141 research outputs found

    A Temperature โ€“ and Supply- Variation Robust 2nd-Order Sigma-Delta Modulation for Capacitive Sensing

    Get PDF
    Capacitance to digital converter, VCO quantizer, Sigma-Delta modulation, Supply variation, temperature variationIn this paper, I proposed a temperature- and supply variation robust 2nd-order sigma-delta modulation circuit for capacitive sensing. Capacitive sensing by conventional circuits is basically supply sensitive. Capacitance is sensed by reading the charge that is equal to the difference between the capacitance value of the capacitor and the capacitor to be sensed. In this method, the amount of charge is dependent on the supply, so it is insensitive to supply variation. In this paper, the capacitance is read by using the time determined by the discharge characteristics when a capacitor called T0V meets the resistance component. The charge accumulated in the capacitor is certainly influenced by the supply value, but capacitive sensing is performed using the characteristic that the time taken to discharge the charge to zero is always constant. In the process, VCO (Voltage-Controlled-Oscillator) based ADC (Analog-to-Digital Converter) was used to increase the resolution by utilizing the noise shaping effect of sigma-delta ADC. In the process, the resistor is switched to a switched capacitor to obtain robust characteristics against temperature variations. Unlike resistance whose values change with temperature, capacitance are relatively robust to temperature effects. By using the characteristics, a circuit having robust characteristics in temperature variation as well as robust in supply variation.openAbstract i List of contents iii List of figures iv List of figures v โ… . Introduction 1.1 Motivation and Objective 1 1.2 Theses outline 3 โ… I. Supply- Variation Robust 2nd-Order Sigma-Delta Modulation 2.1 Supply Independent Technique 4 2.2 Injection Locking Current Controlled Oscillator 8 2.3 VCO Based ADC 13 