Proceedings of the IEEK Conference (대한전자공학회:학술대회논문집)
The Institute of Electronics and Information Engineers (IEIE)
- 기타
2002.07a
-
The numerical alaysis of optical device, silicabased device, are presented. The purpose of this paper is to simulate and to design a 8-channel optical wavelength division multiplexer(OWDM) based on Mach-Zehnder Interferometer(MZI) with wavelength spacing between channels Δλ=0.8 nm at central wavelength λ=1.55
${\mu}{\textrm}{m}$ . In initial condition fur simulating, we assumed as follows. A channel waveguide is made from silica based P-doped SiO2 core layers in order to coupling with a fiber easily and its core dimension was 6${\mu}{\textrm}{m}$ $\times$ 6${\mu}{\textrm}{m}$ . The core and clad index of channel waveguide were 1.455 and 1.444, separately, at λ=1.55${\mu}{\textrm}{m}$ . Where, the separation between channel waveguides in coupling region was 3${\mu}{\textrm}{m}$ . As a result of analysis, a group mode index of channel waveguide was 1.4498370, was gained by Hermite-Gaussian Method(HGM). Also, the channel spacing was determined by the waveguide arm length difference and was Δλ=0.8 nm as like a proposed condition. The central wavelength of a designed-multiplexer was activated about wavelength λ=1.55${\mu}{\textrm}{m}$ , and we certificated that it can be used to 8-channel optical wavelength division multiplexer/demultiplexer. -
The erbium doped fibre ring laser (EDFL) is modelled using the standard propagation and rate equations of a homogeneous, two-level gain medium. The EDFL numerical simulations provide comparable results with the experimental data. The process of lasing mode competition and mode selection is clearly depicted and explained.
-
We improve the free-space optical interconnection efficiency by using circular aperture computer-generated hologram (CGH). In free-space optical interconnection system using CGH, the single CGH is composed of sub-CGHs, which can change the direction of input beams to desired output positions, by Fourier transform. Each sub-CGH is rectangular shape, so the input beams through each sub-CGH are transformed to sinc functions in output plane. The side lobes of each sinc function are superimposed in output plane and they result in detection error in output plane, so the detection efficiency is low. We use the circular shaped sub-CGHs in order to reduce the side lobe value in output plane instead of rectangular shaped sub-CGHs. The each input beam is transformed to first-order Bessel functions through circular shaped sub-CGHs in output plane. The side lobes of first-order Bessel functions us low values compared with side lobes of sinc function, so we can improve the detection efficiency in output plane. We use binary phase modulated CGH, and confirm this improvement results by simulation.
-
The performance improvement of 40Gbit/s soliton transmission system employing nonlinear optical loop mirror (NOLM) as all-optical regenerative repeater is investigated. The switching characteristic of NOLM is optimized using our design strategies. By inserting the optical repeater where the eye-penalty of the transmitted signal becomes 1 ㏈, we achieve the improvement of 0.3㏈ eye-penalty resulting in further 480km transmission distance.
-
A configuration for radio-over-fiber transmission, with remote LO delivery from the central office, and a simple, cost-effective, base station solution is proposed. It is shown that using practically available components, and even with a fiber dispersion of 17 ㎰/nm/km, it is possible to transmit, without repeaters, bit rates of up to 622 Mbit/s for about 20 km at a bit-error rate of 10
$\^$ -9/, with 0㏈m laser power and a modest optical gain of 6㏈. By increasing the optical gain to 25 ㏈, the link length can be increased to ∼80 km. -
We present a phase covariance model that can well represent stimulus intensity as well af feature binding (i.e., covariance). The model is represented by complex neural equations, which is a mean field model of stochastic neural model such as Boltzman machine and sigmoid belief networks.
-
The Mass production of ceramic heater has encountered with the estimation for the proper parameters of the printing conditions. This paper presents a method to estimate the squeegee pressure. It uses resistance distribution from the trial run with approximate squeegee pressure which comes from statistical process control (SPC). Then, the resistance distribution and its total resistance are input to the backpropagation neural networks that can recognize resistance's distribution patterns. The value of output network derived from the input value can identify to the appropriate squeegee pressure. The experimental results are demonstrated In ensure the efficiency and the reliability of this method with the accuracy 96.75 percent. Indeed, embedded on this method will aid us to reduce the loss from the normal mass production.
-
Radial Basis Function (RBF) networks is known as efficient method in classification problems and function approximation. The basis function of RBF networks is usual adopted normal distribution like the Gaussian function. The output of the Gaussian function has the maximum at the center and decrease as increase the distance from the center. For learning of neural network, the method treating the limited area of input space is sometimes more useful than the method treating the whole of input space. The q-normal distribution is the set of probability density function include the Gaussian function. In this paper, we introduce the RBF networks with the basis function of q-normal distribution and actually approximate a function using the RBF networks.
-
To obtain good performance of radial basis function (RBF) neural networks, it needs very careful consideration in design. The selection of several parameters such as the number of centers and widths of the radial basis functions must be considered carefully since they critically affect the network's performance. We propose a learning algorithm for growing of complexity of RBF neural networks which is adapted automatically according to the complexity of tasks. The algorithm generates a new basis function based on the errors of network, the percentage of decreasing rate of errors and the nearest distance from input data to the center of hidden unit. The RBF's center is located at the point where the maximum of absolute interference error occurs in the input space. The width is calculated based on the standard deviation of distance between the center and inputs data. The steepest descent method is also applied for adjusting the weights, centers, and widths. To demonstrate the performance of the proposed algorithm, general problem of function estimation is evaluated. The results obtained from the simulation show that the proposed algorithm for RBF neural networks yields good performance in terms of convergence and accuracy compared with those obtained by conventional multilayer feedforward networks.
-
This paper presents a new stochastic binary neural network based on the Hopfield model. We apply the proposed network to TSP and compare it with other methods by computer simulations. Furthermore, we apply 2-opt to the proposed network to improve the performance.
-
Many scientifc applications include manipulation of data points tying in a space. We describe a method, based on sector labeling to generate a space-filling curve for partitioning such given data points. Our method is straightforward and flexible, equipping a one-one correspondence between point-values on the curve and data points in space in more efficient than designated methods found in the literature. It is widely believed that the Hilbert curve achieves the desired properties on linear mappings due to the locality between data points. Therefore we focus on the Hilbert curve since, later on, we identify it as the most suitable for our application. We demonstrate on using our method for the data particles of an n-body simulation that based on Barnes-Hut algorithm.
-
A novel characteristic value extraction method based on morphological spatial frequency is proposed. Morphological spatial frequency defined by morphological pattern distribution function is introduced. Superiority of the method was proved for various images by experiment. Furthermore the fact that the proposed method does not need threshold to obtain binary image provides its applicability to content-based image retrieval.
-
One problem of vision-based eye-gazed detection is that it gives low resolution. Base on the displacement of the eyes, we proposed method for vision-based eye-gaze detection. While looking at difference positions on the screen, the distance of the centers of the eyes change accordingly. This relationship is derived and used to map the displacement to the distance in the screen. The experiments are performed to measure the accuracy and resolution to verify the proposed method. The results shown the accuracy of the screen mapping function for the horizontal plane are 76.47% and the error of this function be 23.53%
-
There are increasing needs to deliver the multimedia streaming over heterogeneous networks. When considering network environments and equipment accessed by user, delivery of video streaming must be scalable. There are many kinds of scalable video coding: spatial, temporal, SNR, and hybrid. The SNR scalable and spatial resolution, but different SNR quality with respect to layers. The 1-layer SNR scalable encoder produces SNR scalable video streams with ease. But, there is drift problem. Modified 1-layer approach does not have this problem but coding inefficiency, and is not MPEG-compliant. The present MPEG-compliant 2-layer encoder comes out to reduce coding rate. But it still use only base layer to encode whole layer. In this paper, we propose adaptive MPEG-compliant 2-layer encoder. Using linear combination algorithm, encoder use 1 motion vector to encode the sequences efficiently. By dong this, we can achieve the coding efficiency of SNR scalable coding.
-
An Adaptive Beam Tracing for Visual Simulation of Ray Propagation in Wireless Communications SystemsIn this paper, an adaptive beam tracing method with revised subdivision technique is proposed, in which the beam is generated by a set of three rays. According to reflection and/or refraction of the rays on the buildings and/or ground, additional rays are generated adaptively and the beam is subdivided efficiently and automatically. After generation of the set of beams, we transform the electromagnetic wave propagation data into volume data. Then one can visualize the data of propagation with reflection, refraction and interaction in full three dimensional space at any viewpoint by the so-called ray casting algorithm, which is one of the most useful methods in compute. graphics(CG).
-
In this paper, we present a new generalized k-Tree-based (CU/PE) allocation model to perform dynamic resource (CU/PE) allocation/deallocation decision for the reconfigurable MSIMD/MIMD multi-dimensional (k-D) mesh-connected architectures. Those reconfigurable multi-SIMD/MIMD systems allow dynamic modes of executing tasks, which are SIMD and MIMD. The MIMD task requires only the free sub-system; however the SIMD task needs not only the free sub-system but also the corresponding free CU. In our new k-Tree-based (CU/PE) allocation model, we introduce two best-fit heuristics for the CU allocation decision: 1) the CU depth first search (CU-DFS) in O(kN
$_{f}$ ) time and 2) the CU adjacent search (CU-AS) in O(k2$^{k}$ ) time. By the simulation study, the system performance of these two CU allocation strategies was also investigated. Our simulation results showed that the CU-AS and CU-DFS strategies performed the same system performance when applied for the reconfigurable MSIMD/MIMD 2-D and 3-D mesh-connected architectures. -
The locking is the most widely-used concurrency control mechanism for guaranteeing logical consistency of a database where a number of transactions perform concurrently. In this Paper, we propose a new method for lock management appropriate in main-memory databases. Our method chooses the partition, a fixed-sized container for records. as a unit of locking. and directly keeps lock information within the Partition itself. These make our method enjoy the following advantages: (1) it has freedom in controlling of the trade-off between the system concurrency and the lock processing overhead by considering the characteristics of given target applications. (2) it enhances the overall system performance by eliminating the hashing overhead, a serious problem occurred in the traditional method.
-
This paper proposes a new dynamic storage structure and methods fur geometric data with detail levels. Using geometric data with detail levels, we can search geometric data quickly. However, the previous structures for detail levels form the bottleneck in the design of database and do not support all types of geometric data with detail levels. Our structure supports all types of geometric data with detail levels. Moreover, our structure does not form bottleneck in the design of database. This paper presents the structure and algorithms for searching and updating of geometric data with detail levels. Experiments are then performed.
-
High frequency digital LSI circuits are usually composed of many sub-circuits coupled with interconnects. They sometimes causes serious problems of the fault switching by time-delays, crosstalks, reflections of signals and so on. Therefore, it is very important to develop a user-friendly simulator for solving these problems. Although a moment matching method is widely used as the reduction technique of interconnects, it may happen to arise erroneous results for evaluating the poles far from the origin. In this paper, we show an asymptotic method in the complex frequency-domain, where we calculate the exact poles and residues giving large effect to the transient responses. Then, the interconnects are replaced by the asymptotic equivalent circuits using the poles and residues. Thus, we can develop a users-friendly simulator using the equivalent circuits.
-
In this paper we present a novel temperature compensated Hall effect power IC for accurate operation of wide temperature and high current drive of the motor coil. In order to compensate the temperature dependence of Hall sensitivity with negative temperature coefficient(TC), the differential amplifier has the gain consisted of epi-layer resistor with positive TC. The material of Hall device and epi-resistor is epi-layer with the same mobility. The variation of Hall sensitivity is -38% at 150
$^{\circ}C$ and 88% at - 40$^{\circ}C$ . But the operating point(B$\sub$ op/) and release point(B$\sub$ RP/) of the Hall power IC are within${\pm}$ 25%. The experimental results show very stable and accurate performance over wide temperature range of -40$^{\circ}C$ to 125$^{\circ}C$ . -
We propose a current-mode analog programmable finite-impulse-response (FIR) filter with variable tap circuits. From the circuit simulation, the operation of the 7- tap FIR filter is confirmed. We design and fabricate the 0.0625-step tap circuit using 0.8
$\mu\textrm{m}$ CMOS technology. The proposed FIR filter has a variable length of taps and variable coefficients, so it has a potential for being used to software defined radio (SDR) terminals. -
A compact rail to rail CMOS voltage follower is presented. The circuit is based on the symmetrical class AB voltage follower and can operate under supply voltages of
${\pm}$ 1.5 V. The proposed circuit has power dissipation of 5.2㎽ under quiescent condition and can drive${\pm}$ 1.25 V to 250$\Omega$ load with a total harmonic distortion of less than 0.5 percent and cut off frequency of 237 ㎒. Although simple, the proposed circuit enables the output transistors to drive load efficiently. -
A new design approach for realising low-power low-voltage high-Q high-order RE bandpass filter is proposed. Based on the gyrator-C inductor topology, a 2
$\^$ nd/-order biquadratic bandpass filter can be realised by adding a series capacitor to the input port of the gyrator. High-Q 2$\^$ nd/-order and 4$\^$ th/-order fully differential RF bandpass filters operating in the 2.4-㎓ ISM (Industrial, scientific and medical) frequency band under a 2-V single power supply voltage with low power dissipation are reported. -
In this work, an efficient lifting implementation of invertible deinterlacing is proposed. The invertible deinterlacing is a technique developed for intra-frame-based video coding as a preprocessing. Unlike the conventional deinterlacing, it preserves the sampling density and has the invertibility. For a special selection of filters, it is shown that the deinterlacing can be implemented efficiently by an in-place computation. It is also shown that the deinterlacing can be combined with the lifting discrete wavelet transform (BWT) employed in JPEG2000. A bit modification of the original lifting DWT is shown to provide the simultaneous implementation of deinterlacing. This fact makes the proposed technique attractive for the application to Motion-JPEG2000. The inverse transform and the reversible lifting implementation are also discussed.
