The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a faster and more efficient color image segmentation technique, which is called local window K_means (LWK_means), consisting of three modules: window presetting, local window clustering, windows merging. LWK_means divides the color image into many windows, and then parallelly processes each window using the proposed local window K_means clustering algorithm, which is adaptive...
A variation of the suspend-resume technique eliminates the need to initialize the Linux kernel, and when combined with approaches to enhance external memory read speed and shrink the suspend image, can decrease Android OS boot time by up to 90 percent.
Aiming at the shortcomings of current various eye tracking methods, which would result in tracking error, with improved cam shift algorithm, a rapid eye tracking method based on precise positioning iris is proposed. Firstly, the detector based on AdaBoost algorithm is used to position iris, and susan operator is used to eliminate the influence of eyeball-like factors. Secondly, with the template of...
Wi-Fi fingerprinting has been accepted as a common solution to indoor positioning. However, due to signal fluctuation and external interference, Wi-Fi fingerprinting suffers from aliasing, which may result in degradation of accuracy and being undistinguishable of different floors in a multi-floor environment. This paper proposes two algorithms trying to eliminate or minimize the problems and improve...
Distributed Real-time Embedded (DRE) systems are facing great challenges in networked, unpredictable and especially unsecured environments. In such systems, there is a strong need to enforce security on distributed computing nodes in order to guard against potential threats, while satisfying the real-time requirements. This paper proposes a Security-Aware Feedback Control Mechanism (SAFCM) which has...
Traditional mechanisms for risk control and task scheduling may not be very suitable for security-critical embedded real-time systems under dynamic peration environments. In this paper, we are interested in design of an adaptive risk control and management mechanism of the uniprocessor system for real-time embedded applications. With the purpose of obtaining adaptive capability to reduce system risks...
Since the real-time systems are becoming increasingly networked, there are some growing critical challenges of security management and risk control. For the unpredicted and especially unsecured environments, such security-critical distributed real-time embedded systems need to enforce security on multiple nodes in order to against the potential threats as well as satisfying the real-time requirements...
Security and energy are two main concerns for embedded systems, especially in battery-powered security-critical systems. In this paper, we make efforts to identify energy-related characteristics of common security algorithms for data-sensitive embedded real-time systems. Different to traditional researches, this paper focuses on the influences of size of protected data on energy-related factors. We...
H.264/AVC can achieve much higher compression efficiency, compared with previous video compression standards. However, the lower encoding efficiency is an influential factor for popularization of H.264. In this paper, an improved P_SKIP mode decision algorithm for H.264 encoder is proposed: As observers are less sensitive to boundary parts of video images, a certain degree of information loss for...
Energy and security are hot topics for real-time embedded systems. However, little traditional research consider the two factors together, which leaves a great challenge to guarantee the security of embedded applications running under battery-powered real-time embedded systems. In this paper, we investigate the characteristics of energy consumption for the most popular security algorithms. To precisely...
SIFT algorithm has strong robustness and stability, which can be applied in many bad conditions to achieve high recognition rate. The 128-dimensional feature descriptor has good independence. However, it also contains redundant information, which makes the calculation amount of following matching increase. An improved SIFT algorithm is proposed to solve the disadvantages of large computation and not...
Most studies on energy-efficient scheduling of real-time messages ignore buffer constraint, which is not practical in resource-constraint green wireless networks. In this paper, a novel model, Maze(A,D), is proposed to integrate both time-sensitive and buffer-constraint applications in one framework. The energy-efficient message scheduling is formulated as a shortest-curve problem based on the convex...
Security problem poses a great challenge for running mission-critical cyber-physical systems in wireless networks. With the disregard of security factors, existing message scheduling schemes expose critical messages to security threats, especially by confidentiality attacks. Incorporating confidentiality improvement into message scheduling, we investigate the problem of scheduling periodic messages...
The emergence of multi-core wireless sensor nodes brings a new opportunity to the popularity of wireless sensor networks. At the same time, there arises the question “How to effectively debug concurrent tasks on a multi-core wireless sensor node?” In this paper, based on the uClinux operating system, we design TMCD (Task-level Multi-Core Debugger), a remote task-level debugger to support embedded...
Recent advances in wireless sensor networks have led to many new routing protocols where energy awareness and reliability are the important consideration. The paper analyzes the cluster-based and gradient-based routing protocol in wireless sensor network. The advantages and limitations of protocols have been found. For improving the ability of protocol, an improved clustering routing protocol is proposed...
Cooperative coverage by multiple robots with contact sensors is studied in this paper. Multiple robots internal spiral coverage algorithm is presented to overcome the sensing limitation of the robot whose sense range is the radius of the body. The algorithm guarantees complete coverage by repeating covering portion of the environment and setting the GATE grids. The algorithm is also robust in that...
Safety-critical system (SCS) has highly demand for the dependability, which requires plenty of resource to ensure the system under test (SUT) satisfy the dependability requirement. Nowadays few of testing approach can efficiently cover the dependability of SUT. This paper proposes a new SCS testing method to improve SCS adaptive dependability testing, which integrates two strategies: the verification...
In this paper, we present an approach to map intellectual property (IP) cores onto tree based network-on-chip (NoC) architecture such that the total communication energy is minimized. We first formulate the problem of energy-aware mapping, and then propose a recursive bipartitioning algorithm to solve it. The proposed technique is an efficient divide-and-conquer approach, based on the Kernighan-Lin...
Videoconferencing not only needs intra-stream synchronization to ensure the reconstruction quality of the stream, but also has real time requirement to satisfy the natural interaction between participants. This paper analyzed the components of end-to-end delay in the videoconferencing over wireless campus network with the objective of understanding how to reduce the delay as much as possible. Then...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.