2.4 Full Architecture 16 2.4.1 Control Block 19 2.4.2 Block Diagram 21 2.5 Schematic and Layout 23 III. Temperature- and Supply- Variation Robust 2nd-Order Sigma-Delta Modulation 3.1 Switched Capacitor DAC 31 3.2 Switched Capacitor Clock Generator 36 3.3 Control Block 38 3.4 Schematic 39 IV. Simulation and Measurement Result 4.1 Resistor DAC Circuit 42 4.1.1 Measurement Result 42 4.2 Switched Capacitor DAC Circuit 45 4.2.1 Simulation Result 45 V. Conclusion๋ณธ ๋…ผ๋ฌธ์€ ์ „์›๋ณ€ํ™” ๋ฐ ์˜จ๋„๋ณ€ํ™”์—๋„ ์•ˆ์ •์ ์œผ๋กœ ์ •์ „์šฉ๋Ÿ‰์„ ์ฝ์–ด๋‚ผ ์ˆ˜ ์žˆ๋Š” 2์ฐจ ์‹œ๊ทธ๋งˆ-๋ธํƒ€ ๋ณ€์กฐ๊ธฐ ํšŒ๋กœ์ด๋‹ค. ์ปคํŒจ์‹œํ„ฐ์˜ ๋ฐฉ์ „ ์‹œ๊ฐ„์ด ์ „์›์˜ ์˜ํ–ฅ์ด ์•„๋‹Œ ์ •์ „์šฉ๋Ÿ‰๊ณผ ์ €ํ•ญ ๊ฐ’์—๋งŒ ์˜ํ–ฅ์„ ๋ฐ›๋Š”๋‹ค๋Š” ์ ์„ ์ด์šฉํ•˜์—ฌ ํšŒ๋กœ๋ฅผ ๊ตฌ์„ฑํ•˜์˜€๋‹ค. ๋˜ํ•œ ์ €ํ•ญ์ด ์˜จ๋„๋ณ€ํ™”์— ๋”ฐ๋ผ์„œ ์ผ์ •ํ•œ ๊ฐ’์„ ์œ ์ง€ํ•˜๊ธฐ ํž˜๋“ค๋‹ค๋Š” ์ ์„ ๋ณด์™„ํ•˜๊ธฐ์œ„ํ•ด switched capacitor ๊ธฐ๋ฒ•์„ ์‚ฌ์šฉํ•˜์˜€๋‹ค. ์ปคํŒจ์‹œํ„ฐ๋Š” ์ €ํ•ญ์— ๋น„ํ•ด ์ƒ๋Œ€์ ์œผ๋กœ ์˜จ๋„๋ณ€ํ™”์—๋„ ์ •์ „์šฉ๋Ÿ‰์„ ์•ˆ์ •์ ์ธ ๊ฐ’์œผ๋กœ ์œ ์ง€ํ•  ์ˆ˜ ์žˆ๋‹ค. ์ด ์ ์„ ์ด์šฉํ•˜์—ฌ ์ „์›๋ณ€ํ™”๋ฟ ๋งŒ์ด ์•„๋‹Œ ์˜จ๋„๋ณ€ํ™”์—๋„ ๊ฐ•์ธํ•œ ํŠน์„ฑ์„ ๊ฐ€์งˆ ์ˆ˜ ์žˆ๊ฒŒ ๋œ๋‹ค. ๋˜ ์ „์••์ œ์–ด๋ฐœ์ง„๊ธฐ๋ฅผ ํ™œ์šฉํ•œ ์•„๋‚ ๋กœ๊ทธ-๋””์ง€ํ„ธ ๋ณ€ํ™˜๊ธฐ๋ฒ•๋„ ์‚ฌ์šฉ๋˜์—ˆ๋‹ค. ์ „์••์ œ์–ด๋ฐœ์ง„๊ธฐ์— โ€˜์ „์••์ œ์–ด๋ฐœ์ง„๊ธฐ ๊ธฐ๋ฐ˜ ์–‘์žํ™”๊ธฐโ€™๋ผ๋Š” ์–‘์žํ™”๋ฅผ ํ•  ์ˆ˜ ์žˆ๋Š” ํšŒ๋กœ๋ฅผ ์—ฐ๊ฒฐํ•˜์—ฌ ๋™์ž‘์ด ์ง„ํ–‰๋œ๋‹ค. ์ด ๊ธฐ๋ฒ•์„ ์‚ฌ์šฉํ•˜๊ฒŒ ๋˜๋ฉด ์–‘์žํ™”์˜ค๋ฅ˜์˜ ์„ฑ๋ถ„๋“ค์ด ๋ฐฑ์ƒ‰์žก์Œ์ฒ˜๋Ÿผ ๋ชจ๋“  ์ฃผํŒŒ์ˆ˜๋Œ€์—ญ์— ๊ฑธ์ณ์„œ ๊ณจ๊ณ ๋ฃจ ์กด์žฌํ•˜๋Š” ๊ฒƒ์ด ์•„๋‹Œ, ๊ณ ์ฃผํŒŒ ์ชฝ์„ ํ–ฅํ•ด 20dB์˜ ๊ธฐ์šธ๊ธฐ๋ฅผ ๊ฐ€์ง€๋ฉฐ ์ƒ์Šนํ•˜๋Š” ํ˜•ํƒœ๋กœ ๋‚˜ํƒ€๋‚œ๋‹ค. ์ตœ์ข…์ ์ธ ์ „์ฒด ๋ฃจํ”„์˜ ํŠน์„ฑ์„ ํ™•์ธํ•˜๋ฉด 40dB์˜ ๊ธฐ์šธ๊ธฐ๋ฅผ ๊ฐ€์ง€๋ฉฐ ์ƒ์Šนํ•˜๋Š” ํ˜•ํƒœ๋ฅผ ๊ฐ–๋Š”๋‹ค. ์ด ํŠน์„ฑ์„ ํ†ตํ•˜์—ฌ ๋™์ž‘ ๋Œ€์—ญํญ์ด ์•„๋‹Œ ๋” ๊ณ ์ฃผํŒŒ ์˜์—ญ์œผ๋กœ ์–‘์žํ™” ์˜ค๋ฅ˜ ์„ฑ๋ถ„๋“ค์„ ๋ฐ€์–ด๋‚ผ ์ˆ˜ ์žˆ๋‹ค๋Š” ์žฅ์ ์ด ์žˆ๋‹ค. ๊ทธ ๊ฒฐ๊ณผ, SNR์ด ์ƒ์Šนํ•˜๊ฒŒ ๋˜์–ด ์ตœ์ข…์ ์œผ๋กœ ์ •์ „์šฉ๋Ÿ‰์„ ์ฝ์–ด๋‚ผ ์ˆ˜ ์žˆ๋Š” ๋ถ„ํ•ด๋Šฅ ์„ฑ๋Šฅ์ด ์ข‹์•„์ง€๊ฒŒ ๋œ๋‹ค.MasterdCollectio

