The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Stochastic computing is a low cost, noise tolerant computing technique based on streams of random bits. Given the non-deterministic nature of the architecture, we apply information theoretic techniques to the analysis and design of stochastic circuits. The fundamental circuit elements, adders and multipliers, are characterized in terms of mutual information between the desired quantity and the stochastic...
This paper demonstrates a high performance brain-computer interface (BCI) that allows users to dial phone numbers. The system is based on Canonical Correlation Analysis (CCA) and the automatic artifacts removal system based on BSS-CCA method and Steady-State Visual Evoked Potential (SSVEP). Through six frequency bands (9Hz, 10Hz, 11Hz, 12Hz, 13 Hz, 14Hz) displayed on the screen, subjects can choose...
In this paper, we suggest a novel multi-GPU scheme that can provide flexible interconnections between multi-GPUs and displays with no additional hardware by implementing new software features, while avoiding system overhead. Our proposed scheme offers the complete concept of windowing system and GPU driver for single-node multi-GPU system on multiple display environments.
Wireless sensor network (WSN) is commonly used for localization analysis. Through sniffing receive signal strength indication (RSSI) in WSN system, localization of higher RSSI is connected automatically. This paper proposes the Raspberry-Pi (RasPi) based sensor node to sniffing RSSI and automatically connect the device to strongest RSSI. The RasPi brings the advantages of a personal computer (PC)...
Provides an abstract for each of the presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
Cloud computing is Internet-based network, share computing resources through virtualization mode and provide dynamic computing storage or other services according to the user needs. The paper puts forward a new Intelligent health perception system based on cloud computing. The system will achieve scalable IntelliSense terminals and systems, and play an important role to prompt the technology of cloud...
In this paper, we present a complexity study of the Gamma correction method for automatic text extraction from complex images. This study is based on the build of a simple and adequate algorithm for future hardware solution. Then, a profiling study for each function of the proposed solution was done. After validation, using C/C++ environment, a comparison with the OpenCV based algorithm developed...
The computation of the Log-Likelihood Ratio (LLR) at the channel output may impose great demand of memory and hardware area, especially for high-order modulations. This paper introduces a new approach for the approximation of the LLR in AWGN channels based on the splitting of the original constellation into smaller sectors. Each new sector has a less complex configuration in which it is possible to...
The positioning technology is one of the most important technologies in the wireless sensor network. The paper describes the current international positioning on several existing technologies, including the based ranging RSSI, TOA, TDOA, etc. and non-centroid algorithm based on distance, Amorphous algorithm, APIT algorithm and so on. Dv_Hop algorithm is a distributed localization algorithm based on...
Wireless Sensor Networks(WSNs) consists of hundreds of nodes which are of low power, low cost, and tiny devices. The main functionality of these nodes is to sense the environment and send the sensed data to the observer. In order to validate and get the significance of sensing data, location information of the sensor node needs to be combined with the sensed data. In addition to this, there are many...
Code reuse attack (CRA) is a powerful exploitation technique that allows attackers to perform arbitrary computation. To maximize the performance, prior hardware solutions to CRAs require invasive modifications to the CPU architecture or substantial storage overhead to keep the binary analysis result. In this paper, we propose a new debug interface with which CRA solutions can be easily implemented...
The Network Functions Virtualization (NFV) paradigm is the most promising technique to help network providers in the reduction of capital and energy costs. The deployment of virtual network functions (VNFs) running on generic x86 hardware allows higher flexibility than the classical middleboxes approach. NFV also reduces the complexity in the deployment of network services through the concept of service...
Virtual Network Functions (VNFs) promise great efficiencies in deploying and operating new services, in terms of performance, resiliency and cost. However, today most operational VNF clouds are still generally static after their initial instantiation, thus not realizing many of the potential benefits of virtualization and enhanced orchestration. In this paper, we explore a large-scale operational...
The growing concern in tracking, identification and localization systems has turn Radio Frequency Identification (RFID) technology into a mainstream in scientific research. In this technology, the phenomena known as the tag collision problem is becoming increasingly important, since it leads to a wastage of bandwidth, energy, and an increase in identification delay. There- fore, anti-collision protocols...
If the computing industry wants to continue to make scalability the primary source of value in tomorrow's computing systems, we will have to quickly find new and productive ways to scale the serial portions of important applications. In this talk, I will highlight my work and the work of others to do just this through the application of heterogeneous parallel designs. Of course, we will want to address...
In this paper an 8 bits word-length digital architecture that implements a piecewise-linear approximation for the hyperbolic tangent function is presented. Among the main characteristics of this architecture, it can be highlighted its low memory consumption (only two data breakpoints are considered for function approximation), and its hardware portability because it can be implemented in a wide variety...
Outcome based education (OBE) is the modern teaching buzzword which is widely accepted and practiced in most of the educational institutes across the world. For engineering courses where understanding of technical concept with practical understanding is highly relevant, the modern tool usage as project based learning during the delivery of course is required. This paper presents an innovative approach...
For implementation of a fast arithmetic algorithm and efficient hardware realization, signed digit representation is crucial. Redundant binary (RB) and 2's complement number representation is the most widely used technique for representation signed digit number. The drawbacks of RB technique include multi valued logic as well as need of unconventional hardware blocks. Though 2's complement notation...
The IEEE P2302 Intercloud WG conducts work since 2011 on the project Standard for Intercloud Interoperability and Federation with the goal to define a standard architecture and building components for large-scale interoperability of independent cloud providers. While the standardization process has achieved fine-grained definitions of several Intercloud components, a deployment of the Intercloud to...
One of the most challenging problems in computer vision is the ability of understanding video sequences to automatically detect and recognize moving objects. This work presents the development and the inexpensive implementation of an efficient algorithm based on the background subtraction technique adequate for low-cost embedded video surveillance systems. The proposed algorithm exploits the combination...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.