WorldWideScience

Sample records for cs310 embedded computer

  1. Embedded computer vision

    CERN Document Server

    Kisacanin, Branislav

    2008-01-01

    Brings together experiences from researchers in the field of embedded computer vision, from both academic and industrial research centers, and covers a broad range of challenges and trade-offs brought about by this paradigm shift. This title offers emphasis on tackling important problems for society, safety, security, health, and mobility.

  2. Computer algebra in spacetime embedding

    CERN Document Server

    Roque, Waldir L

    2014-01-01

    In this paper we describe an algorithm to determine the vectors normal to a space-time V4 embedded in a pseudo-Euclidean manifold M4+n. An application of this algorithm is given considering the Schwarzchild space-time geometry embedded in a 6 dimensional pseudo-Euclidean manifold, using the algebraic computing system REDUCE.

  3. Hybridity in Embedded Computing Systems

    Institute of Scientific and Technical Information of China (English)

    虞慧群; 孙永强

    1996-01-01

    An embedded system is a system that computer is used as a component in a larger device.In this paper,we study hybridity in embedded systems and present an interval based temporal logic to express and reason about hybrid properties of such kind of systems.

  4. Advances in embedded computer vision

    CERN Document Server

    Kisacanin, Branislav

    2014-01-01

    This illuminating collection offers a fresh look at the very latest advances in the field of embedded computer vision. Emerging areas covered by this comprehensive text/reference include the embedded realization of 3D vision technologies for a variety of applications, such as stereo cameras on mobile devices. Recent trends towards the development of small unmanned aerial vehicles (UAVs) with embedded image and video processing algorithms are also examined. The authoritative insights range from historical perspectives to future developments, reviewing embedded implementation, tools, technolog

  5. Cybersecurity of embedded computers systems

    OpenAIRE

    Carlioz, Jean

    2016-01-01

    International audience; Several articles have recently raised the issue of computer security of commercial flights by evoking the "connected aircraft, hackers target" or "Wi-Fi on planes, an open door for hackers ? " Or "Can you hack the computer of an Airbus or a Boeing ?". The feared scenario consists in a takeover of operational aircraft software that intentionally cause an accident. Moreover, several computer security experts have lately announced they had detected flaws in embedded syste...

  6. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  7. Embedding Moodle into Ubiquitous Computing Environments

    NARCIS (Netherlands)

    Glahn, Christian; Specht, Marcus

    2010-01-01

    Glahn, C., & Specht, M. (2010). Embedding Moodle into Ubiquitous Computing Environments. In M. Montebello, et al. (Eds.), 9th World Conference on Mobile and Contextual Learning (MLearn2010) (pp. 100-107). October, 19-22, 2010, Valletta, Malta.

  8. Computers as components principles of embedded computing system design

    CERN Document Server

    Wolf, Marilyn

    2012-01-01

    Computers as Components: Principles of Embedded Computing System Design, 3e, presents essential knowledge on embedded systems technology and techniques. Updated for today's embedded systems design methods, this edition features new examples including digital signal processing, multimedia, and cyber-physical systems. Author Marilyn Wolf covers the latest processors from Texas Instruments, ARM, and Microchip Technology plus software, operating systems, networks, consumer devices, and more. Like the previous editions, this textbook: Uses real processors to demonstrate both technology and tec

  9. Tools for Embedded Computing Systems Software

    Science.gov (United States)

    1978-01-01

    A workshop was held to assess the state of tools for embedded systems software and to determine directions for tool development. A synopsis of the talk and the key figures of each workshop presentation, together with chairmen summaries, are presented. The presentations covered four major areas: (1) tools and the software environment (development and testing); (2) tools and software requirements, design, and specification; (3) tools and language processors; and (4) tools and verification and validation (analysis and testing). The utility and contribution of existing tools and research results for the development and testing of embedded computing systems software are described and assessed.

  10. Embedded systems for supporting computer accessibility.

    Science.gov (United States)

    Mulfari, Davide; Celesti, Antonio; Fazio, Maria; Villari, Massimo; Puliafito, Antonio

    2015-01-01

    Nowadays, customized AT software solutions allow their users to interact with various kinds of computer systems. Such tools are generally available on personal devices (e.g., smartphones, laptops and so on) commonly used by a person with a disability. In this paper, we investigate a way of using the aforementioned AT equipments in order to access many different devices without assistive preferences. The solution takes advantage of open source hardware and its core component consists of an affordable Linux embedded system: it grabs data coming from the assistive software, which runs on the user's personal device, then, after processing, it generates native keyboard and mouse HID commands for the target computing device controlled by the end user. This process supports any operating system available on the target machine and it requires no specialized software installation; therefore the user with a disability can rely on a single assistive tool to control a wide range of computing platforms, including conventional computers and many kinds of mobile devices, which receive input commands through the USB HID protocol.

  11. Advanced Technologies, Embedded and Multimedia for Human-Centric Computing

    CERN Document Server

    Chao, Han-Chieh; Deng, Der-Jiunn; Park, James; HumanCom and EMC 2013

    2014-01-01

    The theme of HumanCom and EMC are focused on the various aspects of human-centric computing for advances in computer science and its applications, embedded and multimedia computing and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of human-centric computing. And the theme of EMC (Advanced in Embedded and Multimedia Computing) is focused on the various aspects of embedded system, smart grid, cloud and multimedia computing, and it provides an opportunity for academic, industry professionals to discuss the latest issues and progress in the area of embedded and multimedia computing. Therefore this book will be include the various theories and practical applications in human-centric computing and embedded and multimedia computing.

  12. Cluster Computing for Embedded/Real-Time Systems

    Science.gov (United States)

    Katz, D.; Kepner, J.

    1999-01-01

    Embedded and real-time systems, like other computing systems, seek to maximize computing power for a given price, and thus can significantly benefit from the advancing capabilities of cluster computing.

  13. PCI Embedded Computer Systems公司CPU板

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    PCI Embedded Computer Systems推出面向低功耗嵌入式系统的传导冷却XMC CPU板。AMD Geode LX 800处理器系列以基于x86的嵌入式处理器提供了所需的性能和功耗适应性,工作频率为500MHz时,最大功耗3.9W,典型功耗1.8W。Geode LX处理器提供了毫无折损地设计创新产品所需的低功耗x86性能。在AMD Geode CS5536伴随器件的配合下,

  14. Modern Embedded Computing Designing Connected, Pervasive, Media-Rich Systems

    CERN Document Server

    Barry, Peter

    2012-01-01

    Modern embedded systems are used for connected, media-rich, and highly integrated handheld devices such as mobile phones, digital cameras, and MP3 players. All of these embedded systems require networking, graphic user interfaces, and integration with PCs, as opposed to traditional embedded processors that can perform only limited functions for industrial applications. While most books focus on these controllers, Modern Embedded Computing provides a thorough understanding of the platform architecture of modern embedded computing systems that drive mobile devices. The book offers a comprehen

  15. Securing Embedded Smart Cameras with Trusted Computing

    Directory of Open Access Journals (Sweden)

    Winkler Thomas

    2011-01-01

    Full Text Available Camera systems are used in many applications including video surveillance for crime prevention and investigation, traffic monitoring on highways or building monitoring and automation. With the shift from analog towards digital systems, the capabilities of cameras are constantly increasing. Today's smart camera systems come with considerable computing power, large memory, and wired or wireless communication interfaces. With onboard image processing and analysis capabilities, cameras not only open new possibilities but also raise new challenges. Often overlooked are potential security issues of the camera system. The increasing amount of software running on the cameras turns them into attractive targets for attackers. Therefore, the protection of camera devices and delivered data is of critical importance. In this work we present an embedded camera prototype that uses Trusted Computing to provide security guarantees for streamed videos. With a hardware-based security solution, we ensure integrity, authenticity, and confidentiality of videos. Furthermore, we incorporate image timestamping, detection of platform reboots, and reporting of the system status. This work is not limited to theoretical considerations but also describes the implementation of a prototype system. Extensive evaluation results illustrate the practical feasibility of the approach.

  16. Sensor-embedded computers for better life-cycle management

    Science.gov (United States)

    Vadde, Srikanth; Kamarthi, Sagar V.; Gupta, Surendra M.; Zeid, Ibrahim

    2004-12-01

    This research investigates the advantages offered by embedded sensors for cost-effective and environmentally benign product life cycle management for desktop computers. During their use by customers as well as at the end of their lives, Sensor Embedded Computers (SECs) by virtue of sensors embedded in them generate data and information pertaining to the conditions and remaining lives of important components such as hard-drive, motherboard, and power supply unit. A computer monitoring framework is proposed to provide more customer comfort, reduce repair costs and increase the effectiveness of current disassembly practices. The framework consists of SECs, remote monitoring center (RMC), repair/service, disassembly, and disposal centers. The RMC collects dynamic data/information generated by sensors during computer usage as well as static data/information from the original equipment manufacturers (OEMs). The RMC forwards this data/information to the repair/service, disassembly, and disposal centers on need-basis. The knowledge about the condition and remaining life of computer components can be advantageously used for planning repair/service and disassembly operations as well as for building refurbished computers with known expected lives. Simulation model of the framework is built and is evaluated in terms of the following performance measures: average downtime of a computer, average repair/service cost of a computer, average disassembly cost of a computer, and average life cycle cost of a computer. Test results show that embedding sensors in computers provides a definite advantage over conventional computers in terms of the performance measures.

