Pub Date : 2010-03-07DOI: 10.1109/SSST.2010.5442827
Fan Wang, V. Agrawal
Recent work on random access scan (RAS) has shown its advantages in reducing test application time, test data volume and test power over those of the conventional serial scan (SS). This paper is first to examine the soft error tolerance of RAS. The RAS structure not only improves error tolerance ability during test, it also provides capability to efficiently enhance the circuits error tolerance during normal function mode. A single event upset (SEU) induced error in a flip-flop of SS propagates to other flip-flops via scan while the error for RAS remains localized to the affected flip-flop. We enhance the error tolerance by applying the built-in soft error resilience (BISER) and triple modular redundancy (TMR) techniques to RAS and serial scan (SS). Results show that the BISER implementation for RAS can save on average 20.51% hardware over BISER applied to SS. TMR-RAS saves on average 179.28% over TMR-SS for ISCAS89 benchmarks.
{"title":"Enhancing random access scan for soft error tolerance","authors":"Fan Wang, V. Agrawal","doi":"10.1109/SSST.2010.5442827","DOIUrl":"https://doi.org/10.1109/SSST.2010.5442827","url":null,"abstract":"Recent work on random access scan (RAS) has shown its advantages in reducing test application time, test data volume and test power over those of the conventional serial scan (SS). This paper is first to examine the soft error tolerance of RAS. The RAS structure not only improves error tolerance ability during test, it also provides capability to efficiently enhance the circuits error tolerance during normal function mode. A single event upset (SEU) induced error in a flip-flop of SS propagates to other flip-flops via scan while the error for RAS remains localized to the affected flip-flop. We enhance the error tolerance by applying the built-in soft error resilience (BISER) and triple modular redundancy (TMR) techniques to RAS and serial scan (SS). Results show that the BISER implementation for RAS can save on average 20.51% hardware over BISER applied to SS. TMR-RAS saves on average 179.28% over TMR-SS for ISCAS89 benchmarks.","PeriodicalId":6463,"journal":{"name":"2010 42nd Southeastern Symposium on System Theory (SSST)","volume":"3 1","pages":"263-268"},"PeriodicalIF":0.0,"publicationDate":"2010-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75631397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-03-07DOI: 10.1109/SSST.2010.5442837
H. Ochoa, R. K. Nakka
Radar is an electromagnetic system used for the detection and location of objects based on reflection. It operates by radiating energy into space and detecting the echo signal reflected from an object or target. This work analyzes how currents are induced on targets by the electromagnetic waveforms radiated by an antenna when the object is moving at high velocity. It is assumed that the target is a perfect electric conductor moving at high velocity. This work analyzes how the amplitude, the frequency and the duration of these currents are affected by the target velocity. The transmitted electromagnetic waveforms can then be calculated using vector potentials and by using the Lorentz transformation, the electromagnetic waveform is transformed from the stationary reference frame to a moving reference frame. Currents induced on the object can be modeled by using the transformed waveform and the equivalence principle. The object radiates an electromagnetic waveform as a consequence of the induced currents. The radiated waveform is calculated using the vector potentials and once more the reflected waveform is transformed from the moving reference frame to the stationary reference frame using the Lorentz transformation. Finally the equivalence principle was used to calculate currents induced in the antenna by the reflected electromagnetic waveforms. The relationship of the induced current on the antenna as a function of the target velocity is analyzed.
{"title":"Analysis of induced surface currents on high velocity target using a relativistic approach","authors":"H. Ochoa, R. K. Nakka","doi":"10.1109/SSST.2010.5442837","DOIUrl":"https://doi.org/10.1109/SSST.2010.5442837","url":null,"abstract":"Radar is an electromagnetic system used for the detection and location of objects based on reflection. It operates by radiating energy into space and detecting the echo signal reflected from an object or target. This work analyzes how currents are induced on targets by the electromagnetic waveforms radiated by an antenna when the object is moving at high velocity. It is assumed that the target is a perfect electric conductor moving at high velocity. This work analyzes how the amplitude, the frequency and the duration of these currents are affected by the target velocity. The transmitted electromagnetic waveforms can then be calculated using vector potentials and by using the Lorentz transformation, the electromagnetic waveform is transformed from the stationary reference frame to a moving reference frame. Currents induced on the object can be modeled by using the transformed waveform and the equivalence principle. The object radiates an electromagnetic waveform as a consequence of the induced currents. The radiated waveform is calculated using the vector potentials and once more the reflected waveform is transformed from the moving reference frame to the stationary reference frame using the Lorentz transformation. Finally the equivalence principle was used to calculate currents induced in the antenna by the reflected electromagnetic waveforms. The relationship of the induced current on the antenna as a function of the target velocity is analyzed.","PeriodicalId":6463,"journal":{"name":"2010 42nd Southeastern Symposium on System Theory (SSST)","volume":"5 1","pages":"217-221"},"PeriodicalIF":0.0,"publicationDate":"2010-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73779255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-03-07DOI: 10.1109/SSST.2010.5442833
C. Tang
This paper presents an analytical method for quantitative performance analysis and configuration optimization for the cooperation of multiple nonholonomic mobile manipulators to transport a common object. The major challenge of such cooperation comes from the requirement of tight physical interactions between the robotic agents through a payload. The cooperation as a mobile constrained articulation system that takes into account the nonholonomic constraints due to the wheels together with the holonomic constraints due to the physical interactions are modeled and analyzed. Performance of several representative scenarios with varying actuation arrangements are then quantified in terms of manipulability measure. Subsequently, the measure is utilized to determine the optimal configuration of the cooperation permitting the payload transported in a near omnidirectional manner.
