To reduce the low-power allpole active-RC filter's output magnitude sensitivity to passive components, the "impedance tapering" design method was used. This design procedure has been applied to the desig...
详细信息
To reduce the low-power allpole active-RC filter's output magnitude sensitivity to passive components, the "impedance tapering" design method was used. This design procedure has been applied to the design of 2 nd- and 3rd-order low-pass (LP) (class 4) Sallen-and-Key filters and has already been published. In this paper the active sensitivity analysis using MATHEMATICA was performed on the same "impedance tapered" filter sections as in [1]. The analysis was performed by calculation of the real filter's transfer-function magnitude which was denormalized to various cut-off frequencies from low to high, using a single-pole model of a real operational amplifier. The amount of active and passive sensitivity reduction was compared using the same degree of impedance tapering. It was demonstrated that both sensitivities, i.e. active and passive, were correspondingly reduced for the same filter. Thus, a judicious selection of component values accounts for a considerable decrease in both passive and active sensitivities.
The High Performance Embedded computing Software Initiative (HPEC-SI) program is developing a unified computation and communication Application Programming Interface (API) and framework for high performance signal pro...
详细信息
ISBN:
(纸本)0769522599
The High Performance Embedded computing Software Initiative (HPEC-SI) program is developing a unified computation and communication Application Programming Interface (API) and framework for high performance signal processing tasks on parallel computers. The goal of the program is to address the high cost of software in Department of Defense (DoD) systems by improving the portability and productivity of signal processing application development threefold, while improving performance by one half compared to current practices. This paper describes the motivation for the HPEC-SI program, its goals and approaches, and progress of the HPEC-SI Working Groups in extending the Vector, Signal, and Image Processing Library (VSIPL) standard to C++ and transparent operation in parallel computing systems. The current draft version of the C++ extensions to VSIPL is described, and highlights of its advantages are considered. This paper also examines results from the Demonstration Working Group, and describes requirements and plans developed by the applied Research Working Group for data parallel extensions to VSIPL and describes Development Working Group progress so far in developing parallel VSIPL.
Medical research and drug discovery rely increasingly on making comparisons between MR images from large numbers of subjects, often with multiple time points for each subject. We show how image registration and visual...
详细信息
We present techniques for transforming images and videos into painterly animations depicting different artistic styles. Our techniques rely on image and video analysis to compute appearance and motion properties. We a...
详细信息
ISBN:
(纸本)9781581138870
We present techniques for transforming images and videos into painterly animations depicting different artistic styles. Our techniques rely on image and video analysis to compute appearance and motion properties. We also determine and apply motion information from different (user-specified) sources to static and moving images. These properties that encode spatio-temporal variations are then used to render (or paint) effects of selected styles to generate images and videos with a painted look. Painterly animations are generated using a mesh of brush stroke objects with dynamic spatio-temporal properties. Styles govern the behavior of these brush strokes as well as their rendering to a virtual canvas. We present methods for modifying the properties of these brush strokes according to the input images, videos, or motions. Brush stroke color, length, orientation, opacity, and motion are determined and the brush strokes are regenerated to fill the canvas as the video changes. All brush stroke properties are temporally constrained to guarantee temporally coherent non-photorealistic animations.
In this paper, we propose a method to support intuitive coloring and texture mapping design of 3D computer graphic shapes. This method generates multiple candidate models applying various kinds of texture patterns and...
详细信息
ISBN:
(纸本)0780385667
In this paper, we propose a method to support intuitive coloring and texture mapping design of 3D computer graphic shapes. This method generates multiple candidate models applying various kinds of texture patterns and allows users to evaluate them sensitively. The technique called Interactive Evolutionary Computation (IEC) helps them to easily find the pleasant color texture pattern for 3D graphic shapes. To respond the users' evaluation quickly, texture mapping procedure should be easy and light weight. In this method, 3D shapes are reconstructed to a simple representation and applied for simple image warp functions.
This paper presents a new model for the accurate calculation of the abnormal waveform of the breaker reignition current following the interruption of the capacitive charging current of a long unloaded overhead line se...