-
A VLSI architecture of an Ogg Vorbis decoder is proposed : which is dedicated to portable audio appliances. Referring to the computational cost analysis of the decoding processes, the LSP (Line Spectrum Pair) process, which takes more than 50% of the total processing time, can be regarded as a bottleneck to achieve realtime processing by embedded Processors. Thus in our decoder a specific hardware architecture is devised for the LSP process so as to be integrated into a single chip together with an ARM7TDMI processor. In addition, in order to reduce the total hardware cost, instead of the floating point arithmetic, the fixed point arithmetic is adopted. The LSP module has been implemented with 9,740 gates by using a Virtual Silicon 0.l5
$\mu\textrm{m}$ CMOS technology, which operates at 58.8MHz with the total CPU load reduced by 57%. It is also verified that the use of the fixed point arithmetic does not incur any significant sound distortion. -
This paper reports a parallel architecture in a HMM based speech recognition system for a low-power LSI design. The proposed architecture calculates output probability of continuous HMM (CHMM) by using concurrent and pipeline processing. They enable to reduce memory access and have high computing efficiency. The novel point is the efficient use of register arrays that reduce memory access considerably compared with any conventional method. The implemented system can achieve a real time response with lower clock in a middle size vocabulary recognition task (100-1000 words) by using this technique.
-
A noise reduction technique to reduce background noise in corrupted voice is proposed. The proposed method is based on linear prediction and takes advantages of periodicity of voiced speech. A voiced sound is regarded as a periodic stationary signal in short time interval. Therefore, the current voice signal is correlated with the voice signal delayed by a pitch period. A linear predictor can estimate only the current signal correlated with the delayed signal. Therefore, the enhanced voice can be obtained as output of the linear predictor. Simulation results show that the proposed method is able to reduce the background noise.
-
In the integrated systems, that is integrated digital TV(DTV) internet and home automation, like home server, is needed integration of digital TV video signal and computer graphic signal. The graphic signal is operating at the high speed and has time-divide-stream. So the re-request of data is not easy at the time of error detection. therefore EDAC algorithm is efficient. This paper presents the efficiency error detection auto correction(EDAC) for conversion of graphics signal to DTV video signal. A presented EDAC algorithms use the modified Hamming code for enhancing video quality and reliability. A EDAC algorithm of this paper can detect single error, double error, triple error and more error for preventing from incorrect correction. And it is not necessary an additional memory. In this paper The comparison between digital TV video signal and graphic signal, a EBAC algorithm and a design of conversion graphic signal to DTV signal with EDAC function is described.
-
In this paper, a new technique for Thai isolated speech phoneme segmentation is proposed. Based on Thai speech feature, the isolated speech is first divided into low and high frequency components by using the technique of wavelet decomposition. Then the energy contour of each decomposed signal is computed and employed to locate phoneme boundary. To verity the proposed scheme, some experiments have been performed using 1,000 syllables data recorded from 10 speakers. The accuracy rates are 96.0, 89.9, 92.7 and 98.9% for initial consonant, vowel, final consonant and silence, respectively.
-
In this paper dynamic characteristics were investigated of the perception of a bound image width. Subjective evaluation tests were carried out of the width of a sound image when its presentation region was moved in the horizontal plane. As a result, the sound image width was perceived narrower or wider than the actual presentation region when the sound source width was decreased or increased, respectively. The result obtained shows that a phenomenon which is a kind of auditory motion aftereffects was occurred in the perception of a sound source with changing its width.
-
A single DSP implementation of 3D sound movement is described. With the use of a realtime 3D acoustic image localization algorithm, an efficient approach is devised for synthesizing the 3D sound movement by interpolating only two parameters of "delay" and "gain". Based on this algorithm, the realtime 3D sound synthesis is performed by a commercially available 16-bit fixed-point DSP with computational labor of 65 MIPS and memory space of 9.6k words, which demonstrates that the algorithm call be used even for the mobile applications.
-
The proxy mechanism widely used in WWW systems offers low-delay data delivery by means of "proxy server". By applying the proxy mechanisms to the video streaming system, we expect that high-quality and low-delay video distribution can be accomplished without introducing extra load on the system. In addition, it is effective to adapt the quality of cached video data appropriately in the proxy if user requests are diverse due to heterogeneity in terms of the available bandwidth, end-system performance, and user′s preferences on the perceived video quality. We have proposed proxy caching mechanisms to accomplish the high-quality and highly-interactive video streaming services. In our proposed system, a video stream is divided into blocks for efficient use of the cache buffer. The proxy server is assumed to be able to adjust the quality of a cached or retrieved video block to the request through video filters. In this paper, to verify the practicality of our mechanisms, we implemented them on a real system and conducted experiments. Through evaluations from several performance aspects, it was shown that our proposed mechanisms can provide users with a low-latency and high-quality video streaming service in a heterogeneous environment.
-
In this paper, a new interactive TV service model is proposed. The MPEG-4 system is specified for composing and managing various object streams including user interactions. The data broadcasting model supporting user interactions is designed using MPEG-4 system in our proposal. We evaluate possibility of proposed service model using simulation player. This player supports MPEG-2 TS which contains MPEG-2 video and AC-3 audio streams as a main service and MPEC-4 system data as interactive services as well as user specific EPG information, and XML data, etc as supplemetary services. The player also supports a multi-channel environment. The synchronization between audio and visual data is achieved by DTS and PTS in TS.
-
To support UDP-based real-time multimedia applications over the Internet, it is necessary to provide a certain amount of bandwidth within the network so that the performance of the applications will not be seriously affected during periods of congestion. Since the flow rates of some of these applications do not back of during periods of congestion, it is also necessary to protect flow-controlled TCP flows from unresponsive or aggressive UDP flows. To achieve these goals, we propose a simple queue policy to support multimedia applications, called threshold-based queue management (TBQM). TBQM isolates UDP flows efficiently from TCP flows to protect TCP flows while supporting bandwidth requirements of UDP applications that require QoS. In addition, TBQM supports drop fairness between TCP flows without maintaining per-flow state. We also present some experimental results to show that the proposed queue policy can work well.
-
An efficient search of binary tree for huffman decoding based on numeric interpretation of codewordsThis paper presents a new method of Huffman decoding which gives a significant improvement of processing efficiency based on the reconstruction of an efficient one-dimensional array data structure incorporating the numeric interpretation of the accrued codewords in the binary tree. In the Proposed search method, the branching address is directly obtained by the arithematic operation with the incoming digit value eliminating the compare instruction needed in the binary tree search. The proposed search method gives 30% of improved Processing efficiency and the memory space of the reconstructed Huffman table is reduced to one third compared to the ordinary ‘compare and jump’ based binary tree. The experimental result with the six MPEG-2 AAC test files also shows about 198% of performance improvement compared to those of the widely used conventional sequential search method.
-
In this paper, a new algorithm for two-dimensional (2-D) finite-difference time-domain (FDTD) method is presented. By this new method, the maximum time step size can be increased over the Courant-Friedrich-Levy (CFL) condition restraint. This new algorithm is adapted from an Alternating-Direction Implicit FDTD (ADI-FDTD) method. However, unlike the ADI-FDTD algorithm. the alternation is performed with respect to the blocks of fields rather than with respect to each respective coordinate direction. Moreover. this method can be efficiently simulated with parallel computation. and it is more efficient than the conventional FDTD method in terms of CPU time. Numerical formulations are shown and simulation results are presented to demonstrate the effectiveness and efficiency of our proposed method.
-
In this paper, we propose a new object tracking algorithm using deformed template and Level-Set theory, which is robust against background variation, object flexibility and occlusion. The proposed tracking algorithm consists of two steps. The first step is an estimation of object shape and location, on the assumption that the transformation of object can be approximately modeled by the affine transform. The second step is a refinement of the object shape to fit into the real object accurately, by using the potential energy map and the modified Level Set speed function. Experimental results show that the proposed algorithm can track non-rigid objects with large variation in the backgrounds.
-
In a network communication process, cryptographic algorithms play important role for secure process. This paper presents a new system architecture named "DCCS." This system can handle flexible operations of both cryptographic algorithms and the keys. For experimental evaluation, two representative cryptographic algorithms DES and Triple-DES are designed and implemented into an FPGA chip on the SEBSW-1. Then the developed board is confirmed to change its cryptographic algorithms dynamically. Also its throughput confirmed the ability of the real-time net-work use of the designed system.
-
We had been developing the variety of parallel processing systems in order to improve the processing speed of visual media applications. These systems were using multi-access memory system(MAMS) as a parallel memory system, which provides the capability of the simultaneous accesses of image points in a line-segment with an arbitrary degree, which is required in many low-level image processing operations such as edge or line detection in a particular direction, and so on. But, the performance of these systems did not give a faithful speed because of asynchronous feature between MAMS and processing elements. To improve the processing speed of these systems, we have been investigated a pipelined parallel processing system using MAMS. Although the system is considered as being the single instruction multiple data(SIMD) type like the early developed systems, the performance of the system yielded about 2.5 times faster speed.
-
In this paper, a new approach is proposed for the error detection dedicated to MPEG-4 video coding by using the digital watermarking. In the process of encoding, the proposed scheme abstracts the macroblock features of headers, motion vectors, and Discrete Cosine Transform (DCT) coefficients, which are embedded in the quantized DCT coefficients as the digital watermarks. The decoder performs the accurate error detection through the watermark extraction. Simulation results demonstrate that the error detection ability of the proposed approach can be significantly enhanced, and that digital watermark embedding incurs little degradation to the picture quality.
-
For the effective use of information in the information society, information should be protected and outflow of information by illegal users should be prevented. This study sets up user authentication policy, user authentication regulations and procedures for information protection and builds information protection key distribution center and encryption user Authentication system which can protect information from illegal users.
-
This paper presents a statistical technique for audio watermarking. We describe the application of the promising public key watermarking method to the patchwork algorithm. Its detection process does not need the original content nor the secret key used in the embedding process. Special attention is given to statistical method working in the frequency domain. We will present a solution of robust watermarking of audio data. In this scheme, an extension of patchwork audio watermarking is presented which enables public detection of the watermark. Experimental results show good robustness of the approach against MP3 compression and other common signal processing manipulations.
-
This paper presents the design of Rijndael crypto-processor with 128 bits, 192 bits and 256 bits key size. In October 2000 Rijndael cryptographic algorithm is selected as AES(Advanced Encryption Standard) by NIST(National Institute of Standards and Technology). Rijndael algorithm is strong in any known attacks. And it can be efficiently implemented in both hardware and software. We implement Rijndael algorithm in hardware, because hardware implementation gives more fast encryptioN/decryption speed and more physically secure. We implemented Rijndael algorithm for 128 bits, 192 bits and 256 bits key size with VHDL, synthesized with Synopsys, and simulated with ModelSim. This crypto-processor is implemented using on-the-fly key generation method and using lookup table for S-box/SI-box. And the order of Inverse Shift Row operation and Inverse Substitution operation is exchanged in decryption round operation of Rijndael algorithm. It brings about decrease of the total gate count. Crypto-processor implemented in these methods is applied to mobile systems and smart cards, because it has moderate gate count and high speed.
-
For laser-cutting rapid prototyping systems that fabricate objects with layers having a certain degree of thickness, it is necessary both to minimize surface distortion and to generate dynamically feasible laser cutting trajectories. An effective tangential layer cutting algorithm is developed for this requirements. An energy function is defined in terms of tangential line lengths and their distances. And the energy is minimized for the tangential lines to closely describe a layer suffice. Our method is applied to 3D model samples and the generated tangential lines effectively approximate layer surface and make laser trajectory smooth.
-
This paper presents perceptual model with a stochastic rnultiresolution characteristic that can be applied with watermark embedding in the biorthogonal wavelet domain. The perceptual model with adaptive watermarking algorithm embed at the texture and edge region for more strongly embedded watermark by the SSQ(successive subband quantization). The watermark embedding is based on the computation of a NVF(noise visibility function) that have local image properties. This method uses non-stationary Gaussian model stationary Generalized Gaussian model because watermark has noise properties. In order to determine the optimal NVF, we consider the watermark as noise. The particularities of embedding in the stationary GG model use shape parameter and variance of each subband regions in multiresolution. To estimate the shape parameter, we use a moment matching method. Non-stationary Gaussian model use the local mean and variance of each subband. The experiment results of simulation were found to be excellent invisibility and robustness. Experiments of such distortion are executed by Stirmark benchmark test.
