This paper presents the modeling & implementation of a closed-loop high-gain switched-inductor switched-capacitor converter (SISCC) for step-up DC-DC conversion & regulation. The power part of SISCC consists o...
详细信息
ISBN:
(纸本)9781479948321
This paper presents the modeling & implementation of a closed-loop high-gain switched-inductor switched-capacitor converter (SISCC) for step-up DC-DC conversion & regulation. The power part of SISCC consists of two cascaded blocks: (i) Front: a serial-parallel switched-capacitor (SC) circuit with nc pumping capacitors, and (ii) Core: a switched-inductor (SI) booster with mc resonant capacitors, so as to boost the step-up gain up to (nc+1)x(mc+1) at most, where D is the duty cycle of pulse-width-modulation (PWM) control. The control part of SISCC is composed of a phase generator and PWM controller, mainly implemented in the chip (I.C. number: D35-101B-37e, TSMC 0.35μm 2P4M, size: 500μm×300μm, 12.2mW, max. frequency: 200kHz) via full-custom fabrication of National Chip Design and Implementation Center (CIC), Taiwan. Some theoretical analysis includes: formulation, steady-state analysis, and conversion ratio. Finally, the performance of this scheme is verified experimentally on a SISCC prototype, and the results are illustrated to show the efficacy of this scheme.
Recently, screen recording technology is widely used by lots of applications, such as remote control, distance learning, and distance conference etc. A problem, called Asymmetric Screen Resolution (ASR) in this paper,...
详细信息
ISBN:
(纸本)9781479979820
Recently, screen recording technology is widely used by lots of applications, such as remote control, distance learning, and distance conference etc. A problem, called Asymmetric Screen Resolution (ASR) in this paper, will occur in these applications. The ASR problem means that the resolution of a recording computer is different from that of a display computer. Different computer system will have different screen resolution and the ASR problem will result in screen recording resolution mismatch between the recording computer and display computer. This paper proposes a novel CRA algorithm to apply advantage of the CUDA parallel computing for adjusting the resolution on the Graphics Processing Unit (GPU). This algorithm effectively reduces CPU utilization and guarantees the display quality after adjusting resolution. Four different application scenarios, web browsing, text editing, slide presentation, and video playback are used to test the performance of our proposed CRA algorithm. These experiments measure CPU utilization and the PSNR of image adjusted by the CRA algorithm. The experimental results show that CRA algorithm effectively reduce CPU utilization 32%~40% while using whole screen in resolution adjustment. The CRA algorithm effectively reduces CPU utilization 0.1%~13% while using difference rectangle in resolution adjustment. On image quality measurements, the PSNR value is controlled between 25db~28db while using the CRA algorithm to adjust screen resolution from 1920×1080 to 1536×864. The PSNR value is controlled between 26db~34db by using the CRA algorithm to adjust screen resolution from 1920×1080 to 960×540. Using CRA algorithm presented in this paper will definitely get a good image quality, and effectively reduce CPU utilization.
Petri net is a powerful modelling and analysis mechanism, which facilitates a smart way to understand events and dynamic systems. This paper provides an analysis of several generations of mobile network systems, namel...
详细信息
Subcircuit Extraction plays an important role in computer-Aided-Design of digital circuits. With the rapid growth of wafer processing technologies, the integration is from very large scale to giga large scale. Therefo...
详细信息
ISBN:
(纸本)9781479961245
Subcircuit Extraction plays an important role in computer-Aided-Design of digital circuits. With the rapid growth of wafer processing technologies, the integration is from very large scale to giga large scale. Therefore, to extract sub circuits from such large scale integration is computation-consuming problem. In this paper, we propose a parallel sub circuit extraction algorithm on graphic processing unit. The experimental result shows that the proposed algorithm can achieve over 3x-7x times faster than serial algorithm.
In 2012, Guo and Chang proposed a chaotic maps-based password-authenticated key agreement scheme. Their scheme uses smart cards and Chebyshev chaotic maps to enhance the security. After analyzing Guo and Chang's p...
详细信息
In 2012, Guo and Chang proposed a chaotic maps-based password-authenticated key agreement scheme. Their scheme uses smart cards and Chebyshev chaotic maps to enhance the security. After analyzing Guo and Chang's protocol, we find that their scheme does not provide forward secrecy and integrity is absent in password change phase. In this paper, details of the found flaws and some further suggestions are given.
