This letter proposes a reliable depth-image-based rendering (DIBR) technique, which can provide users with reliable 3D services even if contents contain unknown or inappropriate values in some parameters. For the reliable DIBR, this letter presents how to set rendering parameters such as far/near clipping plane, convergence distance, and scale factor by taking mobile display size into consideration. Various experiments show that the proposed method can be effectively employed for 3D services based on DIBR over terrestrial-digital multimedia broadcasting (T-DMB).
Test power and test overhead are crucial to VLSI and SOC testing. This paper proposes a low cost test pattern generator (TPG) for test-per-clock built-in self-test (BIST) scheme. The proposed method utilizes a two-dimensional TPG and a bit-XOR array to reduce area overhead, and generates single input change (SIC) sequences to reduce input transitions of the circuit under test (CUT). Simulation results on ISCAS benchmarks demonstrate that the proposed method can achieve high fault coverage and effectively reduce test power.
A block-based Wiener filter is proposed for the source localization problem under an additive measurement error model. In this paper, we expand the Wiener filter, which is a single sensor case, to multi-sensor scenario. The proposed block-based Wiener filter method proves to be more efficient than the existing methods under various noise situations when the length of data set is more than two and as the number of data set increases, the performance is improved.
A successive elimination algorithm for two-bit transform (2BT) based motion estimation (ME) is proposed. By mathematically deriving the lower bound for2BT-based matching criterion, we can discard the impossible candidates earlier and save computations substantially. Experimental results show that although the performance of the proposed algorithm is the same as that of the full search 2BT (FS-2BT) based ME algorithm, the computational complexity has been reduced significantly.
The spectral envelope is mainly determined by the shape of vocal tract and it is generally represented by linear estimation methods such as an autoregressive (AR) modeling. Neural network (NN) is general tools for modeling nonlinear function. Nonlinear aspects of NN have been emphasized. However, in this study, a novel approach to spectral estimation, which is based on the use of a linear feed-forward NN is discussed. Example of the linear network for estimating the spectral envelope of vowel sound is presented. The proposed linear NN technique leads to interesting new paradigms which could not have been considered in advance.
This paper analyses the lower bound of range resolution in Frequency Modulated Interrupted Continuous Wave (FMICW) radar, and presents a novel aliasing receiver theory. Through introducing a novel alias-removing algorithm, the receiver allows a certain degree of range aliasing, which leads to a much larger sweep bandwidth and an improved range resolution.
This paper proposes a new driving scheme for insulated gate bipolar junction transistors (IGBTs) and thyristors used for high power conversion. Most power conversion techniques are based on switching actions so that gate driving scheme and their related circuits have important roles in power conversion. In this paper, fault-tolerant gate driving schemes for power switches and their power supply that utilizes stored energy in the system are presented. Experiments have been carried out with 6500V-rated IGBTs and thyristors to verify the validity of the proposed driving scheme.
Chord is a peer-to-peer look up algorithm based on a distributed hash table protocol in wired IP networks, exploiting the advantage of scalability for large-scale of distributed applications. However, deploying Chord into mobile networks should be inherently accompanied with supplementary network traffics to maintain the hash key mapping rules because of a high rate of joining and leaving nodes. This paper proposes an enhanced reactive Chord for mobile networks, which can reduce network traffics and achieve fast lookup services. For this purpose, a conventional Chord is modified to act reactively, and then the table activity checking feature is devised into it, called enhanced reactive Chord. Simulation results show that the proposed Chord can decrease network traffics by an average of 41.3% maintaining same setup latency, compared with conventional Chord in mobile networks.
The novel circular Multifractal monopole antenna is presented for ultra-wideband (UWB) applications. The proposed antenna is etched on a FR4 substrate with the size of 22 × 30 × 1mm3 and optimized to operate over the frequency band between 3 and 12.5GHz.
A novel method for deploying mobile sensors is proposed. The proposed method minimizes the energy consumption by deciding the target position before movement. It also deploys the sensor nodes in an optimal layout which provides maximum coverage and robust connectivity. To that end, we propose a novel topology, rake tree, in which each vertex can be matched to a position in the optimal layout. Simulation results show that the proposed method results in more coverage and consumes less energy compared to previous works.
The previous researches on the modulated scattering antenna array (MSAA) have shown that the second-order intermodulation scattering signal is relatively low compared with the directly received signal. In this research, a switched reflector is used to solve this problem. The diversity performance of the MSAA with a switched reflector is investigated. It is shown that the diversity performance of the MSAA can be improved by mounting a switch on the reflector.
In this paper, we propose an enhanced macro diversity handover (MDHO) technique for TDD-OFDMA-based interference-limited IEEE 802.16j multi-hop relay cellular networks. The proposed MDHO ensures that the topology of the diversity set members is always fully exploited. Evaluation results show that the proposed MDHO significantly outperforms the conventional MDHO and offers a CINR gain of as much as 4.13dB.
Wolf attack is a new kind of biometric specific vulnerability and wolf attack probability is defined as a maximum success probability of the wolf attack with one wolf sample. From a theoretical point of view, a possible approach for describing wolf attack probability has been proposed in recent years, yet very little is known about practical approach in using a minutiae pattern. In this paper we propose a making method of wolf fingerprints to show vulnerability against simple count matching system. Even though this approach is valid only in a simple model, it is closely related to wolf attack against the real fingerprint systems. The experimental results show that wolf fingerprint using a minutiae pattern can get very high wolf attack probability.