Pub Date : 2006-04-07DOI: 10.1109/TPSD.2006.5507415
J. Yumin, L. Johnson
This paper describes a simple and inexpensive but yet reliable ultrasonic device to help the visually impaired to detect objects several meters away. There are a number of ways to design a device employing ultrasonic principles. In our approach the detection produces a change of duty cycle in the received signals, and then it is converted into a variable frequency, and eventually the user is alerted by the sound from a buzzer. The transmitter sends a continuous 40 kHz signal without modulation. The reflected ultrasonic signal collected by the receiver is very weak, and thus it needs to be amplified and rectified. Two Peripheral Interface Controllers (PICs) are employed in this design.
{"title":"An implementation of an ultrasonic device for the visually impaired","authors":"J. Yumin, L. Johnson","doi":"10.1109/TPSD.2006.5507415","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507415","url":null,"abstract":"This paper describes a simple and inexpensive but yet reliable ultrasonic device to help the visually impaired to detect objects several meters away. There are a number of ways to design a device employing ultrasonic principles. In our approach the detection produces a change of duty cycle in the received signals, and then it is converted into a variable frequency, and eventually the user is alerted by the sound from a buzzer. The transmitter sends a continuous 40 kHz signal without modulation. The reflected ultrasonic signal collected by the receiver is very weak, and thus it needs to be amplified and rectified. Two Peripheral Interface Controllers (PICs) are employed in this design.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125136729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-07DOI: 10.1109/TPSD.2006.5507408
M. Cistelecan, D. Popescu
In this paper we present a theoretical approach to power control for ad-hoc wireless networks using sliding mode control theory. We derive a dynamic system based on the signal-to-interference ratio (SIR) of links in the network whose control input is related to the transmitted power, and show how sliding mode control theory is used to derive the power equations that lead to an equilibrium point where the link SIR are optimized.
{"title":"Power control for ad-hoc wireless networks using sliding-mode control theory","authors":"M. Cistelecan, D. Popescu","doi":"10.1109/TPSD.2006.5507408","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507408","url":null,"abstract":"In this paper we present a theoretical approach to power control for ad-hoc wireless networks using sliding mode control theory. We derive a dynamic system based on the signal-to-interference ratio (SIR) of links in the network whose control input is related to the transmitted power, and show how sliding mode control theory is used to derive the power equations that lead to an equilibrium point where the link SIR are optimized.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120876611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-07DOI: 10.1109/TPSD.2006.5507445
Dung Dang, W. Luo
This paper proposes a new finding regarding the different roles and significance of noise detection and pixel estimation utilized in the majority of impulse noise removing algorithms. Extensive experimental results will be presented to show that the importance of each method depends on the noise ratio. In other words, by particularly examining how the adaptive median filter (AMF) algorithm [18] employs the two aforementioned methods in comparison with their modified versions as well as the ideal-filtering algorithm, this paper will point out the role that each method plays. The significance of noise detection can be realized at low noise ratio while pixel estimation gains its efficiency as noise ratio increases.
{"title":"Impulse noise removal: Noise detection versus pixel estimation","authors":"Dung Dang, W. Luo","doi":"10.1109/TPSD.2006.5507445","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507445","url":null,"abstract":"This paper proposes a new finding regarding the different roles and significance of noise detection and pixel estimation utilized in the majority of impulse noise removing algorithms. Extensive experimental results will be presented to show that the importance of each method depends on the noise ratio. In other words, by particularly examining how the adaptive median filter (AMF) algorithm [18] employs the two aforementioned methods in comparison with their modified versions as well as the ideal-filtering algorithm, this paper will point out the role that each method plays. The significance of noise detection can be realized at low noise ratio while pixel estimation gains its efficiency as noise ratio increases.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121179776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-07DOI: 10.1109/TPSD.2006.5507448
Fatma Arslan, A. Chan, A. Grigoryan
Aerial imagery is a very important data source used in underwater oceanographic studies. These images are usually corrupted by clutters caused by surface water waves. Removal of the wave clutters from these images is an important preprocessing step for accurate assessment of information since the clutters interfere with useful information over the surface. In this work we propose a novel method combining the tensor transform by wavelet transform and denoising these images. Surface waves are classified in two categories: ripple waves and spark waves. Both types of clutters are directional and can be detected by the tensor representation of the image. To remove the long-waves, the subband-filtering technique is used, but it is reduced to 1-D filtering by means of the splitting-signals in the tensor representation. To remove the short-waves, the well-known SMEME (spectral spatial maximum exclusive mean) filter is used with the tensor transform as a pre-step of the filter.