{"title":"Configuration optimization for multiple nonholonomic mobile manipulators with holonomic interaction","authors":"C. Tang","doi":"10.1109/SSST.2010.5442833","DOIUrl":"https://doi.org/10.1109/SSST.2010.5442833","url":null,"abstract":"This paper presents an analytical method for quantitative performance analysis and configuration optimization for the cooperation of multiple nonholonomic mobile manipulators to transport a common object. The major challenge of such cooperation comes from the requirement of tight physical interactions between the robotic agents through a payload. The cooperation as a mobile constrained articulation system that takes into account the nonholonomic constraints due to the wheels together with the holonomic constraints due to the physical interactions are modeled and analyzed. Performance of several representative scenarios with varying actuation arrangements are then quantified in terms of manipulability measure. Subsequently, the measure is utilized to determine the optimal configuration of the cooperation permitting the payload transported in a near omnidirectional manner.","PeriodicalId":6463,"journal":{"name":"2010 42nd Southeastern Symposium on System Theory (SSST)","volume":"14 1","pages":"237-242"},"PeriodicalIF":0.0,"publicationDate":"2010-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75374816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-03-07DOI: 10.1109/SSST.2010.5442799
Forrest N. Bush, J. Esposito
We examine the problem of designing computer vision algorithms to autonomously drive an off road vehicle between two lane markings painted on the ground. In this paper we describe field tests used to compare the efficacy of two popular line extractions techniques from the literature: the Hough Transform and the RANSAC Algorithm. Although it is very implementation dependent, we found the Hough Transform to be superior to the RANSAC algorithm in both speed and accuracy for identifying lane markings in the off road environment.
{"title":"Vision-based lane detection for an autonomous ground vehicle: A comparative field test","authors":"Forrest N. Bush, J. Esposito","doi":"10.1109/SSST.2010.5442799","DOIUrl":"https://doi.org/10.1109/SSST.2010.5442799","url":null,"abstract":"We examine the problem of designing computer vision algorithms to autonomously drive an off road vehicle between two lane markings painted on the ground. In this paper we describe field tests used to compare the efficacy of two popular line extractions techniques from the literature: the Hough Transform and the RANSAC Algorithm. Although it is very implementation dependent, we found the Hough Transform to be superior to the RANSAC algorithm in both speed and accuracy for identifying lane markings in the off road environment.","PeriodicalId":6463,"journal":{"name":"2010 42nd Southeastern Symposium on System Theory (SSST)","volume":"8 1","pages":"35-39"},"PeriodicalIF":0.0,"publicationDate":"2010-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72768149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-03-07DOI: 10.1109/SSST.2010.5442826
Charles M. Felps, Michael H. Fick, Keegan R. Kinkade, Jeremy Searock, J. Piepmeier
The Semantic Robot Vision Challenge is a research competition designed to advance the ability of agent's to automatically acquire knowledge and use this knowledge to identity objects in an unknown and unstructured environment. In this paper, we present a complete design and implementation of a robotic system intended to compete in the Semantic Robot Vision Challenge. The system takes a text input document of specific objects to search an online visual database to find a training image. The system then autonomously navigates through a cluttered environment, captures images of objects in the area, and uses the training images to identify objects found in the captured images. The system is complete, robust, and achieved first place in the 2009 competition.
