Proceedings of the IEEK Conference (대한전자공학회:학술대회논문집)
The Institute of Electronics and Information Engineers (IEIE)
- 기타
summer
-
We proposed a new type of timing recovery scheme to work with a system that uses BCJR (Bahl-Cocke-Jelinek-Raviv) decoding algorithm and BPSK modulation. The unknown timing offset is estimated by the modified Mueller and
$M\ddot{u}ller$ estimator with the aid of the decoder. Timing offset can be acquired as soon as the symbols are received and be updated symbol by symbol. The simulation results for turbo codes whose decoder uses BCJR algorithm show a satisfactory performance even in case of severe timing jitter. -
This paper proposed a systematic analysis for slotted ALOHA with capture effect. This is a generalization for slotted ALOHA system. Based on this model, we can increase the maximum through-put of slotted ALOHA system with two power levels. Lee's algorithm is consider to be an extension of ALOHA system with capture effect. In this paper, we showed that, the choice of Lee's algorithm is not an optimum one. Based on the previous experimental results, we proposed here a more practical analysis for slotted ALOHA system. The result is very accurate and can be applied to other wireless systems which also employed capture effect.
-
When providing flexible data transmission for future CDMA(Code Division Multiple Access) cellular networks, problems arise in two aspects: transmission rate. This paper has proposed an approach to maximize the cellular network capacity by combining the genetic transmission rate allocation and a rapid power control algorithm. We present a genetic chromosome representation to express call drop numbers and transmission rate to control mobile's transmission power levels while handling their flexible transmission rates. We suggest a rapid power control algorithm, which is based on optimal control theory and Steffenson acceleration technique comparing with the existing algorithms. Computer simulation results showed effectiveness and efficiency of the proposed algorithm Conclusively, our proposed scheme showed high potential for increasing the cellular network capacity and it can be the fundamental basis of future research.
-
In this paper we present a linear discrete bit-loading algorithm that maximizes the transmit bit rate using the channel informations to optimize the performance of the very high-speed digital subscriber line(VDSL) system. It will be useful under the constraint of a maximum transmit power for each user. When the level of crosstalk is high, the power allocation of a user changes the noise experienced by the other users in the same binder. In this case, the performance of DSL modems can be improved by jointly considering the bit and power allocation of all users.
-
The goal of this study is to realize the PBG lowpass filter using novel PBG structure modification both upper layer and ground layer. It has been designed three aperture slots of ground layer for PBG structure which the center slot shape of ground is two type, rectangular and dumbbell. This PBG LPF has the character of the broader stopband and smaller size than typical LPF. The measurement results have matched the simulated ones. It has the cutoff frequency of each 4.465GHz and 3.52GHz and at least -20dB of the signal suppression at the stopband
-
Five-port reflectometer which consists of a ring with 5 arms (two inputs, three outputs) and three RF power detectors has been used as a vector network analyser, a demodulator in the homodyne receiver as well as in Phase Looked Loop (PLL) and so on. Calibration of five-port reflectometer is an important task. In this paper, we present a calibration method of five-port for a propagation channel sounder. The method is based on measurement of the phase differences between the three voltages at the five-port's outputs in order to determine the ratio of two input incident waves. The frequency channel sounder based on five-port is calibrated for each frequency from 2.2 GHz to 2.6 GHz with 1 MHz step. This method can also determine the absolute delays of each propagation path in the propagation channel. The calibration method is validated using measurement data.
-
OFDMA is considered as one of the major candidates for broadband wireless access. The OFDMA signal is usually coherently demodulated, requiring the channel estimation which can be estimated using a known pilot signal. In multi-cell environment, the performance of channel estimation is mainly limited by intercell interference. It is desirable to use a pilot signal that can estimate the channel information robust to the intercell interference in the OFDMA uplink system. In this paper, we consider two types of pilot signal applicable to multi-cell OFDMA uplink systems: One is time-multiplexed pilot signal and the other is codemultiplexed pilot signal. Simulation results show that the code-multiplexed pilot is suitable for low mobility environment and time-multiplexed pilot is suitable for high mobility environment.
-
In an IP network, various types of traffics are statistically multiplexed to utilize efficiently the network resources. The DiffServ-aware-MPLS supports a wide variety of communication services with different QoS requirements. The DiffServ-aware-MPLS based on QoS architecture had become one of the most promising ways to guarantee QoS Multi-service IP network. But how to manage IP network with QoS guarantee is still an open issue. In this paper, we propose DiffServ-aware-MPLS buffer management technique using the specified policing, queuing, and scheduling
-
The MAC protocol of HIPERLAN/2 is based on TDMA/TDD and AP (Access Point) can dynamically allocate the number of RCHs (Random CHannels). We propose a dynamic random channel allocation scheme improved by limiting the number of minimum RCHs. On a simulated scenario adopted practical Internet traffic, the proposed scheme is shown to achieve over
$19\%$ lower delay than previously studied algorithm. This study will be a first step towards designing scope of RCHs for high-performance wireless packet network -
In this paper, I propose a thread scheduling policy for faster packet processing on the network processors with multithreaded multiprocessor architecture. To implement the proposed policy, I derived several basic parameters related to the thread scheduling and included a new parameter representing the packet contents and the features of the multithreaded architecture. Through the empirical study using a network processor, I proved the proposed scheduling ploicy provides better throughput and load balancing compared to the generally used thread scheduling policy.
-
Mobile IP [9] was introduced to help the mobile user to be contacted with a single IP address even though the point-of-access changes. However, mobile IP creates the so-called 'triangle routing' which makes the delays for data packets longer, as well as creating unnecessary traffic at the home network of the mobile user. To overcome this, Route Optimization (RO) for mobile IP [1] was proposed, which eliminated the triangle routing phenomenon. But [l] requires that the network protocol stack of all existing hosts to change. Privacy is also another matter to be considered. This paper introduces a scheme called Peer Agent scheme to implement RO for mobile IP without requiring existing hosts to change. Method to preserve location privacy while still enabling RO is also considered.
-
In this paper we propose a fair and secure e-commerce model for P2P network, in which communication entities can buy and sell products by P2P contract. In particular, we focus on a fair transaction protocol that is based on a collaboration with distributed communication entities. This feature makes our model very attractive in P2P networking environment which does not depend on any central trusted authority for managing communication entities.
-
Computing today is becoming ubiquitous. In such ubiquitous computing environments, entities expect to access resources and services at any time from anywhere. Therefore, the question rises of how to establish trust relationship in previously unknown devices or resources with such environment. After reviewing a model to delegate trust to communicating entities in ubiquitous environment and its security problems, we present a new model for secure delegation over communication entities. We adopt two-party signature scheme as cryptographic primitives. Additionally, we apply threshold cryptosystems to our model for more secure enhancement.
