Memristive devices offer energy and area efficient non-volatile data storage for data-intense Ternary Content Ad-dressable Memory (TCAM) architectures. However, depending on the storage implementation in the bitcell d...
Memristive devices offer energy and area efficient non-volatile data storage for data-intense Ternary Content Ad-dressable Memory (TCAM) architectures. However, depending on the storage implementation in the bitcell design, the matching functionality shows multiple undesired discharge effects leading to false look-up results. In particular, the ternary storage suffers during the look-up operation from a poor resistance ratio, match-line leakage and device variabilities. In this paper, we investigate the inherent, design-dependent limitations in the ternary state storage capability due to different memristive TCAM bitcell design parameters and device variabilities. We test these limits based on variability-aware device simulations and isolate crucial parameters for the optimization of memristive TCAMs.
To experience realistic driving scenarios in the virtual simulation environment, strengths of both the traffic simulation and the vehicle simulation tools must be combined. In this paper, a driver-in-the-loop co-simul...
详细信息
Implementing cloud computing and data networks for local internet services is a priority. This research addresses the issue by introducing a novel approach to enhance the quality of regional internet data services. Th...
详细信息
The revolutionary and rapid development of Information and Communication Technology (ICT) has significantly contributed to modernizing military operations by improving the long-range communication and information shar...
The revolutionary and rapid development of Information and Communication Technology (ICT) has significantly contributed to modernizing military operations by improving the long-range communication and information sharing of unmanned aerial vehicles (UAVs) on the battlefield. However, efficient decision-making between clusters of UAVs controlled by the controller station (CS) is still one of the critical aspects that can cause potential threats to the armed forces on the battlefield. Thus, we have proposed a majority voting-based mechanism to attain consensus decision-making for UAVs, i.e., followers, monitored by the CS (leader) on the battlefield. Furthermore, we have focused on various voting scenarios to choose the efficient decision (attack or retreat) for the armed forces without any conflict between leader and follower utilizing the majority voting mechanism. Finally, the performance evaluation of the proposed mechanism is analyzed and simulated using the performance metrics of consensus delay and throughput.
It is challenging to derive explainability for unsupervised or statistical-based face image quality assessment (FIQA) methods. In this work, we propose a novel set of explainability tools to derive reasoning for diffe...
详细信息
The emergence of the global COVID-19 pandemic poses new challenges for biometrics. Not only are contactless biometric identification options becoming more important, but face recognition has also recently been confron...
详细信息
Face image quality assessment (FIQA) estimates the utility of the captured image in achieving reliable and accurate recognition performance. This work proposes a novel FIQA method, CR-FIQA, that estimates the face ima...
详细信息
Wearing a mask has proven to be one of the most effective ways to prevent the transmission of SARSCoV-2 coronavirus. However, wearing a mask poses challenges for different face recognition tasks and raises concerns ab...
详细信息
Due to the COVID-19 situation, face masks have become a main part of our daily life. Wearing mouth-and-nose protection has been made a mandate in many public places, to prevent the spread of the COVID-19 virus. Howeve...
详细信息
Diminishing the appearance of a fence in an image is a challenging research area due to the characteristics of fences(thinness, lack of texture, etc.) and the need for occluded background restoration. In this paper, w...
详细信息
Diminishing the appearance of a fence in an image is a challenging research area due to the characteristics of fences(thinness, lack of texture, etc.) and the need for occluded background restoration. In this paper, we describe a fence removal method for an image sequence captured by a user making a sweep motion, in which occluded background is potentially observed. To make use of geometric and appearance information such as consecutive images, we use two well-known approaches: structure from motion and light field rendering. Results using real image sequences show that our method can stably segment fences and preserve background details for various fence and background combinations. A new video without the fence, with frame coherence, can be successfully provided.
暂无评论