详细信息
ISBN:
(纸本)0780387759
This paper presents a new model for the accurate calculation of the abnormal waveform of the breaker reignition current following the interruption of the capacitive charging current of a long unloaded overhead line section. The breaker is assumed located a some distance from the source. The suggested model is based on the circuit analysis of the cascaded cables and transmission line sections in terms of the ABCD constants using their distributed parameters, e.g. series inductance and shunt capacitance. The new model is verified using the results available in the literature obtained by applying the approximate, much more tedious and time consuming traveling wave approach. The model is applied to investigate the effect of the different parameters (such as the lengths and the surge impedances of the cable and overhead line) on the magnitudes and waveforms of the breaker reignition current.
We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks that dynamically detect invalid memory a...
详细信息
We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks that dynamically detect invalid memory accesses. Instead of terminating or throwing an exception, the generated code simply discards invalid writes and manufactures values to return for invalid reads, enabling the server to continue its normal execution path. We have applied failure-oblivious computing to a set of widely-used servers from the Linux-based open-source computing environment. Our results show that our techniques 1) make these servers invulnerable to known security attacks that exploit memory errors, and 2) enable the servers to continue to operate successfully to service legitimate requests and satisfy the needs of their users even after attacks trigger their memory errors. We observed several reasons for this successful continued execution. When the memory errors occur in irrelevant computations, failure-oblivious computing enables the server to execute through the memory errors to continue on to execute the relevant computation. Even when the memory errors occur in relevant computations, failure-oblivious computing converts requests that trigger unanticipated and dangerous execution paths into anticipated invalid inputs, which the error-handling logic in the server rejects. Because servers tend to have small error propagation distances (localized errors in the computation for one request tend to have little or no effect on the computations for subsequent requests), redirecting reads that would otherwise cause addressing errors and discarding writes that would otherwise corrupt critical data structures (such as the call stack) localizes the effect of the memory errors, prevents addressing exceptions from terminating the computation, and enables the server to continue on to successfully process subsequent requests. The overall result is a substantial extension of the range of req
Mobile servers are established to provide services for mobile nodes in an anticipated area. If the distribution of mobile nodes can be foreseen, the location of mobile servers becomes critical to the QoS of wireless s...
详细信息
Mobile servers are established to provide services for mobile nodes in an anticipated area. If the distribution of mobile nodes can be foreseen, the location of mobile servers becomes critical to the QoS of wireless systems. Under resource and topology constraints, it is very difficult to figure out a solution, or unable to cover all given mobile nodes within limited number of mobile servers. In this paper, we study the issue of the partial covering problem such that part of mobile nodes to be covered. Several approximation algorithms are proposed to cover the maximum number of elements. For real time systems, such as the battle-field communication system, the proposed algorithms with polynomial-time complexity can be efficiently applied. The algorithm complexity analysis illustrates the improvement made by our algorithms. The experimental results show that the performance of our algorithms is much better than other existing 3-approximation algorithm for the robust k-center problem.
3D virtual simulation environments (VE) applications have been impelled mainly by the computer games industry, military and industrial training and product design development. However, most of the existing systems are...
详细信息
ISBN:
(纸本)0769522327
3D virtual simulation environments (VE) applications have been impelled mainly by the computer games industry, military and industrial training and product design development. However, most of the existing systems are focused on specific tasks and have a supporting structure, which is closely tight to the application. As a consequence, a change in the application usually means a change in the supporting structure too, making it difficult and expensive to develop new or to extend existing VEs. In this paper, we present a novel approach to building and extending 3D virtual simulation environments through the integration of interactive non-linear stories and Virtual Reality. With this approach, VEs are composed as non-linear stories which can be changed either completely or partly, making it easier for developers to build and/or extend VEs applications, such as highly dynamic marketing campaigns to 3D virtual shops, customized training courses, educational and entertainment games, etc. Moreover, the use of a nonlinear story for building a VE application can also facilitate the communication among the different professionals involved in the building of complex VE applications.
While the kind of theoretical computer science being studied in academe is still highly relevant to systems-oriented research, it is less relevant to applications-oriented research. In appliedcomputing, theoretical e...
详细信息
暂无评论