In this paper, we propose a new automated approach to extract the centerlines from 2-D angiography. The centerline extraction is the basis of 3-D reconstruction of the blood vessels, so the accurate localization of ce...
详细信息
The residue number system (RNS) has computational advantages in addition and multiplication compared with weighted number systems, such as the binary number system (BNS), since operations on residue digits are perform...
详细信息
The residue number system (RNS) has computational advantages in addition and multiplication compared with weighted number systems, such as the binary number system (BNS), since operations on residue digits are performed independently and these processes can be performed in parallel. Thus they are widely used in digital signal processing etc. Since residue to binary conversion is critical and difficult for the practicality of RNS, in this paper, a novel residue to binary (R/B) conversion algorithm for the restricted moduli set (2/sup n/ -1, 2/sup n/, 2n+1), based on exploring the periodicity of modulo (2/sup n/ /spl plusmn/ 1) operations is presented. A new 2n-bit adder based R/B converter is also proposed. The performance comparison results demonstrate that the new converter is faster and requires less area compared with the others reported in the previous literature.
Unmanned air vehicles (UAVs) are identified as an integral part of future military forces. The coordinated route-planning problems of UAV team with various architectures are addressed in the framework of game theory. ...
详细信息
ISBN:
(纸本)0780384032
Unmanned air vehicles (UAVs) are identified as an integral part of future military forces. The coordinated route-planning problems of UAV team with various architectures are addressed in the framework of game theory. A two-stage route planner has been proposed, which combines various game models and the concept of evolutionary computation and is compatible with the cooperative/competitive nature envisioned for UAV team. Our route planner can handle different kinds of mission constraints in hierarchical style. Potential routes of each vehicle form their own sub-population, and evolve only in their own sub-population, while the cooperation and competition among UAVs are reflected by the definition of fitness function. Experimental results show the feasibility of generating the coordinated routes for UAV team using game theory methods.
A new parallel-based lifting algorithm (PBLA) for the 9/7 filters, exploring the parallelism of arithmetic operations in each lifting step, was proposed in this paper. It shortened significantly the critical path of c...
详细信息
ISBN:
(纸本)0780384032
A new parallel-based lifting algorithm (PBLA) for the 9/7 filters, exploring the parallelism of arithmetic operations in each lifting step, was proposed in this paper. It shortened significantly the critical path of computation, and resulted in a fast VLSI implementation architecture. In comparison with the conventional lifting algorithm based implementation (ClabI), the latency is reduced by more than half from (4T/sub m/ + 8T/sub a/) to (T/sub m/ + 4T/sub a/), which is competitive to that of convolution based implementation CBI, and can be further reduced to Tm by inserting 3 stages of pipeline. The experimental results demonstrate that the proposed architecture has good performances in both speed and area.
This paper proposes a novel fast architecture for a 2D discrete wavelet transform by using a lifting scheme, Parallel and embedded decimation techniques are employed to optimize the architecture, which is mainly compo...
详细信息
ISBN:
(纸本)078038511X
This paper proposes a novel fast architecture for a 2D discrete wavelet transform by using a lifting scheme, Parallel and embedded decimation techniques are employed to optimize the architecture, which is mainly composed of two horizontal filter modules and one vertical filter module, working in parallel and pipeline fashion with 100% hardware utilization. The architecture is designed to generate two outputs in one working clock cycle, with every two subbands coefficients alternately. The total time for computing J levels of decomposition for an N/spl times/N image is approximately 2N/sup 2/(1-4/sup -J/)/3 clock cycles. In comparison with the other devices reported in previous literature, the design has many advantages including lower hardware complexity and area and power efficiency. The design is also fast, regular and simple, as well as well suited for VLSI implementation.
A circuit architechure to realize clock recovery for fast Ethernet applications is presented, whick includies system architecture, modified Mueller Muller algorithm for 100BASE-TX, phase detector for 100BASE-TX and mu...
详细信息
A circuit architechure to realize clock recovery for fast Ethernet applications is presented, whick includies system architecture, modified Mueller Muller algorithm for 100BASE-TX, phase detector for 100BASE-TX and multiple output charge pump PLL. The clock recovery circuit is verified by TSMC 0.35um 1P5M CMOS process. The results show that this clock recovery circuit exactly extracts the timing information. It has advantages over others for simple and easy implementation.