-
In recent years, an increasing amount of computer network research has focused on the problem of cluster system in order to achieve higher performance and lower cost. The load unbalance is the major defect that reduces performance of a cluster system that uses parallel program in a form of SPMD (Single Program Multiple Data). Also, the load unbalance is a problem of MPP (Massive Parallel Processors), and distributed system. The cluster system is a loosely-coupled distributed system, therefore, it has higher communication overhead than MPP. Dynamic load balancing can solve the load unbalance problem of cluster system and reduce its communication cost. The cluster systems considered in this paper consist of P heterogeneous nodes connected by a switch-based network. The master node can predict the average execution time of tasks for each slave node based on the information from the corresponding slave node. Then, the master node redistributes remaining tasks to each node considering the predicted execution time and the communication overhead for task migration. The proposed dynamic load balancing uses execution time prediction to optimize the task redistribution. The various performance factors such as node number, task number, and communication cost are considered to improve the performance of cluster system. From the simulation results, we verified the effectiveness of the proposed dynamic load balancing algorithm.
-
In this paper, we propose new unsharp masking technique based on the multiscale gradient planes. The unsharp masking technique is implemented as a high-pass filter and improves the sharpness of degraded images. However, the conventional unsharp masking enhances the noise component simultaneously. To reduce the noise influence, we introduce the edge information from the difference of the gradient values between two consecutive scales of the multiscale gradient. The multiscale gradient indicates the presence of image edges as the ratio between the gradients between two different scales by its multiscale nature. The noise reduction of the proposed method does not depend on the variance of images and noises. In experiment, we demonstrate enhancement results for blurred noisy images and compare with the conventional cubic unsharp masking technique.
-
Two-dimensional (2-D) X-ray computerized tomography (CT) equipments are widely used in industrial and medical fields, and nowadays studies on reconstruction algorithm for 3-D cone-beam acquisition systems are active for better utilization. The authors recent-By have proposed a fast reconstruction aigorithm using tree-structured filter bank for 2-D C1, and shown the algorithm is applicable to an approximate reconstruction of 3-D CT. For exact 3-D CT reconstruction, however, we have to backproject 1-D signal into 3-D space. This paper proposes a fast implementation method for this back-projection by use of tree-structured filter bank. and shows the proposed method works approximately 700 times faster than the direct one with almost same reconstruction image quality.
-
To reduce the bit-rate of video sequences by removing temporal redundancy, motion estimation techniques have been developed. However, the high computational complexity of the problem makes such techniques very difficult to be applied to high-resolution applications in a real time environment. For this reason, low computational complexity motion estimation algorithms are viable solutions. If a priori knowledge about the motion of the current block is available before the motion estimation, a better starting point for the search of n optimal motion vector on be selected and also the computational complexity will be reduced. In this paper, we present an adaptive block matching algorithm based on temporal correlations of consecutive image frames that defines the search pattern and the location of initial starting point adaptively to reduce computational complexity. Experiments show that, comparing with DS(Diamond Search) algorithm, the proposed algorithm is about 0.1∼0.5(㏈) better than DS in terms of PSNR and improves as much as 50% in terms of the average number of search points per motion estimation.
-
About 90% of Thai-style addresses have similar features; e.g. the beginning of each address line is diagonal. In this paper, we propose a method for locating destination address block (DAB) on Thai envelopes based on features of Thai-style addresses. Firstly, we decompose image into smaller blocks and remove all blocks not meeting criteria. Secondly, we search for the DAB candidates. Lastly, heuristic rules and typical features are applied to identify the destination address block. Experimental results using 2,700 envelopes of handwritten and machine printed Thai envelopes show a successful address extraction rate of 91%.
-
We presented the automatic extraction technique of a biological internal organization from full-color continuous images. It was implemented using the localized homogeneousness of color intensity, and also using the continuity between neighboring images. Moreover, we set the "four-level status value" of area condition as a value showing "area possibility. This played important role of preventing a miss-judgement of area definition. These our approach had a beneficial effect on tracking color and shape change of the interest area in continuous extraction. As a resell we succeeded in extraction of mouse's stomach from continuous 50 images.
-
We suggest a novel approach to the tracking of multiple moving objects in image sequence. The tracking of multiple moving objects include some complex problems(crossing (occluding), entering, disappearing, joining, and dividing) for objects identifying. Our method can settle these problems by optimization of a penalty function and movement prediction. It is executable in .eat time processing (more than 30 ㎐) because it is computed by only location data.
-
Multispectral Image Data Compression Using Classified Prediction and KLT in Wavelet Transform DomainThe current paper proposes a new multispectral image data compression algorithm that can efficiently reduce spatial and spectral redundancies by applying classified prediction, a Karhunen-Loeve transform (KLT), and the three-dimensional set partitioning in hierarchical trees (3-D SPIHT) algorithm In the wavelet transform (WT) domain. The classification is performed in the WT domain to exploit the interband classified dependency, while the resulting class information is used for the interband prediction. The residual image data on the prediction errors between the original image data and the predicted image data is decorrelated by a KLT. Finally, the 3D-SPIHT algorithm is used to encode the transformed coefficients listed in a descending order spatially and spectrally as a result of the WT and KLT. Simulation results showed that the reconstructed images after using the proposed algorithm exhibited a better quality and higher compression ratio than those using conventional algorithms.
-
At present there is no hardware design system by using the voice. We try to use the voice communication to the hardware design and to communication with the computer. This time, we make au application that introduces voice communication and we execute small-scale circuit description.
-
In this paper, we present an intermediate representation CDFG(Control Data Flow Graph) and an efficient scheduling technique for low power circuit design. The proposed CDFG represents control flow, data dependency and such constraints as resource constraints and timing constraints. In the scheduling technique, the constraints are substituted by subgraphs, and then the number of subgraphs is minimized by using the inclusion and overlap relation efficiently. Also, iterative rescheduling process are performed in a minimum bound estimation, starting with the as soon as possible as scheduling result, so as to reduce the power consumption in low power design. The effectiveness of the proposed algorithm has been proven by the experiment with the benchmark examples.
-
A novel approach of embedded systems for video coding is introduced with the main theme focused on logic-enhanced DRAM and configurable processor. This approach is aiming at reducing high computational costs and frequent memory accessing, which embedded systems are suffering with in the execution of video coding. According Co the software execution analysis, large size functions with intensive memory accesses are tuned to be executed by the logic-enhanced DRAM while small size functions repeatedly called are to be executed by dedicated instructions, which are newly introduced in the configurable processor. The proposed system can speed up H.263 video coding algorithm 7.4 times in comparison with the conventional embedded processor based system.
-
The digital logic systems(DLS) is classified into digital combinational logic systems(CDLS) and digital sequential logic systems(SDLS). This paper presents a method of constructing the digital sequential logic systems without feedback. Firstly we assign all elements in Finite Fields to P-valued digit codes using mathematical properties of Finine Fields. Also, we discuss the operarional properties of the building block T-gate that is used to realizing digital sequential logic systems over Finite Fields. Then we realize the digital sequential logic systems without feedback. This digital sequential logic systems without feedback is constructed ny following steps. Firstly, we assign the states in the state-transition diagram to state P-valued digit dodo, then we obtain the state function and predecessor table that is explaining the relationship between present state and previous states. Next, we obtained the next-state function and predecessor table. Finally, we realize the circuit using T-gate and decoder.
-
This paper proposes MFMCAM(Multi-Functional Multi-port CAM) which has several ports with same characteristic function. This device can process data faster than the conventional single port CAM. MFMCAM is superior to CAMs formed in parallel on the stand points of frequency and module resources. Two representative applications of MFMCAM, sorter and router, are also presented.
-
We present a new low power scan testing and test data compression method for System-On-a-Chip (SOC). The don't cares in unspecified scan vectors are mapped to binary values for low power and encoded by adaptive encoding method for higher compression. Also, the scan-in direction of scan vectors is determined for low power. Experimental results for full-scanned versions of ISCAS 89 benchmark circuits show that the proposed method has both low power and higher compression.
-
A transceiver for ADSL systems contains an interpolated combfilter, halfband filters, oversampling sigma delta modulator, a current steering DAC and an analog filler. The circuit complexity of the architecture makes it necessary to use behavioral models to determine the system features. For this reason, we need a specific behavioral simulation environment using the Matlab program. The Matlab is crucial for these circuits to be rapidly incorporated in larger systems, in particular in the context of mixed-signal-test schemes. Design trade-off among the blocks has also been discussed. The design methodology is based on behavioral design and CMOS process.
-
As the integrated circuit technology gets developed, a circuit size of more than thousands of transistors becomes normal. A hierarchical design is unavoidable due to a huge circuit size. It is important how we can consider hierarchical structure in circuit delay analysis. In this paper we present an accurate method to analyze the delay of circuit with hierarchical structure. Adding the notion of global false path to the hierarchical timing analysis performs more accurate timing analysis.
-
With the popularity of utilization of the Internet among people, the amount of data in the network rapidly increased. So that, the fall of response time from WWW server, which is caused by the network traffic and the burden on m server, has become more of an issue. This problem is encouraged the rearch by redundancy of requesting the same pages by many people, even though they browse the same the ones. To reduce these redundancy, WWW cache server is used commonly in order to store m page data and reuse them. However, the technical uses of WWW cache that different from CPU and Disk cache, is known for its difficulty of improving the cache hit rate. Consecuently, it is difficult to choose effective WWW data to be stored from all data flowing through the WWW cache server. On the other hand, there are room for improvement in commonly used cache replacement algorithms by WWW cache server. In our study, we try to realize a WWW cache server that stresses on the improvement of the stresses of response time. To this end, we propose the new cache replacement algorithm by focusing on the utilizable information of network distance from the WWW cache server to WWW server that possessing the page data of the user requesting.
-
Authentication protocol as a part of security system has been growth rapidly since it was known that sending clear text password in the network is unsecured. Many protocols could be noted proposed to strengthen the authentication process. In 1985 an attempt to safeguard network services within Athena project resulting on the born of Kerberos 〔1〕〔8〕, one of the protocol that has a lot of attention from the research community. Several years later researchers were discovered some weaknesses carried by this protocol 〔2〕〔21〕. In 1992. EKE was introduced by Bellovin and Merrit. Since that time, many protocols introduced could be considered as its variant 〔5〕〔9〕〔13〕〔14〕. Some other protocols such as OKE〔5〕 and SRP〔18〕 although claimed different from EKE, they have the same basic mechanism in holding authentication process. Here, we explain the mechanism of those protocols, their strength and their weaknesses and shortcomings. Due to the limitations of the number of paper pages, only two types of authentication protocol can be explained here i.e EKE and SRP.
-
A mobile agent system that searches for meaningful information from web XML documents is developed. For this, a domain information was conceptualized and a universal DTD generator is developed. A mobile agent with the universal DTD is dispatched to remote sites, extracts meaning information, and transmits the information back to a host. This way of information filtering is able to enhance the quality of information and reduce the network transmission overhead.
-
We have implemented an interactive multimedia education system for C programming. The system consists of two pars. One is multimedia contents to help students better understand C language syntax, programming style, and program logic and the other is a web-based compilation support system that compiles C programs at the server side which are submitted trough Web by students and returns their execution results to the students' PC. Although there are currently some restrictions that students should replace the inputs functions such as scanf(), getc() and getch() with assignment statements or fscanf(fp, , ), since the system has been implemented using general web technologies and shareware C compiler, the education system could be one solution that education institutions seek to reduce annual immense expenditure of money on C complier.
-
In previous study about combinatorial optimization problem solver by using neural network, since Hopfield method, to converge into the optimum solution sooner and certainer is regarded as important. Namely, only static states are considered as the information. However, from a biological point of view, the dynamical system has lately attracted attention. Then we propose the "dynamical" combinatorial optimization problem solver using hysteresis neural network. In this article, the proposal system is evaluated by the N-Queen problem.
-
This paper addresses the problem of merging two feedforward neural networks into one network. Merging is accomplished at the level of hidden layer. A new network selects its hidden layer's units from the two networks to be merged We uses information theoretic criterion (quadratic mutual information) in the selection process. The hidden unit's output and the target patterns are considers as random variables and the mutual information between them is calculated. The mutual information between hidden units are also considered to prevent the statistically dependent units from being selected. Because mutual information is invariant under linear transformation of the variables, it shows the property of the robust estimation.
-
The characteristic features of Malaysia's climate is has stable temperature, with high humidity and copious rainfall. Weather forecasting is an important task in Malaysia as it could affetcs man irrespective of mans job, lifestyle and activities especially in the agriculture. In Malaysia, numerical method is the common used method to forecast weather which involves a complex of mathematical computing. The models used in forecasting are supplied by other counties such as Europe and Japan. The goal of this project is to forecast weather using another technology known as artificial neural network. This system is capable to learn the pattern of rainfall in order to produce a precise forecasting result. The supervised learning technique is used in the loaming process.
-
Parallel-computation is very interesting topic. This paper describes that we apply it into the Boltzmann machine with the Parallel-Transit-Evaluation Method successfully.
