The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the most important step of a stereo vision system, stereo matching, which finds the correspondences in stereo image pairs, requires high-quality real-time depth computation. In this paper, a high accuracy and high throughput full-pipeline hardware architecture with disparity and row parallelism is proposed. In the semi-global aggregation stage, to improve the accuracy in discontinuous regions,...
This paper presents a research of applying software-based SDN network virtualization technology across data centers in a large enterprise. The development history of SDN was briefly reviewed at the beginning, followed by introductions to two SDN network virtualization solutions based on overlay network. An implement method in an enterprise is elaborated based on SDN solutions. This method is proved...
Age estimation from facial images is an important problem in computer vision and pattern recognition. Typically the goal is to predict the chronological age of a person given his or her face picture. It is seldom to study a related problem, that is, how old does a person look like from?the face photo? It is called apparent age estimation. A key difference between apparent age estimation and the traditional...
To build a simple picture of M2M communication under service-oriented M2M architecture, a key innovation underlines the enablement of M2M device abstraction and semantics support. However, state of the art structures of M2M devices/software lack common M2M Service Layer for interoperability. Devices/software rely heavily on specific API implementation-oriented data services and the data definition...
We present a novel optimized 3DDDA ray tracing algorithm on GPUs with CUDA architecture. The grid data is built on the host and then copied to the device. The whole traversing procedure is done on the GPU device. So it just needs the data transformation between the host and the device once. The results show that the CUDA implementation parallel code using different block size on GPU achieves 2.9x...
In this paper, we propose a novel implementation scheme of Discrete Cosine Transform (DCT) with ultra high area-efficiency based on signed stochastic computation. Due to the properties of stochastic computation, a new number system, complicated DCT circuits can be realized with very simple logic. According to our analysis, addition operation is the performance and hardware cost bottleneck for stochastic...
NAND flash offers a range of compelling benefits that will keep attracting mobile and enterprise application developers as engineers tackle the hard problems of scaling the technology to sub-20 nm.
In the field of intelligent visual surveillance, the topic of tolerating background motions while detecting foreground motions in dynamic scene is widely explored by the recent foreground detection literatures. Applying the sophisticated background modeling method is a common solution for such dynamic background problem. However, the sophisticated background modeling method is computation intensive...
Since the first 3b/cell (X3) NAND flash memory paper in ISSCC 2008 [1], market demand for applications using high-density low-cost flash memory such as tablets, smart phones, and SSDs, has increased rapidly. Various electronic devices already use X3 NAND. The use of all BL (ABL) architecture, advanced circuitry, and enhanced algorithms enables this work to achieve 18MB/s performance, allowing penetration...
In order to save network bandwidth and system resource and improve video browse efficiency in client, a web video service based flash video technique is proposed. Firstly, the flash video data model is analyzed and a web video service architecture based on flash video is presented. Secondly, a flash video data processing flowchart with different kinds of video resource is designed for the video release...
Matrix multiplication is one of the most common numerical operations in the field of scientific computing, which is the kernel routine of Level 3 BLAS. The STI CELL processor is a heterogeneous multiprocessor with a unique design to achieve high peak floating point performance. As matrix multiplication operation is essential for a wide range of numerical algorithms, so performance improvements to...
Supply Chain Monitoring (SCMo) systems are able to capture, monitor and provide correct real-time state information about physical activities in supply chain processes for Event Management, which improves efficiency and effectiveness of Supply Chain Management (SCM). Unfortunately, due to various logistic application scenarios, SCMo systems are complex and expensive to build. This paper proposes a...
What we are proposing in this paper is the object, architecture, design and implementation of a Web-based simulation meta-synthesis, named WebSMS. The motivation of the WebSMS system is to provide services for distributed and secure sharing and reuse of resource, distributed collaboration, and distributed execution and observation of simulation. In this paper, the foundational idea of meta-synthetic...
In the distributed environment, one important security issue is how to apply further security control to the object that is released to other terminals. The appearance of trusted computing technology has provided an effective solution for this issue in the distributed environment. At the same time, through combining trusted computing technology with the strong isolation and sharing characteristic...
This paper presents the autonomous control for UAV. The autonomous control concept and autonomous control level (ACL) metrics that can measure autonomy of UAVs are introduced. Compared with manned aircraft control task in battlefield, the functions of autonomous UAV system are organized. According to the laws of increasing precision with decreasing intelligent (IPDI), the architecture of autonomous...
The Fast Fourier Transform (FFT) has been considered one of the most important computing algorithms for decades. Its vast application domain makes it an important performance benchmark for new computer architectures. The most common Cooley-Tukey FFT algorithm factorizes a large FFT into a combination of smaller ones. The choice of factors and the order in which they are applied are critical to the...
This paper proposes a multi-agent framework for intelligence decision support system that targets improved decision making, parallels human problem solving processes, and supports the major phases of decision making. Agents are organized by their roles according to different phases of problem solving. They interact with the user, the environment, and each other, to improve the decision making process...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.