-
Next generation wireless network is evolving toward IP-based network that can various provide multimedia services. A challenge in wireless mobile Internet is support of quality of service over wireless access networks. DiffServ architecture is proposed for evolving wireless mobile Internet. In this paper we propose an algorithm for optimal buffer partitioning which requires the minimal channel capacity to satisfy the QoS requirements of input traffic. We used a partitioned buffer with size B to serve a layered traffic at each DiffServ router. We consider a traffic model with a single source generates traffic having J
$(J\geq2)$ quality of service (QoS) classes. QoS in this case is described by loss probability$\varepsilon_j$ . for QoS class j. Traffic is admitted or rejected based on the buffer occupancy and its service class. Traffic is generated by heterogeneous Markov-modulated fluid source (MMFS). -
An on-chip debugging unit is proposed aiming performance enhancement of JTAG-based SoC systems. The proposed unit comprises a JTAG module and a core breaker. The IEEE 1149.1 standard has been modified and applied to the new JTAG module. The proposed unit eliminates redundant clock cycles included in the TAP command execution stage reducing overall debugging time. TAP execution commands are repeatedly issued to perform debugging of complicated SoC systems. Simulation on the proposed unit shows some
$14\%$ performance enhancement and$50\%$ gate count reduction compared to the conventional ones. -
This work is the study of Voltage-Down Converter used as internal supply voltage having large current driving and stable voltage level at any variation of process, voltage, and temperature(P.V.T). It converts VDD(external supply voltage) into
$V_{1NT}(internal\;supply\;voltage).$ From the simulation results, a new Voltage-Down Converter has large current driving and a little stand-by current under lower supply voltage than conventional circuit. And bad characteristic of VINT, peaking, was eliminated. Start-up circuit for BGR is also added to one circuit, which consumes less current dissipation than convention circuit -
We have developed an optimization algorithm based formulation for performing efficient time driven simultaneous place and route for FPGAs. Field programmable gate array (FPGAs) provide of drastically reducing the turn-around time for digital ICs, with a relatively small degradation in performance. For a variety of application specific integrated circuit application, where time-to-market is most critical and the performance requirement do not mandate a custom or semicustom approach, FPGAs are an increasingly popular alternative. This has prompted a substantial amount of specialized synthesis and layout research focused on maximizing density, minimizing delay, and minimizing design time.
-
A Half-VDD Voltage(VHDD) Generator using PMOS pull-up transistor and NMOS pull-down transistor was newly proposed for low-voltage DRAMs. The driving current was increased and the power-on settling time was reduced in the new circuit. The newly proposed VHDD generator worked successfully at VDD at 1.5V and fabricated using 0.18um CMOS twin-well technology.
-
In this paper, we propose a analog front-end (AFE) for noncoherent On-Off Keying (OOK) Ultra Wide Band (UWB) system based on power detection. The proposed AFE are designed using 0.18 micron CMOS technology and verified by simulation using SPICE. The proposed AFE consist of Sample-and-Hold block, Analog-to-Digital converter, synchronizer, delayed clock generator and impulse generator. The time resolution of 1ns is obtained with 100MHz system clocks and the synchronized 10-bit digital outputs are delivered to the baseband. The impulse generator produces 1ns width pulse using digital CMOS gates. The simulation results show the feasibility of the proposed UWB AFE systems.
-
This paper proposes an advanced circuit for the capacitive type fingerprint sensor signal processing and an effective isolation structure for minimizing an electrostatic discharge(ESD) influence and for removing a signal coupling noise of each sensor pixel. The proposed detection circuit increases the voltage difference between a ridge and valley about
$80\%$ more than old circuit. The test chip is composed of$160\;\times\;192$ array sensing cells$(9,913\times11,666\;um^2).$ The sensor plate area is$58\;\times\;58\;um^2$ and the pitch is 60um. The image resolution is 423 dpi. The chip was fabricated on a 0.35um standard CMOS process. It successfully captured a high-quality fingerprint image and performed the registration and identification processing. The sensing and authentication time is 1 sec(.) with the average power consumption of 10 mW at 3.0V. The reveal ESD tolerance is obtained at the value of 4.5 kV. -
This research presents distributed database and knowledge-base modeling approach for intelligent product design system. The product design information in this study is described by a collection of rules and design knowledge that are utilized according to the product development procedures. In this work, a network-based architecture has been developed to enable dispersed designers to simultaneously accomplish remote design tasks. A client/server communication diagram has also been proposed to facilitate consistent primary information modeling for multi-user access and reuse of designed results. An intelligent product design system has been studied with the concepts of distributed database and network-based architecture in order to support concurrent engineering design and automatic design part assembly. The system provides the capability of composing new designs from proper design elements stored in the database and knowledge-base. The distributed intelligent product design is applied to the design of an automobile part as an example.
-
The researches of the emotions are currently great interest in speech processing as well as in human-machine interaction domain. In the recent years, more and more of researches relating to emotion synthesis or emotion recognition are developed for the different purposes. Each approach uses its methods and its various parameters measured on the speech signal. In this paper, we proposed using a short-time parameter: MFCC coefficients (MelFrequency Cepstrum Coefficients) and a simple but efficient classifying method: Vector Quantification (VQ) for speaker-dependent emotion recognition. Many other features: energy, pitch, zero crossing, phonetic rate, LPC... and their derivatives are also tested and combined with MFCC coefficients in order to find the best combination. The other models: GMM and HMM (Discrete and Continuous Hidden Markov Model) are studied as well in the hope that the usage of continuous distribution and the temporal behaviour of this set of features will improve the quality of emotion recognition. The maximum accuracy recognizing five different emotions exceeds
$88\%$ by using only MFCC coefficients with VQ model. This is a simple but efficient approach, the result is even much better than those obtained with the same database in human evaluation by listening and judging without returning permission nor comparison between sentences [8]; And this result is positively comparable with the other approaches. -
The very complicated proplem in spatial processing is effects of phading (Multipath and Delay Spread) and co-channel interference (CCI). The phading is one of principal causes, that form inter-symbol interference (ISI). Spatial-Temproral Adaptive Filter (STAF) has been taken as a solution of this problem, because it can suppress both these types of interference. But the performance of STAF exposes some elemental limitations, in which are the slow convergence of adaptive process and computational complexity. The cause of this is that, STAF must treat a large quantity of information in both space and time. The way that master these limitation is a use of Subband Spatial-Temproral Adaptive Filter (SSTAF). SSTAF reduce computational complexity by pruning off samples of signal and thus it lost some information in time. This draw on attennation of output SINR of SSTAF. The article analyse a optimal solution of this problem by introducing SSTAF with nonuniform weighted distribution.
-
In NLP (Natural Language Processing) tasks, the highest difficulty which computers had to face with, is the built-in ambiguity of Natural Languages. To disambiguate it, formerly, they based on human-devised rules. Building such a complete rule-set is time-consuming and labor-intensive task whilst it doesn't cover all the cases. Besides, when the scale of system increases, it is very difficult to control that rule-set. So, recently, many NLP tasks have changed from rule-based approaches into corpus-based approaches with large annotated corpora. Corpus-based NLP tasks for such popular languages as English, French, etc. have been well studied with satisfactory achievements. In contrast, corpus-based NLP tasks for Vietnamese are at a deadlock due to absence of annotated training data. Furthermore, hand-annotation of even reasonably well-determined features such as part-of-speech (POS) tags has proved to be labor intensive and costly. In this paper, we present our building an annotated English-Vietnamese parallel aligned corpus named EVC to train for Vietnamese-related NLP tasks such as Word Segmentation, POS-tagger, Word Order transfer, Word Sense Disambiguation, English-to-Vietnamese Machine Translation, etc.
-
Underwater acoustic(UWA) communication is one of the most difficult field because of several factors such as multipath propagation, high temporal and spatial variability of channel conditions. Therefore, it is important to model and analyze the characteristics of underwater acoustic channel such as multipath propagation, transmission loss, reverberation, and ambient noise. In this paper, UWA communication channel is modeled with a ray tracing method and applied to image transmission. Quadrature phase shift keying(QPSK) and multichannel decision feedback equalizer(DFE) are utilized as phase-coherent modulation method and equalization technique, respectively. The objective is to improve the performance of vertical sensor array than that of single sensor in the viewpoint of bit error rate(BER), constellation output, and received image quality.