-
This work describes the use of neural networks (NNs) for interpreting voltammetric data, i.e., current-voltage spectra that obtained from the electrochemical reaction of analyte species at a gold electrode. Current-voltage spectra of glucose, fructose and ascorbic acid in mixtures obtained from dual-pulse staircase voltammetry (DPSV) was in the form of the mixed responses contain characteristics of the individual analytes approximately in proportion to their concentration. Extraction of individual analyte concentration from combined data was subsequently achieved using NNs. The combination of DPSV and NNs opens a possibility for simultaneous determination of mixtures of the species for fruit juices quality monitoring.
-
Pulse-Coupled Neural Network (PCNN), which can explain the synchronous burst of neurons in a cat visual cortex, is a fundamental model for the biomimetic vision. The PCNN is a kind of pulse coded neural network models. In order to get deep understanding of the visual information Processing, it is important to simulate the visual system through such biologically plausible neural network model. In this paper, we construct the motion detection model based on the PCNN with the receptive field models of neurons in the lateral geniculate nucleus and the primary visual cortex. Then it is shown that this motion detection model can detect the movements and the direction of motion effectively.
-
Many digital watermarking methods have been proposed for copyright protection. Especially, methods to add a watermark in the frequency domain are often used. In those methods, only a few components of frequencies are changed according to watermark information, so that the pixel values of the image obtained by the inverse transform sometimes exceed the dynamic range and owing to the clipping process at this time watermark information is changed. This phenomenon even occurs without attacks like image processing. In this paper, we propose two methods to prevent loss of watermark information, applicable to such cases, it is said that one is the method called "inversion of increase and decrease" and another is "conservation of amounts of changes." We can extract the watermark information correctly under the condition of no attacks by using these proposed methods.
-
Error resilience for image coding is an important component of multimedia communication system. Error resilience schemes address loss recovery from the compression perspective. Multiple description coding (MDC) is one of the error resilience techniques promising for robust video transmission. It is the way to achieve tradeoff description such as scalar quantization, correlating transform and the quantized frame expansion. In this paper, we consider Multiple Description Scalar Quantization (MDSQ) to wavelet domain. Conventional MDSQ schemes considered description with equal weights in each sub-bands. But, we can see that the each sub-bands is unequal contribution to whole image quality. Therefore, we experiment the multiple design MDSQ table to make probability of zero index high, which gives high efficiency in arithmetic symbol coder. We also compare our proposed method with the conventional methods and show improved performance in terms of redundancy-rate-distortion.
-
Compression of magnetic resonance images (MRI) has proved to be more difficult than other medical imaging modalities. In an average sized hospital, many tora bytes of digital imaging data (MRI) are generated every year, almost all of which has to be kept. The medical image compression is currently being performed by using different algorithms. In this paper, Fuzzy C-Means (FCM) algorithm is used for the Vector Quantization (VQ). First, a digital image is divided into subblocks of fixed size, which consists of 4
${\times}$ 4 blocks of pixels. By performing 2-D Discrete Cosine Transform (DCT), we select six DCT coefficients to form the feature vector. And using FCM algorithm in constructing the VQ codebook. By doing so, the algorithm can make good time quality, and reduce the processing time while constructing the VQ codebook. -
This paper provides a frame-layer method for controlling bit rate of compressed video data in real time. Our approach is easy to operate and can store encoded video data in real time without deteriorating the quality of an image. To provide ameliorated and consistent visual quality, a new concept named SOP (Set Of Pictures) and a new quantization parameter variation control algorithm based on a second-order rate-distortion model 〔2〕 are introduced. The total bit-budget is allocated efficiently to cope with unpredictable recording time by using the proposed algorithm and it is distributed to each frame. In the end, we show improved and consistent video quality with experimental results obtained from C-model of a MPEG-4 (simple-profile) encoder.
-
This paper discusses a software reliability model for the distributed s-PCT algorithm fur remote sensing applications. The distributed algorithm is designed based on a Manager-Worker threading concept and goes further to use redundancy to achieve fault tolerance. The paper provides a status report on our progress in developing the reliability concept and applying it to create a model for the distributed s-PCT In particular, we are interested ill the algorithm performance versus reliability.
-
In this paper, we propose a post-processing method to reduce the blocking artifacts. We perform the post-processing only in the spatial domain so that it is readily applicable to real-time video decoder. Many approaches proposed so far for deblocking deal with only The luminance signal. but here we propose processing the chrominance signals as well since the low bit rare application where the blocking artifacts are most problematic suffers significantly from the color misalignment caused by blocking artifacts occurring to chrominance data as well. The proposed method is composed of low pass filtering in two steps considering the edge direction. The first step is the IIR low pass filtering in the diagonal direction, and the second step is another IIR low pass filtering in horizontal and vertical directions.
-
Recently, database technologies have been used commonly. But, ordinary technologies aren't suitable to construct a complicated database such as a classical literature database or an archaeological relic's database. Because this kinds of data are semi-structured data that doesn't have regular structures, database schema can't be defined before databases. We have proposed DREAM model for semi-structured databases. In this model, a database consists of five elements and the model has operations similar to operation of set theory. And further we have introduced dynamic schema "shape" showing structure of each element. We have already realized a prototype of DBMS adopting DREAM model (DREAM DBMS) and constructing function of shapes. However, shape is imperfect to describe database structures because it can't explain nested structures of elements. In this paper, we will profuse a "shape graph"that is dynamic schema showing database structures more exactly and extend the DREAM DBMS. Further we will evaluate the performance of constructing function of shapes and shape graphs.
-
This paper proposes a control board that includes PNP function with extensibility and effective allocation of allocation. The object of study is to overcome limited extensity of old systems and it is to reuse the system. The system recognizes automatic subsystem from application of main system with board level that is using hardware and software co-design method. The system has both function of main-board and sub-board. So one system can operate simultaneously such as module of alien system. This system has advantages that are fast execution, according as process functional partition to hardware/ software co-design and board size is reduced as well as offer extensity of development system. We obtained good result with control board for existent Z-80 training kit.
-
Advances in networking infrastructure have led to the development of a new type of "computational grid" infrastructure that provides predictable, consistent and uniform access to geographically distributed resources such as computers, data repositories, scientific instruments, and advanced display devices Such Grid environments are being used to construct sophisticated, performance-sensitive applications in such areas as dynamic, distributed real-time applications. In this paper, we propose a toolset for designing distributed real-time systems based on computational grid. The toolset is based on a new methodology and integrates the models that methodology Proposed for designing real-time systems.
-
This paper presents the design and implementation of a crypto processor, a special-purpose microprocessor optimized for the execution of cryptography algorithms. This crypto processor can be used fur various security applications such as storage devices, embedded systems, network routers, etc. The crypto processor consists of a 32-bit RISC processor block and a coprocessor block dedicated to the SEED and triple-DES (data encryption standard) symmetric key crypto (cryptography) algorithms. The crypto processor has been designed and fabricated as a single VLSI chip using 0.5
$\mu\textrm{m}$ CMOS technology. To test and demonstrate the capabilities of this chip, a custom board providing real-time data security for a data storage device has been developed. Testing results show that the crypto processor operates correctly at a working frequency of 30MHz and a bandwidth o1240Mbps. -
In this paper, we will present the design and implementation of the KASUMI crypto algorithm and confidentiality algorithm (f8) to an hardware chip for 3GPP system. The f8 algorithm is based on the KASUMI which is a block cipher that produces a 64-bit output from a 64-bit input under the control of a 128-bit key. Various architectures (low hardware complexity version and high performance version) of the KASUMI are made with a Xilinx FPGA and the characteristics such as hardware complexity and thor performance are analyzed.
-
For a rule-based conversion of Hangout into the Roman alphabet rather than a word-for-word conversion, one must come up with a faultless model for the Korean standard pronunciation rules, which are the basis of the Romanization. It is on this foundation that the Korean-Roman alphabet conversion table can be created. For linguistic modeling using PetriNet, modeling boundary and notation of modeling can be defined. In order to describe PetriNet, which is a dynamic modeling tool, as a static one, one can model the standard Korean pronunciation rules and the Hangout-Roman alphabet notation by conversion into incident matrix Thus, this research attempts to develop a mathematical modeling tool for a natural language using PetriNet, and create a Korean-Roman alphabet conversion table.
-
In this paper. we propose a floating resistor with positive and negative resistance operating at lower supply voltages. The circuit uses only two transistors between the supply voltages. which enable to operate it at low supply voltages. Moreover. the circuit uses fewer number of transistors compared to the reported work. The gate terminal is used in this circuit for the current addition/subraction at the terminals of resistor. The characteristic of the proposed circuit is verified using HSPICE for the power supply +/-1.5V.
-
In this paper a common design method fur RF receivers of different CDMA standards is introduced. The method adopted a new equation, receiver noise equation, for the analysis of each standard. The test conditions for RF receivers in four different CDMA standards, CDMA cellular, PCS, WCDMA, and cdma2000 are analyzed based on the receiver noise equation. With the result of the analysis, the specifications fer RF receivers of different CDMA standards are derived.
-
An alternative CMOS implementation of a multi-output four-terminal floating nullor (FTFN) with constant-g
$_{m}$ rall-to-rail input stage is proposed. This presented circuit is based on the advantages of a complementary transconductance amplifier and class AB dual translinear cell circuit that comes up with wide bandwidth. The constant-g$_{m}$ characteristic is controlled by the maximum-current selection circuits, maintaining the smooth response over the change of input common mode voltage. The circuit performances are confirmed through HSPICE simulations. A current-mode multifunction filter is used to exhibit the potentiality of this proposed scheme.eme. -
This paper describes a phase compensation technique for the low power consumption OTA. Power consumption of the low power OTA is lower than that of the conventional Wang's OTA. However. this circuit has an oscillation problem. The phase margin is -24deg. By using the phase compensation capacitor, the phase margin becomes 52deg. As a result, the low power consumption OTA circuit becomes to have an enough phase margin and to operate stably.
-
This paper is proposed a 8-bit analog to digital converter for CMOS image sensor. A analog to digital converter for CMOS image sensor is required function to control gain. Frequency divider is used In control gain in this proposed analog to digital converter. At 3.3 Volt power supply, total static power dissipation is 8㎽ and programmable gain control range is 30㏈. Newly suggested analog to digital converter is designed by 0.35um 2-poly 4-metal CMOS technology.
-
A complementary VHF CMOS active inductor is described. The proposed circuit employs 'p-type' and 'n-type' active inductor to obtain enlarged signal handling ability. Under the same inductance, Q value, and power consumption, the proposed circuit shows more than 12-㏈ improvement in dynamic range while maintaining high-frequency operation. Further enhancement is obtained by using a fully differential floating inductor structure. A 1-㎓ 4
$\^$ th/-order coupled-resonator filter is designed to demonstrate the potential of the proposed active inductor. -
This paper describes a design of a 1bit Carry Propagate Free Adder/Subtracter (CPFA/S) VLSI using the Adiabatic Dynamic CMOS Logic (ADCL) circuit technology. Using a PSPICE simulator, energy dissipation of the ADCL 1bit CPFA/S is compared with that of the CMOS 1bit CPFA/S. As a result, energy dissipation of the proposed ADCL circuits is about 1/23 as low as that of the CMOS circuits. The transistors count, propagation-delay tittle and energy dissipation of the ADCL 4bit CPFA/S are compared with those of the ADCL 4bit Carry Propagate Adder/Subtracter (CPA/S). The transistors count and propagation-delay tittle are found to be reduced by 7.02% and 57.1%, respectively. Also, energy dissipation is found to be reduced by 78.4%. Circuit operation and performance are evaluated using a chain of the ADCL 1bit CPFA/S fabricated in a
$1.21mutextrm{m}$ CMOS process. The experimental results show that addition and subtraction are operated with clock frequencies up to about 1㎒. -
In this paper, we design an efficient, scalable one-dimensional discrete wavelet transform (1DDWT) filter using data reorder unit (DRU). At each level, the required hardware is optimized by sharing multipliers and adders because the input rate is reduced by a factor of two at each level due to decimation. The proposed architecture shows 100% hardware utilization by balancing hardware with input rate. Furthermore, sharing the coefficients of the highpass and the lowpass filters using the mirror filter property reduces the number of multipliers and adders by half. We designed a scalable DRU that efficiently reorders and feeds inputs to highpass and lowpass filters. The proposed DRU-based architecture is so regular and scalable that it can be easily extended to an arbitrary 1D DWT structure with M taps and J levels. Compared to other architectures, the proposed DWT filter shows efficiency in performance with relatively less hardware.
-
In this paper, we propose a technique to eliminate 1,he effect of false paths in the calculation of the distribution of the maximum delay of a given CMOS combinatorial circuit, when distributions of interconnect delays and gate switching delays of the circuit are given. The technique can be incorporated into our algorithm for the statistical static timing analysis, which can take correlations of the delays into account.
