-
Cheolkon Jung, Licheng Jiao
2010 Volume 7 Issue 10 Pages
666-671
Published: 2010
Released on J-STAGE: May 25, 2010
JOURNAL
FREE ACCESS
This letter proposes a reliable depth-image-based rendering (DIBR) technique, which can provide users with reliable 3D services even if contents contain unknown or inappropriate values in some parameters. For the reliable DIBR, this letter presents how to set rendering parameters such as far/near clipping plane, convergence distance, and scale factor by taking mobile display size into consideration. Various experiments show that the proposed method can be effectively employed for 3D services based on DIBR over terrestrial-digital multimedia broadcasting (T-DMB).
View full abstract
-
Shaochong Lei, Zhen Wang, Zeye Liu, Feng Liang
2010 Volume 7 Issue 10 Pages
672-677
Published: 2010
Released on J-STAGE: May 25, 2010
JOURNAL
FREE ACCESS
Test power and test overhead are crucial to VLSI and SOC testing. This paper proposes a low cost test pattern generator (TPG) for test-per-clock built-in self-test (BIST) scheme. The proposed method utilizes a two-dimensional TPG and a bit-XOR array to reduce area overhead, and generates single input change (SIC) sequences to reduce input transitions of the circuit under test (CUT). Simulation results on ISCAS benchmarks demonstrate that the proposed method can achieve high fault coverage and effectively reduce test power.
View full abstract
-
Chee-Hyun Park, Kwang-Seok Hong
2010 Volume 7 Issue 10 Pages
678-683
Published: 2010
Released on J-STAGE: May 25, 2010
JOURNAL
FREE ACCESS
A block-based Wiener filter is proposed for the source localization problem under an additive measurement error model. In this paper, we expand the Wiener filter, which is a single sensor case, to multi-sensor scenario. The proposed block-based Wiener filter method proves to be more efficient than the existing methods under various noise situations when the length of data set is more than two and as the number of data set increases, the performance is improved.
View full abstract
-
Changryoul Choi, Jechang Jeong
2010 Volume 7 Issue 10 Pages
684-690
Published: 2010
Released on J-STAGE: May 25, 2010
JOURNAL
FREE ACCESS
A successive elimination algorithm for two-bit transform (2BT) based motion estimation (ME) is proposed. By mathematically deriving the lower bound for2BT-based matching criterion, we can discard the impossible candidates earlier and save computations substantially. Experimental results show that although the performance of the proposed algorithm is the same as that of the full search 2BT (FS-2BT) based ME algorithm, the computational complexity has been reduced significantly.
View full abstract
-
Takahiro Emoto, Udantha R. Abeyratne, Masatake Akutagawa, Shinsuke Kon ...
2010 Volume 7 Issue 10 Pages
691-696
Published: 2010
Released on J-STAGE: May 25, 2010
JOURNAL
FREE ACCESS
The spectral envelope is mainly determined by the shape of vocal tract and it is generally represented by linear estimation methods such as an autoregressive (AR) modeling. Neural network (NN) is general tools for modeling nonlinear function. Nonlinear aspects of NN have been emphasized. However, in this study, a novel approach to spectral estimation, which is based on the use of a linear feed-forward NN is discussed. Example of the linear network for estimating the spectral envelope of vowel sound is presented. The proposed linear NN technique leads to interesting new paradigms which could not have been considered in advance.
View full abstract
-
Fan Ding, Xiaojing Huang, Biyang Wen, Zhisheng Yan
2010 Volume 7 Issue 10 Pages
697-703
Published: 2010
Released on J-STAGE: May 25, 2010
JOURNAL
FREE ACCESS
This paper analyses the lower bound of range resolution in Frequency Modulated Interrupted Continuous Wave (FMICW) radar, and presents a novel aliasing receiver theory. Through introducing a novel alias-removing algorithm, the receiver allows a certain degree of range aliasing, which leads to a much larger sweep bandwidth and an improved range resolution.
View full abstract
-
Dong-Myung Lee, Thomas L. Keister, Jae-Hyeong Seo, Thomas G. Habetler, ...
2010 Volume 7 Issue 10 Pages
704-710
Published: 2010
Released on J-STAGE: May 25, 2010
JOURNAL
FREE ACCESS
This paper proposes a new driving scheme for insulated gate bipolar junction transistors (IGBTs) and thyristors used for high power conversion. Most power conversion techniques are based on switching actions so that gate driving scheme and their related circuits have important roles in power conversion. In this paper, fault-tolerant gate driving schemes for power switches and their power supply that utilizes stored energy in the system are presented. Experiments have been carried out with 6500V-rated IGBTs and thyristors to verify the validity of the proposed driving scheme.