-
This paper proposes a novel algorithm for hybrid lossless audio coding, which employs integer discrete cosine transform. The proposed algorithm divides the input signal into frames of a proper length, decorrelates the framed data using the integer DCT and finally entropy-codes the frame data. In particular, the adaptive Golomb-Rice coding method used for the entropy coding selects an optimal option which gives the best compression efficiency. Since the proposed algorithm uses integer operations, it significantly improves the computation speed in comparison with an algorithm using real or floating-point operations. When the coding algorithm is implemented in hardware, the system complexity as well as the power consumption is remarkably reduced. Finally, because each frame is independently coded and is byte-aligned with respect to the frame header, it is convenient to move, search, and edit the coded data.
-
Video event detection has become an essential application in multimedia computing. For sports video, salient events are usually detected by analyzing video sequence by specific decision rules. However in many kinds of sports video (e.g. soccer), the game contains continuous actions, in which the boundaries of shots, scenes are uncertain. So the conventional analyzing methods using crisp decisions are not efficient. Fuzzy logic is a natural approach that can tackle this problem. In this paper, we present a new approach using fuzzy technique for event detection in soccer video. The experiment shows encouraging results for this method
-
The color gamut mapping method that is used for enhancing the color reproduction quality between PC monitor and printer devices is adopted for display quality enhancement. The high definition display devices operate at the clock speed of around
$70\;MHz\;\sim\;150\;MHz$ and permit several nano seconds for real-time processing. Thus, the concept of three-dimensional reduced resolution look-up table is used. The required hardware can be greatly reduced by look-up table resolution adjustment. The proposed hardware architecture is successfully implemented in ASIC and also successfully adopted in display quality enhancement purposes. -
In this paper, we propose a new image quality assessment scheme considering the human visual perception characteristics. A subjective quality assessment is obtained by the response of the receptive field in the primary visual cortex and a human's eye can't focus on all of the visual range in a moment. Take advantage of two facts above, we apply Gabor wavelet transform, which is well fit the receptive field in the cortex, to divided constant sized subblocks. Then a local distortion of the subblocks and a global distortion for the entire image are calculated in order. The proposed method has been evaluated using video test sequences provided by the Video Quality Experts Group (VQEG). The experimental results show that good correlation with human perception is obtained using the proposed metric, which is what we called GPSNR.
-
We are going to procedure various view from two frontal image using trifocal tensor. We found that warping is effective to produce synthesized poses of a face with the small number of mesh point of a given image in previous research[1]. For this research, fundamental matrix is important to calculate trifocal tensor. So, in this paper, we investigate two existing algorithms: Hartley's[2] and Kanatani's[3]. As an experimental result, Kenichi Kantani's algorithm has better performance of fundamental matrix than Harley's algorithm. Then we use the fundamental matrix of Kenichi Kantani's algorithm to calculate trifocal tensor. From trifocal tensor we calculate new trifocal tensor with rotation input and translation input and we use warping to produce new virtual views.
-
In this paper, we propose a new scheme for geometry coding of three-dimensional (3-D) mesh models using a fixed spectral basis. In order to code the mesh geometry information, we generate a fixed spectral basis using the dual graph derived from the 3-D mesh topology. After we partition a 3-D mesh model into several independent sub-meshes to reduce coding complexity, the mesh geometry information is projected onto the generated orthonormal bases which are the eigenvectors of the Laplacian matrix of the 3-D mesh. Finally, spectral coefficients are coded by a quantizer and a variable length coder. The proposed scheme can not only overcome difficulty of generating a fixed spectral basis, but also reduce coding complexity. Moreover, we can provide an efficient multi-resolution representation of 3-D meshes.
-
Differentiated services (DiffServ) has been widely accepted as the service model to adopt for providing quality-ofservice (QoS) over the next-generation IP networks. There is a growing need to support QoS in mobile ad hoc networks. Supporting DiffServ in mobile ad hoc networks, however, is very difficult because of the dynamic nature of mobile ad hoc networks, which causes network congestion. The network congestion induces long transfer packet delay and low throughput which make it very difficult to support QoS in mobile ad hoc networks. We propose DiffServ module to support differentiated service in mobile ad hoc networks through congestion control. Our DiffServ module uses the periodical rate control for real time traffic and also uses the best effort bandwidth concession when network congestion occurs. Network congestion is detected by measuring the packet transfer delay or bandwidth threshold of real time traffic. We evaluate our mechanism via a simulation study. Simulation results show our mechanism may offer a low and stable delay and a stable throughput for real time traffic in mobile ad hoc networks.
-
QoS is a subject of high interest for successful deployment of various services in a home gateway and the gateway is possible to support QoS by installing existing queuing disciplines, which control the outgoing traffic to guarantee only QoS of the traffic. But m the home gateway it is also important to guarantee QoS of the incoming traffic. This paper proposes an adaptive control of the traffic to guarantee QoS of incoming traffic into the home gateway. In the proposed method, the upper limit of the available bandwidth of sending rate varies with receiving rate. And the proposed method makes the gap between the allocated rate and the actual service rate of the traffic narrow. Some experiments on a test bed show that the proposed method is valid.
-
In 2004, Ku-Chen proposed an improvement to Chien et al.'s scheme to prevent from some weaknesses. Lee et al. also proposed an improvement to Chien et al.'s scheme to prevent from parallel session attack. This paper, however, will demonstrate that Ku-Chen's scheme is still vulnerable to the parallel session attack and Lee et al.'s scheme is also vulnerable to masquerading server attack.
-
We propose a dynamic wavelength assignment algorithm for online RWA problem in WDM networks with wavelength conversion. With our algorithm, for a given network condition, the following results have been proven mathematically: (1) the probability to find the set of wavelengths for a requested connection is equal or better than any other previously proposed algorithms, (2) our algorithm minimizes the usage of converters by chaining the minimum number of the longest wavelength continuous segments, leaving more converters available for future requests and (3) the complexity of our algorithm is reasonable, which is also another advantage of our algorithm.
-
This paper aims towards designing and implementation of a new adaptive Peer to Peer (P2P) network that cluster itself on the basis of semantic proximity. We also developed an algorithm to classify the nodes to form the semantic groups and to direct the queries to appropriate groups without any human intervention. This is done using Bloom filters to summarise keywords of the documents shared by a peer. The queries are directed towards the appropriate clusters instead of flooding them. The proposed topology supports a system for maintaining a global, omnipresent trust value for each peer in an efficient manner both in terms of decision time and network load.
-
This paper proposes a packet-based channel access scheme in Distributed-Queuing Request Update Multiple Access(DQRUMA) MAC(Media Access Control) protocol. To increase a channel access ratio, we eliminate the wait-to-transmit state that does not transmit Xmt_Req(Transmission Request) although the mobile terminal(MS) has new arrival packets in buffer.