-
Shortest path problem belongs to the combinatorial optimization problem and plays an important role in the field of computer aided design. It can either be directly applied as in the case of routing or serves as a important subroutine in more complex problems. In this paper, a systolic array for the SSSP(single-source shortest path problem) was derived. The array was modeled and simulated in RTL level using VHDL, then synthesized to a schematic and finally implemented to a layout using the cell library based on 0.35
$\mu\textrm{m}$ CMOS 1-poly 4-metal CMOS technology. -
We investigated the influence of RTP annealing of multi-layered metal films deposited on oxides layer. Two types of oxides, BPSG and P-7205, were used as a bottom layer under multi-layered metal film. The bonding was not good in metal/BPSG/Si samples because adhesion between metal layer and BPSG oxide layer was poor by interfacial reaction during RTP annealing above 650
$^{\circ}C$ . On the other hand bonding was always good in metal/ P-TEOS /Si samples regardless of annealing temperature. We observed the interface between oxide and metal layers using AES and TEM. The phosphorus and oxygen profile in interface between metal and oxide layers were different in metal/BPSG/Si and metal/P-TEOS/Si samples. We have known that the properties of interface was improved in metal/BPSG/Si samples when the sample was annealed below 650$^{\circ}C$ . -
Kim, Young-Hee;Lim, Gyu-Ho;Yoo, Sung-Han;Park, Mu-Hun;Ko, Bong-Jin;Cho, Seong-Ik;Min, Kyeong-Sik;Ahn, Jin-Hong;Chung, Jin-Yong 369
To remedy both the degradation and saturation of the output voltages in the modified Dickson pump, a new multistage charge pump circuit is presented in this paper. Here using PMOS charge-transfer switches instead of NMOS ones eliminates the necessity of diode-configured output stage in the modified-Dickson pump, achieving the improved voltage pumping gain and its output voltages proportional to the stage numbers. Measurement indicates that VOUT/3VDD of this new pump circuit with two stages reaches to a value as high as 0.94V even with low VDD=1.0 V, strongly addressing that this scheme is very favorable at low-voltage memory applications. -
In this paper, we give the definition of the two dimensional q-Gabor wavelet. It consists of the q-normal distribution, which is also given in this paper. If the q-normal distribution is used as a kernel of the Gabor wavelet instead of the normal distribution, the q-Gabor wavelet is obtained. Furthermore, the q-Gabor wavelet is compared with the Gabor and the Haar wavelets to show how good The q-Gabor wavelet is.
-
When it calculates the optimum price of filter coefficient, the many operation quantity is necessary. Is like that the real-time control is difficult and the hardware embodiment expense is big. The case which does not know advance information of input signal or the case where the statistical nature changes with change of surroundings environment is necessary the adaptive filter. Every hour to change a coefficient automatically and system in order to reach to the condition of optimum oneself, the fact that is the adaptive filter. When it does not the quality of input signal or it does not know the environment of surroundings every hour changing, it does not emit not to be, in order to collect, the fact that is the adaptive filter. The case of the Acoustic Echo Canceler does thousands filter coefficients in necessity. It reduces a many calculation quantity to respect, it uses the IIR filter from hour territory. Also it uses the block adaptive filter which has a block input signal and a block output signal. The former there is a weak point where the stability discrimination is always demanded. Consequently, The block adaptive filter is researched plentifully. This dissertation planned the block MADF adaptive filter used to MADf algorithm.
-
Orthogonal Frequency Division Multiplexing (OFDM), which employs orthogonal overlapping subcarriers to modulate the signals, has been attracted much attention in recent time as a favorable option for future generation wireless networks due to its ability to overcome many impairments in wireless channels. Since OFDM is a multi-carrier system adaptive modulation techniques can be effectively and efficiently used to enhance the system performance in terms of both BER and overall system capacity. This paper discusses a COFDM-CDMA system with adaptive modulation schemes for future generation wireless networks.
-
In this paper, a new signature verification method is proposed. In the proposed method, on-line signature features are decomposed into multi-level signals by using the discrete wavelet transform, and then they are verified using the adaptive algorithm in time-frequency domain. Through computer simulations, the effectiveness of the proposed method is examined.
-
In this paper, we implemented system to detect obstacle in that develop a guidance robot for the visually impaired through sound. We used ultra sonic sensor to detect obstacle. We supposed the algorithm that classifies distance and direction of obstacle using information that produce correct warning negative sign according to direction and distance of obstacle. According to the experiment, a reagent could detect obstacle without sight information.
-
In this paper, we give the definitions of the q-Haar and q-Gabor wavelet. Instead of using the conventional Gaussian distribution as a kernel of the Gabor wavelet, if the q-normal distribution is used, we can get the q-Gabor wavelet as a possible generalization of the Gabor wavelet. The q-normal distribution, which is given by the author, is one of the generalized Gaussian distribution. On the other hand, if two sets of the q-normal distribution are connected anti-symmetrically, we can get the q-Haar wavelet as a possible generalization of the Haiw wavelet. We give experiments on the q-eabor and q-Haar wavelet and discuss about the q-Gabor and q-Haar wavelet.
-
In this paper, a novel noncoherent multiuser detector with diversity reception for a differentially encoded DS/CDMA signal in a frequency-selective Rayleigh fading channel is proposed. The proposed receiver employs multipath decorrelator and decision feedback differential detector (DFDD) with diversity reception. DFDD performs differential encoding and diversity combining. The performance is obtained by analysis and simulation and it is sown that the proposed receiver outperforms conventional differential receiver with slight increase of complexity.
-
This paper proposes a new symmetrical bandpass filter based on capacitive loading with a coplanar waveguide (CPW) structure. The filter was numerically designed at the operating frequency around 2 ㎓ by using IE3D software package. The characteristics of the proposed filter were then measured which the results were in good agreement with simulation. The passband insertion loss was considerably low (~3 ㏈) and the return loss was high (greater than 10 ㏈). The size of the proposed filter was also decreased approximately 50% when comparing with the fitters using conventional transmission lines.
-
Because of superior division among sub-channels, DWT MC-CDMA is less interference with neighborhood channel. In our newly proposed multi-carrier CDMA data transmission method, lIR CMFB filter banks sharply divide sub-bands and reduces spectral overlaps among neighboring sub-channels. In experiment result, proposed filter is better ability of sub-band division than FIR filter. Since the proposed cosine modulated filter banks lIR filter having wavelet property is designed to response sharp transition band, the ISI and ICI between neighboring sub-channels can be effectively reduced. And robustness about narrow band interference of CMFB IIR MC-CDMA almost same FIR DWT MC-CDMA.
-
The delta modulation used for controlling the speed of an induction motor has high peak of harmonic spectrum at low speed range causing acoustic noises in the induction motor. This paper proposes to suppress the harmonics by synchronizing the reference signal with the hysteresis windows for controlling the distribution of the switching frequency. As a result we can decrease the peak of harmonic spectrum. The simulation results show that the peak spectrum of harmonics can be reduced up to 60%.
-
On the TDD system, the uplink and downlink transmission share the same frequency but are seperated in time. In this paper we just consider the uplink transmission. The BWA system in this paper should be accepted the adaptive modulation. Each uplink burst shall begin with an uplink preamble. The reception of an uplink burst is the most challenging from a synchronization perspective. The burst detection, power estimation, symbol synchronization and carrier synchronization should be obtained from the preamble. It will be shown in this paper, how can get a burst detection by preambles and extract the synchronization parameter from preamble.
-
Recent works in the area of multimedia studies focus on a wide range of issues from the impact of multimedia on culture to its impact on economics and anything in between. The interconnectedness of the issues raised by this new practice is complicated by the fact that media are rapidly converging: in a very real way, multimedia is becoming a media prism that reflects the way in which media continually influence each other across disciplines and cultural borders. Thus, the impact of multimedia reflects a complicated crossroads where media, human experience, culture and technology converge. An effective design is generally based on shaping aesthetics for function and utility, with an emphasis on ease of use. However, in designing for cyberspace, it is possible to create narratives that challenge the interactor by encoding in the design an instructional aspect that teaches new approaches and forms. Such a design offers an equally aesthetic experience for the interactor as they explore the meaning of the work. This design approach has been used constructively in many applications. The crucial concern is to determine how little or how much information must be presented for the interactor to achieve a suitable level of cognition. This is always a balancing act: too much difficulty will result in interactor frustration and the abandonment of the activity and too little will result in boredom leading to the same negative result In addition, it can be anticipated that the interactor will bring her or his own level of experiential cognition and/or accretion, to the experience providing reflective cognition and/or restructure the learning curve. If the design of the application is outside their present experience, interactors will begin with established knowledge in order to explore the new work. Thus, it may be argued that the interactor explores, learns and cognates simultaneously based on primary experiential cognition. Learning is one of the most important keys to establishing a comfort level in a new media work. Once interactors have learned a new convention, they apply this cognitive knowledge to other new media experiences they may have. Pierre Levy would describe this process as a "new nomadism" that creates "an invisible space of understanding, knowledge, and intellectual power, within which new qualities of being and new ways of fashioning a society will flourish and mutate" (Levy xxv 1997). Thus, navigation itself of offers the interactors the opportunity to both apply and loam new cognitive skills. This suggests that new media narrative strategies are still in the process of developing unique conventions and, as a result, have not reached a level of coherent grammar. This paper intends to explore the cognitive aspects of new media design and in particular, will explore issues related to the design of new media interfaces. The paper will focus on the creation of narrative strategies that engage interactors through loaming curves thus enhancing interactivity.vity.
-
In this paper, we introduce an encoder design technique of multiple symbol trellis coded modulation for noncoherent continuous phase frequency shift keying (MTCM/NCPFSK) on the interleaved Rician fading channel. To find dominant factors which affects the error probability of MTCM/NCPFSK, we derive the pairwise error probability (PEP) of MTCM/NCPFSK and find that the error probability mainly depends on the effective length of error event and the corresponding squared product distance (SPD) for the small value of Rician parameter K. Using this performance criteria, we search for the optimal encoder of MTCM/NCPFSK for the interleaved Rician fading channel. We also compare that encoder with the encoder designed for additive white Gaussian noise channel.
-
The technology of Computer Graphics (CG) has been in great progress for almost 20 years and has proven to be a valuable tool for a broad variety of fields, including nuclear engineering. To work in any hazardous environment for example radiation field is particularly challenging because the danger is not always visually apparent. In this study as the application of CG to nuclear engineering field, we proposed to develop a radiation risk recognition aided system in which various radiation information; radiation risks, radiation distribution, hazard information and so on, were visualized by CG. The system used the server and client system. In the server there were two parts; one (main-server) was the database part having various data and the other (sub-server) was the visualization part visualizing the human phantom by POV-Ray. In the client there was the input and output part. The outputs from the system were various radiation information represented by coloring, circle graph and line graph intuitionally. The system is useful for a broad range of activities including radiation protection, radiation management, dose minimization, and demonstration to the public.
-
The existing recovery technique using the logging technique in the client/sewer database system only administers the log as a whole in a server. This contains the logging record transmission cost on the transaction that is executed in each client potentially and increases network traffic. In this paper, the logging technique for redo-only log is suggested, which removes the redundant before-image and supports the client-based logging to eliminate the transmission cost of the logging record. Also, in case of a client crash, redo recovery through a backward client analysis log is performed in a self-recovering way. In case of a server crash, the after-image of the pages which needs recovery through simultaneous backward analysis log is only transmitted and redo recovery is done through the received after-image and backward analysis log. Also, we select the comparing model to estimate the performance about the proposed recovery technique. And we analyzed the redo and recovery time about the change of the number of client and the rate of updating operation.
-
Most of electric distribution utilities have their reliability performance measured by reliability indices such as SAIFI and SAIDI to evaluate customer satisfaction. Adding protective devices in electrical distribution system can increase the system reliability by protecting public customers from local faults. In large-scale distribution system, it is difficult to determine the positions of these protective devices, which can efficiently protect customers within utilities' investment. In this paper, we propose an optimization technique to identify types and positions of protective devices to minimize SAIFI and SAIDI indices according to system requirement constraints.
-
Tangible user interfaces have attracted strong attention in the HCI(Human and Computer Interface) community for their ability to take advantage of skills humans develop in the real world. We are developing "tangible media aided design system" which employs physical objects i.e., brick as interfacing media for 3D graphic modeling. This system is targeting for persons who are afraid of experiencing 3D graphic modeling and virtual space, or have a sense of reluctance in approaching to them. Our approach suggests the easiest way for people to experience computer system and virtual space carefree while developing and improving their space sense. This work is one of initial explorations of media aided design system using tangible user interfaces.
-
The electrical characteristics of biologically active points (BAPs) compared with those of the surrounding human skins are studied. And we confirm that BAPs have lower resistance and higher capacitance than the surrounding skins do. We also find that BAPs have higher characteristic frequency than surrounding skins and the impedance spectra of BAPs sometimes have two semicircles on the complex impedance plane. We propose the skin impedance model that is proper to the BAPs and this circuit describes our experimental results sufficiently well.
-
In this paper, we present a novel efficient semaphore implementation scheme which diminishes completion time of high priority tasks and improves reliability of a system. The real-time system is constrained to complete their tasks in time. Especially, the task of a hard real-time system must meet its deadline under unfavorable conditions. In this paper, the number and sort of the locked semaphores, when an event occurred, decide whether the context switch should occur or not, so higher priority tasks diminish in their completion time. The experimental results show that the proposed method gives performance improvements in finish time of high priority tasks of about 11% over the Zuberi.