  17. A new embedded solution of hyperspectral data processing platform: the embedded GPU computer

    Science.gov (United States)

    Zhang, Lei; Gao, Jiao Bo; Hu, Yu; Sun, Ke Feng; Wang, Ying Hui; Cheng, Juan; Sun, Dan Dan; Li, Yu

    2016-10-01

    During the research of hyper-spectral imaging spectrometer, how to process the huge amount of image data is a difficult problem for all researchers. The amount of image data is about the order of magnitude of several hundred megabytes per second. Traditional solution of the embedded hyper-spectral data processing platform such as DSP and FPGA has its own drawback. With the development of GPU, parallel computing on GPU is increasingly applied in large-scale data processing. In this paper, we propose a new embedded solution of hyper-spectral data processing platform which is based on the embedded GPU computer. We also give a detailed discussion of how to acquire and process hyper-spectral data in embedded GPU computer. We use C++ AMP technology to control GPU and schedule the parallel computing. Experimental results show that the speed of hyper-spectral data processing on embedded GPU computer is apparently faster than ordinary computer. Our research has significant meaning for the engineering application of hyper-spectral imaging spectrometer.

  18. Efficient Model for Distributed Computing based on Smart Embedded Agent

    Directory of Open Access Journals (Sweden)

    Hassna Bensag

    2017-02-01

    Full Text Available Technological advances of embedded computing exposed humans to an increasing intrusion of computing in their day-to-day life (e.g. smart devices. Cooperation, autonomy, and mobility made the agent a promising mechanism for embedded devices. The work aims to present a new model of an embedded agent designed to be implemented in smart devices in order to achieve parallel tasks in a distribute environment. To validate the proposed model, a case study was developed for medical image segmentation using Cardiac Magnetic Resonance Image (MRI. In the first part of this paper, we focus on implementing the parallel algorithm of classification using C-means method in embedded systems. We propose then a new concept of distributed classification using multi-agent systems based on JADE and Raspberry PI 2 devices.

  19. Magnetic Random Access Memory for Embedded Computing

    Science.gov (United States)

    2007-10-29

    Nicholas D. Rizzo, John Salter , Mark Durlam, Renu W. Dave, Jason Janesky, Brian Butcher, Ken Smith, 153 and Greg Grynkewich. Magnetoresistive random access...single magnetoresistive element. Nature, 425:485–487, October 2, 2003. [184] A. Ney and J. S. Harris , Jr. Reconfigurable magnetologic computing using the

  20. Computers as Components Principles of Embedded Computing System Design

    CERN Document Server

    Wolf, Wayne

    2008-01-01

    This book was the first to bring essential knowledge on embedded systems technology and techniques under a single cover. This second edition has been updated to the state-of-the-art by reworking and expanding performance analysis with more examples and exercises, and coverage of electronic systems now focuses on the latest applications. Researchers, students, and savvy professionals schooled in hardware or software design, will value Wayne Wolf's integrated engineering design approach.The second edition gives a more comprehensive view of multiprocessors including VLIW and superscalar archite

  1. Towards Resilient Computing on ROS for Embedded Applications

    OpenAIRE

    Fabre, Jean-Charles; Lauer, Michaël; Roy, Matthieu; Amy, Matthieu; Excoffon, William; Stoicescu, Miruna

    2016-01-01

    International audience; Systems are expected to evolve during their service life in order to cope with changes of various natures, ranging from fluctuations in available resources to additional features requested by users. For dependable embedded systems, the challenge is even greater, as evolution must not impair dependability attributes. Resilient computing implies maintaining dependability properties when facing changes. Resilience encompasses several aspects, among which evolvability, i.e...

  2. Disclosive Computer Ethics: The Exposure and Evaluation of Embedded Normativity in Computer Technology

    NARCIS (Netherlands)

    Brey, Philip

    2000-01-01

    This essay provides a critique of mainstream computer ethics and argues for the importance of a complementary approach called disclosive computer ethics, which is concerned with the moral deciphering of embedded values and norms in computer systems, applications and practices. Also, four key values

  3. Embedded Volttron specification - benchmarking small footprint compute device for Volttron

    Energy Technology Data Exchange (ETDEWEB)

    Sanyal, Jibonananda [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Fugate, David L. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Woodworth, Ken [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Nutaro, James J. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Kuruganti, Teja [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2015-08-17

    An embedded system is a small footprint computing unit that typically serves a specific purpose closely associated with measurements and control of hardware devices. These units are designed for reasonable durability and operations in a wide range of operating conditions. Some embedded systems support real-time operations and can demonstrate high levels of reliability. Many have failsafe mechanisms built to handle graceful shutdown of the device in exception conditions. The available memory, processing power, and network connectivity of these devices are limited due to the nature of their specific-purpose design and intended application. Industry practice is to carefully design the software for the available hardware capability to suit desired deployment needs. Volttron is an open source agent development and deployment platform designed to enable researchers to interact with devices and appliances without having to write drivers themselves. Hosting Volttron on small footprint embeddable devices enables its demonstration for embedded use. This report details the steps required and the experience in setting up and running Volttron applications on three small footprint devices: the Intel Next Unit of Computing (NUC), the Raspberry Pi 2, and the BeagleBone Black. In addition, the report also details preliminary investigation of the execution performance of Volttron on these devices.

  4. A Prototype Embedded Microprocessor Interconnect for Distributed and Parallel Computing

    Directory of Open Access Journals (Sweden)

    Bryan Hughes

    2008-08-01

    Full Text Available Parallel computing is currently undergoing a transition from a niche use to widespread acceptance due to new, computationally intensive applications and multi-core processors. While parallel processing is an invaluable tool for increasing performance, more time and expertise are required to develop a parallel system than are required for sequential systems. This paper discusses a toolkit currently in development that will simplify both the hardware and software development of embedded distributed and parallel systems. The hardware interconnection mechanism uses the Serial Peripheral Interface as a physical medium and provides routing and management services for the system. The topics in this paper are primarily limited to the interconnection aspect of the toolkit.

  5. Embedding

    DEFF Research Database (Denmark)

    Høyrup, Jens

    2016-01-01

    “Embedding” as a technical concept comes from linguistics, more precisely from grammar. The present paper investigates whether it can be applied fruitfully to certain questions that have been investigated by historians (and sometimes philosophers) of mathematics: 1. The construction of numeral sy...... spatial and linguistic embedding and concludes that the spatio-linguistic notion of embedding can be meaningfully applied to the former two discussions, whereas the apparent embedding of older within new theories is rather an ideological mirage....

  6. Computer Game Play as an Imaginary Stage for Reading: Implicit Spatial Effects of Computer Games Embedded in Hard Copy Books

    Science.gov (United States)

    Smith, Glenn Gordon

    2012-01-01

    This study compared books with embedded computer games (via pentop computers with microdot paper and audio feedback) with regular books with maps, in terms of fifth graders' comprehension and retention of spatial details from stories. One group read a story in hard copy with embedded computer games, the other group read it in regular book format…

  7. Computer Game Play as an Imaginary Stage for Reading: Implicit Spatial Effects of Computer Games Embedded in Hard Copy Books

    Science.gov (United States)

    Smith, Glenn Gordon

    2012-01-01

    This study compared books with embedded computer games (via pentop computers with microdot paper and audio feedback) with regular books with maps, in terms of fifth graders' comprehension and retention of spatial details from stories. One group read a story in hard copy with embedded computer games, the other group read it in regular book format…

  8. Embedding

    DEFF Research Database (Denmark)

    Høyrup, Jens

    2015-01-01

    to become the starting point not only for theoretical algebra, but for the whole transformation of mathematics from his time onward: the possibility of embedding, that is, of making a symbol or an element of a calculation stand not only for a single number, determined or undetermined, but for a whole...

  9. Integrating Embedded Computing Systems into High School and Early Undergraduate Education

    Science.gov (United States)

    Benson, B.; Arfaee, A.; Choon Kim; Kastner, R.; Gupta, R. K.