-
Network management for detail analysis can cause speed decline of application in case of lack band width by traffic increase of the explosive Internet. Because a manager requests MIB value for the desired objects to an agent by management policy, and then the agent responds to the manager. Such processes are repeated, so it can cause increase of network traffic. Specially, repetitious occurrence of sending-receiving information is very inefficient for a same object when a trend analysis of traffic is performed. In this paper, an efficient SNMP is proposed to add new PDUs into the existing SNMP in order to accept time function. Utilizing this PDU, it minimizes unnecessary sending-receiving message and collects information for trend management of network efficiently. This proposed SNMP is tested for compatibility with the existing SNMP and decreases amount of network traffic largely
-
In this paper we introduce a bandwidth allocation algorithm and admission control policy for IEEE 802.16 broadband wireless access standard. The proposed mechanism is practical and compatible to the IEEE 802.16. Our scheme provides QoS support to high priority traffic and high throughput in low priority traffic. The simulation show that the proposed scheme includes QoS support for real-time traffic and we presented that BS determine a efficient contention mini-slot size. We have shown the relationship between traffic size and its QoS requirements and the network performance.
-
In this paper, we propose the dual band(2.4GHz and 5GHz) antenna for access point of WLAN(Wireless Local Area Network) which has similar radiation patterns for each band. Simulation results by using HFSS(High Frequency Structure Simulator) for the proposed antenna are presented. The electrical characteristics of the proposed antenna are measured with HP 8510C network analyzer and included. And radiation patterns are measured with rectangular anechoic far field antenna chamber. Measured results show that
$S_{11}$ is less than - 14dB and VSWR(Voltage Standing Wave Ratio) is less than 1.5 for all frequency bands of interest. The measured maximum gain for elevation pattern at 2.40GHz is about 2.46dBi at$theta=-78^{\circ}$ and maximum gain for 5.825GHz is about 2.70dBi at$theta=-80^{\circ}.$ And the implemented antenna has good radiation pattern characteristic, therefore, we expect that the implemented dual band antenna is applicable for access point of WLAN. -
Sufficient bandwidth that can support multimedia service has to be provided in the next generation wireless communication system. In this paper, the effective handoff scheme considering the position of mobile terminal is proposed. In addition, the dynamic channel allocation scheme is proposed. The shared channel in this algorithm can reduce more the blocking probability and the dropping probability. The proposed algorithms are simulated by SMPL library in C language. The simulation results show that the blocking probability and the dropping probability of the call can be reduced up to
$60\%\;and\;10\%$ using the proposed algorithms, respectively. -
This paper focuses on a TCP window-based flow control mechanism with Explicit Congestion Notification (ECN). We investigate the fundamental problem of achieving a fair window control for TCP, which cooperates with ECN. This is done by using feedback congestion pricing as a means of estimating the state of bottleneck router. The problem is solved by achieving network optimal performance, which maximize the total user utilities. We then look at the simulation of such scheme.
-
In variety of environments for applications, wireless sensor networks have received increasing attention in the recent few years. But, sensor nodes have many limitations including battery power and communication range. These networks require robust wireless communicant protocols that are energy efficient and provide low latency. In this paper, we propose new protocol as is defined SCP. The key idea of SCP is that only one node which is defined as a Super-Cluster Header sends the combined data to the BS. We evaluated the effectiveness of SCP through experiments which have several parameter violations. Simulation results shows that performance of SCP is through better than other legacy protocol within the framework of energy cost, life time of the sensor network and fair distribution of the energy consumption.
-
In this paper, we only describe the digital block of two-channel 18-bit analog-to-digital (A/D) converter employing sigma-delta method and xl28 decimation. The device contains two fourth comb filters with 1-bit input from sigmadelta modulator. each followed by a digital half band FIR(Finite Impulse Response) filters. The external analog sigma-delta modulators are sampled at 6.144MHz and the digital words are output at 48kHz. The fourth-order comb filter has designed 3 types of ways for optimal power consumption and signal-to-noise ratio. The following 3 digital filters are designed with 12tap, 22tap and 116tap to meet the specification. These filters eliminate images of the base band audio signal that exist at multiples of the input sample rate. We also designed these filters with 8bit and 16bit filter coefficient to analysis signal-to-noise ratio and hardware complexity. It also included digital output interface block for I2S serial data protocol, test circuit and internal input vector generator. It is fabricated with 0.35um HYNIX standard CMOS cell library with 3.3V supply voltage and the chip size is 2000um by 2000um. The function and the performance have been verified using Verilog XL logic simulator and Matlab tool.
-
Embedded business will be expanded market more and more since customers seek more wearable and ubiquitous systems. Cellular telephones, PDAs, notebooks and portable multimedia devices could bring higher microprocessor revenues and more rewarding improvements in performance and functions. Increasing battery capacity is still creeping along the roadmap. Until a small practical fuel cell becomes available, microprocessor developers must come up with power-reduction methods. According to MPR 2003, the instruction and data caches of ARM920T processor consume
$44\%$ of total processor power. The rest of it is split into the power consumptions of the integer core, memory management units, bus interface unit and other essential CPU circuitry. And the relationships among CPU, peripherals and caches may change in the future. The processor working on higher operating frequency will exact larger cache RAM and consume more energy. In this paper, we propose advanced low power trace cache which caches traces of the dynamic instruction stream, and reduces cache access times. And we evaluate the performance of the trace cache and estimate the power of the trace cache, which is compared with conventional cache. -
In this paper, The stress induced leakage currents of thin silicon oxides is investigated in the nano scale structure implementation for Soc. The stress and transient currents associated with the on and off time of applied voltage were used to measure the distribution of high voltage stress induced traps in thin silicon oxide films. The stress and transient currents were due to the charging and discharging of traps generated by high stress voltage in the silicon oxides. The channel current for the thickness dependence of stress current, transient current, and stress induced leakage currents has been measured in oxides with thicknesses between
$41\square\;and\;113.4\square,$ which have the channel width x length 10x1um, respectively. The stress induced leakage currents will affect data retention and the stress current, transient current is used to estimate to fundamental limitations on oxide thicknesses. The weight value of synapse transistor was caused by the bias conditions. Excitatory state and inhitory state according to weighted values affected the channel current. The stress induced leakage currents affected excitatory state and inhitory state. -
This paper presents a method of constructing the digital logic systems(DLS) using edge-valued decision diagrams(EVDD). The proposed method is as following. The EVDD is a new data structure type of decision diagram(DD) that is recently used in constructing the digital logic systems based on the graph theory. Next, we apply EVDD to function minimization of digital logic systems. The proposed method has the visible, schematical and regular properties.
-
A new wide-band VCO topology using Miller capacitance is proposed. Contrary to conventional VCO using the Miller capacitance where the variable amplifier gain is negative, the proposed VCO uses both the negative and positive variable amplifier gain to enhance the frequency tuning range significantly. The proposed VCO is simulated using HSPICE. The simulations show that 410MHz and 220MHz frequency tuning range are obtained using the negative .and positive variable amplifier gain, respectively. The tuning range of the proposed VCO is
$23\%$ of the center frequency(2.8GHz). The phase noise is -104dBc/Hz at 1MHz offset by simple model. The operating current is only 3.84mA at 2.5V power supply. -
This paper proposed an ultra low-power CMOS exponential voltage-mode circuit using the Pseudo-exponential function for realizing the exponential characteristics. The proposed circuit provides high dB-linear output voltage range at low-voltage applications. In a
$0.25\;\mu m$ CMOS process, the simulations show more than 35 dB output voltage range and 26 dB with the linearity error less than$\pm0.5\;dB.$ The average current consumption is less than 80 uA. The proposed circuit can be used for the design of an extremely low-power variable gain amplifier (VGA) and automatic gain control (AGC). -
This paper presents a hybrid decimal division algorithm to improve division speed. In a binary number system, non-restoring algorithm has a smaller number of operations than restoring algorithm. In decimal number system, however, the number of operations differs with respect to quotient values. Since one digit ranges 0 to 9 in decimal, the proposed hybrid algorithm employ either non-restoring or restoring algorithm on each digit to reduce iterative operations. The selection of the algorithm is based on the remainder values. The proposed algorithm improves computation speed substantially over conventional algorithms by decreasing the number of operations.