-
This paper represents a improved data compression algorithm of mixed text file by 2 byte completion Hangout and 1 byte alphabet from. Original LZW algorithm efficiently compress a alphabet text file but inefficiently compress a 2 byte completion Hangout text file. To solve this problem, data compression algorithm using 2 byte prefix field and 2 byte suffix field for compression table have developed. But it have a another problem that is compression ratio of alphabet text file decreased. In this paper, we proposes improved LZW algorithm, that is, compression table in the Extended LZW(ELZW) algorithm uses 2 byte prefix field for pointer of a table and 1 byte suffix field for repeat counter. where, a prefix field uses a pointer(index) of compression table and a suffix field uses a counter of overlapping or recursion text data in compression table. To increase compression ratio, after construction of compression table, table data are properly packed as different bit string in accordance with a alphabet, Hangout, and pointer respectively. Therefore, proposed ELZW algorithm is superior to 1 byte LZW algorithm as 7.0125 percent and superior to 2 byte LZW algorithm as 11.725 percent. This paper represents a improved data Compression algorithm of mixed text file by 2 byte completion Hangout and 1 byte alphabet form. This document is an example of what your camera-ready manuscript to ITC-CSCC 2002 should look like. Authors are asked to conform to the directions reported in this document.
-
In this paper a Phase-based virtual image encryption and decryption techniques based on a joint transform correlator (JTC) are proposed. In this method, an encrypted image is obtained by multiplying a phase-encoded virtual image that contains no information from the decrypted image with a random phase. Even if this encryption process converts a virtual image into a white-noise-like image, the unauthorized users can permit a counterfeiting of the encrypted image by analyzing the random phase mask using some phase-contrast technique. However, they cannot reconstruct the required image because the virtual image protects the original image from counterfeiting and unauthorized access. The proposed encryption technique does not suffer from strong auto-correlation terms appearing in the output plane. In addition, the reconstructed data can be directly transmitted to a digital system for real-time processing. Based on computer simulations, the proposed encryption technique and decoding system were demonstrated as adequate for optical security applications.
-
In this paper, we proposed digital audio watermarking algorithm for high quality audio. Nowadays, digital watermark used to confirm to digital copyright protection, not only digital image but also digital audio is active in the digital watermarking study. In this paper, we proposed digital audio watermarking algorithm using psychoacoustics model and MDCT/IMDCT (Modified Discrete Cosine Transform/Inverse Modified Discrete Cosine Transform) for the high quality audio watermark. In the proposed scheme, we used to 441KHz, 128kbps and stereo audio data for audio watermarking algorithm. Audio data is passed by MDCT; watermark can be inserted into the frequency domain with 256,1024 and 2048 interval.
-
The consumer in the 21
$\^$ st/ century e-business era is developing a taste fur greater professionalism diversity, internationalism and large-scale integration of his or her demands. With these changes in the consumers preferences in mind, e-businesses need to develop a real time track and trace system to accommodate their logistical and consumer service operations. This research paper discusses the development of a object-oriented logistics tracking database system and a web service tracking component necessary to efficiently store and manage the movements of postal goods and provide real time information on logistics trading. -
This paper presents a basic theory of information flow from single sending point to multiple receiving points, where new theories of algebraic system called "Hybrid Vector Space" and flow vector space play important roles. Based on the theory, a new algorithm for finding maximum homogenous information flow is proposed, where homogenous information flow means the flow of the same contents of information delivered to multiple clients at a time. Effective multi-routing algorithms fur tree-shape delivery rout search are presented.
-
Using intelligent information contained within the speech to identify the specific hidden data in the watermarked multimedia data is considered to be an efficient method to achieve the speech digital watermarking. This paper presents the performance comparison between various types of speech codec in order to determine an appropriate one to be used in digital watermarking applications. In the experiments, the speech signal encoded by four different types of speech codec, namely CELP, GSM, SBC and G.723.1codecs is embedded into a grayscale image, and theirs performance in term of speech recognition are compared. The method for embedding the speech signal into the host data is borrowed from a watermarking method based on the zerotrees of wavelet packet coefficients. To evaluate efficiency of the speech codec used in watermarking applications, the speech signal after being extracted from the attacked watermarked image will be played back to the listeners, and then be justified whether its content is intelligible or not.
-
A communication-aid circuit to detect eye-gazed patterns is proposed in this paper. The circuit is an analog-digital mixed system. By determining the direction of eye-gazed pattern, the circuit detects an eye-gazed pattern from 2-dimensional arrayed patterns on a syllabary. Different from conventional systems, the syllabary is moved to overlap the eye-gazed pattern with the center coordinate of screen. Thus, the proposed circuit can avoid a complex calculation of the distance between the eye-gazed point and the center coordinate. Furthermore: an economical size of hardware can be provided since no full-adders are required by employing floating-gate MOSFBT's. The validity of the cricuit design is confirmed by computer simulations. Furthermore, to implement onto an IC chip, the layout design is performed by using a CAD tool, MAGIC.
-
Hearing loss caused by exposure to industrial machine noise results in devastating disability that is mostly preventable. And recent researches indicate that the noise may also induce hypertension and cardiovascular disease. In addition the sleep polygraph provides many indicators of sleep disturbance by the noise. In this paper we make an analysis on ball bearing machine noise, a kind of the industrial noise. The analysis of Its power spectrum is based on FFT(Fast Fourier Transform). And then the spectral results of the noise are compared with that of the spectrum for an auditory signal. The signal is measured from the pronunciation of two Koreans. Finally we suggest the most important stratagem to prevent the noise for worker's health and efficiency.
-
In this paper, the zerotrees of DWT is proposed to be used in a speech based digital watermarking for digital images. Since in this research work the raw speech and its content are used as a watermark signal, in the watermarking scheme, the PCM coded speech signal is embedded into a sequence of images. The performance of the scheme is evaluated by the PSNR obtained from the watermarked images and the strength of attacks the embedded speech signal can survive. Moreover, since in this research work the contents contained in the speech is used to identify the specific information hidden in the embedded signal. The speech signal after being extracted from the watermarked images is played back to the listeners to determine whether its content is intelligible or not. The experimental results show impressive performance of the scheme implementing our proposed technique, judged by the higher robustness obtained form the embedded signal against various types of attack, including brightness/contrast enhancement, Twirling, highpass filtering and JPEG compression standard.
-
For mission-critical and safe-critical operations of medical information, financial, or administrative systems, a reliable and robust storage system is indispensable. The main purpose of our research is to develop a high-confidential, reliable, and survivable storage system.
-
This paper proposes a tabu search (TS) algorithm to optimal weight selection in design of robust H
$_{\infty}$ power system stabilize. (PSS), In H$_{\infty}$ control design, the weight selection and the representation of system uncertainties are the major difficulties. To cope with these problems, TS is employed to automatically search for the optimal weights. On the other hand, the normalized coprime factorization (NCF) is used. The H$_{\infty}$ controller can be directly developed without${\gamma}$ -iteration. Also, the pole-zero cancellation phenomena are prevented. The performance and robustness of the proposed PSS under different loading conditions are investigated in comparison with a robust tuned PSS by examining the case of a single machine infinite bus (SMIB) system. The simulation results illustrate the effectiveness and robustness of the proposed PSS. -
In this paper, the old Fourier-Motzkin method (abbreviated as the old FH method from now on) is first modified to the form which can derive all minimal vectors as well as all minimal support vectors of nonnegative integer homogeneous solutions (i.e., T-invariants) for a matrix equation
$Ax=b=0^{m{\times}1}$ ,$A\epsilonZ^{m{\times}n}$ and$b\epsilonZ^{m{\times}1}$ , of a given Petri net, where the old FM method is a well-known and direct method that can obtain at least all minimal support solutions for$Ax=0^{m{\times}1}$ from the incidence matrix .$A\epsilonZ^{m{\times}n}$ , Secondly, for$Ax=b\ne0^{m{\times}n}$ a new extended FM method is given; i.e., all nonnegative integer minimal vectors which contain all minimal support vectors of not only homogeneous but also inhomogeneous solutions are systematically obtained by applying the above modified FH method to the augmented incidence matrix$\tilde{A}$ =〔A,-b〕$\epsilon$ $Z^{m{\times}(n+1)}$ s.t.$\tilde{A}\tilde{x}$ =0^{m{\times}1}$ However, note that for this extended FM method we need some criteria to obtain a minimal vector as well as a minimal support vector from both of nonnegative integer homogeneous and inhomogeneous solutions for Ax=b. Then those criteria are also discussed and given in this paper. -
A bi-directional and multi-channel wireless telemetry capsule, 11mm in diameter, is presented that can transmit video images from inside the human body and receive a control signal from an external control unit. The proposed telemetry capsule includes transmitting and receiving antennas, a demodulator, decoder, four LEDs, and CMOS image sensor, along with their driving circuits. The receiver demodulates the received signal radiated from the external control unit. Next, the decoder receives the stream of control signals and interprets five of the binary digits as an address code. Thereafter, the remaining signal is interpreted as four bits of binary data. Consequently, the proposed telemetry module can demodulate external signals so as to control the behavior of the camera and four LEDs during the transmission of video images. The proposed telemetry capsule can simultaneously transmit a video signal and receive a control signal determining the behavior of the capsule itself. As a result, the total power consumption of the telemetry capsule can be reduced by turning off the camera power during dead time and separately controlling the LEDs for proper illumination of the intestine.
-
This paper proposes the effective compensation method fur the IR lamp deterioration in NDIR capnograph system. The newly designed optical chamber with two IR lamps and an electronic hardware for controlling lamp intensity have been implemented. After applying the proposed optical chamber and reference lamp control circuit to the NDIR type capnograph system, it is identified that the proposed method can compensate the lamp deterioration effectively.
-
Biomedical signals are ubiquitously contaminated and degraded by background noise which span nearly all frequency bandwidths. This paper proposes the MADF (multiplication free adaptive digital filter) algorithm to cancel the noise. And the convergence characteristics of the algorithm is analyzed. In the experimental results, the MADF algorithm has the advantage in which has superior to a condition of low-frequency and slow data speed. This application gives an important significance in ensuring the objectivity of clinical information and in promoting the representation and the disease diagnosis.
-
In this paper, we proposed the formation of Hangul-International Phonetic Alphabet conversion table that also meets the standard Korean pronunciation rule. In Hangul, due to a phonetic value change phenomenon, notation and pronunciation are different. To do this, conversion table of notation-phonetic value is created, and conversion table of phonetic value-International Phonetic Alphabet notation are formed. As a result, the conversion table of International Phonetic Alphabet notation that accords with the standard Korean pronunciation has been formed, and it is proved by experiments that the result of conversion has no faults.
-
By defining a power distribution ratio (PDR) and coupling efficiency (CE) amenable to the rigorous analytical solutions of newly developed rigorous modal transmission-line theory (MTLT), we explicitly analyze the power coupling characteristics of TE modes propagating in GADCs. The numerical results reveal that the incident power is optimally coupled into the desired guiding channel if the powers of rigorous modes excited at the input boundary of grating-assisted coupler are equally partitioned.
-
The dynamic permittivity of a microstrip structure leads to a convenient and modified Smith-chart representation that includes the frequency-dependent influence of the lossy characteristics of the line cohesively. The efficacy of the model is illustrated with an example concerning a microstrip patch antenna. Relevant simulations show that the input impedances calculated from the model are more accurate than those from the previous model in the literature by comparing to the measure results, as illustrated with an example of a patch antenna. This model is compatible for CAD efforts with MATLAB
$\^$ TM/ facilitation fast and user-friendly implementations. -
This paper presents the iterative procedure with the concept of expanded waves in the spectral and spatial domains using the fast modal algorithm. We presents its applications to microwave integrated circuits on resistive substrate. The advantage is a reduction in computation time. These calculated results are checked by comparison with the experimental and simulated results by Sonnet and Momentum program.
-
An active phased array antenna consists of many channels. Each channel has a different initial phase shift and gain because of the inequality in the active circuits themselves, interface between radiators and active circuits, and beam-forming circuits and other antenna system configurations. This raises an inherent problem in active phased array antennas. To compensate for this problem the initial phase and gain of each channel should be calibrated. This paper presents an efficient calibration method for an initial phase variation of each channel in active phased array antennas. We tested our method in an active phased array antenna, and obtained good results in the radiation pattern and beam direction of antenna.
-
Pichaya Supanakoon;Monchai Chamchoy;Panarat Rawiwan;Prakit Tangtisanon;Sathaporn Promwong;Teerasilpa Dumwipata;Takada, Jun-ichi 523
The crosstalk among coupled microstrip lines is the major limiting factors of signal qualities in the high-speed digital and communication equipment. In this paper, a three-dimensional finite difference time domain (FDTD) method is applied to analyze the crosstalk between the coupled microstrip lines. The proposed structures of the coupled microstrip lines are investigated to reduce the coupling in a simple way by modifying their ground plane with an optimum gap. The examples of these structures with the different sizes of the gaps on their ground plane are studied. These structures are considered as the four-port network to evaluate transmission efficiency, near- and far-end crosstalk. Gaussian pulse is excited to evaluate the frequency characteristics from dc to 30 ㎓. The transmission efficiency, near- and far-end crosstalk of each structure of the coupled microstrip lines are demonstrated. The numerical results of this study show that the majority of crosstalk is the far-end crosstalk. The usage of the optimum gap on the ground plane can reduce the far-end crosstalk of the coupled microstrip lines while the transmission efficiency is nearly equal. -
The frequencies for HAPS used in fixed wireless access are allocated in the millimeter wave bands. The systems using these frequencies can have a serious impact on the radio communication qualities due to rain. In this paper, we compare the specific rain attenuation using CM(combined) raindrop size distribution with those using different sevral raindrop size distributions for the frequency bands 28/48㎓. The rain attenuations using CM raindrop size distribution for the path between the earth and HAPS platform according to the elevation angle are described.
