The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Performance is main key of all modern day applications and connotation of performance differs with the target platform and its intended application. Every component of software stack including the compiler tools needs to contribute towards achieving the better performance. The major hope and scope of further improvement through the highly matured and saturated domain of compiler optimization research...
The template matching is an important technique used in pattern recognition. It aims at finding a given pattern within a frame sequence. Pearson's Correlation Coefficient (PCC) is widely used to evaluate the similarity of two images. This coefficient is computed for each image pixel, which entails a computationally very expensive process. This paper proposes an implementation of the template matching...
Complex computing platforms involving pipelined processors, memory hierarchies, multi-core and many-core architectures are very common nowadays. These approaches require a deep understanding of the underlying hardware and the corresponding programing model to be able to decide which alternative is more suitable, i.e. obtain the best performance at the minimum cost, for a given application. Hence,...
Real-time embedded systems are present in various application domains such as automotive, aeronautical, space, and telecommunications. Avionics systems (i.e., aviation electronics) represent a specialized class for the aerospace branch. It is a fact that avionics are getting more and more complex considering functionality and design and also using an increased number of digital computer resources...
Embedded system design is subject to many constraints with strong influence on design objectives and architectures. Designers of embedded systems need to consider the desired functionality together with cost constraints, and also with other quality metrics. The paper presents a simplified model for early estimation of system quality based on metrics such as hardware costs and operation speed. The...
Modern embedded systems are typically implemented using both programmable processors and application specific hardware in order to meet real time design goals, besides other metrics, such as, performance, area and cost. The availability of programmable processors and application specific hardware enables an application architect to partition the execution of the given application code (specified in...
Cache parameters such as size and associativity are fixed at manufacturing time which are often not tuned for the specific characteristics of each application code. The net result is excessive energy consumption and lower performance. This paper explores the benefits of the use of a reconfigurable data cache in terms of capacity and associativity in a LEON-3 embedded system. We present real energy...
Non-volatile Memories (NVMs), have many promising characteristics, such as low leakage power, low cost, non-volatility, and high scalability, which are all attractive for embedded systems to employ them as the main memory. However, one of the constraints that undermine the credential of NVMs as main memory is its limited write endurance. To tackle this problem, this paper proposes five techniques:...
Nowadays, image and video processing applications are becoming widely used in many domains including industrials, medical imaging, manufacturing, and security systems. Real time image and video processing is a very demanding task as it needs to perform high computations for a big amount of data represented by the image, and the complex operations, which may need to be performed on the image. For these...
This paper presents HF-RISC, a 32-bit RISC processor, along with its associated programming toolchain. The instruction set architecture of the processor is based on MIPS I and its hardware organization comprises three pipeline stages. The processor was synthesized in four different technology nodes for maximum frequency and simulated using CoreMark, an industry-standard performance evaluation benchmark...
Embedded system design involves meeting strict design goals such as performance, area and power consumption. In-order to meet these design goals embedded systems are implemented in programmable processors and application-specific hardware. Hardware/Software partitioning is thus, a critical step in the realization of embedded systems. The initial software description of the application is profiled...
Hardware security in server, client, mobile and embedded systems is becoming increasingly critical, especially with the rapid growth of the Internetof- Everything (IoE). Security threats and vulnerabilities for all hardware components must be addressed. This forum brings together chip designers and system architects to discuss: (1) design, hardware and logistics attack challenges, as well as advanced...
Today on-chip monitoring solutions should be characterized by a reduced software and hardware overheads. So, this work deals with techniques to profile computational behavior and communication patterns of hardware/software components belonging to systems with multiple processing elements, i.e. a more general representation of on-chip embedded systems. In particular, the paper focuses on profiling...
Embedded systems have an increasing importance in our everyday lives. The growing complexity of embedded systems and the emerging trend to interconnections between them lead to new challenges. Intelligent solutions are necessary to overcome these challenges and to provide reliable and secure systems to the customer under a strict time and financial budget. WISES 2015 is a platform for presentation...
FPGA vendors now include hardened IPs to form a system-on-chip (SoC) making it easier to build embedded systems. However programming and integrating hardware accelerators (devices) into these systems present a challenge. The OpenCL standard has become accepted as a good programming model for managing devices, or hardware accelerators in the context of embedded systems on FPGAs, due to its rich set...
Arduino is an open source platform that offers a clear and simple environment for physical computing. It is now widely used in modern robotics and Internet of Things (IoT) applications, due in part to its low-cost, ease of programming, and rapid prototyping capabilities. Sensors and actuators can easily be connected to the analog and digital I/O pins of an Arduino device, which features an on-board...
Security flaws are open doors to attack embedded systems and must be carefully assessed in order to determine threats to safety and security. Subsequently securing a system, that is, integrating security mechanisms into the system's architecture can itself impact the system's safety, for instance deadlines could be missed due to an increase in computations and communications latencies. SysML-Sec addresses...
Platform-Based Design (PBD) is an appropriate method to make a trade-off among different requirements and constraints in embedded systems, such as power, performance and cost. This paper presents a hardware and software all programmable platform with a processor-programmable logic hardware architecture and a Real-Time Operating System (RTOS) centric software architecture. The corresponding RTOS-centric...
This work presents a technique for testing real-time embedded systems using Hardware-in-the-Loop (HIL) simulation, exploiting High-Level Architecture (HLA) standard for interoperability and synchronization of heterogeneous architectures. The proposed testing approach uses the Ptolemy framework to verify in real-time models running in hardware against their respective reference models developed in...
As a benefactor of the proliferation of large scale integration, traditionally simple and unintelligent devices such as cameras have been transformed into key components of rich and engaging smart environments. By integrating machine perception algorithms, these cognitive cameras have the ability to perceive and understand their environments. A principal barrier to realizing the potential of cognitive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.