-
In this paper, we propose a robust music retrieval system based on the content analysis of music. New feature extraction method called Multi-Feature Clustering (MFC) is proposed for the robust and optimum performance of the music retrieval system. It is demonstrated that the use of MFC significantly improves the system stability of music retrieval with better classification accuracy.
-
This paper proposes new method for the enhancement of nonexistent high frequency spectral contents from low sample rate audio signal. For example, Due to the protocol constraint, the audio bandwidth of MP3 is restricted to 16Khz. Although band-restricted MP3 audio provide savings of storage space and network bandwidth, it suffers a major problem of a loss in high frequency fidelity such as localization, ambient information, and bright nature of audio. This paper provides a new mathematical analysis for the adaptive estimation of the high frequency contents based on the nature of the input low sample rate audio. Proposed method can be worked globally to any kind of audio such as speech and music that are restricted by sampling rate and bandwidth.
-
A multichannel smart sound sensor capable to detect and identify sound events in noisy conditions is presented in this paper. Sound information extraction is a complex task and the main difficulty consists is the extraction of highlevel information from an one-dimensional signal. The input of smart sound sensor is composed of data collected by 5 microphones and its output data is sent through a network. For a real time working purpose, the sound analysis is divided in three steps: sound event detection for each sound channel, fusion between simultaneously events and sound identification. The event detection module find impulsive signals in the noise and extracts them from the signal flow. Our smart sensor must be capable to identify impulsive signals but also speech presence too, in a noisy environment. The classification module is launched in a parallel task on the channel chosen by data fusion process. It looks to identify the event sound between seven predefined sound classes and uses a Gaussian Mixture Model (GMM) method. Mel Frequency Cepstral Coefficients are used in combination with new ones like zero crossing rate, centroid and roll-off point. This smart sound sensor is a part of a medical telemonitoring project with the aim of detecting serious accidents.
-
This paper proposes a new noise cancellation method for speech recognition in noise environments. We determine the time adaptive threshold value using standard deviations of wavelet coefficients after wavelet transform by frames. The time adaptive threshold value is set up by using sum of standard deviations of wavelet coefficients in cA3 and weighted cD1. cA3 coefficients represent the voiced sound with lower frequency components and cD1 coefficients represent the unvoiced sound with higher frequency components. In experiments, we removed noise after adding white Gaussian noise and colored noise to original speech. The proposed method improved SNR and MSE more than wavelet transform and wavelet packet transform does. As a result of speech recognition experiment using noise speech DB, recognition performance is improved by
$2\sim4\;\%.$ -
Wavelet transform (WT) has attracted most engineers and scientists because of its excellent properties. The coherence of practical approach and a theoretical basis not only solves currently important problems, but also gives the potential of formulating and solving completely new problems. It has been show that multi-resolution analysis of Wavelet transforms is good solution in speech analysis and threshold of wavelet coefficients has near optimal noise reduction property for many classes of signals. This paper proposed applications of wavelet in speech processing: pitch detection, voice-unvoice (V -UV) decision, denoising with the detailed algorithms and results.
-
In shallow water, the performance of the operating active sonar systems is usually limited by reverberation. One of the measure to overcome the negative effect of reverberation is of selecting an adequate transmission pulse. SFM(Sinusoidal Frequency Modulation) pulse has been received a considerable attention as a candidate for suppressing the reverberation effect. In this paper, we analyze the detection performance of SFM pulse with respect to modulation frequency and bandwidth. To conduct the analysis. we synthesize the signal at the receiver considering. the transmitter. the receiver, and the propagation medium characteristcs. The simulations provide the optimum modulation frequency and bandwidth under the given situation.
-
In most of the character recognition systems, the method of template matching or statistical method using hidden Markov model is used to extract and recognize feature shapes. In this paper, we used modified chain-code which has 8-directions but 4-codes, and made the chain-code of hand-written character, after that, converted it into transition chain-code by applying to HMM(Hidden Markov Model). The transition chain code by HMM is analyzed as signal flow graph by Mason's theory which is generally used to calculate forward gain at automatic control system. If the specific forward gain and feedback gain is properly set, the forward gain of transition chain-code using Mason's theory can be distinguished depending on each object for recognition. This data of the gain is reorganized as tree structure, hence making it possible to distinguish different hand-written characters. With this method,
$91\%$ recognition rate was acquired. -
The inverse kinematics problem is to find a set of joint variable values that will place the end effector of a robot manipulator into a given pose. Pieper has shown that a sufficient condition for a manipulator to have a closed form solution is that three adjacent joint axes intersects, hence the six axes robot with spherical wrist allows closed form solution. But many industrial robots have a non-spherical wrist to provide a stronger wrist configuration so that they can handle heavy payloads. Also, the use of a non-spherical wrist can result in a cheap and simple wrist arrangement than when all three axes intersect at a common point. In these cases, closed form solutions cannot be found. Therefore numerical technique must be used to solve the inverse kinematics equations. This paper proposes a new algorithm that can be used for finding inverse kinematics solution of the six axes robot with non-spherical wrist. Computer simulations are provided to prove the usefulness of our method.
-
This paper presents a comparative performance analysis of a network accelerator model based on M/M/l queuing system. It assumes the Poisson distribution as its input traffic load. The decoding delay is employed as a performance analysis measure. Simulation results based on the proposed model show only
$15\%$ differences with respect to actual measurements on field traffic for BCM5820 accelerator device. The performance analysis model provides with reasonable hardware structure of network servers, and can be used to span design spaces statistically. -
The Hough transform has been used as a tool for line detection. The main idea of the Hough transform is to transform each pixel in the image individually into the parameter domain. In this way, the Hough transform converts a difficult global detection problem in the image domain into a more easily solved local peak detection problem in the parameter domain. In this paper, we show that the discrete Hough transform is identical to the discrete Radon transform. Thus, we can use the generalized Radon transform to handle more general parameterized curve types.
-
This paper first takes advantage of a rigorous modal transmission-line theory (MTLT) to analyze the filtering properties of optical waves guiding by grating-assisted fiber couplers (GAFCs). The numerical results reveal that MTLT serves as a suitable and powerful approach to evaluate systematically the dispersion properties and the characteristics of optical power transfer in GAFCs.
-
In this paper, a verification method and model for a PCI-Express device are described. PCI-Express technology is one of new I/O interconnection technologies which is intended to replace conventional PCI based technology, and is introduced by PCI-SIG in 2002. For a fast prototyping, a verification suite which includes a behavioral model and stimuli is needed before actual design is finished. And also it should be simple in structure and accurate enough to verify the design. In this paper, an Early Verification Suite (EVS) which complies with PCI-Express protocol is developed and tested.
-
In this paper, we present a design and experiment of PCI Express core verification model. The model targeting Endpoint core based on Verilog HDL is designed by newly-emerging SystemC, which is a new C++ class library based system design approach. In the verification model, we designed and implemented a SystemC host system model which acted as Root Complex and device driver dedicated to the PCI Express Endpoint RTL core. The verification process is scheduled by scenarios which are implemented in host model. We show that the model is useful especially for verifying the RTL model which has dependencies on system software.