-
This paper present a gain-clamped L-band EDFA based on reflecting back a portion of backward amplified spontaneous emission into the erbium-doped fiber section, utilizing a fiber Bra99 grating. By using FBG with R=66.1 and 99.9%, the gain is clamped at 15.1 and 14.3㏈, respectively, with a variation of less than 0.2㏈ for an input signal power as high as -5 ㏈m. However, a small noise figure penalty is obtained, which is the consequence of the gain clamping effect.
-
This paper proposes a design of the racetrack microcavity resonator based on silicon substrate. The optimised dimensions of the structure were found by FDTD simulation. The characteristics were also found by the method, and further compared with another model of mode coupling theory. The optimised dimensions of straight guide at wavelength 1.55
$\mu\textrm{m}$ are thickness and width of 0.4$\mu\textrm{m}$ . The curve guide provides the maximum at 1$\mu\textrm{m}$ whereas the resonating section require small coupling section of about 3$\mu\textrm{m}$ . -
The use of concatenated codes in noncoherent synchronous optical fiber CDMA networks is proposed. The concatenated code sequences are generated using balanced Walsh code sequences and Walsh code sequences. The selection of balanced Walsh code sequences is presented and the design of fully programmable transmitter and receiver is reported. The analysis of the system BER performance shows that multiple-access interference is completely eliminated and the BER performance of the proposed system is better than that of the non-coherent synchronous optical fiber CDMA system using optical orthogonal codes with double hard-limiters.
-
In this paper, the performance of upidirectional and hi-directional regenerative erbium-doped fiber amplifier (EDFA) is compared. The systems are operating above laser oscillation threshold. The experimental results show that the unidirectional regenerative EDFA has a better performance than the hi-directional.
-
This paper proposes a wavelength sensor based on the optical directional coupler. The finite-difference time-domain (FDTD) is used in analysis of the field intensity of tile light propagating thorough the structure. The device with tile width of 0.4
$\mu\textrm{m}$ and the thickness of 0.4$\mu\textrm{m}$ , which corresponding with the coupling length of 40$\mu\textrm{m}$ , would provide tile linear relationship between the coupling efficiency against the wavelength. The device can sense the wavelength in a range between 1.5$\mu\textrm{m}$ and 1.6$\mu\textrm{m}$ , with continuous resolution. The wide wavelength could be also done be paralleling th light to a number of wavelength-sensing modules with particularly required bands. Therefore, it could be employed as the wavelength sensing for most optical communications, optoelectronics, laser applications and etc. -
This paper proposes a unidirectional beam antenna using a probe excited circular ring near the reflector. The antenna structure is simple. The radiation characteristics of the antenna fur various spacing between a probe excited circular ring and the reflector are analyzed. These characteristics are also compared with the conventional single aperture near the reflector. It is found that the proposed structure yields better characteristics than the conventional structure. The numerical results of the radiation pattern, elevational beam peak, beamwidth, and maximum directivity are investigated. The result of the analysis is very useful to design the antenna of the high directivity with unidirectional beam.
-
Suwattana, Danai;Santiyanon, Jakkapol;Laopetcharat, Thawan;Charoenwattanaporn, Monton;Goenchanart, Ut;Malisuwan, Settapong 549
A Wireless Local Area Network (WLAN) is a flexible data communication system implemented as an extension to, or as an alternative for, a wired LAN with in a building or campus. However, communications in an indoor environment present problems not encountered in outdoor wireless communication systems. Since cellular type systems are interference limited, the indoor environment is more hostile than the outdoor environment due to the lower propagation constant. In this paper, the equation for the signal to interference ratio in a multistory building will be derived. Knowing the S/I ratio, the floor frequency reuse can be determined. Finally, the simulation in this research is designed to study the performance (BER) of WLAN system in the multistory environment by applying the 8-PSK Trellis Coded modulation technique. The procedure allows a quick evaluation of BER in Wireless LAN system due to the co-channel interference. -
Wideband CDMA is one of the radio access technologies for the third generation in which voice is the basic service. There has been lot of research work in order to find out the suitable transmission scheme to meet the requirement of accommodating variable type of services in Wideband-CDMA. This paper studies the behavior of different services using different transmission schemes in Wideband CDU and compares their performance in terms of BER. Different transmission schemes are found to be suitable for different services. Transmission schemes used are- fixed processing gain scheme also called as variable bandwidth scheme, single code transmission and multicode transmission. It is found that fixed processing gain scheme is suitable fur high data rates. Single code transmission is suitable fer low data rates where as multicode transmission is suitable for low and medium data rates.
-
The Call Processing Language (CPL, in short), recommended in RFC 2824 of IETF, is a service description language for the Internet Telephony. The CPL allows users to define their own services, which dramatically improves the choice and flexibility of the users. The syntax of the CPL is strictly defined by DTD (Document Type Definition). However, compliance with the DTD is not a sufficient condition for correctness of a CPL script. There are enough rooms for non-expert users to make semantical mistakes in the service logic, which could lead to serious system down. In this paper, we present six classes of semantic warnings for the CPL service description: MF, IS, CR, AS, US, OS. For each class, we give the definition and its effects with an example script. These warnings are not necessarily errors. However, these warnings will help users to find ambiguity, redundancy and inconsistency in their own service description.
-
This paper proposes a home control system architecture that have network configuration function. The proposed home control system architecture is implemented with partly hardware and software. For implementation of this system architecture, we developed ECONICS which is home automation controller. ECONICS consists of main board and communication modem. This communication modem supply the power line communication. The physical layer and the MAC layer software of EIA 709.1 standard protocol are implemented in communication modem. The upper layer software of EIA 709.1 standard protocol and home configuration software for home network installation, management, diagnostics, control and monitoring are implemented in main board of ECONICS. We verified the commercial feasibility of the proposed system through the home network configuration and operation. As a result, we have concluded that the proposed home control system architecture provides all the key function necessary to easily manage and control home network nodes.
-
This paper evaluates the stability of the terminal group for he inter-vehicle communication (IVC) network with an autonomous relay access scheme. Some stability criterions such as updating rate, terminal group convergence probability and total path average holding time have been conducted by computer simulation. As the results, dynamic moving of the terminal is the serious problem that can degrade the stability of the terminal group and directly affect to overall performance of the IVC network.
-
With the development of Wavelength Division Multiplexing (WDM) and Optical Cross-Connect (OXC) systems, an efficient integration of IP and WDM has been focused. The Optical Internetworking Forum (OIF) proposes a new model that is called Overlay model for the integration of IP and WDM. In the Overlay model, UNI 1.0 signaling is adopted to establish signaling interface between Optical and IP network. UNI 1.0 signaling consists of a lot of functions; especially, reliability, light traffic, and etc. For that reason, Srefresh and ACK messages in UNI signaling support reliable messaging and reduce the amount of information that must be transmitted and processed in order to maintain RSVP states and processing time. This paper focuses on an implementation of Srefresh and ACK messages based on UNI 1.0 signaling and comparison between before and after implementing. The results show that Srefresh and ACK messages improve intelligence in the control plane of the optical network, which will make them more survivable, flexible, reliable, and controllable.
-
In a recent wireless network environments, dynamic host configuration protocol (BHCP) service is used to assign IP addresses to mobile terminals. In IPv6 networks, it is necessary to introduce the concept of handoff to support a seamless service to mobile terminals. In a general soft handoff technique used by code-division multiple acces (CDMA) communication systems, the powers received to base station are simply compared to determine which base station will handle the signal to and from each mobile termins. However, in IPv6 network, to transmit data-oriented services, it is necessary to support an enhanced soft handoff technique with more security and quality of service. In this paper, we propose a scheme to reduce a signaling process of handoff in IPv6 network. Also, we propose a technique to reduce wasted reservation resources and to guarantee quality of service (QoS) using DHCP.
-
In this study, it enabled to perform keyword search on Geographic Information Systems (GIS) more flexibly by taking in the concept of geographic thesaurus in order to make the keyword search that was more efficiently. The search procedure depends on the history when user information is included. This study provides a system for keyword searching as well as check the validity of the system. Furthermore, by establishing this reference method, the search that took in the query of a user flexibly is attained rather than a chosen type reference system.
-
For train service, safety and reliability is an inevitable performance. Specially, turn-out system of the railway for safety because of actual part. Hence the management is strictly executed over turn-out systems of the railway. Also number of turn-out system need to monitoring systems. In this paper, the data multi-acquisition system for monitoring it is necessary to reduce the cost from the expensive characteristics of multi-monitoring system according to the importance of each data because this system is based on communication of one to several units. We designed the data multi-acquisition system using numbers of micro-controller and the experiment was executed to the actual turn-out system.
-
In this research, we propose a flexible conveying system (FCS) which consists of multiple arrays of cells. Each cell is a wheel driven by a two degree-of-freedom mechanism. The direction and velocity of cell are controlled based on the concept of hybrid control under a distributed network. Each cell has its own controller under a subsumption architecture for low-level control. A cell communicates with its four neighboring cells to manipulate n targeted object towards its desired position. The high-level control assigns a desired position and direction of the object to each cell. The path of each object is generated by many supporting cells. Moreover, the FCS can handle multiple objects simultaneously. To study the flexible conveying system, a GUI-based simulator of flexible conveying system is constructed. The simulated results show that the system can handle multiple objects independently and simultaneously under the proposed hybrid control architecture.
-
We propose a semantics filter aimed at filtering unnecessary data for a user. In the Geographic Information Systems (GIS), transfer of spatial data for each user is one of the important problems. We design a system that filters spatial data by using user's information adaptively. Our system derives the degree of geographical knowledge and the priority of buildings by using fuzzy reasoning. Furthermore, this system computes the priority of roads by deriving the contiguity relation between a building and a road. This paper describes a method for filtering of spatial data.
-
This paper presents a systematic method of probing channel characteristics and communication reliabilities of home power line communication network applied to the Internet accessed control of home appliances. The effects of the three performance deteriorating factors, i.e., additive noise, channel attenuation, and intersymbol interference, can be systematically measured by applying the channel probing waveform in the frequency range from 100㎑ to 450㎑. Probability of bit error is derived with the probed channel parameters of the signal attenuation, noise and signal-to-interference ratio read in the frequency domain. The agreement between the derived probability of bit ewer and the measured probability of bit error support the validity of the proposed approach of probing home power line channel characteristics. The experimental results performed with the constructed test-bed applying the Proposed channel probing method and the operation reliability measurement of the overall networked system also support the feasibility of commercially deploying the PLC modem installed home appliances and their services for the Internet accessed home automation in densely populated residential apartment complexes.
-
This paper proposes neighborhood reduction techniques in local search of the customer decomposition subproblem in the Multi Depots Vehicle Routing Problem with Time Windows (MDVRPTW) by using geospatial relation among depots and customers. The neighborhood of the customer decomposition subproblem can be simply and well defined but it should include excessively bad solution candidates. Our techniques find such candidates by using information of the problem domain, geographical relation. We use our techniques in Tabu Search and evaluate the effectiveness in computer experiment.
-
A new approach of error concealment using a digital watermarking technique for interframe video coding is presented in this paper. In the proposed method, the most important feature of the reference frame is extracted. Then, this feature is embedded into the prediction error of current frame prior to transmission. Error concealment is achieved by means of recovering the erroneous reference frame using the embedded data before the reconstruction of current frame is performed. Simulation results demonstrated the effectiveness of the proposed method.
-
EZW, a wavelet transformation based compression algorithm, utilizes the correlations of the wavelet coefficients between subbands. Due to the reason that, it is based on Zero Tree's parent-descendant dependency of the subbands, subband coding is possible, but it is not efficient for applications, which require multi-resolution restorations. In this paper we compare and analyze the performance between spatial band coding, which apply the correlation between adjusting pixels, and EZW So as to prove that spatial band coding is superior to EZW in the sense that it exhibit higher PSNR values and that it is apt to molti-resolution restoration.
-
Even though digital video coding techniques have been developed very rapidly, rate controlling is still an unsolved problem. This paper presents a new scene adaptive video encoding scheme for MPEG-1 and MPEG-2 video encoders. Degradation of picture quality at scene changes due to poor prediction of global complexity measure is addressed. The proposed scheme determines the picture types adaptively based on scene contents of each video frame. The effective placement of reference and inter-reference frames is studied at sudden scene changes and gradual scene changes respectively. Results show that the proposed scheme demonstrates a significant improvement in performance compared to TM5〔1〕.
-
In this paper, a novel error concealment, algorithm is proposed for the MPEG-4 video decoding. Apart from existing algorithms which fail to exhibit stable performance over various video sequences and error patterns, the proposed algorithm adopts a new hybrid scheme, which can achieve a consistent performance with reduced computational complexity. This algorithm is implemented on the basis of the MPEG-4 decoder, and the experimental results demonstrate that the new approach provides acceptable performance both subjectively and objectively at various bit error rates and video sequences.