We present a novel approach to restoring images blurred by rotational motions, without experiencing geometric coordinate transformations as in traditional restoration. The space-variant blur is decomposed into a serie...
详细信息
We present a novel approach to restoring images blurred by rotational motions, without experiencing geometric coordinate transformations as in traditional restoration. The space-variant blur is decomposed into a series of space-invariant blurs along the blurring paths. By incorporating Bresenham's algorithm into our work, the blurred gray values of the discrete pixels can be fetched along the blurring paths in real time. Thus, the space-variant blur can be quickly removed along the blurring paths. We apply a two-stage process to restore the rectangular blurred image, which results in the proposal of two corresponding restoration algorithms. One removes the blur by deconvolution along the blurring paths, which are completely inside the rectangular image. The other is used in the case when only some of the pixels of some blurring paths are inside the rectangular image, so based on a neighborhood knowledge guide, the information of these pixels is restored with the least cost in terms of the constrained optimization estimation theory. Furthermore, these two restoration algorithms avoid iteration calculations and some time-consuming operations. To determine the blur center and the blur extents from the blurred image in a case of not knowing the rotational motion parameters, we present, based on cross correlation, an effective blur identification method, which becomes an integral part of the proposed approach. The experimental results demonstrate the efficiency of the proposed restoration algorithms and the effectiveness of the blur identification method. (C) 2003 Society of Photo-Optical Instrumentation Engineers.
Optical scanning plays a very important role in LADAR system for large field of view (FOV). But it introduces a Optical scanning lag angle which depends on the detecting range and the angular rate of scanner. Optical ...
详细信息
ISBN:
(纸本)0819446793
Optical scanning plays a very important role in LADAR system for large field of view (FOV). But it introduces a Optical scanning lag angle which depends on the detecting range and the angular rate of scanner. Optical scanning lag angle makes a part of received optical energy fall out of the optical sensitive area of detector which will greatly degrade the, detecting performance of LADAR in many cases. Optical scanning lag effect and optical scanning lag angle are computational analyzed in detail in this paper. And two conceptual solutions, sub-area receiving way on unit optical sensitive area and electrical scan receiving way on detector array, are proposed.
A physical model of velocity-overshoot of hot-carries based on the balanced equation of energy is developed and implemented in MOSFET models. Derived from the Boltzmann equation, a simple analytic simulation model can...
详细信息
ISBN:
(纸本)0780377494
A physical model of velocity-overshoot of hot-carries based on the balanced equation of energy is developed and implemented in MOSFET models. Derived from the Boltzmann equation, a simple analytic simulation model can be put into the BSIM3 simulation model. There are better identical verifications among the model of velocity overshoot, standard BSIM3 model (not including effects of velocity overshoot) and real device data.
Network flow is an excellent approach to finding min-cuts in network because of the celebrated maxflow/min-cut theorem. For a long time, however, it has not been a practical circuit partitioning method for its relativ...
详细信息
Network flow is an excellent approach to finding min-cuts in network because of the celebrated maxflow/min-cut theorem. For a long time, however, it has not been a practical circuit partitioning method for its relatively high computational complexity. Algorithm FBB is the first one to apply network flow to solve two-way balanced circuit partitioning successfully. Later, its improved version DMC efficiently solved the problem of multi-way circuit partitioning. In this paper, an improved circuit-partitioning algorithm MCER is presented. MCER is based on a min-cut equivalence relation. The algorithm not only inherits to take advantage of flow theory, but also incorporates a subsets movement-based method to utilize internal equivalent topological structure of circuit. Based on the equivalence relation and subsets movement between initial min-cuts, MCER will find more min-cuts. A series of experiments demonstrate that searching space of MCER is bigger than that of former algorithms and NICER outperforms FBB or DMC in terms of the size of min-cuts. Furthermore, MCER will degrade to DMC or FBB under special conditions. (C) 2003 Elsevier B.V. All rights reserved.
暂无评论