-
In this paper, data rate of VDSL system was analyzed in RFI(Radio Frequency Interference) environment. This Paper used Various 'VDSL Test Loop' suggested by ANSI DSL Standard group TIE1.4.Many parameters, 'Noise Model A', 'Noise Model F' and KARL-HAM band are used for more accurate results of the simulation. Most of conditions for simulation are followed to the ANSI Standard 'Spectrum management'. Many results have been calculated according to the different conditions of the test loops in simulation. Simulation results confirm that using shaped PSD mask to reject RFI is one of factor to decrease the performance of VDSL systems.
-
This paper presents a combination of optimization concept and congestion control for multicast communications to bring best benefit for the network. For different types of Internet services, there will be different utility functions and so there will be different ways to choose on how to control the congestion, especially for real time multicast traffic. Our proposed algorithm OMCC brings the first implementation experiment of utility-based Multicast Congestion Control. Simulation results show that OMCC brings better network performances in multicast session throughput while it still keeps a certain fairness of unicast and multicast sessions, and thus, provides better benefit for all network participants.
-
The transmission capacity of wireless communication systems may become dramatically high by employ multiple transmit and receive antennas with space-time coding techniques appropriate to multiple transmit antennas. For large number of transmit antennas and at high bandwidth efficiencies, the receiver may become too complex whenever correlation across transmit antennas is introduced. Reducing decoding complexity at receiver by combining array processing and space-time codes (STC) helps a communication system using STC to overcome the big obstacle that prevents it from achieving a desired high transmission rate. Multi-carrier CDMA (MC-CDMA) allows providing good performance in a channel with high inter-symbol interference. Antenna array, STC and MC-CDMA system have a similar characteristic that transmit-receive data streams are divided into sub-streams. Thus, there may be a noticeable reduction of receiver complexity when we combine them together. In this paper, the combination of array processing and STC in MC-CDMA system over slow selective-fading channel is investigated and compared with corresponding existing MC-CDMA system using STC. A refinement of this basic structure leads to a system design principle in which we have to make a trade off between transmission rate, decoding complexity, and length of spreading code to reach a given desired design goal.
-
Binary Exponential Back-off (BEB) scheme is widely adopted in both wire and wireless networks for collision resolution. The BEB suffers from several performance drawbacks including long packet delay and low utilization since it doubles the back-off size after each collision. In addition, operation of the BEB algorithm may lead to the last-come-first-serve result among competing users and the BEB is further unstable for every arrival rate greater than 0 due to its random access property[1,2]. In this paper, we propose a deterministic back-off algorithm to reduce contention interval as much as possible for accessing the channel without collision in the back-off process. Simulation results show that our scheme offers a higher throughput as well as a lower packet transfer delay than the BEB by taking advantage of its lower collision ratio in saturation state.
-
This paper presents a new dynamically adaptable polling scheme for efficient support of real-time traffic over an IEEE 802.11 wireless LAN network. The poll scheduling plays an important role in IEEE 802.11 PCF. However, the current version of the polling list management scheme proposed in the IEEE802.11 standard is inefficient when a variable number of mobile stations have variable packets to transmit. If Point Coordinator(PC) has an exact information on the station status, it is possible to efficiently perform polling. In this thesis. we suggest an adaptable polling scheme to meet requirements of the stations. In our scheme, each station transmits packets including a piggyback information to inform that it wants to receive a poll in the next polling duration. Simulation results indicate that our scheme may reduces the packet discard ratio and real-time packet transfer delay.
-
The exponential back-off algorithm doubles the back-off size after each collision without considering network traffic status, which causes degradation of system performance. In this paper, we propose a linear random back-off mechanism which dynamically selects the back-off window size based on the channel status which includes the number of active stations and collisions to significantly increase the protocol capacity. We present an analytical model for the saturated throughput of our linear random back-off algorithm. Simulation results show that performance can be substantially enhanced if binary exponential back-off algorithm is replaced by a linear back- off algorithm.
-
A VPN is widely used in a communications environment which access is controlled to permit peer connections only within a defined community of interest. It is constructed through some form of partitioning of a common underlying communication medium, where this underlying communications medium provides services to the network on a non-exclusive basis. In this paper, we have analyzed a variety of architecture to implement Giga bps VPN system. The proposed architecture will satisfy the needs of clients who adopt Giga bps VPN system in the various environments.
-
Linear size expanders have been studied in many fields for the practical use, which is possibility to connect large numbers of device chips in parallel communication systems. One major limitation on the efficiency of parallel computer designs has been the prohibitively high cost of parallel communication between processors and memories. Linear size expanders can be used to construct theoretically optimal interconnection networks. In current, the defined constructions have large constant factors, thus rendering them impractical for reasonable sized networks. This paper presents an improvement on constructing concentrators using an
$(n,\;k,\;2rs/(r^2-s^2))expander,$ which realizes the reduction of the size in a superconcentrator by a constant factor. -
Microsensor nodes is energy limited in sensor networks. If nodes had been stop in working, sensor network can't acquire sensing data in that area as well as routing path though the sensor can't be available. So, it's important to maximize the life of network in sensor network. In this paper, we look at communication protocol, which is modified by LEACH(Low-Energy Adaptive Clustering Hierarchy). We extend LEACH's stochastic cluster-head selection algorithm by a Position-based Selection (PB-Leach). This method is that the sink divides the topology into several areas and cluster head is only one in an area. PB-Leach can prevent that the variance of the number of Cluster-Head is large and Cluster-Heads are concentrated in specific area. Simulation results show that PB-Leach performs better than leach by about 100 to
$250\%.$ -
In this paper, we suggest a new antenna structure for RFID(Radio Frequency IDentification) reader. Conventional RFID reader uses a loop antenna. The central area of a loop antenna shows a low magnetic field strength especially for the case of a large loop antenna diameter. We propose a parallel-fed multiple loop antenna. Simulation results and measured results show that we can adjust field distribution with the number of turns and diameter of an inner loop antenna to obtain a longer reading distance. Simulation results for the specific case of a proposed antenna structure show that at the center point of a proposed parallel-fed multiple loop antenna, the typical card area averaged magnetic field strength is 2.53A/m, which is higher than the case of a conventional type single loop antenna of 0.44A/m and the case of a series-fed multiple loop antenna of 0.96A/m when we drive with same source signal. We realized the antenna for the case of 13.56MHz RFID reader and the performance of reading distance was much more improved than the case of a conventional antenna.