{"title":"Directional denoising of aerial images by splitting-signals","authors":"Fatma Arslan, A. Chan, A. Grigoryan","doi":"10.1109/TPSD.2006.5507448","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507448","url":null,"abstract":"Aerial imagery is a very important data source used in underwater oceanographic studies. These images are usually corrupted by clutters caused by surface water waves. Removal of the wave clutters from these images is an important preprocessing step for accurate assessment of information since the clutters interfere with useful information over the surface. In this work we propose a novel method combining the tensor transform by wavelet transform and denoising these images. Surface waves are classified in two categories: ripple waves and spark waves. Both types of clutters are directional and can be detected by the tensor representation of the image. To remove the long-waves, the subband-filtering technique is used, but it is reduced to 1-D filtering by means of the splitting-signals in the tensor representation. To remove the short-waves, the well-known SMEME (spectral spatial maximum exclusive mean) filter is used with the tensor transform as a pre-step of the filter.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126909175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-07DOI: 10.1109/TPSD.2006.5507411
S. Agaian, J. P. Pérez
In this paper we propose a new approach using a parametric chi-(p,q) statistical decision stego detection technique. The new approach can detect both randomly and sequentially embedded sensitive data. Computer simulations have shown that the presented algorithm has the following advantages: 1) Ability to localize concentrations of hidden information; 2) Ability to perform detection faster than existing methods; 3) Ability to detect images using an adjustable block structure method that takes into account the correlation between adjacent blocks. Comparison with common existing steganalysis methods will also be presented.
{"title":"Block structure chi-(p,q) steganalysis method","authors":"S. Agaian, J. P. Pérez","doi":"10.1109/TPSD.2006.5507411","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507411","url":null,"abstract":"In this paper we propose a new approach using a parametric chi-(p,q) statistical decision stego detection technique. The new approach can detect both randomly and sequentially embedded sensitive data. Computer simulations have shown that the presented algorithm has the following advantages: 1) Ability to localize concentrations of hidden information; 2) Ability to perform detection faster than existing methods; 3) Ability to detect images using an adjustable block structure method that takes into account the correlation between adjacent blocks. Comparison with common existing steganalysis methods will also be presented.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127997581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-07DOI: 10.1109/TPSD.2006.5507432
V. Mukherjee, S. Mohanty, E. Kougianos, Rahul Allawadhi, R. Velagapudi
The increasing market demand for ever smaller and application packed portable electronic devices has been fueling the relentless scaling of the CMOS transistor. The ITRS roadmap envisages that high performance CMOS circuits will require ultra-low gate oxide thickness to overcome the effects of shorter channel lengths. However, such devices will be susceptible to a more profound leakage mechanism due to carrier tunneling through the gate oxide. Consequently, the gate oxide tunneling current has emerged as the major component of the leakage power consumption of nanoscale CMOS devices. In the case of an important CMOS circuit like Static RAM (SRAM) there is a high probability for the leakage currents to be manifested with more prominence. SRAMs form a vital component of the CPU cache therefore there is a critical need for analysis, explanation, and characterization of the various tunneling mechanisms SRAMs. This paper explores the gate leakage current scenarios in the READ, WRITE and IDLE states of the SRAM which can make significant contribution to modeling and reduction of gate leakage in SRAM circuits.