    2011-01-01

    Early exposure to embedded computing systems is crucial for students to be prepared for the embedded computing demands of today's world. However, exposure to systems knowledge often comes too late in the curriculum to stimulate students' interests and to provide a meaningful difference in how they direct their choice of electives for future…

  10. A Middleware Platform for Providing Mobile and Embedded Computing Instruction to Software Engineering Students

    Science.gov (United States)

    Mattmann, C. A.; Medvidovic, N.; Malek, S.; Edwards, G.; Banerjee, S.

    2012-01-01

    As embedded software systems have grown in number, complexity, and importance in the modern world, a corresponding need to teach computer science students how to effectively engineer such systems has arisen. Embedded software systems, such as those that control cell phones, aircraft, and medical equipment, are subject to requirements and…

  11. Task scheduling for high performance low power embedded computing

    Science.gov (United States)

    Deniziak, Stanislaw; Dzitkowski, Albert

    2016-12-01

    In this paper we present a method of task scheduling for low-power real-time embedded systems. We assume that the system is specified as a task graph, then it is implemented using multi-core embedded processor with low-power processing capabilities. We propose a new scheduling method to create the optimal schedule. The goal of optimization is to minimize the power consumption while all time constraints will be satisfied. We present experimental results, obtained for some standard benchmarks, showing advantages of our method.

  12. Energy-driven computing for energy-harvesting embedded systems

    OpenAIRE

    Merrett, Geoff V.

    2016-01-01

    There has been increasing interest over the last decade in the powering of embedded systems from ‘harvested’ energy, and this has been further fuelled by the promise and vision of IoT. Energy harvesting systems present numerous challenges, although some of these are also posed by their battery-powered counterparts: e.g. ultra-low power consumption. However, a significant challenge not witnessed in battery-powered systems is a requirement to manage the combination of a highly unpredictable and...

  13. Motivating Constraints of a Pedagogy-Embedded Computer Algebra System

    Science.gov (United States)

    Dana-Picard, Thierry

    2007-01-01

    The constraints of a computer algebra system (CAS) generally induce limitations on its usage. Via the pedagogical features implemented in such a system, "motivating constraints" can appear, encouraging advanced theoretical learning, providing a broader mathematical knowledge and more profound mathematical understanding. We discuss this issue,…

  14. User interfaces for computational science: a domain specific language for OOMMF embedded in Python

    CERN Document Server

    Beg, Marijan; Fangohr, Hans

    2016-01-01

    Computer simulations are used widely across the engineering and science disciplines, including in the research and development of magnetic devices using computational micromagnetics. In this work, we identify and review different approaches to configuring simulation runs: (i) the re-compilation of source code, (ii) the use of configuration files, (iii) the graphical user interface, and (iv) embedding the simulation specification in an existing programming language to express the computational problem. We identify the advantages and disadvantages of different approaches and discuss their implications on effectiveness and reproducibility of computational studies and results. Following on from this, we design and describe a domain specific language for micromagnetics that is embedded in the Python language, and allows users to define the micromagnetic simulations they want to carry out in a flexible way. We have implemented this micromagnetic simulation description language together with a computational backend ...

  15. Integral Images: Efficient Algorithms for Their Computation and Storage in Resource-Constrained Embedded Vision Systems

    Directory of Open Access Journals (Sweden)

    Shoaib Ehsan

    2015-07-01

    Full Text Available The integral image, an intermediate image representation, has found extensive use in multi-scale local feature detection algorithms, such as Speeded-Up Robust Features (SURF, allowing fast computation of rectangular features at constant speed, independent of filter size. For resource-constrained real-time embedded vision systems, computation and storage of integral image presents several design challenges due to strict timing and hardware limitations. Although calculation of the integral image only consists of simple addition operations, the total number of operations is large owing to the generally large size of image data. Recursive equations allow substantial decrease in the number of operations but require calculation in a serial fashion. This paper presents two new hardware algorithms that are based on the decomposition of these recursive equations, allowing calculation of up to four integral image values in a row-parallel way without significantly increasing the number of operations. An efficient design strategy is also proposed for a parallel integral image computation unit to reduce the size of the required internal memory (nearly 35% for common HD video. Addressing the storage problem of integral image in embedded vision systems, the paper presents two algorithms which allow substantial decrease (at least 44.44% in the memory requirements. Finally, the paper provides a case study that highlights the utility of the proposed architectures in embedded vision systems.

  16. 7th International Conference on Embedded and Multimedia Computing (EMC-12)

    CERN Document Server

    Jeong, Young-Sik; Park, Sang; Chen, Hsing-Chung; Embedded and Multimedia Computing Technology and Service

    2012-01-01

    The 7th International Conference on Embedded and Multimedia Computing (EMC-12), will be held in Gwangju, Korea on September 6 - 8, 2012. EMC-12 will be the most comprehensive conference focused on the various aspects of advances in Embedded and Multimedia (EM) Computing. EMC-12 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of EM. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in EM. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. The EMC-12 is the next event, in a series of highly successful International Conference on Embedded and Multimedia Computing, previously held as EMC 2011 (China, Aug. 2011), EMC 2010 (Philippines, Aug. 2010), EM-Com 2009 (Korea, Dec. 2009), UMC-08 (Australia, Oct. 2008), ESO-08(China, Dec. 2008), UMS-08 ...

  17. A Computationally Efficient and Adaptive Approach for Online Embedded Machinery Diagnosis in Harsh Environments

    Directory of Open Access Journals (Sweden)

    Chuan Jiang

    2013-01-01

    Full Text Available Condition-based monitoring (CBM has advanced to the stage where industry is now demanding machinery that possesses self-diagnosis ability. This need has spurred the CBM research to be applicable in more expanded areas over the past decades. There are two critical issues in implementing CBM in harsh environments using embedded systems: computational efficiency and adaptability. In this paper, a computationally efficient and adaptive approach including simple principal component analysis (SPCA for feature dimensionality reduction and K-means clustering for classification is proposed for online embedded machinery diagnosis. Compared with the standard principal component analysis (PCA and kernel principal component analysis (KPCA, SPCA is adaptive in nature and has lower algorithm complexity when dealing with a large amount of data. The effectiveness of the proposed approach is firstly validated using a standard rolling element bearing test dataset on a personal computer. It is then deployed on an embedded real-time controller and used to monitor a rotating shaft. It was found that the proposed approach scaled well, whereas the standard PCA-based approach broke down when data quantity increased to a certain level. Furthermore, the proposed approach achieved 90% accuracy when diagnosing an induced fault compared to 59% accuracy obtained using the standard PCA-based approach.

  18. An AI Embedded Object-Oriented Approach for Formulating Computable General Equilibrium

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    This paper proposes and illustrates an AI embedded object-oriented methodology to formulate the computable general equilibrium (CGE) models.In this framework,a CGE model is viewed as a collection of objects embedded AI or namely agents in computer world,corresponding to economic agents and entities in real world,such as government,households,markets and so on.A frame representation of major objects in CGE model is used for trade and environment.Embedded AI object-oriented approach(or software agent)is used in the CGE model representation can able to narrow the gap among the semantic representation,formal CGE (mathematical) representation and computer and algorithm representation,and to improve CGE in understanding and maintenance etc.In such a system,constructing a CGE model to appear an intuitive process rather than an abstract process.This intuitive process needs more understanding of the substance of economics and the logic underlying the problem rather than mathematical notation.

  19. Integral Images: Efficient Algorithms for Their Computation and Storage in Resource-Constrained Embedded Vision Systems.

    Science.gov (United States)

    Ehsan, Shoaib; Clark, Adrian F; Naveed ur Rehman; McDonald-Maier, Klaus D

    2015-07-10

    The integral image, an intermediate image representation, has found extensive use in multi-scale local feature detection algorithms, such as Speeded-Up Robust Features (SURF), allowing fast computation of rectangular features at constant speed, independent of filter size. For resource-constrained real-time embedded vision systems, computation and storage of integral image presents several design challenges due to strict timing and hardware limitations. Although calculation of the integral image only consists of simple addition operations, the total number of operations is large owing to the generally large size of image data. Recursive equations allow substantial decrease in the number of operations but require calculation in a serial fashion. This paper presents two new hardware algorithms that are based on the decomposition of these recursive equations, allowing calculation of up to four integral image values in a row-parallel way without significantly increasing the number of operations. An efficient design strategy is also proposed for a parallel integral image computation unit to reduce the size of the required internal memory (nearly 35% for common HD video). Addressing the storage problem of integral image in embedded vision systems, the paper presents two algorithms which allow substantial decrease (at least 44.44%) in the memory requirements. Finally, the paper provides a case study that highlights the utility of the proposed architectures in embedded vision systems.