-
In this paper, we investigated methods to reduce SAR(Specific Absorption Rate) value with EMI(Electromagnetic Interference) paint distribution on front case of mobile handset. Simulations for several different EMI patterns were carried out. For the purpose of modeling, we used 3 dimensional CAD(Computer Aided Design) program, `Pro-engineering'. SAR simulation was done with SEMCAD, simulation platform for electromagnetic compatibility antenna design and dosimetry. In order to distinguish the individual pieces and to enable an assignment of the different material properties, each subfile was imported separately. In simulation, folding angle was set to
$142^{\circ}.$ If we vary folding angle, different SAR value will be obtained. Among the tested EMI paint patterns, the hairpin pattern showed the best performance, i.e. the decrease efficiency of$16.5\%$ and horizontal-direction zigzag pattern showed the decrease efficiency of$12.2\%$ when we set the completely removed pattern as reference. -
High oxidation temperature of SiC shows a tendency of carbide formation at the interface which results in poor MOSFET transfer characteristics. Thus we developed oxidation processes in order to get low interface charge densities. N-type 6H-SiC MOS capacitors were fabricated by different oxidation processes: dry, wet, and dryreoxidation. Gate oxidation and Ar anneal temperature was
$1150^{\circ}C.$ Ar annealing was performed after gate oxidation for 30 minutes. Dry-reoxidation condition was$950^{\circ}C,$ H2O ambient for 2 hours. Gate oxide thickness of dry, wet and dry-reoxidation samples were 38.0 nm, 38.7 nm, 38.5 nm, respectively. Mo was adopted for gate electrode. To investigate quality of these gate oxide films, high frequency C- V measurement, gate oxide leakage current, and interface trapped charge densities (Dit) were measured. The interface trapped charge densities (Dit) measured by conductance method was about$4\times10^{10}[cm^{-1}eV^{-1}]$ for dry and wet oxidation, the lowest ever reported, and$1\times10^{11}[cm^{-1}eV^{-1}]$ for dry-reoxidation -
This paper proposes an alternative observation scheme, T-S fuzzy model based indirect adaptive fuzzy observer. Nonlinear systems arc represented by fuzzy models since fuzzy logic systems arc universal approximators. In order to estimate the unmeasurable states of a given nonlinear system, T-S fuzzy modeling method is applied to get the dynamics of an observation system. T-S fuzzy system uses the linear combination of the input state variables and the modeling applications of them to various kinds of nonlinear systems can be found. The adaptive fuzzy scheme estimates the parameters comprising the fuzzy model representing the observation system. The proposed indirect adaptive fuzzy observer based on T-S fuzzy model can cope with not only unknown states but also unknown parameters. In the process of deriving adaptive law, the Lyapunov theory and Lipchitz condition are used. To show the performance of the proposed observation method, it is applied to an inverted pendulum on a cart.
-
With the growing acceptance of XML technologies, XML will be the most common tool for all data manipulation and data transmission. Meeting security requirements for privacy, confidentiality and integrity is essential in order to move business online and it is important for security to be integrated with XML solutions. Many policies require certain conditions to be satisfied and actions to be performed before or after a decision is made. Binary yes/no decision to an access request is not enough for many applications. These issues were addressed and formalized as provisions and obligations by Betti et Al. In this paper, we propose an authorization model with provisions and obligations in XML. We introduce a formal definition of authorization policy and the issues involving obligation discussed by Betti et Al. We use the formal model as a basis to develop an authorization model in XML. We develop DTDs in XML for main components such as authorization request, authorization policy and authorization decision. We plan to develop an authorization system using the model proposed.
-
This paper describes an automatic 3D models generation algorithm based on 2D silhouette images, using X-ray camera without camera parameters. The algorithm takes a multi steps process approach. First, a series of 2D silhouette images is captured from different directions of object and then converted to binary images. An octree data structure is constructed for voxel-based representation of object. An estimate 3D volume of object can be reconstructed by intersecting voxels and the 2D silhouettes. The marching cube algorithm is applied to get triangle mesh representing of the obtained 3D model for rendering.
-
In this paper, we wish to construct a optimal traffic cycle using wire remote control. if police vehicle or ambulance suddenly enter the traffic intersection, it will increase the traffic accident. In this paper, wireless traffic light use the radio traffic control signal and research about the hardware manufacture to check special detectors on urgency vehicles may safety and rapidly enter traffic intersection. Also, this paper present a traffic signal control conditions that analyzes different traffic intersection flows in cases of saturated flows, where the real traffic volume demand is large and the capacity constraints of bottlenecks have significant effects on the flow patterns. Through computer simulation this wireless traffic light has been proven to be much more safety and efficient than fixed traffic signal light which does not considering emergency vehicles for safety escort.
-
Fault diagnosis is one of the most studied problems in process engineering. Recently, great research interest has been devoted to approaches that use classification methods to detect faults. This paper presents an application of a newly developed classification method - support vector machines - for fault diagnosis in an industrial case. A real set of operation data of a motor pump was used to train and test the support vector machines. The experiment results show that the support vector machines give higher correct detection rate of faults in comparison to rule-based diagnostics. In addition, the studied method can work with fewer training instances, what is important for online diagnostics.
-
The Semantic Web is an extension of the current Web in which information is given formal and explicit meaning. The Semantic Web enables computer programs to understand information contents and thus facilitates more efficient discovery, automation, integration and sharing of data. To create Semantic Web contents one needs appropriate tools. In this paper, we describe such a toolkit we have constructed. The most important feature of the toolkit is that it makes use of information extraction techniques for automatically annotating web page contents. Experiments with a real life application show promising results and demonstrate the usefulness of the toolkit.
-
Recently, with the machine learning trend, most of the machine translation systems on over the world use two syntax tree sets of two relevant languages to learn syntactic tree transfer rules. However, for the English-Vietnamese language pair, this approach is impossible because until now we have not had a Vietnamese syntactic tree set which is correspondent to English one. Building of a very large correspondent Vietnamese syntactic tree set (thousands of trees) requires so much work and take the investment of specialists in linguistics. To take advantage from our available English-Vietnamese Corpus (EVC) which was tagged in word alignment, we choose the SITG (Stochastic Inversion Transduction Grammar) model to construct English- Vietnamese syntactic tree sets automatically. This model is used to parse two languages at the same time and then carry out the syntactic tree transfer. This English-Vietnamese bilingual syntactic tree set is the basic training data to carry out transferring automatically from English syntactic trees to Vietnamese ones by machine learning models. We tested the syntax analysis by comparing over 10,000 sentences in the amount of 500,000 sentences of our English-Vietnamese bilingual corpus and first stage got encouraging result
$(analyzed\;about\;80\%)[5].$ We have made use the TBL algorithm (Transformation Based Learning) to carry out automatic transformations from English syntactic trees to Vietnamese ones based on that parallel syntactic tree transfer set[6]. -
In this paper, we design and implement practical application service using VoiceXML. And we suggest new solutions of problems can be occurred when implementing a new systems using VoiceXML, based on the fact. Up to now, speech related services were developed using API (Application Program Interface) and programming languages, which methods depend on system architectures. It thus appears that reuse of contents and resource was very difficult. To solve these problems, nowadays, companies develop their applications using VoiceXML. Advantages of using VoiceXML when developing services are as follows. First, we can use web developing technologies and technologies for transmitting web contents. And, we can save labors for low level programming like C language or Assembler language. And we can save labors for managing resources, too. As the result of these advantages, we can reduce developing hours of applications services and we can solve problem of compatibility between systems. But, there's poor grip of actual problems can be occurred when implementing their own services using VoiceXML. To overcome these problems, we implemented interactive stock trading system using VoiceXML and concentrated our effort to find out problems when using VoiceXML. And then, we proposed solutions to these problems and analyzed strong points and weak points of suggested system.
-
This paper focuses on the DSP implementation of an HMM-based speech recognizer that can handle several hundred words of vocabulary size as well as speaker independency. First, we develop an HMM-based speech recognition system on the PC that operates on the frame basis with parallel processing of feature extraction and Viterbi decoding to make the processing delay as small as possible. Many techniques such as linear discriminant analysis, state-based Gaussian selection, and phonetic tied mixture model are employed for reduction of computational burden and memory size. The system is then properly optimized and compiled on the TMS320C6711 DSP for real-time operation. The implemented system uses 486kbytes of memory for data and acoustic models, and 24.5kbytes for program code. Maximum required time of 29.2ms for processing a frame of 32ms of speech validates real-time operation of the implemented system.
