The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
These days' memory elements in digital systems have become more prone to soft errors or transient errors due to integration in circuits, smaller size of transistors and capacitors, combining with cosmic ray effects and many more reasons. Soft errors in memory elements have been a greater concern than soft errors in logic circuits since memories are used to hold the largest numbers and bits susceptible...
Electrocardiogram (ECG) is the record of electrical and muscular movement of the heart over a period of time which is useful for diagnosing many cardiac diseases. Due to the increase in mortality rate associated with cardiac diseases, automatic detection of these diseases is highly required. Hence, feature extraction and de-noising of ECG signals are highly useful in cardiology. This paper describes...
Soft error tolerance is a matter of concern for system reliability nowadays. The likelihood of soft errors increase with system complexity, reduction in operational voltages, exponential growth in transistors per chip, increases in clock frequencies and device shrinking. As the memory bit-cell area is condensed, single event upset that would have formerly despoiled only a single bit-cell are now proficient...
The likelihood of soft errors increase with system complexity, reduction in operational voltages, exponential growth in transistors per chip, increases in clock frequencies and device shrinking. As the memory bit-cell area is condensed, single event upset that would have formerly despoiled only a single bit-cell are now proficient of upsetting multiple contiguous memory bit-cells per particle strike...
As modern technology evolves, the use of face recognition system is scattering in different sectors of commercial markets rather than in security purposes only. Various approaches are introduced for face recognition system, among them principal component analysis is one of the simplest and efficient method. To improve the performance of face recognition, choosing a threshold value and minimum number...
This paper aims to provide a solution for the blind people to walk safely by detecting obstacle and generating corresponding alert signal according to the distance of the obstacle. The solution is provided by developing a walking assistant embedded in a spectacle glass with an obstacle detection module and an alarm generator. There is only one ultrasonic sensor in the obstacle detection module which...
This paper proposes a novel approach to detect and correct multi bit upsets using horizontal-vertical-diagonal-shift (HVDS) parity. Many of the errors occur when information is transmitted from one node to another node. Detection and correction of these errors is a must for many systems e.g. safety critical systems. Existing work on error detection and correction cover up to three bit errors (as far...
To keep pace with the advancement of technology, software products are overlooking the chances of soft errors in the program. Program analysis to check program execution flow is an effective way to detect soft errors. High level language computer program execution can be analyzed on the basis of the dependence of the variables used in the program. This paper illustrates a novel method to analyze variable...
Biometrics includes the study of automatic methods for distinguishing human beings based on physical or behavioral traits. Finding good biometric methods has been researched extensively in recent years. Among several biometric features, ear is quite stable because it does not vary with age and emotion. The ear recognition works based on the height of the ear, reference line cut point and corresponding...
In present world, Bangla is one of the most spoken languages. But, in the arena of electronic devices, tools for Bangla writing are inadequate. Also, there are limitations for typing Bangla faster in an efficient way because of the lack of proper layout. After forty-one years of the liberation war, an optimal and widely accepted Bangla keyboard layout has not yet been obtained. And in present days,...
To keep pace with today's nano-technology, safety critical embedded systems are becoming less tolerant to errors. Research into techniques to cope with errors in these systems has mostly focused on transformational approach, replication of hardware devices, parallel program design, component based design and/or information redundancy. It would be better to tackle the issue early in the design process...
Biometrics includes the study of automatic methods for distinguishing human beings based on physical or behavioural traits. Finding good biometric features and recognition methods has been researched extensively in recent years. Among several biometric features ear is quite stable because it does not vary with age and emotion. However, very few researches have been accomplished with this biometric...
Fingerprint analysis is typically based on the location and pattern of detected singular points in the images. These singular points (cores and deltas) not only represent the characteristics of local ridge patterns but also determine the topological structure (i.e., fingerprint type) and largely influence the orientation field. A core-delta relation is used as a global constraint for the final selection...
An important part in the design of real-time systems is the allocation and scheduling of the software tasks onto the hardware architecture. This faces the challenge of meeting deadlines, completion times, earliest start times and tolerating faults. Unfortunately, these processes are far from trivial due to the wide range of complex constraints that typically appear in real-time systems. The lack of...
Soft errors are significant concern for circuit reliability. Among various adopted techniques to mitigate soft errors effects on system functionality, Error Correcting Code (ECC) is one of the dominant approaches since it reduces cost overhead significantly. This paper deals with a new error correcting coding approach to tolerate soft errors at processor, data path, and memory devices of a computer...
Now a days, a significant web based crisis are causing internet users to be attracted to visit the fake websites and thus being mistreated into providing with their confidential information to some malicious systems run by some malevolent parties. This type of fraud technique is defined as phishing. The resulted damage is ranged from denial of e-mail access to plenty of monetary losses. It has harmful...
Fingerprint analysis is typically based on the position and pattern of detected singular points in the fingerprint images. These singular points (cores and deltas) represent the characteristics of local ridge patterns, determine the topological structure (i.e., fingerprint type) and largely influence the orientation field. A core-delta relation is used as a global constraint for the final selection...
Soft error is a significant reliability concern for nanometer technologies. Shrinking feature sizes, lower voltage levels, reduced noise margins, and increased clock frequency improves the performance and lowers the power consumption of integrated circuit. But it causes the integrated circuit more susceptible to soft error that can corrupt data and make systems vulnerable. In computer systems, where...
Enhancing lifetime of sensor nodes should be considered as the key design objective in Wireless Sensor Networks (WSN). A sensor node can only be equipped with a limited energy supply and it loses its energy during data communication. In some application scenarios, replenishment of energy resources might be impossible since the sensor nodes are distributed in remote environment. Hence, the nodes lose...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.