View full abstract
-
H.K. Kwak, Y.H. Yoon, C.G. Kim, K.S. Chung
2010 Volume 7 Issue 10 Pages
711-716
Published: 2010
Released on J-STAGE: May 25, 2010
JOURNAL
FREE ACCESS
Chord is a peer-to-peer look up algorithm based on a distributed hash table protocol in wired IP networks, exploiting the advantage of scalability for large-scale of distributed applications. However, deploying Chord into mobile networks should be inherently accompanied with supplementary network traffics to maintain the hash key mapping rules because of a high rate of joining and leaving nodes. This paper proposes an enhanced reactive Chord for mobile networks, which can reduce network traffics and achieve fast lookup services. For this purpose, a conventional Chord is modified to act reactively, and then the table activity checking feature is devised into it, called enhanced reactive Chord. Simulation results show that the proposed Chord can decrease network traffics by an average of 41.3% maintaining same setup latency, compared with conventional Chord in mobile networks.
View full abstract
-
H. Ebrahim Zadeh, Ch. Ghobadi, J. Nourinia
2010 Volume 7 Issue 10 Pages
717-721
Published: 2010
Released on J-STAGE: May 25, 2010
JOURNAL
FREE ACCESS
The novel circular Multifractal monopole antenna is presented for ultra-wideband (UWB) applications. The proposed antenna is etched on a FR4 substrate with the size of 22 × 30 × 1mm3 and optimized to operate over the frequency band between 3 and 12.5GHz.
View full abstract
-
Hojin Ghim, Namgi Kim, Dongwook Kim, Min Choi, Hyunsoo Yoon
2010 Volume 7 Issue 10 Pages
722-727
Published: 2010
Released on J-STAGE: May 25, 2010
JOURNAL
FREE ACCESS
A novel method for deploying mobile sensors is proposed. The proposed method minimizes the energy consumption by deciding the target position before movement. It also deploys the sensor nodes in an optimal layout which provides maximum coverage and robust connectivity. To that end, we propose a novel topology,
rake tree, in which each vertex can be matched to a position in the optimal layout. Simulation results show that the proposed method results in more coverage and consumes less energy compared to previous works.
View full abstract
-
Lin Wang, Qiang Chen, Qiaowei Yuan, Kunio Sawaya
2010 Volume 7 Issue 10 Pages
728-731
Published: 2010
Released on J-STAGE: May 25, 2010
JOURNAL
FREE ACCESS
The previous researches on the modulated scattering antenna array (MSAA) have shown that the second-order intermodulation scattering signal is relatively low compared with the directly received signal. In this research, a switched reflector is used to solve this problem. The diversity performance of the MSAA with a switched reflector is investigated. It is shown that the diversity performance of the MSAA can be improved by mounting a switch on the reflector.
View full abstract
-
Jamil Sultan, N. Misran, M. Ismail, M.T. Islam
2010 Volume 7 Issue 10 Pages
732-737
Published: 2010
Released on J-STAGE: May 25, 2010
JOURNAL
FREE ACCESS
In this paper, we propose an enhanced macro diversity handover (MDHO) technique for TDD-OFDMA-based interference-limited IEEE 802.16j multi-hop relay cellular networks. The proposed MDHO ensures that the topology of the diversity set members is always fully exploited. Evaluation results show that the proposed MDHO significantly outperforms the conventional MDHO and offers a CINR gain of as much as 4.13dB.
View full abstract
-
Hyunho Kang, Shoko Yonezawa, Manabu Inuma, Akira Otsuka, Hideki Imai
2010 Volume 7 Issue 10 Pages
738-744
Published: 2010
Released on J-STAGE: May 25, 2010
JOURNAL
FREE ACCESS
Wolf attack is a new kind of biometric specific vulnerability and wolf attack probability is defined as a maximum success probability of the wolf attack with one wolf sample. From a theoretical point of view, a possible approach for describing wolf attack probability has been proposed in recent years, yet very little is known about practical approach in using a minutiae pattern. In this paper we propose a making method of wolf fingerprints to show vulnerability against simple count matching system. Even though this approach is valid only in a simple model, it is closely related to wolf attack against the real fingerprint systems. The experimental results show that wolf fingerprint using a minutiae pattern can get very high wolf attack probability.
View full abstract