-
Jung, Do-Joon;Lee, Chang-Woo;Lee, Yeon-Chul;Bak, Sang-Yong;Kim, Jong-Bae;Hyun Kang;Kim, Hang-Joon 615
This paper proposes a real-time face detection and tracking a method in complex backgrounds. The proposed method is based on the principal component analysis (PCA) technique. For the detection of a face, first, we use a skin color model and motion information. And then using the PCA technique the detected regions are verified to determine which region is indeed the face. The tracking of a face is based on the Euclidian distance in eigenspace between the previously tracked face and the newly detected faces. Camera control for the face tracking is done in such a way that the detected face region is kept on the center of the screen by controlling the pan/tilt platform. The proposed method is extensible to other systems such as teleconferencing system, intruder inspection system, and so on. -
In this paper, we propose a new blocking method, multiple blocking, and examine the efficiency of the method in basic matrix operations. In the best case for the matrix multiplication C=AB+C, the multiple blocking improves the performance by more than 10%, compared to the conventional single blocking method.
-
Extreme development in digital multimedia has raised anxiety in the minds of copyrighted content owners. This has resulted in the creation of several watermarking techniques. This paper, proposes a method of embedding a perceptually transparent digital signal, named semi-fragile watermark in the wavelet domain, utilizing the characteristics of the human visual system. So as to detect attacks inflicted on the content and use an algorithm to specify the character of the attack.
-
A methodology based on factorial design and Motto Carlo methods is developed and implemented for incorporating uncertainties within a multiphase subsurface flow and transport simulation system. Due to uncertainties in intrinsic permeability and longitudinal dispersivity, the predicted output is also uncertain based on the well-developed multiphase compositional simulator. The simulation results reveal that the uncertainties in input parameters pose considerable influences on the predicted output, and the mean and variance of permeability will have significant impacts on the modeling output. The proposed method offers an effective tool for evaluating uncertainty in multiphase flow simulation system.
-
In this paper, we propose an improved optical security system using three phase-encoded images and the principle of interference. This optical system based on a Mach-Zehnder interferometer consists of one phase-encoded virtual image to be encrypted and two phase-encoded images, encrypting image and decrypting image, where every pixel in the three images has a phase value of '0' and '
$\pi$ '. The proposed encryption is performed by the multiplication of an encrypting image and a phase-encoded virtual image which dose not contain any information from the decrypted image. Therefore, even if the unauthorized users steal and analyze the encrypted image, they cannot reconstruct the required image. This virtual image protects the original image from counterfeiting and unauthorized access.. The decryption of the original image is simply performed by interfering between a reference wave and a direct pixel-to-pixel mapping image of the encrypted image with a decrypting image. Both computer simulations and optical experiments confirmed the effectiveness of the proposed optical technique for optical security applications. -
Blowfish is a symmetric block cipher that can be used as a drop-in replacement fur DES or IDEA. It takes a variable-length key, from 32bit to 448bit, making it ideal for both domestic and exportable use. This paper is somewhere middle-of-the-line, where this paper made significant tradeoffs between speed, size and ease of implementation. The main focus was to make an implementation that was usable, moderately compact, and would still run at an acceptable clock speed. For the real time process of blowfish, it is required that high-speed operation and small size hardware. So, A structure of new adders constructed in this study has all advantages abstracted from other adders. As for this new adder, area cost increases by 1.06 times and operation speed increases by 1.42 times.
-
In this paper, we proposed the multiple access control of RS232C Serial Communications protocol using collision sense method. The communications wires of data transmission and reception are tied together through the buffer each to connect to the multiple communication channels. The hardware interface and control program are designed to build the prototype system and the experimental multiple access communications network is built by multiple PC systems and the transfer completion rate results are shown.
-
This paper introduces a way to realize high-pass, band-stop and all-pass transfer functions using Operational Transconductance Amplifiers (OTAs) and grounded capacitors. The basic circuit configuration is constructed with five OTAs and two grounded capacitors. In the circuit with the proportional block, it is shown that the circuit parameters can be independently set and electronically tuned by the transconductance gains. Although the circuit configuration has been Down, it seems that the feature for realizing the high-pass, the band-pass and the all-pass transfer functions makes the structure more attractive and useful. An example is given together with simulated results by PSPICE.
-
In this paper, a low-voltage CMOS squarer and a four-quadrant analog multiplier are presented. It is based on a source-coupled pair and a scaled-floating voltage generator which are modified to work as a voltage squaring and a sum/difference circuits. The proposed squarer/multiplier have been simulated with HSPICE, where -3㏈ bandwidth of 10MHz is achieved. The power consumption is about 0.6㎽, from a
${\pm}$ 1.5V supply, and the total harmonic distortion is less than 0.7%, with a 1.2V peak-to-peak 1MHz input signal. -
The increaseing speeds are accompanied by decreases in pulse rise and fall time in VLSI circuits. These accenturate the high frequency spectral contents of the signals and cause the frequency dependent loss of the conductors which interconnect the various sub-circuits composing of VLSI circuit. The lossy effect is approximated by the square root of frequency dependence of the per unit length resistance. In the practical applications, several problems may arise along with this approximation, so we extend our investigation of the lossy effect by numerical Laplace inversion method.
-
This paper introduces the design and implementation of 40-㎓-band low noise amplifier (LNA) with ultra low gain flatness for wide-band wireless multimedia and satellite communication systems. The 40-㎓-band 4-stage LNA MMIC (Monolithic Microwave Integrated Circuit) demonstrates a small signal gain of more than 20 ㏈, an input return loss of 10.3 ㏈, and an output return loss of 16.3 ㏈ for 37
$\square$ 42 ㎓. The gain flatness of the 40-㎓-band 4-stage LNA MMIC was 0.1 ㏈ for 37$\square$ 42 ㎓. The noise figure of the 40 ㎓-band LNA was simulated to be less than 2.7 dB for 37~42 ㎓. The chip size of the 4-stage LNA MMIC was 3.7${\times}$ 1.7$\textrm{mm}^2$ . -
An analog multiplier-divider circuit that realized through the use of OTAs, which does not require external passive circuit elements and temperature compensated, is proposed in this paper. Since the scheme is realized in such a way that employs only OTA as a standard cell, the circuit is simple and can be easily constructed from commercially available IC. The circuit bandwidth is wide and close to the transistor f
$\sub$ T/. Simulation results that demonstrate the performances of the multiplier-divider circuit are included. -
This paper describes a novel converter to implement high-speed binary-to-residue conversion for moduli 2
$^{n}$ - 1, 2$^{n}$ , 2$^{n}$ +2$^{\alpha}$ /($\alpha$ $\in$ {0,1,…,n-1}) without using look-up table. In our implementation, the high-speed converter can be achieved, because of the modulo addition time is independent of the word length of operands by using the Signed-Digit (SD) adders inside the modulo adders. For a LSI implementation of residue SD number system with ordinary binary system, the proposed binary-to-residue converter is the efficient circuit.cient circuit. -
A microprocessor with genetic instructions such as crossover, mutation and inversion is proposed. The processor is modeled using VHDL, synthesized to a schematic and implemented on a FPGA. The control path is implemented with a microprogram consisting of about 15032-bit microwords, and the operation of each instruction is checked through simulation.
-
This paper proposes a digital algorithm for gray-scale/color image segmentation of real-time video signals and a cell-network-based implementation architecture in state-of-the-art CMOS technology. Through extrapolation of design and simulation results we predict that about 300
$\times$ 300 pixels can be integrated on a chip at 100nm CMOS technology, realizing very high-speed segmentation at about 1600sec per color image. Consequently real-time color-video segmentation will become possible in near future. -
This paper describes the design of elliptic curve crypto (ECC) coprocessor over binary fields for ECC protocols. Our ECC processor provides the elliptic curve operations for Diffie-Hellman, EC Elgamal and ECDSA protocols. The ECC we have implemented is defined over the fieTd GF(2
$\^$ 163/),which is a SEC-2 recommendation[6]. -
In this paper, we propose a block LMS algorithm using distributed arithmetic (BDA) and a multi-memory block structured BDA (MBDA). Moreover, we propose an effective VLSI architecture of adaptive digital filter using MBDA, and evaluate the sampling rate and output latency.
-
In this paper, we defined necessary operations and functional blocks of a multiplexer for 3-D video systems and present our multiplexer design. We adopted the ITU-T's recommendation(H.222.0) to define the operations and functions of the multiplexer and explained the data structures and details of the design for multiview image processing. The data structure of TS(Transport Stream) and PES (Packetized Elementary Stream) in ITU-T Recommendation H.222.0 does not fit our multiview image processing system, because this recommendation is fur wide scope of transmission of non-telephone signals. Therefore, we modified these TS and PES stream structures. The TS is modified to DSS(3D System Stream) and PES is modified to SPDU(DSS Program Data Unit). We constructed the multiplexer through these modified DSS and SPDU. The number of multiview image channels is nine, and the image class employed is MPEG-2 SD(Standard Definition) level which requires a bandwidth of 2∼6 Mbps. The required clock speed should be faster than 54(= 6
${\times}$ 9)㎒ which is the outer interface clock speed. The inside part of the multiplexer requires a clock speed of only 1/8 of 54㎒, since the inside part of the multiplexer operates by the unit of byte. we used ALTERA Quartus II and the FPGA verification for the simulation. -
This paper proposes a weighted least-squares(WLS) method for designing variable one-dimensional (1-D) FIR digital filters with simultaneously variable magnitude and variable non-integer phase-delay responses. First, the coefficients of a variable FIR filter are represented as the two-dimensional (2-D) polynomials of a pair of spectral parameters: one is for tuning the magnitude response, and the other is for varying its non-integer phase-delay response. Then the optimal coefficients of the 2-D polynomials are found by minimizing the total weighted squared error of the variable frequency response. Finally, we show that the resulting variable FIR filter can be implemented in a parallel form, which is suitable for high-speed signal processing.
-
According to the growth of communication biz, embedded market rapidly developing in domestic and overseas. Embedded system can be used in various way such as wire and wireless communication equipment or information products. There are lots of developing performance applying speech recognition to embedded system, for instance, PDA, PCS, CDMA-2000 or IMT-2000. This study implement minimum memory of speech recognition engine and DB for apply real time embedded system. The implement measure of speech recognition equipment to fit on embedded system is like following. At first, DC element is removed from Input voice and then a compensation of high frequency was achieved by pre-emphasis with coefficients value, 0.97 and constitute division data as same size as 256 sample by lapped shift method. Through by Levinson - Durbin Algorithm, these data can get linear predictive coefficient and again, using Cepstrum - Transformer attain feature vectors. During HMM training, We used Baum-Welch reestimation Algorithm for each words training and can get the recognition result from executed likelihood method on each words. The used speech data is using 40 speech command data and 10 digits extracted form each 15 of male and female speaker spoken menu control command of Embedded system. Since, in many times, ARM CPU is adopted in embedded system, it's peformed porting the speech recognition engine on ARM core evaluation board. And do the recognition test with select set 1 and set 3 parameter that has good recognition rate on commander and no digit after the several tests using by 5 proposal recognition parameter sets. The recognition engine of recognition rate shows 95%, speech commander recognizer shows 96% and digits recognizer shows 94%.
-
Sampling rate conversion widely used in subband coding, A/D and D/A transitions etc. is an important techniques. Nyquist filters and the filter banks have been used far the sampling converter. However, they need many memories and, whenever the sampling rate is changed it is necessary to redesign filters. Then we propose design method of the new interpolation kernel. Design method of the new interpolation kernel is approximated each piecewise of lowpass filter by n th polynomials. The proposed kernel is not redesigned, whenever the sampling rate is changed. The proposed kernel is a continuous function, the sampling rate of the rational number can be converted.
-
Subspace analysis (which includes PCA) seeks for feature subspace (which corresponds to the eigenspace), given multivariate input data and has been widely used in computer vision and pattern recognition. Typically data space belongs to very high dimension, but only a few principal components need to be extracted. In this paper I present a fast sequential algorithm for subspace analysis or tracking. Useful behavior of the algorithm is confirmed by numerical experiments.
-
Kono, Yoshinori;Hasegawa, Hiroshi;Ayama, Miyoshi;Kasuga, Masao;Matsumoto, Shuichi;Koike, Atsushi;Takagi, Koichi 702
This paper describes effects of visual information influencing sound localization in the peripheral visual Held under dynamic conditions. Presentation experiments of an audio-visual stimulus were carried out using a movie of a moving patrol car and its siren sound. The tallowing results were obtained: first, the sound image on the timing at the beginning of the presentation was more strongly captured by the visual image than that at the end, i.e., the "beginning effect" was occurred; second, in the peripheral regions, the "beginning effect" was strongly appeared in near the fixation point of eyes. -
This paper describes an effective technique for coding video sequences based on JPEG2000 codec. In the proposed method, multiple frames are combined into one large picture by interleaving each pixel data. A large picture enables images to be coded more efficiently and image quality is improved. A video sequence is efficiently coded by adapting the time correlation of the video sequences to spatial correlation. We demonstrated the effectiveness of this method by encoding video sequences using JPEG2000.