  20. Energy-aware memory management for embedded multimedia systems a computer-aided design approach

    CERN Document Server

    Balasa, Florin

    2011-01-01

    Energy-Aware Memory Management for Embedded Multimedia Systems: A Computer-Aided Design Approach presents recent computer-aided design (CAD) ideas that address memory management tasks, particularly the optimization of energy consumption in the memory subsystem. It explains how to efficiently implement CAD solutions, including theoretical methods and novel algorithms. The book covers various energy-aware design techniques, including data-dependence analysis techniques, memory size estimation methods, extensions of mapping approaches, and memory banking approaches. It shows how these techniques

  1. User interfaces for computational science: A domain specific language for OOMMF embedded in Python

    Science.gov (United States)

    Beg, Marijan; Pepper, Ryan A.; Fangohr, Hans

    2017-05-01

    Computer simulations are used widely across the engineering and science disciplines, including in the research and development of magnetic devices using computational micromagnetics. In this work, we identify and review different approaches to configuring simulation runs: (i) the re-compilation of source code, (ii) the use of configuration files, (iii) the graphical user interface, and (iv) embedding the simulation specification in an existing programming language to express the computational problem. We identify the advantages and disadvantages of different approaches and discuss their implications on effectiveness and reproducibility of computational studies and results. Following on from this, we design and describe a domain specific language for micromagnetics that is embedded in the Python language, and allows users to define the micromagnetic simulations they want to carry out in a flexible way. We have implemented this micromagnetic simulation description language together with a computational backend that executes the simulation task using the Object Oriented MicroMagnetic Framework (OOMMF). We illustrate the use of this Python interface for OOMMF by solving the micromagnetic standard problem 4. All the code is publicly available and is open source.

  2. Polarizable density embedding: a new QM/QM/MM-based computational strategy.

    Science.gov (United States)

    Olsen, Jógvan Magnus Haugaard; Steinmann, Casper; Ruud, Kenneth; Kongsted, Jacob

    2015-05-28

    We present a new QM/QM/MM-based model for calculating molecular properties and excited states of solute-solvent systems. We denote this new approach the polarizable density embedding (PDE) model, and it represents an extension of our previously developed polarizable embedding (PE) strategy. The PDE model is a focused computational approach in which a core region of the system studied is represented by a quantum-chemical method, whereas the environment is divided into two other regions: an inner and an outer region. Molecules belonging to the inner region are described by their exact densities, whereas molecules in the outer region are treated using a multipole expansion. In addition, all molecules in the environment are assigned distributed polarizabilities in order to account for induction effects. The joint effects of the inner and outer regions on the quantum-mechanical core part of the system is formulated using an embedding potential. The PDE model is illustrated for a set of dimers (interaction energy calculations) as well as for the calculation of electronic excitation energies, showing promising results.

  3. Hyperparallel optical quantum computation assisted by atomic ensembles embedded in double-sided optical cavities

    Science.gov (United States)

    Li, Tao; Long, Gui-Lu

    2016-08-01

    We propose an effective, scalable, hyperparallel photonic quantum computation scheme in which photonic qubits are hyperencoded both in the spatial degrees of freedom (DOF) and the polarization DOF of each photon. The deterministic hyper-controlled-not (hyper-cnot) gate on a two-photon system is attainable with our interesting interface between the polarized photon and the collective spin wave (magnon) of an atomic ensemble embedded in a double-sided optical cavity, and it doubles the operations in the conventional quantum cnot gate. Moreover, we present a compact hyper-cnotN gate on N +1 hyperencoded photons with only two auxiliary cavity-magnon systems, not more, and it can be faithfully constituted with current experimental techniques. Our proposal enables various applications with the hyperencoded photons in quantum computing and quantum networks.

  4. Embedded Processor Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Embedded Processor Laboratory provides the means to design, develop, fabricate, and test embedded computers for missile guidance electronics systems in support...

  5. Computing the Dilation of Edge-Augmented Graphs Embedded in Metric Spaces

    DEFF Research Database (Denmark)

    Wulff-Nilsen, Christian

    2008-01-01

    Let G = (V,E) be an undirected graph with n vertices embedded in a metric space. We consider the problem of adding a shortcut edge in G that minimizes the dilation of the resulting graph. The fastest algorithm to date for this problem has O(n^4) running time and uses O(n^2) space. We show how to ...... to improve running time to O(n^3*log n) while maintaining quadratic space requirement. In fact, our algorithm not only determines the best shortcut but computes the dilation of G U {(u,v)} for every pair of distinct vertices u and v.......Let G = (V,E) be an undirected graph with n vertices embedded in a metric space. We consider the problem of adding a shortcut edge in G that minimizes the dilation of the resulting graph. The fastest algorithm to date for this problem has O(n^4) running time and uses O(n^2) space. We show how...

  6. Soft-error tolerance and energy consumption evaluation of embedded computer with magnetic random access memory in practical systems using computer simulations

    Science.gov (United States)

    Nebashi, Ryusuke; Sakimura, Noboru; Sugibayashi, Tadahiko

    2017-08-01

    We evaluated the soft-error tolerance and energy consumption of an embedded computer with magnetic random access memory (MRAM) using two computer simulators. One is a central processing unit (CPU) simulator of a typical embedded computer system. We simulated the radiation-induced single-event-upset (SEU) probability in a spin-transfer-torque MRAM cell and also the failure rate of a typical embedded computer due to its main memory SEU error. The other is a delay tolerant network (DTN) system simulator. It simulates the power dissipation of wireless sensor network nodes of the system using a revised CPU simulator and a network simulator. We demonstrated that the SEU effect on the embedded computer with 1 Gbit MRAM-based working memory is less than 1 failure in time (FIT). We also demonstrated that the energy consumption of the DTN sensor node with MRAM-based working memory can be reduced to 1/11. These results indicate that MRAM-based working memory enhances the disaster tolerance of embedded computers.

  7. Building professionalism and employability skills: embedding employer engagement within first-year computing modules

    Science.gov (United States)

    Hanna, Philip; Allen, Angela; Kane, Russell; Anderson, Neil; McGowan, Aidan; Collins, Matthew; Hutchison, Malcolm

    2015-07-01

    This paper outlines a means of improving the employability skills of first-year university students through a closely integrated model of employer engagement within computer science modules. The outlined approach illustrates how employability skills, including communication, teamwork and time management skills, can be contextualised in a manner that directly relates to student learning but can still be linked forward into employment. The paper tests the premise that developing employability skills early within the curriculum will result in improved student engagement and learning within later modules. The paper concludes that embedding employer participation within first-year models can help relate a distant notion of employability into something of more immediate relevance in terms of how students can best approach learning. Further, by enhancing employability skills early within the curriculum, it becomes possible to improve academic attainment within later modules.

  8. Using embedded computer-assisted instruction to teach science to students with Autism Spectrum Disorders

    Science.gov (United States)

    Smith, Bethany

    The need for promoting scientific literacy for all students has been the focus of recent education reform resulting in the rise of the Science Technology, Engineering, and Mathematics movement. For students with Autism Spectrum Disorders and intellectual disability, this need for scientific literacy is further complicated by the need for individualized instruction that is often required to teach new skills, especially when those skills are academic in nature. In order to address this need for specialized instruction, as well as scientific literacy, this study investigated the effects of embedded computer-assisted instruction to teach science terms and application of those terms to three middle school students with autism and intellectual disability. This study was implemented within an inclusive science classroom setting. A multiple probe across participants research design was used to examine the effectiveness of the intervention. Results of this study showed a functional relationship between the number of correct responses made during probe sessions and introduction of the intervention. Additionally, all three participants maintained the acquired science terms and applications over time and generalized these skills across materials and settings. The findings of this study suggest several implications for practice within inclusive settings and provide suggestions for future research investigating the effectiveness of computer-assisted instruction to teach academic skills to students with Autism Spectrum Disorders and intellectual disability.

  9. Employing Inquiry-Based Computer Simulations and Embedded Scientist Videos to Teach Challenging Climate Change and Nature of Science Concepts

    Science.gov (United States)

    Cohen, Edward Charles

    2013-01-01

    Design based research was utilized to investigate how students use a greenhouse effect simulation in order to derive best learning practices. During this process, students recognized the authentic scientific process involving computer simulations. The simulation used is embedded within an inquiry-based technology-mediated science curriculum known…

  10. T and D-Bench--Innovative Combined Support for Education and Research in Computer Architecture and Embedded Systems

    Science.gov (United States)

    Soares, S. N.; Wagner, F. R.