{"title":"Gate leakage current analysis in READ/WRITE/ IDLE states of a SRAM cell","authors":"V. Mukherjee, S. Mohanty, E. Kougianos, Rahul Allawadhi, R. Velagapudi","doi":"10.1109/TPSD.2006.5507432","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507432","url":null,"abstract":"The increasing market demand for ever smaller and application packed portable electronic devices has been fueling the relentless scaling of the CMOS transistor. The ITRS roadmap envisages that high performance CMOS circuits will require ultra-low gate oxide thickness to overcome the effects of shorter channel lengths. However, such devices will be susceptible to a more profound leakage mechanism due to carrier tunneling through the gate oxide. Consequently, the gate oxide tunneling current has emerged as the major component of the leakage power consumption of nanoscale CMOS devices. In the case of an important CMOS circuit like Static RAM (SRAM) there is a high probability for the leakage currents to be manifested with more prominence. SRAMs form a vital component of the CPU cache therefore there is a critical need for analysis, explanation, and characterization of the various tunneling mechanisms SRAMs. This paper explores the gate leakage current scenarios in the READ, WRITE and IDLE states of the SRAM which can make significant contribution to modeling and reduction of gate leakage in SRAM circuits.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129352437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-07DOI: 10.1109/TPSD.2006.5507410
Mychal Hoffman, Paul Bauer, Brian Hemrnelman, Abul Hasan
A three-layer fully-connected feedforward neural network with 35 input neurons, 10 hidden neurons, and 26 output neurons has been developed and implemented directly in hardware. The digital neurons use 12-bit two's complement fixed-point weights and symmetric saturating linear activation functions. The hidden layer and output layer contain 360 and 286 12-bit weights respectively. The neural network was developed with VHDL and synthesized for an XC2V4000-6BF957 X iVirtex-2 FPGA. All calculations within each neural layer are performed in parallel. The neural network was configured and trained to solve the classic character recognition problem. The network was trained in MATLAB using floating-point numbers and an uncorrupted character set. The trained network achieved a 100% recognition rate on the perfect characters as well as characters that had up to 29% of their pixels flipped. When the floating-point computations from MATLAB were performed instead with 12-bit fixed-point weights in the Xilinx FPGA, for the characters tested to date, uncorrupted character recognition remained at 100% and noisy character recognition was not significantly affected by the loss of precision.
一个三层全连接前馈神经网络,包含35个输入神经元、10个隐藏神经元和26个输出神经元,并直接在硬件上实现。数字神经元采用12位二进制补不动点权和对称饱和线性激活函数。隐藏层和输出层分别包含360和286个12位权重。该神经网络采用VHDL语言开发,并在XC2V4000-6BF957 X iVirtex-2 FPGA上合成。每个神经层中的所有计算都是并行执行的。对神经网络进行了配置和训练,以解决经典字符识别问题。该网络在MATLAB中使用浮点数和未损坏的字符集进行训练。经过训练的网络对完美字符以及高达29%的像素翻转的字符实现了100%的识别率。当在Xilinx FPGA中使用12位定点权重代替MATLAB进行浮点计算时,对于迄今为止测试的字符,未损坏字符识别率保持在100%,并且噪声字符识别没有受到精度损失的明显影响。
{"title":"Hardware synthesis of artificial neural networks using field programmable gate arrays and fixed-point numbers","authors":"Mychal Hoffman, Paul Bauer, Brian Hemrnelman, Abul Hasan","doi":"10.1109/TPSD.2006.5507410","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507410","url":null,"abstract":"A three-layer fully-connected feedforward neural network with 35 input neurons, 10 hidden neurons, and 26 output neurons has been developed and implemented directly in hardware. The digital neurons use 12-bit two's complement fixed-point weights and symmetric saturating linear activation functions. The hidden layer and output layer contain 360 and 286 12-bit weights respectively. The neural network was developed with VHDL and synthesized for an XC2V4000-6BF957 X iVirtex-2 FPGA. All calculations within each neural layer are performed in parallel. The neural network was configured and trained to solve the classic character recognition problem. The network was trained in MATLAB using floating-point numbers and an uncorrupted character set. The trained network achieved a 100% recognition rate on the perfect characters as well as characters that had up to 29% of their pixels flipped. When the floating-point computations from MATLAB were performed instead with 12-bit fixed-point weights in the Xilinx FPGA, for the characters tested to date, uncorrupted character recognition remained at 100% and noisy character recognition was not significantly affected by the loss of precision.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124845760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-07DOI: 10.1109/TPSD.2006.5507450
A. Coker, V. Taylor
Nanoscale elements are fabricated using bottom-up processes, and as such they are prone to high levels of defects. Defect-tolerance will play a crucial role in the realization of practical nanoscale devices. In this paper we investigate the performance impact of combining a molecular switch junction with an ECC demultiplexer to allow for enhanced fault-tolerance. The results indicate that the molecular switch junction, which adds redundancy to the address lines, aids in reducing the delay as the redundancy increases. Further, the probability analysis also indicates that the fault tolerance improves with the combined scheme.
