The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Road Sign Detection (RSD) is becoming a major goal of the safety Advanced Driving Assistance Systems (ADAS). Automotive research area share many publications based various techniques used to detect and classify signs. This paper provides a hardware detection-based correlation architecture using Xilinx System Generator (XSG). This proposed architecture outsets with pre-processing step: RGB to YCrCb...
The software is an important part of the computer. With the widespread application of computer, software development is toward large-scale, standardization and wide generalization direction. In order to improve present situation and problems of software development, a novelty software design method is provided in this paper based on hierarchical technology, and its values and valid is analyzed and...
Network Functions Virtualization (NFV) enhances the flexibility of network service provisioning and reduces the time to services deployment. NFV and SDN promises transform the carrier networks, introducing innovation in the network core. NFV moves packet processing from dedicated hardware middleboxes to Virtualized Network Functions (VNFs), which run on virtual machines hosted on commercial off-the-shelf...
Smart Grids and Power Systems are becoming more computerized, intelligent and integrated with the cyber world very rapidly. Entering another realm, such as cyber space, poses new threats and issues for modern day power systems. In order to understand these threats, a cyber-power test bed was developed for testing cyber-attacks on an electric power grid system, along with its crucial components and...
RDF databases naturally map to a graph representation and employ languages, such as SPARQL, that implements queries as graph pattern matching routines. Graph methods exhibit an irregular behavior: they present unpredictable, fine-grained data accesses, and are synchronization intensive. Graph data structures expose large amounts of dynamic parallelism, but are difficult to partition without generating...
RFID (Radio Frequency Identification) is among the most emerging and tremendously growing technologies in the field of automatic identification. The technology is far better than its other contending systems such as Barcodes and magnetic tapes as it provides optimal communication link with non line of sight capability. Several researchers have proposed various ultralightweight RFID authentication...
This paper presents two simple, practical and scalable architectures which facilitate real-time sensor data streaming for cloud applications. Real-time sensor data is invaluable in applications where either the sensor or system state is time variant. Applications involving sensors typically push live data values to cloud based software applications that rely on live data feeds to aid real-time analytics,...
This paper presents a generic hardware design which allows the composition of application specific datapaths at runtime. The architectural template consists of a grid of identical tiles which are connected by a lightweight network-onchip. A processor core is used to configure pre-synthesized basic processing elements to arbitrary tiles at runtime. The sum of these personalized processing elements...
Many applications use encryption to protect data confidentiality, which require decryption before any data processing. Integrating ASIC design of encryption engines and general-purpose processor can yield the best overall performance in program execution as it benefits from low latency hardware engine and high processor memory bandwidth. However, ASIC design is fixed once manufactured, which cannot...
SCADA systems allow users to monitor and/or control physical devices, processes and events remotely. As these systems are critical to industrial processes, they are often run on highly reliable and dedicated hardware. Moving these SCADA systems to an Infrastructure as a Service (IaaS) cloud, allows for: cheaper deployments, system redundancy support, and increased uptime, however it is not clear to...
The sizes of databases are increasing every day. Hence, now days, accessing data in an acceptable time is one of the biggest challenges in centralized database. In centralized databases, the records can be categorized according to the access frequencies; least accessed records (cold data) and most accessed records (hot data). In a study it shows that more than 90% cases query are requested for hot...
In 2013, the Center of Excellence in Remote Sensing Education and Research (CERSER) added more satellite receiving hardware to its current National Oceanic and Atmospheric Administration (NOAA) satellite system [2]. The program now processes both NOAA satellite images as well as Geostationary Operational Environmental Satellite (GOES) [8] satellite images. This new imaging capability required the...
The recent growth of interest for in-memory databases poses the question on whether established prediction methods such as response surfaces and simulation are effective to describe the performance of these systems. In particular, the limited dependence of in-memory technologies on the disk makes methods such as simulation more appealing than in the past, since disks are difficult to simulate. To...
The scan PUF, which is based-on the power-up states of scan flip-flops, had been proposed to overcome security issues of semiconductor ICs. IC identification, one of those security issues, requires decent uniqueness along with reliability and randomness. This paper presents two efficient PUF elements' selection methods for scan PUF: uniqueunanimous selection method and unique-majority selection method...
Implementing database operations on parallel platforms has gain a lot of momentum in the past decade. A number of studies have shown the potential of using GPUs to speed up database operations. In this paper, we present empirical evaluations of a state-of-the-art work published in SIGMOD'08 on GPU-based join processing. In particular, this work presents four major join algorithms and a number of join-related...
Electrocardiogram (ECG) is one of the most safety-relevant biometrics due to its live indication and the unique specific waveform. This paper presents an approach for a security identification system and its System-on-Chip (SoC) implementation. The design of the proposed solution has been validated using both MATLAB and Vivado high-level synthesis tools. The achieved implementation results show that...
The Kingdom of Saudi Arabia, like many other Gulf Council Countries, is lately experiencing a very rapid population and industrial growth, which results in an increasing demand for energy. To meet this growing demand, the GCC too is transitioning towards a smarter electricity grid with increased penetration of renewable sources. However, all agree that the success of such a shift in paradigm also...
Big data revolution has created an unprecedented demand for intelligent data management solutions on a large scale. While data management has traditionally been used as a synonym for relational data processing, in recent years a new group popularly known as NoSQL databases have emerged as a competitive alternative. There is a pressing need to gain greater understanding of the characteristics of modern...
Internet of Things concept can be applied to all aspects of life, such as electricity, agriculture, transportation, energy and habitation. Most of the common monitoring systems in the Internet of Things (IoT) [1] suffer from lack of versatility as they apply only to a particular application area. Software design of the monitoring and management system for the IoT, as proposed in the paper, has high...
This paper details how LINC a coordination middleware, can fasten the development of prototypes that integrate several equipment. A case study of rapid prototyping is presented. It illustrates how a smart parking prototype has been built from several independent and autonomous equipment, coming from different vendors. This has been achieved by parallel development thanks to the resource based approach...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.