    Invariant subspaces for operators whose spectra are Carathรฉodory regions

    Get PDF
    AbstractIn this paper it is shown that if an operator T satisfies โ€–p(T)โ€–โฉฝโ€–pโ€–ฯƒ(T) for every polynomial p and the polynomially convex hull of ฯƒ(T) is a Carathรฉodory region whose accessible boundary points lie in rectifiable Jordan arcs on its boundary, then T has a nontrivial invariant subspace. As a corollary, it is also shown that if T is a hyponormal operator and the outer boundary of ฯƒ(T) has at most finitely many prime ends corresponding to singular points on โˆ‚D and has a tangent at almost every point on each Jordan arc, then T has a nontrivial invariant subspace

    MatGD: Materials Graph Digitizer

    Full text link
    We have developed MatGD (Material Graph Digitizer), which is a tool for digitizing a data line from scientific graphs. The algorithm behind the tool consists of four steps: (1) identifying graphs within subfigures, (2) separating axes and data sections, (3) discerning the data lines by eliminating irrelevant graph objects and matching with the legend, and (4) data extraction and saving. From the 62,534 papers in the areas of batteries, catalysis, and MOFs, 501,045 figures were mined. Remarkably, our tool showcased performance with over 99% accuracy in legend marker and text detection. Moreover, its capability for data line separation stood at 66%, which is much higher compared to other existing figure mining tools. We believe that this tool will be integral to collecting both past and future data from publications, and these data can be used to train various machine learning models that can enhance material predictions and new materials discovery.Comment: 23 pages, 4 figure

    ARM MOTIONS FOR DIFFERENT TARGET POSITIONS DURING TAEKWONDO ROUNDHOUSE KICKS

    Get PDF
    The purpose of this study was to investigate arm motions for five different target positions during Taekwondo roundhouse kicks. Nine Taekwondo experts performed roundhouse kicks at a target. A 3D motion analysis was conducted. One-way repeated ANOVA was used to compare the arm motion among five conditions. This study reveals that a higher kick needs the increased vertical separation of the right and left arm (elbow and wrist) in release phase. For a longer kick at Body level, elbows should be more vertically apart and wrists should be more horizontally apart in the release phase. Both attackers and counter attackers in Taekwondo athletes can use the arm swing characteristics at different target heights and distances

    EFFECTS OF FOOT PLACEMENT ON RESULTANT JOINT MOMENTS OF LOWER EXTREMITY JOINTS DURING SQUAT

    Get PDF
    The purpose of this study was to investigate the effects of foot placement (stance width and foot angle) on normalized sagittal- and frontal-plane resultant joint moments (NRJM) of the lower extremity joints during the squat. Forty-two participants were recruited: male (n = 21) and female (n = 21). Three-dimensional motion analysis and inverse dynamics analysis were conducted. There was a significant interaction between the stance width and foot angle on the NRJM in the sagittal plane, whereas there were significant main effects of the stance width, foot angle, and gender on the NRJM in the frontal plane

    ELVIS: Empowering Locality of Vision Language Pre-training with Intra-modal Similarity