{"title":"Performance analysis of a fault-tolerant crossbar molecular switch memory demultiplexer","authors":"A. Coker, V. Taylor","doi":"10.1109/TPSD.2006.5507450","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507450","url":null,"abstract":"Nanoscale elements are fabricated using bottom-up processes, and as such they are prone to high levels of defects. Defect-tolerance will play a crucial role in the realization of practical nanoscale devices. In this paper we investigate the performance impact of combining a molecular switch junction with an ECC demultiplexer to allow for enhanced fault-tolerance. The results indicate that the molecular switch junction, which adds redundancy to the address lines, aids in reducing the delay as the redundancy increases. Further, the probability analysis also indicates that the fault tolerance improves with the combined scheme.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124258465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-07DOI: 10.1109/TPSD.2006.5507425
Weihua Song
This paper applies neural network training, validating and testing techniques in evaluating the performance of Opinion filtered neural network trust model (OFNN). OFNN model is used to filter heterogeneous trust recommendation systems and deceptive trust recommendations in P2P networks. The model is evaluated in terms of accuracy, convergence speed and reliability. Both simulation data and real data are applied in the evaluation. The results show that OFNN model has accuracy of 83.3% at a convergence speed of 17 training iterations on the real data. The model has accuracy of 93.75% with an average convergence speed of 4545 iterations based on the simulated trust systems in a P2P network.
{"title":"Evaluating Opinion filtered neural network trust model","authors":"Weihua Song","doi":"10.1109/TPSD.2006.5507425","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507425","url":null,"abstract":"This paper applies neural network training, validating and testing techniques in evaluating the performance of Opinion filtered neural network trust model (OFNN). OFNN model is used to filter heterogeneous trust recommendation systems and deceptive trust recommendations in P2P networks. The model is evaluated in terms of accuracy, convergence speed and reliability. Both simulation data and real data are applied in the evaluation. The results show that OFNN model has accuracy of 83.3% at a convergence speed of 17 training iterations on the real data. The model has accuracy of 93.75% with an average convergence speed of 4545 iterations based on the simulated trust systems in a P2P network.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128879784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-04-07DOI: 10.1109/TPSD.2006.5507462
Nickolas B. Grady, M. Frye, C. Qian
This paper summarizes the Phase I Airframe Development of an undergraduate research project for the Raptor 90 remote-controlled helicopter. The purpose of the project is to introduce the fundamentals of dynamics and control for rotorcraft to undergraduate engineers interested in control system theory. Follow on research for the Raptor 90 will include instrumentation and flight-testing for data collection. Controller development will be investigated using a dynamic model simulation of the Raptor 90 helicopter.
{"title":"The Development of a high performance UAV for flight control research","authors":"Nickolas B. Grady, M. Frye, C. Qian","doi":"10.1109/TPSD.2006.5507462","DOIUrl":"https://doi.org/10.1109/TPSD.2006.5507462","url":null,"abstract":"This paper summarizes the Phase I Airframe Development of an undergraduate research project for the Raptor 90 remote-controlled helicopter. The purpose of the project is to introduce the fundamentals of dynamics and control for rotorcraft to undergraduate engineers interested in control system theory. Follow on research for the Raptor 90 will include instrumentation and flight-testing for data collection. Controller development will be investigated using a dynamic model simulation of the Raptor 90 helicopter.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133916757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}