This paper describes a resource-efficient vision system for the mini-robot"Khepera". It is implemented to perform a fundamental approach of robotic navigation, which is obstacle detection by using an optical...
详细信息
Although stochastic models of speech signals (e.g. hidden Markov models, trigrams, etc) have lead to impressive improvements in speech recognition accuracy, it has been noted that these models have little relationship...
详细信息
Although stochastic models of speech signals (e.g. hidden Markov models, trigrams, etc) have lead to impressive improvements in speech recognition accuracy, it has been noted that these models have little relationship to speech production, and their recognition performance on some important tasks is far from perfect. However, there have been recent attempts to bridge the gap between speech production and speech recognition using models that are stochastic and yet make more reasonable assumptions about the mechanisms underlying speech production. A new technique, which is given the name "Letter Identification", is developed for the Khepera robot application, mainly to control the movement of the robot's mobile base and suit all the application's constraints. The recognition technique, together with the necessary software and hardware implementation, are described in this paper.
If robots are deployed in large numbers in our environment in future, collaboration between the presumably specialized robots will be essential for a successful operation. The robots will set up mobile ad-hoc networks...
详细信息
A subharmonic receiver for sensing applications in the 245 GHz ISM band has been proposed. The receiver consists of a single-ended common base LNA, a 60 GHz push-push VCO with 1/32 divider, a transconductance 4th subh...
详细信息
The polycrystalline silicon films with same doping concentration and different thickness were prepared by low pressure chemical vapor deposition. The gauge factors of the films samples were tested, the results show th...
详细信息
A5-1 algorithm is a stream cipher used to encrypt voice data in GSM,which needs to be realized with high performance due to real-time *** implementation on FPGA or ASIC can't obtain a trade-off among performance,c...
详细信息
ISBN:
(纸本)9781509066261;9781509066254
A5-1 algorithm is a stream cipher used to encrypt voice data in GSM,which needs to be realized with high performance due to real-time *** implementation on FPGA or ASIC can't obtain a trade-off among performance,cost and *** this aim,this paper introduces CGRCA to implement A5-1,and in order to optimize the performance and resource consumption,this paper proposes a resource-based path seeking(RPS) algorithm to develop an advanced *** results show that final optimal throughput of A5-1 implemented on CGRCA is 162.87 Mbps when the frequency is 162.87 MHz,and the set-up time is merely 87 cycles,which is optimal among similar works.
This paper presents a study of logic circuit design using Strained Induced Double Gated Junctionless transistors (SIDG-JLT) with work function engineering (WFE) in sub-20nm node for negligible Short Channel Effects (S...
详细信息
In this paper, a speech recognition system is designed and the relevant hard-ware environment is built through Zynq FPGA AX7020 platform. In this system, the feature extraction of speech signals is based on MFCC (mel-...
详细信息
Supported by self-developed high-performance 1.4km NANF and linear equalizer, we achieved the penalty-free 400Gb/s 4λ WDM transmission for mobile X-Haul, reaching optical budget of 42.4dB and dynamic range and net da...
详细信息
With the fast development of artificial intelligence(AI) and industrial Internet of Things(IIoT)technologies, it is challenging to deal with the problems of data privacy protection and secure *** recent years, federat...
详细信息
With the fast development of artificial intelligence(AI) and industrial Internet of Things(IIoT)technologies, it is challenging to deal with the problems of data privacy protection and secure *** recent years, federated learning(FL) is proposed to attack the challenges of learning shared models collaboratively while protecting security based on the data from cross-domain clients. However, data in the real environment is usually not independent and identically distributed(Non-IID) due to the differences in business, working environments, and data acquisition, and thus classic federated methods suffer from significant performance degradation. In this paper, a novel federated framework is proposed for secure textile fiber identification(Fed TFI) via cross-domain texture representation based on high-definition fabric images. In addition to sharing the gradient of Fed TFI, the local patch of feature maps between crossdomain clients is randomly exchanged to build a richer image texture feature distribution while protecting data security simultaneously for secure computing. Furthermore, a texture embedding layer is designed to provide a joint representation through similarity measure between triplet samples in low-dimensional *** verify the effectiveness of the proposed framework, two textile image datasets, i.e., one public and the other we collected, are utilized to construct four Non-IID scenarios, including label skew, feature skew, and two combined skew scenarios. The experimental results confirm the effectiveness of our model to obtain better detection accuracies than benchmarks in four Non-IID scenarios by keeping data privacy for secure computing in fabric IIoT.
暂无评论