Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
We present a built-in self-restructuring system for a mesh-connected processor array where faulty processing elements are compensated for by spare processing elements located on a diagonal. First, an algorithm for restructuring the array with faulty processing elements is presented. The reliability of the system is analyzed by simulation. It is compared with that of an array with spare processing...
In this paper we proposed the method of correcting codes formation based on Residue Number System. The proposed method provides the formation of RNS correcting codes of the input data which is represented in a positional notation.
The paper proposes a new approach for FPGA reconfiguration based on usage of the open-source synthesis and place-and-route tools. The well-known partial reconfiguration technologies assume pre-compilation of all required FPGA configurations by the designer. In autonomous intelligent control systems it can become quite a strong limitation, due to control law couldn't be changed on-board without using...
The understanding of application characteristics such as hardware resource requirements and communication patterns is key in building highly utilized high performance computing systems for target workloads at a reasonable cost and with available technology. The characterization drives the design decision of both hardware and software. Memory access pattern is a key factor as data movement is a major...
Cache hierarchies have long been utilized to minimize the latency of main memory accesses by caching frequently used data closer to the processor. Significant research has been done to identify the most crucial metrics of cache performance. Though the majority of research focuses on measuring cache hit rates and data movement as the major cache performance metrics, cache utilization can be equally...
The remote access of computers can be accomplished numerous ways. A common remote access method is secure shell (SSH). It is possible to use SSH to access graphical interfaces by using X11 forwarding. SSH, however, uses the computer that the user is accessing from, the client, as a means to process the graphical commands. This problem can be solved by using a program called VirtualGL. VirtualGL allows...
At present, the cost of High Performance Computing (HPC) system is very high and recently cloud has been popular for its operation on HPC. In this study, we investigated the price efficiency that will benefit the customer in choosing provider's package. We analyzed relation between prices, times and problem sizes (N) or workloads from High Performance Linpack on Amazon EC2 in Compute Optimize package...
In the real world, books and documents are the sources of knowledge. But this knowledge is only bounded to people with clear vision. Our society includes a group of people who does not have a clear vision or people who are blind. For this group, world is like a black illusion. The shape and structure's information of an object is unavailable to them let alone reading a document. For blind acquiring...
We grew up interacting with the physical objects around us. And there are large number of them that we use everyday. These objects are more fun to use than our computing devices. Taking about objects, another thing that get's attached with objects is gestures; how we manipulate these objects & how we use them in everyday life. These gesture are used to interact with objects as well as to interact...
Dynamic checking the integrity of software at run-time is always a hot and difficult spot for trusted computing. In this paper we present a lightweight approach, Control-flow checking using branch sequence signatures (CFCBS), to checking violation of control flow integrity at run-time. Our solution assigns a unique branch sequence signature, which enhances the capability of fault coverage, to each...
In this paper we explore the notion of a secure kiosk, a trusted computing platform built using off-the-shelf components. We demonstrate how kiosks serve as convenient primitives when designing secure computing protocols, as they allow for a very prescribed set of assumptions to be made about a system. We begin by defining the necessary properties of a kiosk, and then explain how each of these properties...
in today's scenarios world is struggling to develop new technologies for handicap people, so that they can also compete in the modern world. The Main existing solutions are prosthetic devices, voice recognition programs, screen readers, and hand gestures recognition, but developing new technologies faces various problems like time, cost and portability. This paper proposes a new perspective by enhancing...
Many recently proposed graph-processing frameworks utilize powerful computer clusters with dozens of cores to process massive graphs. Their usability and flexibility often come at a cost. We demonstrate that custom software written for “nanocomputers,” including a credit-card-sized Raspberry Pi, a low-cost ARM server, and an Intel Atom computer, can process the same graphs. Our implementations of...
A simple, rugged and accurate Flight Profile Simulator (FPS) for launch vehicle hardware and software real-time testing is proposed in this paper. The launch vehicle onboard system is a MIL-STD-1553B based configuration with Onboard Computer (OBC) as Bus Controller (BC) and Navigation, Sequencing and Control subsystems as Remote Terminals (RT). The simulator acts as another RT on the 1553B bus and...
The continuous dependency on technology has encouraged the integration of BeagleBone Black and C programming language in Universiti Tenaga Nasional in order to produce graduates that are active in the digital shift. The integration is introduced in the "Programming for Engineers" subject for first semester undergraduate students. However, the suitability of the syllabus as well as the integration...
Authentication is the first step to access a resource (service, website, data, etc.), so it is of vital importance in a system. The most widely used authentication mechanisms are one-factor authentication based on password and two-factor authentication methods which require a password and another factor (verification code, biometric feature, hardware token, software plug-in, etc.). However, in many...
Artificial neural network (ANN) is an important branch of artificial intelligence field. This paper reviews the classic models and implementation methods of ANN, and analyzes the key issues of implementation based on FPGA. Considering the demand of intelligent information processing in aviation field, this paper proposes an application assumption that combines traditional airborne computer systems...
Hardware in-the-loop simulation test has the advantage of live test, digital simulation test, which can build the lifelike test environment. This kind of test can carry through repeated test of multi-sample. The key technique of the hardware in-the-loop simulation test is real-time algorithmic and communication technology. In this paper, based on reflective memory network, the design for hardware...
As progress in technology is predicted to make quantum computers available in the next few decades, it is imperative to design public-key cryptosystems capable of resisting attacks that are perceived to be possible using these new platforms. Lattice-based cryptography is one of the most promising quantum-safe candidates being considered to replace current public-key systems. Thus, it has been extensively...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.