{"title":"Integration of semantic vision techniques for an autonomous robot platform","authors":"Charles M. Felps, Michael H. Fick, Keegan R. Kinkade, Jeremy Searock, J. Piepmeier","doi":"10.1109/SSST.2010.5442826","DOIUrl":"https://doi.org/10.1109/SSST.2010.5442826","url":null,"abstract":"The Semantic Robot Vision Challenge is a research competition designed to advance the ability of agent's to automatically acquire knowledge and use this knowledge to identity objects in an unknown and unstructured environment. In this paper, we present a complete design and implementation of a robotic system intended to compete in the Semantic Robot Vision Challenge. The system takes a text input document of specific objects to search an online visual database to find a training image. The system then autonomously navigates through a cluttered environment, captures images of objects in the area, and uses the training images to identify objects found in the captured images. The system is complete, robust, and achieved first place in the 2009 competition.","PeriodicalId":6463,"journal":{"name":"2010 42nd Southeastern Symposium on System Theory (SSST)","volume":"42 1","pages":"243-247"},"PeriodicalIF":0.0,"publicationDate":"2010-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90486167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-03-07DOI: 10.1109/SSST.2010.5442859
John M. Davis, I. Gravagne, R. Marks
The discrete and continuous Fourier transforms are applicable to discrete and continuous time signals respectively. Time scales allows generalization to to any closed set of points on the real line. Discrete and continuous time are special cases. Using the Hilger exponential from time scale calculus, the discrete Fourier transform (DFT) is extended to signals on a set of points with arbitrary spacing. A time scale DN consisting of N points in time is shown to impose a time scale (more appropriately dubbed a frequency scale), DN, in the Fourier domain The time scale DFT's (TS-DFT's) are shown to share familiar properties of the DFT, including the derivative theorem and the power theorem. Shifting on a time scale is accomplished through a boxminus and boxplus operators. The shifting allows formulation of time scale convolution and correlation which, as is the case with the DFT, correspond to multiplication in the frequency domain.
{"title":"Time scale discrete Fourier transforms","authors":"John M. Davis, I. Gravagne, R. Marks","doi":"10.1109/SSST.2010.5442859","DOIUrl":"https://doi.org/10.1109/SSST.2010.5442859","url":null,"abstract":"The discrete and continuous Fourier transforms are applicable to discrete and continuous time signals respectively. Time scales allows generalization to to any closed set of points on the real line. Discrete and continuous time are special cases. Using the Hilger exponential from time scale calculus, the discrete Fourier transform (DFT) is extended to signals on a set of points with arbitrary spacing. A time scale DN consisting of N points in time is shown to impose a time scale (more appropriately dubbed a frequency scale), DN, in the Fourier domain The time scale DFT's (TS-DFT's) are shown to share familiar properties of the DFT, including the derivative theorem and the power theorem. Shifting on a time scale is accomplished through a boxminus and boxplus operators. The shifting allows formulation of time scale convolution and correlation which, as is the case with the DFT, correspond to multiplication in the frequency domain.","PeriodicalId":6463,"journal":{"name":"2010 42nd Southeastern Symposium on System Theory (SSST)","volume":"8 1","pages":"102-110"},"PeriodicalIF":0.0,"publicationDate":"2010-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87510237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-03-07DOI: 10.1109/SSST.2010.5442801
S. Yousefi, N. Kehtarnavaz, M. Akins, K. Luby‐Phelps, M. Mahendroo
This paper presents an image processing approach for distinguishing three pregnancy stages of mice using Second Harmonic Generation (SHG) microscopy images. Three classes of SHG images for day 6, day 12 and day 18 of the 19-day mouse gestation period are considered. A classification is performed based on morphological features previously used for such SHG images, wavelet-based texture features, and a combination of morphological and wavelet-based texture features. It is shown that the combination of the features provide a more effective mechanism for distinguishing the three stages of mouse pregnancy as compared to each separate set of features.
{"title":"Distinguishing different stages of mouse pregnancy using Second Harmonic Generation images","authors":"S. Yousefi, N. Kehtarnavaz, M. Akins, K. Luby‐Phelps, M. Mahendroo","doi":"10.1109/SSST.2010.5442801","DOIUrl":"https://doi.org/10.1109/SSST.2010.5442801","url":null,"abstract":"This paper presents an image processing approach for distinguishing three pregnancy stages of mice using Second Harmonic Generation (SHG) microscopy images. Three classes of SHG images for day 6, day 12 and day 18 of the 19-day mouse gestation period are considered. A classification is performed based on morphological features previously used for such SHG images, wavelet-based texture features, and a combination of morphological and wavelet-based texture features. It is shown that the combination of the features provide a more effective mechanism for distinguishing the three stages of mouse pregnancy as compared to each separate set of features.","PeriodicalId":6463,"journal":{"name":"2010 42nd Southeastern Symposium on System Theory (SSST)","volume":"17 1","pages":"44-46"},"PeriodicalIF":0.0,"publicationDate":"2010-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83398807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-03-07DOI: 10.1109/SSST.2010.5442824
K. Rao, Do Nyeon Kim
Video coding standards: H.264/AVC, DIRAC, AVS China and VC-1 are presented. These are the latest standards and are adopted by ITU-T/ISO-IEC, BBC, China standards organization and SMPTE respectively. Besides presenting these standards, research potential and as well projects (both at UG and grad levels) are emphasized. These are available by accessing the database for research and projects in [18]. Web/ftp sites for accessing standards documents, software, test sequences, conformance bit streams, industry activities etc are provided.