The literatures have indicated that cooperative learning facilitates enhancing learning performance, which focuses on (1) the interaction and the collaboration between grouping members, and (2) one member helping othe...
详细信息
The literatures have indicated that cooperative learning facilitates enhancing learning performance, which focuses on (1) the interaction and the collaboration between grouping members, and (2) one member helping other members to be successful. The literatures have shown that the grouping organization is a critical issue for promoting learning achievement in cooperative learning. To evaluate the differences between the self-organized groups and the designated groups, this paper has conducted a serial of experiments and assessments to study the differences of learning performance, participation and satisfaction degree. In the self-organized groups the grouping members are decided by the grouping members, whereas the grouping members in the designated group are composited of the considering conditions. The experiment have demonstrated that the learning achievement of the designated group is high than the self-organized group. For the participation and the satisfaction degree of the curriculum, the self-organized group is high than the designated group.
Face is a highly utilized biometric, and 3D modality is preferred due to better handling of variations such as pose and illumination. However, occlusions covering the face alter the 3D surface and degrade the recognit...
详细信息
Face is a highly utilized biometric, and 3D modality is preferred due to better handling of variations such as pose and illumination. However, occlusions covering the face alter the 3D surface and degrade the recognition performance. To improve recognition rates, the occluded parts should be detected prior to any surface comparison. In this paper, we consider two different occlusion detection approaches: The first one is based on statistical facial surface modeling, where pixel-wise Gaussian Mixture Models are trained. The second algorithm considers occlusion detection as a binary image segmentation problem: The regional cues of dept. values are incorporated with neighborhood cues, and the acquired surface is modeled as a graph. The surface pixels are labeled as either face or occlusion via the graph cut technique. Experiments on the Bosphorus and the UMB-DB databases, including realistic occlusion variations, show that both methods improve occlusion detection and face recognition rates as compared to the baseline technique.
In this paper, we investigate the random access for an energy harvesting secondary user (SU) in a cognitive radio system, in which the SU harvests energy from radio frequency (RF) radiation of the primary user (PU). W...
详细信息
ISBN:
(纸本)9781479935130
In this paper, we investigate the random access for an energy harvesting secondary user (SU) in a cognitive radio system, in which the SU harvests energy from radio frequency (RF) radiation of the primary user (PU). With multipacket reception channel model, the SU can increase its throughput through not only utilizing the idle periods of the PU, but also opportunistically sharing the PU spectrum with some probability when the PU is active. By choosing the appropriate random access probability, we maximize the throughput of the SU under the constraint of the primary queue stability. We also define the energy-limited region and spectrum-limited region to specify the tradeoff between the SU performance and the PU activity. Furthermore, we investigate the effect of the primary queueing delay constraint on the throughput performance of the SU.
This paper presents a novel approach to binary change detection in pairs of images extracted from time series. The main idea is that, given a binary change detection map obtained with any literature technique applied ...
详细信息
ISBN:
(纸本)9781479953141
This paper presents a novel approach to binary change detection in pairs of images extracted from time series. The main idea is that, given a binary change detection map obtained with any literature technique applied to the considered pair of images, we can identify possible change detection errors exploiting other images in the time series. This can be done by considering other pairs of images in the time series that, jointly with the analyzed one, can define a closed circular path in time. Then we model the binary change variable as a conservative field along circular paths within the time series. If for a pixel the circular path does not satisfy the conservativeness property an error is detected. Accordingly, the change detection label on that pixel is considered unreliable Experimental results obatined on a time series of ASAR Envisat images point out the effectiveness of the approach in detecting unreliable pixels.
This paper considers a problem of identification for a high dimensional nonlinear non-parametric system when only a limited data set is available. The algorithms are proposed for this purpose which exploit the relatio...
This paper considers a problem of identification for a high dimensional nonlinear non-parametric system when only a limited data set is available. The algorithms are proposed for this purpose which exploit the relationship between the input variables and the output and further the inter-dependence of input variables so that the importance of the input variables can be established. A key to these algorithms is the non-parametric two stage input selection algorithm.
暂无评论