-
We present modality conversion as an effective means for QoS management. We show that modality conversion, in combination with content scaling, would give a wider range of adaptation to support QoS at media level. Here, we consider modality conversion with respect to resource constraint and human factor. To represent modality conversion as well as content scaling, we present the overlapped content value (OCV) model that relates the content value of different modalities with resources. The specification of user preference on modality conversion is divided into qualitative and quantitative levels. The user preference is then integrated into the OCV model so that modality conversion correctly reflects the user's wishes. For the conversion of multiple contents, an optimization problem is formulated and solved by dynamic programming. The experiments show that the proposed approach is efficient to be applied in practice.
-
There are many methods to find solutions for Integer Programming problems (IPs) such as the Branch-Bound philosophy or the Cutting Plane algorithm. However, most of them have a problem that is the explosion of sets in the computing process. In addition, GA is known as a heuristic search algorithm for solutions of optimization problems. It is started from a random initial guess solution and attempting to find one that is the best under some criteria and conditions. The paper will study an artificial intelligent method to solve IPs by using Genetic Algorithms (GAs). The original solution of this was presented in the papers of Fabricio Olivetti de Francaand and Kimmo Nieminen [2003]. However, both have several limitations which causes could be operations in GAs. The paper proposes a method to upgrade these operations and computational results are also shown to support these upgrades.
-
The Pocket PC has become more popular in market because of the advantages of its small size and convenience for regular customers. Pocket PC is a mobile device so that we can receive the benefits of shared data over a wireless network. Enabling us to transmit data to a central location, simply messaging from one point to the next, its ability to share information across a wireless platform is becoming central to our communication needs. However, using Windows CE - an embedded operating system, as well as being designed for mobile users, there are many limitations to memory and speed of arithmetic operations on Pocket PC. As a result, developers have to deal with many difficulties in managing information storage when developing applications, especially Geography Information System (GIS) applications. In this paper, we propose some efficient methods to store GIS data and to increase the speed of displaying maps in GIS applications developed on Pocket PC and Windows CE 3.0.
-
Employing knowledge of adaptive possibilities of agents in multi-agents system, we have explored new aspects of distributed modular systems for building ubiquitous heterogeneous robotic systems using intelligent building blocks (I-BLOCKS) [1] as reconfigurable modules. This paper describes early technological approaches related to technical design, experimental developments and evaluation of adaptive processing and information interaction among I-BLOCKS allowing users to easily develop modular robotic systems. The processing technology presented in this paper is embedded inside each
$DUPLO^1$ brick by microprocessor as well as selected sensors and actuators in addition. Behaviors of an I-BLOCKS modular structure are defined by the internal processing functionality of each I-Block in such structure and communication capacities between I-BLOCKS. Users of the I-BLOCKS system can easily do 'programming by building' and thereby create specific functionalities of a modular robotic structure of intelligent artefacts without the need to learn and use traditional programming language. From investigating different effects of modern artificial intelligence, I-BLOCKS we have developed might possibly contain potential possibilities for developing modular robotic system with different types of morphology, functionality and behavior. To assess these potential I-BLOCKS possibilities, the paper presents a limited range of different experimental scenarios in which I-BLOCKS have been used to set-up reconfigurable modular robots. The paper also reports briefly about earlier experiments of I-BLOCKS created on users' natural inspiration by a just defined concept of modular artefacts. -
Caenorhabditis (C) elegans is often used in genetic analysis in neuroscience because its simple organism; an adult hermaphrodite contains only 302 neuron. So the worm is often used to study of cancer, alzheimer disease, aging, etc. To analysis mutant type of the worm, an experienced observer was able to subjectively before, but requirements for objective analysis are now increasing. For this reason, we use automated tracking systems to extract global movement coordinate of the worm. In this paper, we extract features, which are related on reversal and movement of the worm. Using these features, we quantitatively analysis 6 type mutant by movement and reversal characteristic.
-
Analyzing adaptive possibilities of agents in multi-agents system, we have discovered new aspects of ambient intelligence in distributed modular systems using intelligent building blocks (I-BLOCKS) [1]. This paper describes early scientific researches related to technical design, applicable experiments and evaluation of adaptive processing and information interaction among I-BLOCKS allowing users to easily develop ambient intelligence applications. The processing technology presented in this paper is embedded inside each DUPLO1 brick by microprocessor as well as selected sensors and actuators in addition. Behaviors of an I-BLOCKS modular structure are defined by the internal processing functionality of each I-Blocks in such structure and communication capacities between I-BLOCKS. Users of the I-BLOCKS system can do 'programming by building' and thereby create specific functionalities of a modular structure of intelligent artefacts without the need to learn and use traditional programming language. From investigating different effects of modem artificial intelligence, I-BLOCKS we have developed might possibly contain potential possibilities for developing applications in ambient intelligence (AmI) environments. To illustrate these possibilities, the paper presents a range of different experimental scenarios in which I-BLOCKS have been used to set-up reconfigurable modular systems. The paper also reports briefly about earlier experiments of I-BLOCKS in different research fields, allowing users to construct AmI applications by a just defined concept of modular artefacts [3].
-
In this paper, we present a overview of content-based image retrieval (CBIR) systems: its results and its problems. We propose our CBIR system currently based on color and texture. From the CBIR systems. we discuss the way to add semantic values in image retrieval systems. There are 3 ways for adding them: concept definition, machine learning and man-machine interaction. Along with this we introduce our preliminary results and discuss them in the goal of reaching semantic retrieval. Different result representation schemes are presented. At last, we present our work to build a complete annotated image database and our image annotaion program.
-
This paper presents a personal identification method using teeth images. The method uses images for teeth expressions of anterior and posterior occlusion state and LDA-based technique. Teeth images give merits for recognition because teeth, rigid objects, cannot be deformed at the moment of image acquisition. In the experiments, personal identification for 12 people was successful. It was shown that our method can contribute to multi-modal authentication systems.
-
Image binarization using a global threshold value [3] performs at high speed, but usually results in undesired binary images when the source images are of poor quality. In such cases, adaptive local thresholding algorithms [1][2][3] are used to obtain better results, and the algorithm proposed by A.E.Savekis which chooses local threshold using foreground and background clustering [1] is one of the best thresholding algorithms. However, this algorithm runs slowly due to its re-computing threshold value of each central pixel in a local window MxM. In this paper, we present a dynamic programming approach for the step of calculating local threshold value that reduces many redundant computations and improves the execution speed significantly. Experiments show that our proposal improvement runs more ten times faster than the original algorithm.
-
This paper propose scene change detection algorithm using coefficient of forward prediction macro-block, backward prediction macro-block, and intra-coded macro-block on getting motion estimation. Proposed method detect scene change with correlation according picture type forward two picture or forward and backward two picture on video sequences. Proposed algorithm is high accuracy and can detect all scene change on video, and detect to occur scene change on P, B, I-picture.
-
This paper proposes remotely sensed image classification method by fuzzy c-means clustering algorithm using average intra-cluster distance. The average intra-cluster distance acquires an average of the vector set belong to each cluster and proportionates to its size and density. We perform classification according to pixel's membership grade by cluster center of fuzzy c-means clustering using the mean-values of training data about each class. Fuzzy c-means algorithm considered membership degree for inter-cluster of each class. And then, we validate degree of overlap between clusters. A pixel which has a high degree of overlap applies to the maximum likelihood classification method. Finally, we decide category by comparing with fuzzy membership degree and likelihood rate. The proposed method is applied to IKONOS remote sensing satellite image for the verifying test.