    2011-01-01

    Teaching and Design Workbench (T&D-Bench) is a framework aimed at education and research in the areas of computer architecture and embedded systems. It includes a set of features not found in other educational environments. This set of features is the result of an original combination of design requirements for T&D-Bench: that the…

  11. EMBEDDED COMPUTER BASED ACTIVE VIBRATION CONTROL SYSTEM FOR VIBRATION REDUCTION OF FLEXIBLE STRUCTURES

    Directory of Open Access Journals (Sweden)

    Venkata Ratnam Tatavolu

    2013-01-01

    Full Text Available Research on Active Vibration Control System (AVCS is being carried out to reduce structural vibrations caused by unwanted vibrations in many application areas such as in space, aircraft structures, satellites, automobiles and civil structures (bridges, particularly at low frequencies. The unwanted vibration may cause damage to the structure or degradation to the structure’s performance. The AVCS comprises physical plant, a sensor to detect the source vibration, a DSP based electronic controller using an actuator connected to the structure generates a counter force that is appropriately out of phase but equal in amplitude to the source vibration. As a result two equal and opposite forces cancel each other by the principle of super position and structure stops vibrating. The main objective of this research work is to develop an embedded computer based real time AVCS for reducing low frequency tonal vibration response of a vibrating flexible cantilever beam by automatic modification of the vibrating beam’s structural response and to verify the performance of the developed system experimentally. The developed AVCS is a generic design platform that can be applied for designing adaptive feed forward AVC and feedback AVC. This study presents the vibration control methodology adapted for reducing tonal vibration generated by a sine generator connected to the primary source actuator attached to one end of the cantilever beam. The secondary actuator is attached to the beam on the other end through the AVCS to reduce primary vibration by destructive interference with the original response of the system, caused by the primary source of vibration. Adaptive feed forward Active Vibration Control (AVC technique is used with Filtered-X Least Mean Square (FxLMS algorithm using FIR digital filter. A cantilever beam was considered as plant and embedded computer based AVCS was tested and evaluated using an experimental setup. The experimental results are

  12. Efficient physical embedding of topologically complex information processing networks in brains and computer circuits.

    Directory of Open Access Journals (Sweden)

    Danielle S Bassett

    2010-04-01

    Full Text Available Nervous systems are information processing networks that evolved by natural selection, whereas very large scale integrated (VLSI computer circuits have evolved by commercially driven technology development. Here we follow historic intuition that all physical information processing systems will share key organizational properties, such as modularity, that generally confer adaptivity of function. It has long been observed that modular VLSI circuits demonstrate an isometric scaling relationship between the number of processing elements and the number of connections, known as Rent's rule, which is related to the dimensionality of the circuit's interconnect topology and its logical capacity. We show that human brain structural networks, and the nervous system of the nematode C. elegans, also obey Rent's rule, and exhibit some degree of hierarchical modularity. We further show that the estimated Rent exponent of human brain networks, derived from MRI data, can explain the allometric scaling relations between gray and white matter volumes across a wide range of mammalian species, again suggesting that these principles of nervous system design are highly conserved. For each of these fractal modular networks, the dimensionality of the interconnect topology was greater than the 2 or 3 Euclidean dimensions of the space in which it was embedded. This relatively high complexity entailed extra cost in physical wiring: although all networks were economically or cost-efficiently wired they did not strictly minimize wiring costs. Artificial and biological information processing systems both may evolve to optimize a trade-off between physical cost and topological complexity, resulting in the emergence of homologous principles of economical, fractal and modular design across many different kinds of nervous and computational networks.

  13. Three dimensional imaging of paraffin embedded human lung tissue samples by micro-computed tomography.

    Directory of Open Access Journals (Sweden)

    Anna E Scott

    Full Text Available Understanding the three-dimensional (3-D micro-architecture of lung tissue can provide insights into the pathology of lung disease. Micro computed tomography (µCT has previously been used to elucidate lung 3D histology and morphometry in fixed samples that have been stained with contrast agents or air inflated and dried. However, non-destructive microstructural 3D imaging of formalin-fixed paraffin embedded (FFPE tissues would facilitate retrospective analysis of extensive tissue archives of lung FFPE lung samples with linked clinical data.FFPE human lung tissue samples (n = 4 were scanned using a Nikon metrology µCT scanner. Semi-automatic techniques were used to segment the 3D structure of airways and blood vessels. Airspace size (mean linear intercept, Lm was measured on µCT images and on matched histological sections from the same FFPE samples imaged by light microscopy to validate µCT imaging.The µCT imaging protocol provided contrast between tissue and paraffin in FFPE samples (15 mm x 7 mm. Resolution (voxel size 6.7 µm in the reconstructed images was sufficient for semi-automatic image segmentation of airways and blood vessels as well as quantitative airspace analysis. The scans were also used to scout for regions of interest, enabling time-efficient preparation of conventional histological sections. The Lm measurements from µCT images were not significantly different to those from matched histological sections.We demonstrated how non-destructive imaging of routinely prepared FFPE samples by laboratory µCT can be used to visualize and assess the 3D morphology of the lung including by morphometric analysis.

  14. New Intelligent Computer Intrusion Detection Method Using Hessian Local Linear Embedding and Multi-Kernel Support Vector Machine

    Directory of Open Access Journals (Sweden)

    Fei Hu

    2013-01-01

    Full Text Available Computer networks frequently collapse under the destructive intrusions. It is crucial to detection hidden intrusions to protect the computer networks. However, a computer intrusion often distributes high dimensional characteristic signals, which increases the difficulty of intrusion detection. Literature review indicates that limited work has been done to address the nonlinear dimension reduction problem in computer intrusion detection. Hence, this study has proposed a new intrusion detection method based on the Hessian Local Linear Embedding (HLLE and multi-kernel Support Vector Machine (SVM. The HLLE was firstly used to reduce the dimension of the original intrusion date in a nonlinear manner. Then the SVM with multiply kernels was employed to detect the intrusions. A real computer network experimental system has been established to evaluate the proposed method. Four typical intrusions have been tested. The test results show high effectiveness of the new detection method. In addition, the new method has been compared with the single-kernel SVM with Local Linear Embedding (LLE or Principal Component Analysis (PCA. The comparison results demonstrate that the proposed HLLE plus multi-kernel SVM can provide the best computer intrusion detection rate of 97.1%.

  15. [Design of an embedded stroke rehabilitation apparatus system based on Linux computer engineering].

    Science.gov (United States)

    Zhuang, Pengfei; Tian, XueLong; Zhu, Lin

    2014-04-01

    A realizaton project of electrical stimulator aimed at motor dysfunction of stroke is proposed in this paper. Based on neurophysiological biofeedback, this system, using an ARM9 S3C2440 as the core processor, integrates collection and display of surface electromyography (sEMG) signal, as well as neuromuscular electrical stimulation (NMES) into one system. By embedding Linux system, the project is able to use Qt/Embedded as a graphical interface design tool to accomplish the design of stroke rehabilitation apparatus. Experiments showed that this system worked well.

  16. Computing Best and Worst Shortcuts of Graphs Embedded in Metric Spaces

    DEFF Research Database (Denmark)

    Wulff-Nilsen, Christian; Luo, Jun

    2008-01-01

    Given a graph embedded in a metric space, its dilation is the maximum over all distinct pairs of vertices of the ratio between their distance in the graph and the metric distance between them. Given such a graph G with n vertices and m edges and consisting of at most two connected components, we...

  17. OpenVX-based Python Framework for real-time cross platform acceleration of embedded computer vision applications

    Directory of Open Access Journals (Sweden)

    Ori Heimlich

    2016-11-01

    Full Text Available Embedded real-time vision applications are being rapidly deployed in a large realm of consumer electronics, ranging from automotive safety to surveillance systems. However, the relatively limited computational power of embedded platforms is considered as a bottleneck for many vision applications, necessitating optimization. OpenVX is a standardized interface, released in late 2014, in an attempt to provide both system and kernel level optimization to vision applications. With OpenVX, Vision processing are modeled with coarse-grained data flow graphs, which can be optimized and accelerated by the platform implementer. Current full implementations of OpenVX are given in the programming language C, which does not support advanced programming paradigms such as object-oriented, imperative and functional programming, nor does it have runtime or type-checking. Here we present a python-based full Implementation of OpenVX, which eliminates much of the discrepancies between the object-oriented paradigm used by many modern applications and the native C implementations. Our open-source implementation can be used for rapid development of OpenVX applications in embedded platforms. Demonstration includes static and real-time image acquisition and processing using a Raspberry Pi and a GoPro camera. Code is given as supplementary information. Code project and linked deployable virtual machine are located on GitHub: https://github.com/NBEL-lab/PythonOpenVX.

  18. High Performance Embedded Computing Software Initiative (HPEC-SI) Program Facilitation of VSIPL++ Standardization

    Science.gov (United States)

    2008-04-01

    parallel VSIPL++, and other parallel computing systems. The cluster is a fifty five node Beowulf style cluster with 116 compute processors of varying types...consoles, which GTRI inserted into to the parallel software testbed. A computer that is used as a compute node in a Beowulf -style cluster requires a... Beowulf -style cluster. GTRI also participated in technical advisory planning for the HPEC-SI program. 5. References 1. Schwartz, D. A ., Judd, R. R

  19. An Embedded System for applying High Performance Computing in Educational Learning Activity

    OpenAIRE

    Irene Erlyn Wina Rachmawan; Nurul Fahmi; Edi Wahyu Widodo; Samsul Huda; M. Unggul Pamenang; M. Choirur Roziqin; Andri Permana W.; Stritusta Sukaridhoto; Dadet Pramadihanto

    2016-01-01

    HPC (High Performance Computing) has become more popular in the last few years. With the benefits on high computational power, HPC has impact on industry, scientific research and educational activities. Implementing HPC as a curriculum in universities could be consuming a lot of resources because well-known HPC system are using Personal Computer or Server. By using PC as the practical moduls it is need great resources and spaces.  This paper presents an innovative high performance computing c...