    Full text link
    Deep learning has shown great potential in assisting radiologists in reading chest X-ray (CXR) images, but its need for expensive annotations for improving performance prevents widespread clinical application. Visual language pre-training (VLP) can alleviate the burden and cost of annotation by leveraging routinely generated reports for radiographs, which exist in large quantities as well as in paired form (imagetext pairs). Additionally, extensions to localization-aware VLPs are being proposed to address the needs of accurate localization of abnormalities for CAD in CXR. However, we find that the formulation proposed by locality-aware VLP literatures actually leads to loss in spatial relationships required for downstream localization tasks. Therefore, we propose Empowering Locality of VLP with Intra-modal Similarity, ELVIS, a VLP aware of intra-modal locality, to better preserve the locality within radiographs or reports, which enhances the ability to comprehend location references in text reports. Our locality-aware VLP method significantly outperforms state-of-the art baselines in multiple segmentation tasks and the MS-CXR phrase grounding task. Qualitatively, ELVIS is able to focus well on regions of interest described in the report text compared to prior approaches, allowing for enhanced interpretability.Comment: Under revie

    ANALYSIS OF THE TRUNK/SHOULDER COMPLEX MOTION DURING THE GOLF DRIVES USING A 5-SEGMENT TRUNK/SHOULDER MODEL

    Get PDF
    The purpose of this study was to quantify detailed trunk/shoulder complex motions during the golf drives using a new 5-segment trunk/shoulder model (pelvis, abdomen, thorax, and right/left shoulder girdles) and to describe the patterns of the relative motions of the trunk/shoulder segments. Fifteen male golfers were divided into two groups: skilled (n=8, 3-handicap or better) and less skilled (n=7, 13- to 18-handicap). The ranges of the orientation angles of the segments during the downswing were computed. In addition to the dominant rotation of the thorax, substantial frontal plane motions of the trunk segments (abdomen and thorax) and transverse plane motions of the shoulder girdles were observed. Only the frontal plane motion of the left shoulder girdle (elevation/depression) was identified as the factor which differentiated the groups

    Environment-Detection-and-Mapping Algorithm for Autonomous Driving in Rural or Off-Road Environment

    Full text link
    Abstractโ€”This paper presents an environment-detection-and-mapping algorithm for autonomous driving that is provided in real time and for both rural and off-road environments. Environment-detection-and-mapping algorithms have been de-signed to consist of two parts: 1) lane, pedestrian-crossing, and speed-bump detection algorithms using cameras and 2) obstacle detection algorithm using LIDARs. The lane detection algorithm returns lane positions using one camera and the vision module โ€œVisLab Embedded Lane Detector (VELD), โ€ and the pedestrian-crossing and speed-bump detection algorithms return the position of pedestrian crossings and speed bumps. The obstacle detection algorithm organizes data from LIDARs and generates a local obstacle position map. The designed algorithms have been im-plemented on a passenger car using six LIDARs, three cameras, and real-time devices, including personal computers (PCs). Vehicle tests have been conducted, and test results have shown that the vehicle can reach the desired goal with the proposed algorithm. Index Termsโ€”Autonomous driving, lane detection, obstacle de-tection, pedestrian-crossing detection, speed-bump detection. I

    C-ITS Environment Modeling and Attack Modeling

    Full text link
    As technology advances, cities are evolving into smart cities, with the ability to process large amounts of data and the increasing complexity and diversification of various elements within urban areas. Among the core systems of a smart city is the Cooperative-Intelligent Transport Systems (C-ITS). C-ITS is a system where vehicles provide real-time information to drivers about surrounding traffic conditions, sudden stops, falling objects, and other accident risks through roadside base stations. It consists of road infrastructure, C-ITS centers, and vehicle terminals. However, as smart cities integrate many elements through networks and electronic control, they are susceptible to cybersecurity issues. In the case of cybersecurity problems in C-ITS, there is a significant risk of safety issues arising. This technical document aims to model the C-ITS environment and the services it provides, with the purpose of identifying the attack surface where security incidents could occur in a smart city environment. Subsequently, based on the identified attack surface, the document aims to construct attack scenarios and their respective stages. The document provides a description of the concept of C-ITS, followed by the description of the C-ITS environment model, service model, and attack scenario model defined by us.Comment: in Korean Language, 14 Figures, 15 Page
    • โ€ฆ
    corecore