{"title":"Current video coding standards: H.264/AVC, Dirac, AVS China and VC-1","authors":"K. Rao, Do Nyeon Kim","doi":"10.1109/SSST.2010.5442824","DOIUrl":"https://doi.org/10.1109/SSST.2010.5442824","url":null,"abstract":"Video coding standards: H.264/AVC, DIRAC, AVS China and VC-1 are presented. These are the latest standards and are adopted by ITU-T/ISO-IEC, BBC, China standards organization and SMPTE respectively. Besides presenting these standards, research potential and as well projects (both at UG and grad levels) are emphasized. These are available by accessing the database for research and projects in [18]. Web/ftp sites for accessing standards documents, software, test sequences, conformance bit streams, industry activities etc are provided.","PeriodicalId":6463,"journal":{"name":"2010 42nd Southeastern Symposium on System Theory (SSST)","volume":"10 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2010-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88307874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-03-07DOI: 10.1109/SSST.2010.5442845
D. Beams, Sriram Boppana
Electric power is delivered most efficiently from utilities to end users when the load draws current at unity power factor. Traditional ac-to-dc power supplies that use a rectifier/filter topology, however, draw currents that are highly non-sinusoidal and rich in harmonics and thus display a low power factor. An alternative approach, known as offline power factor correction, eliminates the filter capacitor and uses switchmode power converter techniques to achieve power factors close to unity. Commercially-available integrated circuits may be combined with external discrete components to make a complete offline power-factor correction circuit; however, the manufacturers' data sheets frequently provide little theoretical basis for their application information. This paper deals with modeling and simulation work to derive the transfer functions of the voltage- and current-control loops, with a primary focus on the current-control loop. The transfer function of the current-control loop has been derived for specified operating conditions, and a Matlab script for plotting Bode plots of these transfer functions is developed.
{"title":"Modeling and simulation of off-line boost power factor correction (PFC) circuits","authors":"D. Beams, Sriram Boppana","doi":"10.1109/SSST.2010.5442845","DOIUrl":"https://doi.org/10.1109/SSST.2010.5442845","url":null,"abstract":"Electric power is delivered most efficiently from utilities to end users when the load draws current at unity power factor. Traditional ac-to-dc power supplies that use a rectifier/filter topology, however, draw currents that are highly non-sinusoidal and rich in harmonics and thus display a low power factor. An alternative approach, known as offline power factor correction, eliminates the filter capacitor and uses switchmode power converter techniques to achieve power factors close to unity. Commercially-available integrated circuits may be combined with external discrete components to make a complete offline power-factor correction circuit; however, the manufacturers' data sheets frequently provide little theoretical basis for their application information. This paper deals with modeling and simulation work to derive the transfer functions of the voltage- and current-control loops, with a primary focus on the current-control loop. The transfer function of the current-control loop has been derived for specified operating conditions, and a Matlab script for plotting Bode plots of these transfer functions is developed.","PeriodicalId":6463,"journal":{"name":"2010 42nd Southeastern Symposium on System Theory (SSST)","volume":"42 1","pages":"177-181"},"PeriodicalIF":0.0,"publicationDate":"2010-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89040902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-03-07DOI: 10.1109/SSST.2010.5442811
T. Beaubouef, F. Petry
In this paper we consider security issues that arise in imprecise databases based on rough set theory. The aspect of security considered is similar to that in statistical databases for which a combination of queries cannot reveal exact values of attributes. Information theory measures are used to characterize security for imprecise databases.
{"title":"Database security issues in rough relational databases","authors":"T. Beaubouef, F. Petry","doi":"10.1109/SSST.2010.5442811","DOIUrl":"https://doi.org/10.1109/SSST.2010.5442811","url":null,"abstract":"In this paper we consider security issues that arise in imprecise databases based on rough set theory. The aspect of security considered is similar to that in statistical databases for which a combination of queries cannot reveal exact values of attributes. Information theory measures are used to characterize security for imprecise databases.","PeriodicalId":6463,"journal":{"name":"2010 42nd Southeastern Symposium on System Theory (SSST)","volume":"20 1","pages":"352-356"},"PeriodicalIF":0.0,"publicationDate":"2010-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91065329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}