  20. Implementation of an Embedded Web Server Application for Wireless Control of Brain Computer Interface Based Home Environments.

    Science.gov (United States)

    Aydın, Eda Akman; Bay, Ömer Faruk; Güler, İnan

    2016-01-01

    Brain Computer Interface (BCI) based environment control systems could facilitate life of people with neuromuscular diseases, reduces dependence on their caregivers, and improves their quality of life. As well as easy usage, low-cost, and robust system performance, mobility is an important functionality expected from a practical BCI system in real life. In this study, in order to enhance users' mobility, we propose internet based wireless communication between BCI system and home environment. We designed and implemented a prototype of an embedded low-cost, low power, easy to use web server which is employed in internet based wireless control of a BCI based home environment. The embedded web server provides remote access to the environmental control module through BCI and web interfaces. While the proposed system offers to BCI users enhanced mobility, it also provides remote control of the home environment by caregivers as well as the individuals in initial stages of neuromuscular disease. The input of BCI system is P300 potentials. We used Region Based Paradigm (RBP) as stimulus interface. Performance of the BCI system is evaluated on data recorded from 8 non-disabled subjects. The experimental results indicate that the proposed web server enables internet based wireless control of electrical home appliances successfully through BCIs.

  1. An Implementation of real-time phased array radar fundamental functions on DSP-focused, high performance embedded computing platform

    Science.gov (United States)

    Yu, Xining; Zhang, Yan; Patel, Ankit; Zahrai, Allen; Weber, Mark

    2016-05-01

    This paper investigates the feasibility of real-time, multiple channel processing of a digital phased array system backend design, with focus on high-performance embedded computing (HPEC) platforms constructed based on general purpose digital signal processor (DSP). Serial RapidIO (SRIO) is used as inter-chip connection backend protocol to support the inter-core communications and parallelisms. Performance benchmark was obtained based on a SRIO system chassis and emulated configuration similar to a field scale demonstrator of Multi-functional Phased Array Radar (MPAR). An interesting aspect of this work is comparison between "raw and low-level" DSP processing and emerging tools that systematically take advantages of the parallelism and multi-core capability, such as OpenCL and OpenMP. Comparisons with other backend HPEC solutions, such as FPGA and GPU, are also provided through analysis and experiments.

  2. Building Professionalism and Employability Skills: Embedding Employer Engagement within First-Year Computing Modules

    Science.gov (United States)

    Hanna, Philip; Allen, Angela; Kane, Russell; Anderson, Neil; McGowan, Aidan; Collins, Matthew; Hutchison, Malcolm

    2015-01-01

    This paper outlines a means of improving the employability skills of first-year university students through a closely integrated model of employer engagement within computer science modules. The outlined approach illustrates how employability skills, including communication, teamwork and time management skills, can be contextualised in a manner…

  3. Building Professionalism and Employability Skills: Embedding Employer Engagement within First-Year Computing Modules

    Science.gov (United States)

    Hanna, Philip; Allen, Angela; Kane, Russell; Anderson, Neil; McGowan, Aidan; Collins, Matthew; Hutchison, Malcolm

    2015-01-01

    This paper outlines a means of improving the employability skills of first-year university students through a closely integrated model of employer engagement within computer science modules. The outlined approach illustrates how employability skills, including communication, teamwork and time management skills, can be contextualised in a manner…

  4. Design and Implementation of Embedded Computer Vision Systems Based on Particle Filters

    Science.gov (United States)

    2010-01-01

    for a heterogeneous imple- mentation platform comprising of both hardware and software components. We use Xilinx’s System Generator and the Xilinx...partitioning and mapping results. The three systems were designed and synthesized using Xilinx System Generator 8.2, Xilinx EDK 8.2, and Xilinx ISE 9.1. For the...the resampling units is fully pipelined. The above equations were mapped to appropriate Xilinx System Generator computation blocks to build the PEcore

  5. Toward three-dimensional virtual biopsy of oral lesions through the development of a confocal endomicroscope interfaced with embedded computing

    Science.gov (United States)

    Thong, Patricia S. P.; Olivo, Malini; Movania, Muhammad M.; Tandjung, Stephanus S.; Bhuvaneswari, Ramaswamy; Seah, Hock-Soon; Lin, Feng; Qian, Kemao; Soo, Khee-Chee

    2011-07-01

    Oral lesions are conventionally diagnosed using white light endoscopy and histopathology of biopsy samples. Oral lesions are often flat and difficult to visualize under white light illumination. Moreover, histopathology is timeconsuming and there is a need to develop minimally invasive optical biopsy techniques to complement current techniques. Confocal laser endomicroscopy holds promise for virtual biopsy in disease diagnosis. This technique enables fluorescence imaging of tissue structures at microscopic resolution. We have developed a prototype real-time 3- dimensional (3D) imaging system using a laser endomicroscope interfaced with embedded computing. A Field- Programmable Gate Array computing platform has been programmed to synchronize cross-sectional image grabbing and Z-depth scanning, as well as automate acquisition of confocal image stacks. A PC was used for real-time volume rendering of the confocal image stacks. We conducted pre-clinical and pilot clinical studies to image the murine and human oral cavity. High quality volume renderings of the confocal image stacks were generated using 3D texture slicing. Tissue morphology and 3D structures could be visualized. The results demonstrate the potential of the system for diagnostic imaging of the oral cavity. This paves the way toward real-time virtual biopsy of oral lesions, with the aim to achieve same-day diagnosis in a clinical setting.

  6. Toward real-time virtual biopsy of oral lesions using confocal laser endomicroscopy interfaced with embedded computing

    Science.gov (United States)

    Thong, Patricia S. P.; Tandjung, Stephanus S.; Movania, Muhammad Mobeen; Chiew, Wei-Ming; Olivo, Malini; Bhuvaneswari, Ramaswamy; Seah, Hock-Soon; Lin, Feng; Qian, Kemao; Soo, Khee-Chee

    2012-05-01

    Oral lesions are conventionally diagnosed using white light endoscopy and histopathology. This can pose a challenge because the lesions may be difficult to visualise under white light illumination. Confocal laser endomicroscopy can be used for confocal fluorescence imaging of surface and subsurface cellular and tissue structures. To move toward real-time "virtual" biopsy of oral lesions, we interfaced an embedded computing system to a confocal laser endomicroscope to achieve a prototype three-dimensional (3-D) fluorescence imaging system. A field-programmable gated array computing platform was programmed to enable synchronization of cross-sectional image grabbing and Z-depth scanning, automate the acquisition of confocal image stacks and perform volume rendering. Fluorescence imaging of the human and murine oral cavities was carried out using the fluorescent dyes fluorescein sodium and hypericin. Volume rendering of cellular and tissue structures from the oral cavity demonstrate the potential of the system for 3-D fluorescence visualization of the oral cavity in real-time. We aim toward achieving a real-time virtual biopsy technique that can complement current diagnostic techniques and aid in targeted biopsy for better clinical outcomes.

  7. Embedded atom computer simulation of lattice distortion and dislocation core structure and mobility in Fe-Cr alloys

    Energy Technology Data Exchange (ETDEWEB)

    Farkas, D.; Schon, C.G.; Lima, M.S.F. de [Virginia Polytechnic Inst., Blacksburg, VA (United States). Dept. of Materials Science and Engineering; Goldenstein, H. [Escola Politecnica USP, Sao Paulo (Brazil). Dept. de Metalurgia

    1996-01-01

    The atomistic structure of dislocation cores of <111> screw dislocations in disordered Fe-Cr b.c.c. alloys was simulated using embedded atom method potentials and molecular statics computer simulation. The mixed Fe-Cr interatomic potentials used were derived by fitting to the thermodynamic data of the disordered system and the measured lattice parameter changes of Fe upon Cr additions. The potentials predict phase separation as the most stable configuration for the central region of the phase diagram. The next most stable situation is the disordered b.c.c. phase. The structure of the screw 1/2 <111> dislocation core was studied using atomistic computer simulation and an improved visualization method for the representation of the resulting structures. The structure of the dislocation core is different from that typical of 1/2 <111> dislocations in pure b.c.c. materials. The core structure in the alloy tends to lose the threefold symmetry seen in pure b.c.c. materials and the stress necessary to initiate dislocation motion increases with Cr content. The mobility of kinks in these screw dislocations was also simulated and it was found that while the critical stress for kink motion in pure Fe is extremely low, it increases significantly with the addition of Cr. The implications of these differences for mechanical behavior are discussed.

