The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This system is an underwater integrated navigation system based on Attitude Heading Reference System (AHRS)/Global Positioning System (GPS)/ Doppler Velocity Log (DVL). It is built on STM32F103 equipped with the uCOS-II system, which has perfect real-time character, low cost and high-performance. The present hardware includes singer board computer, AHRS, DVL, depth gauge, and GPS receiver. Kalman...
Conventional measurement methods were based on microscope, which was time-consuming and complex operation. In this paper, the aim of this work was to preliminary study the feasibility of the rapid and precision determination of Dinophysis concentration at the wavelength of 495–1030 nm. The transmittance spectra of algae liquid were obtained by hyperspectral transmittance image system. The region of...
This paper proposes a novel buffering algorithm for write buffer, comprised of DRAM and NVM, in NAND flash storages of the home cloud server is proposed. As adopting dirty first migration and clean page caching technique, the algorithm may improve performances and lifetime of storage system of the home cloud server. The experimental results show that the algorithm improved buffer hit ratio by up to...
Advanced Encryption Standard (AES) plays an important role in modern cryptographic applications. High performance implementation of AES are required for many application scenarios. Parallelization techniques are popular in recent years to improve the performance. In this paper we propose two parallel AES schemes, one is full software implementation and another is software implementation with hardware...
This paper describes an energy efficient architecture for the lifting-based two-dimensional discrete wavelet transform with Z-scanning method, applying to data compression of bio-potential signals. The architecture makes full use of the data relevance between row- and column-wise coefficients to perform the two wises' transforms simultaneously in one single processor with nearly full hardware utilization...
This paper introduces a new SoC platform mainly integrated with AXI bus, OR1200, ROM, SRAM, 1Mb RRAM, UART and an 80,000-gate FPGA. OR1200 is the only master, and the others are slaves. The SoC boots from ROM, and then program to be run is sent to SRAM from PC by UART, and run by the processor OR1200. The custom RRAM, known as a potential ram, can store encryption/decryption algorithms and keys. The...
Utility pattern mining has received extensive attentions in recent years due to the wide and novel applications in various fields like e-commerce, Web mining, finance, biomedicine, etc. However, there exists not yet a toolbox for utility pattern mining so far. In this work, we address this issue by proposing a first-of-its-kind toolbox named UP-Miner (Utility Pattern Miner) that provides various functions...
Blind source separation (BSS) technique, such as Independent Component Analysis (ICA), is widely used for the removal of motion artifact. Motion artifact is the toughest interference during the monitoring of the ambulatory Electrocardiogram (ECG). To address this issue, in this paper, ICA is used for the removal of motion artifact from ECG. Both the ECG signal and the motion artifact are obtained...
A low-cost SoC implementation of AES algorithm for bio-signals is proposed in this paper. In order to reduce signal delay, we propose three kinds of structure, namely the classic architecture, the architecture including a DMA and the architecture with the wavelet transform module and AES module integrated. As a result, the architecture with modules integrated can obtain minimum data latency and minimum...
Finite field arithmetic is the base of cryptography algorithms like Elliptic Curves Cryptography (ECC) and RSA. In this paper, We have designed an arithmetic unit to implement the operation (A ± αB)mod N, where α is a small number compared with N. In our design, the coefficient α is smaller than 128. The basic motivation of designing this multiply-accumulate (MAC) unit is to support some high security...
Wireless Body Area Network (WBAN) has been widely applied to biomedical applications today, in which error-correcting code (ECC) is utilized to improve reliability. In WBAN, ECC overhead can be comparable to transmit power because of the extremely short transmission distance. Therefore, as the most power-hungry component, ECC decoder should be carefully designed. In this letter, we first present an...
This paper investigates the VLSI architectures for energy efficient low-density parity check (LDPC) decoders with low voltage strategies, which is the most recognized and fundamental way to reduce decoder power dissipations. By carefully optimizing the decoder parallelism under the assumption of a prescribed minimum data throughput, a selected CCSDS LDPC decoder is implemented on FPGA and experiments...
In this paper, we describe a grand vision of our project, which is to develop an autonomous water monitoring system by operating an unmanned aerial and surface vehicle collaboration team with the focus on large and long rivers. Key backgrounds and challenges in realizing this vision are briefly outlined, and we show a simple path planning for an unmanned surface vehicle for the effective water sampling...
Recently, cyber-targeted attacks such as APT are rapidly growing as a social and national security threat. For this, our paper aims to cope with the cyber-targeted attack for recognizing the abnormal network connections with the flow data analysis method prior to the attacks being executed. The proposed Abnormal Connection Detection System can detect anomalous network connections by means of a statistical...
This paper is focused on developing a gain-scheduled linear parameter varying (LPV) tracking controller for a flexible air-breathing hypersonic vehicle model. Using a method of gain-scheduled H2 controller synthesis for continuous-time LPV systems based on parameter-dependent Lyapunov function (PDLF) approach, a combination of LPV control and tracking control of hypersonic vehicle is adopted for the...
Collection of clinical information can be a fraught and intimidating process in hospital environments, especially for children with neurological conditions. Gaming and mobile technology offer many potential advantages for data collection where clinically important data can be collected as a side effect of playing games. Niemann-Pick Disease (NPD) is one example of a condition where gaming technology...
This paper discusses an efficient method for generating height-grid maps, which are widely utilized in developing mobile robots and autonomous vehicles. The proposed method consists of four steps. First, inverse perspective images (IPI) are obtained from wide-angle cameras equipped with a fish-eye lens. Second, dense motion stereo is performed using IPI. Next, depth information is calculated and mapped...
Multi-tenant service-based systems (SBSs) have become a major paradigm in software engineering in the cloud environment. Instead of serving a single end-user, a multitenant SBS provides multiple tenants with similar and yet customised functionalities with potentially different quality-of service (QoS) values. Thus, existing approaches to service selection for single-tenant SBSs are no longer suitable...
A service-based SaaS application can achieve economies of scale by sharing partner services between tenants at runtime, following the Single-Instance Multi-Tenancy (SIMT) model. However, supporting runtime sharing with tenant-specific functional and performance variations in an SIMT application is challenging. We propose an approach, Software-Defined Service Networking (SDSN), to addressing this challenge...
In this paper, we propose a burst-mode EDFA for 40-Gb/s TWDM-PON supporting 100-km reach with 50-dB loss budget. Backward laser injection using a low-cost Fabry-Perot laser suppresses the burst surge whilst achieving low noise figure.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.