Because tools in real world operate the object in order to attain a specific purpose, it is possible to forecast the movement to some extent. So action of hands to operate the tool to attain a purpose is measured befo...
详细信息
A common approach for large industrial designs is to use logic built-in self-test (LBIST) followed by test data from an external tester. Because the fault coverage with LBIST alone is not sufficient, there is a need t...
详细信息
A common approach for large industrial designs is to use logic built-in self-test (LBIST) followed by test data from an external tester. Because the fault coverage with LBIST alone is not sufficient, there is a need to top-up the fault coverage with additional deterministic test patterns from an external tester. This paper proposes a technique of combining LBIST and deterministic ATPG to form "hybrid test patterns" which merge pseudo-random and deterministic test data. Experiments have been done on the Motorola PowerPC/sup TM/ microprocessor core to study the proposed hybrid test patterns. Hybrid test patterns provide several advantages: (1) can be applied using STUMPS architecture (Bardell, 82) with a minor modification, (2) significantly reduce external test data stored in tester memory, (3) reduce the number of pseudorandom patterns by orders of magnitude, thus addressing power issues.
The increasing demand for robotic applications in dynamic unstructured environments is motivating the need for dextrous end-effectors which can cope with the wide variety of tasks and objects encountered in these envi...
详细信息
The increasing demand for robotic applications in dynamic unstructured environments is motivating the need for dextrous end-effectors which can cope with the wide variety of tasks and objects encountered in these environments. The human hand is a very complex grasping tool that can handle objects of different sizes and shapes. Many research activities have been carried out to develop artificial robot hands with capabilities similar to the human hand. In this paper the mechanism and design of a new humanoid-type hand (called TUAT/Karlsruhe Humanoid Hand) with human-like manipulation abilities is discussed. The new hand is designed for the humanoid robot ARMAR which has to work autonomously or interactively in cooperation with humans and for an artificial lightweight arm for handicapped persons. The arm is developed as close as possible to the human arm and is driven by spherical ultrasonic motors. The ideal end-effector for such an artificial arm or a humanoid would be able to use the tools and objects that a person uses when working in the same environment. Therefore a new hand is designed for anatomical consistency with the human hand. This includes the number of fingers and the placement and motion of the thumb, the proportions of the link lengths and the shape of the palm. It can also perform most part of human grasping types. The TUAT/Karlsruhe Humanoid Hand possesses 20 DOF and is driven by one actuator which can be placed into or around the hand.
We study multicast traffic performance in single-hop optical networks based on broadcast and select system that employ a receiver collision avoidance protocol (RCA) as a multicasting protocol. We use an approximate an...
详细信息
We study multicast traffic performance in single-hop optical networks based on broadcast and select system that employ a receiver collision avoidance protocol (RCA) as a multicasting protocol. We use an approximate analytical solution and Markov model to analyse the system. We consider fixed and uniform distribution of the destination set size to show the relationship between the receiver throughput and system throughput against the multicast size of the destination. We also show the trade-off between the offered load and channel probability. Then we evaluate the system as a relationship between blocking probability and offered load.
Numerous bridges have used comparable lateral connection plates welded to either the web or flange to connect the lateral bracing system to the longitudinal girders. Cracks are known to grow in the weld end and the ga...
详细信息
Numerous bridges have used comparable lateral connection plates welded to either the web or flange to connect the lateral bracing system to the longitudinal girders. Cracks are known to grow in the weld end and the gap of the gusset weld. This condition is complicated by the high residual stresses developed in these severely restrained configurations and also by out-of-plane movement caused by the lateral bracing system. We have tried to evaluate the fatigue strength of several of these welded attachments and also to determine whether or not they can be affected by lateral constraints. It was found that the connecting lateral bracing to the web gusset had no influence on its fatigue behaviour. There was no detectable effect of connecting the lateral bracing members to the flange gusset plates. The effect of secondary stresses and displacements in the girder web due to lateral bracing connected to the gusset plates was insignificant as was the relative stiffness of the lateral bracing system.
By using the radix-4 Booth algorithm, low-power 2's complement multipliers are developed by minimizing inter-data switching activities. Before performing multiplication, one of two input data with a smaller dynami...
详细信息
By using the radix-4 Booth algorithm, low-power 2's complement multipliers are developed by minimizing inter-data switching activities. Before performing multiplication, one of two input data with a smaller dynamic range is partitioned into Booth codes, thereby increasing probabilities of partial products being zero. In addition, functional blocks for adding zero preserve their previous input states. As compared to the conventional Wallace-tree multiplier, the two 16/spl times/16-bit multipliers proposed herein are demonstrated to have lower power dissipation.
Self-encoded spread spectrum eliminates the need for traditional transmit and receive PN code generators. The enhanced transmission security arises from the stochastic nature of the unique spectrum spreading and de-sp...
详细信息
Self-encoded spread spectrum eliminates the need for traditional transmit and receive PN code generators. The enhanced transmission security arises from the stochastic nature of the unique spectrum spreading and de-spreading processes. In a self-encoded multiple access (SEMA) system, the number of users is not limited by the number of available sequences, unlike CDMA systems that employ PN codes such as m-, Gold or Kassami sequences. It is important from a design standpoint to specify the minimum number of chips to support multiple users for a specified quality of service and capacity in SEMA system. We find the number of chips for an m-user SEMA system to achieve the specified capacity and bit error rate. The capacity analysis provides a useful indication of the maximum number of users for a given spreading factor.
To process enormous 3D data, we have designed a VLIW (Very Long Instruction Word) processor called FLOVA (Floating-Point VLIW Architecture) exploiting the ILP (Instruction-Level Parallelism) in 3D programs. This paper...
详细信息
To process enormous 3D data, we have designed a VLIW (Very Long Instruction Word) processor called FLOVA (Floating-Point VLIW Architecture) exploiting the ILP (Instruction-Level Parallelism) in 3D programs. This paper presents FGA (FLOVA Geometry Accelerator) that is the 3D graphics system and it almost removes the time required to process in the geometry stage. We have developed the 3D graphics library, FGA-GL, to supports the FGA system. The deferred primitive rendering algorithm of FGA-GL enables the geometry processing of the primitive data to be done concurrently with the host job such as primitive data management or game play. FGA improves the average performance of 3D graphics system by 2.5-3.0.
This paper is presented to explain the steps in removing the secondary part of Jawi characters (such as dots, hamzah, and madda). The method used is based on the connected component labelling algorithm or CCLA and is ...
详细信息
This paper is presented to explain the steps in removing the secondary part of Jawi characters (such as dots, hamzah, and madda). The method used is based on the connected component labelling algorithm or CCLA and is added with the secondary type detection algorithm (STDA) by Bushofa and Spann (see Image and Vision Computing, vol.15, p.167-79, 1997). Several steps in the algorithm however, have been modified in order for it to be matched with the handwritten Jawi characters. Several samples of the result from the suggested algorithm are also presented. The result promises a good outcome.
We have successfully developed a novel picosecond optical near-field probe for the high-frequency field mapping of interconnection lines. The transverse tangential electric field distribution of the microstrip coupled...
详细信息
We have successfully developed a novel picosecond optical near-field probe for the high-frequency field mapping of interconnection lines. The transverse tangential electric field distribution of the microstrip coupled transmission lines was obtained.
暂无评论