The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
H-bridge is an important driver device for consumer electronics and industry controls; however, the existed dead-time problem will reduce its performance. In this paper, A PMOS-driven H-bridge using a gate-bias technology is proposed to avoid the dead-time generation. In addition to no dead-time requirement, the proposed PMOS-driven H-bridge also achieves the better driving efficiency and low hardware...
To assist Java programming educations, we have developed a Web-based Java Programming Learning Assistant System (JPLAS). JPLAS provides fill-in-blank problems to let students study the grammar and the code structure for Java by filling blank elements in a high-quality code that are composed of reserved words, identifiers, and control symbols. However, students can answer the problems only when connected...
In this paper, we proposed the computer vision and behavior imaging science and technology into the field of treatment of children with special needs, aiming to use computer algorithms to automatically analyze children's gaze, and further investigate children's behavior patterns and distinguish whether children are with autism characteristics in our CSBS video. We perform a series of image processing...
Nonnegative matrix factorization (NMF)-based speech enhancement algorithm has been proven to provide satisfactory performance when the prior information about speaker and noise types are given. In most real-world scenarios, however, such prior information may not always be accessible. Therefore, an adaptation technique is favorable to adapt the NMF matrices to match the testing condition for a better...
This paper proposes to employ the technique of nonnegative matrix factorization (NMF) to enhance the temporal modulation components of speech signals for reducing the noisy effect. As for any arbitrary acoustic frequency, the NMF-wise bases for the temporal modulations of both the clean speech and noise are first extracted and then applied to the decomposition of the temporal modulation of the noise-corrupted...
The electrostatic-discharge (ESD) protection capability of HV nLDMOS devices with the source-side engineering by a TSMC 0.25μm 60-V is investigated in this paper. It can be found that a pure nLDMOS device has a poor anti-ESD ability (It2 = 1.833A). At the same time, if an nLDMOS was embedded with an SCR npn-(pnp-) arranged type in the drain-side, the corresponding secondary breakdown-current values...
This paper proposes a high-capacity hiding scheme for embedding secret message in the inactive frames of low-bit rate speech bitstream. Our information-hiding scheme can correctly extract secret message in the receiver. The scheme uses a flag to synchronize the embedding and extraction process in steganography. The results of an imperceptibility evaluation indicate that the average perceptual evaluation...
A Hierarchy Multiple-Voltage (HMulti-Vdd) design technique is proposed in this paper which can effectively reduce power consumption. This paper presents an EDA automation design flow that facilitates separation of high-voltage and low-voltage module in synthesis stage. The proposed HMulti-Vdd methodology can be utilized to identify how many voltage domain and how low supplied voltage are better to...
This study focuses on a tracking technique for minimally invasive surgery to overcome the possible dangers by endoscopic techniques. We used the principles of electric fields to detect the position of the instrument. With a microprocessor board and a shareware tool known as Processing, a three-dimensional tracking system was developed so that the scalpel inside a patient's body can be monitored by...
The video recognition on computer systems has become a high computing complexity and consumed the enormous amount of energy. This paper uses DVFS power management technique schedules the frame task to cores with higher or lower VF settings depending on a task's time-varying compute intensity. The DVFS based scheduling scheme minimize the number of voltage and frequency transition to solve the limitation...
Fingerprinting is one of the most reliable technique for indoor positioning. The concept of the fingerprinting is to compare the offline received signal strength (RSS) database and online RSS measurement to find the most similar reference point to represent the user position. However, fingerprinting is sensitive to the environmental changes, where the offline database is required to be updated. In...
The User-PC computing system (UPC) has been studied to provide a parallel computing platform for members in a group using idling computing resources in personal computers (PCs) of them. UPC adopts the master-worker model where we have implemented the programs for the master on Linux and for the worker on Linux and Windows. However, the current job scheduling method does not consider the real performance...
Power consumption is one of the most important issues of smartphones. Android OS, a popular smartphone operating system, has a function with which an application can be invoked in screen-off state without user's operation. Some applications frequently work in screen-off state, and consume battery. In this paper, we propose a method for identifying applications that largely drain battery in Screen-off...
This paper describes the work aimed to develop a thermal inkjet printhead with identification circuit. Identification integrated circuit is a fuse in series with the drain of MOS, after waiting for the wafer factory burn break fuse line. When VID is greater than 3.6V, namely its fuse is blown. It can conclude that its fuse blown point voltage is equal to 3.6V. Curve VGS equal to 15.5V blown fuse parameter...
The Internet of Things (IoT) is different than the traditional Internet due to factors including (i) massive number of resource constrained devices, (ii) huge volume of small data exchange among physical things, (iii) autonomous configuration and management aspects and (iv) support for mobility. Named Data Networking (NDN) supports them natively and provides excellent mechanism for content retrieval...
Omni-directional cameras are widely used in many applications such as surveillance systems and endoscopy. Omnidirectional cameras use a single camera and a reflective mirror to capture elliptic omnidirectional images and then transform the elliptic omnidirectional images to panoramic images. To accelerate the transformation from elliptic omnidirectional images to panoramic images, this paper proposes...
An improved algorithm based on bio-inspired neural network is proposed for Autonomous Underwater Vehicle (AUV) real-time path planning in three-dimensional (3D) environment in this paper. The algorithm has made an improvement in the shunting equation of the neural network model which is conductive to path planning especially in dynamic environments. The proposed approach has high efficiency and good...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.