  8. A progress report on a NASA research program for embedded computer systems software

    Science.gov (United States)

    Foudriat, E. C.; Senn, E. H.; Will, R. W.; Straeter, T. A.

    1979-01-01

    The paper presents the results of the second stage of the Multipurpose User-oriented Software Technology (MUST) program. Four primary areas of activities are discussed: programming environment, HAL/S higher-order programming language support, the Integrated Verification and Testing System (IVTS), and distributed system language research. The software development environment is provided by the interactive software invocation system. The higher-order programming language (HOL) support chosen for consideration is HAL/S mainly because at the time it was one of the few HOLs with flight computer experience and it is the language used on the Shuttle program. The overall purpose of IVTS is to provide a 'user-friendly' software testing system which is highly modular, user controlled, and cooperative in nature.

  9. Research on Embedded Curriculum in Computer Specialty%计算机专业本科嵌入式系统方向课程建设研究

    Institute of Scientific and Technical Information of China (English)

    蒋伟杰

    2011-01-01

    With the extensive application of embedded system,CC2004 has the embedded system course as the core computer engineering courses.This paper analyzes the current domestic demand for talent on the embedded system and university personnel training status of embedded systems,embedded systems for computer science courses in direction of a set of system-building programs.%随着计算机技术的发展,嵌入式系统得到越来越广泛的应用,CC2004已经把嵌入式系统作为计算机工程专业的核心课程。本文分析目前国内对嵌入式系统人才的需求和高校培养嵌入式系统人才的现状,针对计算机专业嵌入式系统方向的课程体系提出一套建设方案。

  10. Hybrid brain-computer interface for biomedical cyber-physical system application using wireless embedded EEG systems.

    Science.gov (United States)

    Chai, Rifai; Naik, Ganesh R; Ling, Sai Ho; Nguyen, Hung T

    2017-01-07

    One of the key challenges of the biomedical cyber-physical system is to combine cognitive neuroscience with the integration of physical systems to assist people with disabilities. Electroencephalography (EEG) has been explored as a non-invasive method of providing assistive technology by using brain electrical signals. This paper presents a unique prototype of a hybrid brain computer interface (BCI) which senses a combination classification of mental task, steady state visual evoked potential (SSVEP) and eyes closed detection using only two EEG channels. In addition, a microcontroller based head-mounted battery-operated wireless EEG sensor combined with a separate embedded system is used to enhance portability, convenience and cost effectiveness. This experiment has been conducted with five healthy participants and five patients with tetraplegia. Generally, the results show comparable classification accuracies between healthy subjects and tetraplegia patients. For the offline artificial neural network classification for the target group of patients with tetraplegia, the hybrid BCI system combines three mental tasks, three SSVEP frequencies and eyes closed, with average classification accuracy at 74% and average information transfer rate (ITR) of the system of 27 bits/min. For the real-time testing of the intentional signal on patients with tetraplegia, the average success rate of detection is 70% and the speed of detection varies from 2 to 4 s.

  11. 面向普适计算环境的嵌入式系统研究%Pervasive Computing Environment for Embedded System

    Institute of Scientific and Technical Information of China (English)

    綦志勇; 常排排

    2011-01-01

    Service provider and the user interface in ubiquitous computing adaptive problem is an important research topic. Embedded systems provide services to ubiquitous computing service played an important supporting role; pervasive computing tasks to the service users also need access to adaptive user interface to display services, embedded system, adaptive interface is appropriate choice. However, the traditional services of embedded systems software can not achieve the above goals very well. Traditional service model for embedded system deficiencies, this paper summarized the embedded systems for ubiquitous computing hardware, and named the computing-unit of this structure. Subsequently,this paper proposed a new service delivery model for embedded systems, unified user interaction context of the standard message format,and finally studied the implementation of the service model.%服务提供与用户界面自适应问题是普适计算中的重要研究课题.嵌入式系统提供的服务对普适计算的服务起到了重要的支持作用;普适计算任务要荻取用户的服务也需要自适应的用户界面来显示服务项目,嵌入式系统的自适应界面是合适的选择.但是,传统的嵌入式系统服务软件不能很好地实现上述目标.针对传统嵌入式系统服务模型的不足,首先总结了面向普适计算的嵌入式系统硬件结构,并将这种结构命名为计算元.随后提出了一种新的嵌入式系统服务提供模型,统一了用户上下文交互的标准信息格式.最后研究了该服务模型的实现.

  12. Embedded engineering education

    CERN Document Server

    Kaštelan, Ivan; Temerinac, Miodrag; Barak, Moshe; Sruk, Vlado

    2016-01-01

    This book focuses on the outcome of the European research project “FP7-ICT-2011-8 / 317882: Embedded Engineering Learning Platform” E2LP. Additionally, some experiences and researches outside this project have been included. This book provides information about the achieved results of the E2LP project as well as some broader views about the embedded engineering education. It captures project results and applications, methodologies, and evaluations. It leads to the history of computer architectures, brings a touch of the future in education tools and provides a valuable resource for anyone interested in embedded engineering education concepts, experiences and material. The book contents 12 original contributions and will open a broader discussion about the necessary knowledge and appropriate learning methods for the new profile of embedded engineers. As a result, the proposed Embedded Computer Engineering Learning Platform will help to educate a sufficient number of future engineers in Europe, capable of d...

  13. On Distributed Embedded Systems

    Directory of Open Access Journals (Sweden)

    Arvindra Sehmi

    2013-01-01

    Full Text Available Thinking of distributed embedded systems (DES—let alone the more general area of embedded computing—as a unified topic is difficult. Nevertheless, it is a vastly important topic and potentially represents a revolution in information technology (IT. DES is driven by the increasing capabilities and ever-declining costs of computing and communications devices, resulting in networked systems of embedded computers whose functional components are nearly invisible to end users. Systems have the potential to alter radically the way in which people interact with their environment by linking a range of devices and sensors that will allow information to be collected, shared, and processed in unprecedented ways.

  14. Embedded Leverage

    DEFF Research Database (Denmark)

    Frazzini, Andrea; Heje Pedersen, Lasse

    Many financial instruments are designed with embedded leverage such as options and leveraged exchange traded funds (ETFs). Embedded leverage alleviates investors’ leverage constraints and, therefore, we hypothesize that embedded leverage lowers required returns. Consistent with this hypothesis, we...... find that asset classes with embedded leverage offer low risk-adjusted returns and, in the cross-section, higher embedded leverage is associated with lower returns. A portfolio which is long low-embedded-leverage securities and short high-embedded-leverage securities earns large abnormal returns......, with t-statistics of 8.6 for equity options, 6.3 for index options, and 2.5 for ETFs. We provide extensive robustness tests and discuss the broader implications of embedded leverage for financial economics....

  15. Atrial Fibrillation Screening in Nonmetropolitan Areas Using a Telehealth Surveillance System With an Embedded Cloud-Computing Algorithm: Prospective Pilot Study.

    Science.gov (United States)

    Chen, Ying-Hsien; Hung, Chi-Sheng; Huang, Ching-Chang; Hung, Yu-Chien; Hwang, Juey-Jen; Ho, Yi-Lwun

    2017-09-26

    Atrial fibrillation (AF) is a common form of arrhythmia that is associated with increased risk of stroke and mortality. Detecting AF before the first complication occurs is a recognized priority. No previous studies have examined the feasibility of undertaking AF screening using a telehealth surveillance system with an embedded cloud-computing algorithm; we address this issue in this study. The objective of this study was to evaluate the feasibility of AF screening in nonmetropolitan areas using a telehealth surveillance system with an embedded cloud-computing algorithm. We conducted a prospective AF screening study in a nonmetropolitan area using a single-lead electrocardiogram (ECG) recorder. All ECG measurements were reviewed on the telehealth surveillance system and interpreted by the cloud-computing algorithm and a cardiologist. The process of AF screening was evaluated with a satisfaction questionnaire. Between March 11, 2016 and August 31, 2016, 967 ECGs were recorded from 922 residents in nonmetropolitan areas. A total of 22 (2.4%, 22/922) residents with AF were identified by the physician's ECG interpretation, and only 0.2% (2/967) of ECGs contained significant artifacts. The novel cloud-computing algorithm for AF detection had a sensitivity of 95.5% (95% CI 77.2%-99.9%) and specificity of 97.7% (95% CI 96.5%-98.5%). The overall satisfaction score for the process of AF screening was 92.1%. AF screening in nonmetropolitan areas using a telehealth surveillance system with an embedded cloud-computing algorithm is feasible.

