The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Finding a vast array of applications, the problem of computing the convex hull of a set of sorted points in the plane is one of the fundamental tasks in pattern recognition, morphology and image processing. The main contribution of this paper is to show a simple parallel algorithm for computing the convex hull of a set of n sorted points in the plane and evaluate the performance on the dual quad-core...
This paper deals with a collision avoidance problem for path-following of multiple holonomic robots. The path-following aims to move the robots along reference paths with assigned velocities. When there are geometric errors between the robots' positions and the reference paths or when the differences between their velocities and assigned velocities are not zero, we expect to reduce these errors. Unfortunately,...
This paper focuses on the cost of substitution of intermediate goods and investigates how it affects macroeconomic dynamics after a natural disaster. This paper develops a macroeconomic model to show that the cost of substitution of intermediate goods is an important factor for expanding economic loss by inducing the ??cascade effect.?? In addition, it illustrated that the cost of substitution can...
In multi-hop wireless networks, we often encounter a situation where there are some candidate paths between source node S and destination node D, and have to choose a path from the candidates. Although ordinary routing protocols select paths with minimum hops, QoS (quality of service) routing protocols evaluate paths using measures of QoS, such as expected transmission count (ETX). In multi-hop wireless...
Consider the following operation on an arbitrary positive number: if the number is even, divide it by two, and if the number is odd, triple it and add one. The Collatz conjecture assert that, starting from any positive number n, repeated iteration of the operations eventually produces the value 1. The main contribution of this paper is to present hardware-software cooperative approach to verify the...
Lately, it is required that the bandwidth of PWM power amplifier is extended. For example, it is in application of the testing power supply of a low frequency immunity examination, or a class-D amplifier. In this paper, we show that the bandwidth of PWM power amplifier can be extended by using an Approximate 2DOF Digital Controller. This controller is implemented on a DSP. It is demonstrated from...
We propose the fault model considering weak resistive opens inside the gate which might cause pattern-sequence-dependent and timing-dependent malfunction of the circuit. We assume the fixed observation interval for the signal transition, and derive the minimum resistance of intra-gate resistive opens to be detected as a fault by SPICE simulation. Based on the simulation results, we establish three...
The main contribution of this paper is to present efficient hardware algorithms for the modulo exponentiation PE mod M used in RSA encryption and decryption, and implement them on the FPGA. The key ideas to accelerate the modulo exponentiation are to use the Montgomery modulo multiplication on the redundant radix-64 K number system in the FPGA, and to use embedded 18 times 18-bit multipliers and embedded...
The main contribution of this work is to propose a distributed on-demand routing and wavelength assignment algorithm for WDM networks. The proposed algorithm, termed WDM-DSR, is capable to select routes and establish light-paths via message exchanges without imposing a major overhead on the network. Also, we show that the proposed scheme can be used to balance the load in a WDM network. The simulation...
Bidirectional model transformation plays an important role in maintaining consistency between two models, and has many potential applications in software development, including model synchronization, round-trip engineering, software evolution, multiple-view software development, and reverse engineering. However, unclear bidirectional semantics, domain-specific bidirectionalization method, and lack...
As is well known, an advanced knowledge and know-how of human are needed in the operation support work. Further, human expert can cope with the recent trend of machine dynamics. Usually, the diagnosis works have been privately performed in the brain of the individuals, and its information were not shared. Recently, the number of experts is decreasing and it becomes important to maintain and to extend...
To decrease the quantization noise, various 1-bit digital filters are shown. In this paper, we propose a design method of 1-bit digital filter using a new 2-degree-of-freedom control. This design method is applied to a high-pass filter, a low-pass filter and a equalizer. These filters are implemented on DSP, and the performance is verified by the experiment.
This paper describes the parameter estimation and update in neural networks (NN) using a modified version of simultaneous perturbation stochastic approximation (SPSA) algorithm in order to obtain a low computational cost and better performance in the proposed system here. Also, this SPSA is used as learning rule applied to a neuro-controller (NC). In this paper, we apply a direct inverse control scheme...
In this paper a parameter determining method of digital controller is proposed for spreading capacitance load range more and improving transient characteristics for inductance load. In the previous proposed controller, the configuration of the controller is the same to all loads. At inductive load, there is a possibility that the transient characteristics may become bad and the specification may not...
In this paper, we discuss the leader-following formation navigation (LFFN), which is one of the most important issues in formation control. In this formation, one leader is controlled by a human operator, while multiple followers pass along the leader's trajectory in the same motion to the leader. The collision avoidance problem in the LFFN has been discussed in a previous work. However, the problem...
If the lines which connect the output terminal of DC-DC converter and the load are long, the voltage actually across load will be changed largely to produce the voltage drops by the impedances of the lines. Then, the terminal which senses the voltage across load is prepared apart from the output terminal of DC-DC converter, and it leads to the load, and the voltage across load is adjusted so that...
In this paper, the application of the classifier system to human support of hot strip mill operation and making decision rules by the classifier system are described. The rule base for the correction of operation and the judgment of performance are necessary for the system that becomes agent of the human expert. The method to extract correction rules by a classifier system is shown. To search appropriate...
This paper reports the design of two courses, "embedded hardware'' and "embedded software" offered in 2008 spring semester at Hiroshima University. These courses use 16-bit processor TINYCPU, cross assembler TINYASM, and cross compiler TINYC. They are designed very simple and compact: The total number of lines of the source code is only 427. Thus, students can understandthe entire design...
Digital halftoning is an important process to convert a continuous-tone image into a binary image with pure black and white pixels. This process is necessary when printing a monochrome or color image by a printer with limited number of ink colors. The main contribution of this paper is to present a halftoning method that conceals a binary image into two binary images. More specifically, three distinct...
The main contribution of this paper is to present hardware algorithms for redundant radix-2r number system in the FPGA to speed the arithmetic operations for numbers with many bits, which have applications in security systems such as RSA encryption and decryption. Our hardware algorithms accelerate arithmetic operations including addition, multiplication, and Montgomery modulo multiplication.Quite...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.