  16. 基于MPC8548E的通用嵌入式计算机平台系统软件研究和实现%And the realization of MPC8548E embedded computer platform system software based on

    Institute of Scientific and Technical Information of China (English)

    李文光

    2014-01-01

    随着我国嵌入式计算机平台的不断发展,对嵌入式系统软件研究也逐渐加深,通用型嵌入式计算机平台是嵌入式进行软件开发的重要载体。系统软件作为嵌入式计算机硬件与计算程序的桥梁,需要建立良好性能的嵌入式环境,并为系统提供有利的计算条件。而以MPC8548E为基础的嵌入式计算机平台的出现,可以实现嵌入式系统软件的开发与应用。本文就针对基于MPC8548E的通用嵌入式计算机平台系统软件的实现过程进行深入的分析与研究。%With the continuous development of our embedded computer platform,also gradually deepen the research of embedded system software,embedded computer platform is an important carrier of embedded software development.System software as a bridge of embedded computer hardware and computational procedure,the embedded environment requires the establishment of good performance,and provide favorable conditions for the system calculation.The embedded computer platform based on MPC8548E,can realize the development and application of embedded system software.In this thesis the realization process of embedded computer system software based on MPC8548E thorough analysis and research.

  17. An Implementation of Real-Time Phased Array Radar Fundamental Functions on a DSP-Focused, High-Performance, Embedded Computing Platform

    Directory of Open Access Journals (Sweden)

    Xining Yu

    2016-09-01

    Full Text Available This paper investigates the feasibility of a backend design for real-time, multiple-channel processing digital phased array system, particularly for high-performance embedded computing platforms constructed of general purpose digital signal processors. First, we obtained the lab-scale backend performance benchmark from simulating beamforming, pulse compression, and Doppler filtering based on a Micro Telecom Computing Architecture (MTCA chassis using the Serial RapidIO protocol in backplane communication. Next, a field-scale demonstrator of a multifunctional phased array radar is emulated by using the similar configuration. Interestingly, the performance of a barebones design is compared to that of emerging tools that systematically take advantage of parallelism and multicore capabilities, including the Open Computing Language.

  18. The data embedding method

    Energy Technology Data Exchange (ETDEWEB)

    Sandford, M.T. II; Bradley, J.N.; Handel, T.G.

    1996-06-01

    Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in Microsoft{reg_sign} bitmap (.BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed {open_quote}steganography.{close_quote} Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or {open_quote}lossy{close_quote} compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is in data an analysis algorithm.

  19. Data embedding method

    Science.gov (United States)

    Sandford, Maxwell T., II; Bradley, Jonathan N.; Handel, Theodore G.

    1996-01-01

    Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in MicrosoftTM bitmap (BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed `steganography.' Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or `lossy' compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is derived from the original host data by an analysis algorithm.

  20. Computational Thinking for All: Pedagogical Approaches to Embedding 21st Century Problem Solving in K-12 Classrooms

    Science.gov (United States)

    Yadav, Aman; Hong, Hai; Stephenson, Chris

    2016-01-01

    The recent focus on computational thinking as a key 21st century skill for all students has led to a number of curriculum initiatives to embed it in K-12 classrooms. In this paper, we discuss the key computational thinking constructs, including algorithms, abstraction, and automation. We further discuss how these ideas are related to current…

  1. Carleson embeddings

    Directory of Open Access Journals (Sweden)

    Helmut J. Heiming

    1996-01-01

    Full Text Available In this paper we discuss several operator ideal properties for so called Carleson embeddings of tent spaces into specific L q(μ-spaces, where μ is a Carleson measure on the complex unit disc. Characterizing absolutely q-summing, absolutely continuous and q-integral Carleson embeddings in terms of the underlying measure is our main topic. The presented results extend and integrate results especially known for composition operators on Hardy spaces as well as embedding theorems for function spaces of similar kind.

  2. Characterization of a Reconfigurable Free-Space Optical Channel for Embedded Computer Applications with Experimental Validation Using Rapid Prototyping Technology

    Directory of Open Access Journals (Sweden)

    Rafael Gil-Otero

    2007-02-01

    Full Text Available Free-space optical interconnects (FSOIs are widely seen as a potential solution to current and future bandwidth bottlenecks for parallel processors. In this paper, an FSOI system called optical highway (OH is proposed. The OH uses polarizing beam splitter-liquid crystal plate (PBS/LC assemblies to perform reconfigurable beam combination functions. The properties of the OH make it suitable for embedding complex network topologies such as completed connected mesh or hypercube. This paper proposes the use of rapid prototyping technology for implementing an optomechanical system suitable for studying the reconfigurable characteristics of a free-space optical channel. Additionally, it reports how the limited contrast ratio of the optical components can affect the attenuation of the optical signal and the crosstalk caused by misdirected signals. Different techniques are also proposed in order to increase the optical modulation amplitude (OMA of the system.

  3. Characterization of a Reconfigurable Free-Space Optical Channel for Embedded Computer Applications with Experimental Validation Using Rapid Prototyping Technology

    Directory of Open Access Journals (Sweden)

    Lim Theodore

    2007-01-01

    Full Text Available Free-space optical interconnects (FSOIs are widely seen as a potential solution to current and future bandwidth bottlenecks for parallel processors. In this paper, an FSOI system called optical highway (OH is proposed. The OH uses polarizing beam splitter-liquid crystal plate (PBS/LC assemblies to perform reconfigurable beam combination functions. The properties of the OH make it suitable for embedding complex network topologies such as completed connected mesh or hypercube. This paper proposes the use of rapid prototyping technology for implementing an optomechanical system suitable for studying the reconfigurable characteristics of a free-space optical channel. Additionally, it reports how the limited contrast ratio of the optical components can affect the attenuation of the optical signal and the crosstalk caused by misdirected signals. Different techniques are also proposed in order to increase the optical modulation amplitude (OMA of the system.

  4. 基于TPM的嵌入式可信计算平台设计%Embedded Trusted Computing Platform Based on TPM

    Institute of Scientific and Technical Information of China (English)

    王博; 李波; 高振铁; 陈磊

    2011-01-01

    为了解决目前嵌入式应用中存在的诸多安全问题,设计了一种基于TPM(Trusted Platform Module)安全芯片的嵌入式平台设计方案.在分析可信计算技术发展的基础上,结合嵌入式平台结构特点以及TPM芯片的常见接口,采用了通过I2C总线扩展TPM的方法.最后讨论了TPM的操作方法,设计了TPM在Bootloader和Linux内核两种环境下驱动程序.%In order to solve the security problems existing in the current embedded applications, an embedded platform design scheme is presented based on TPM (Trusted Platform Module). Based on the analysis of the development of trusted computing technology and the normal interface of TPM, TPM is extended by I2C interface. After studying the method of TPM operation, TPM drivers for Bootloader and Linux kernel are designed.

  5. An Information Technology Framework for the Development of an Embedded Computer System for the Remote and Non-Destructive Study of Sensitive Archaeology Sites

    Directory of Open Access Journals (Sweden)

    Iliya Georgiev

    2017-04-01

    Full Text Available The paper proposes an information technology framework for the development of an embedded remote system for non-destructive observation and study of sensitive archaeological sites. The overall concept and motivation are described. The general hardware layout and software configuration are presented. The paper concentrates on the implementation of the following informational technology components: (a a geographically unique identification scheme supporting a global key space for a key-value store; (b a common method for octree modeling for spatial geometrical models of the archaeological artifacts, and abstract object representation in the global key space; (c a broadcast of the archaeological information as an Extensible Markup Language (XML stream over the Web for worldwide availability; and (d a set of testing methods increasing the fault tolerance of the system. This framework can serve as a foundation for the development of a complete system for remote archaeological exploration of enclosed archaeological sites like buried churches, tombs, and caves. An archaeological site is opened once upon discovery, the embedded computer system is installed inside upon a robotic platform, equipped with sensors, cameras, and actuators, and the intact site is sealed again. Archaeological research is conducted on a multimedia data stream which is sent remotely from the system and conforms to necessary standards for digital archaeology.

  6. Embedded Data Representations.

    Science.gov (United States)

    Willett, Wesley; Jansen, Yvonne; Dragicevic, Pierre

    2017-01-01

    We introduce embedded data representations, the use of visual and physical representations of data that are deeply integrated with the physical spaces, objects, and entities to which the data refers. Technologies like lightweight wireless displays, mixed reality hardware, and autonomous vehicles are making it increasingly easier to display data in-context. While researchers and artists have already begun to create embedded data representations, the benefits, trade-offs, and even the language necessary to describe and compare these approaches remain unexplored. In this paper, we formalize the notion of physical data referents - the real-world entities and spaces to which data corresponds - and examine the relationship between referents and the visual and physical representations of their data. We differentiate situated representations, which display data in proximity to data referents, and embedded representations, which display data so that it spatially coincides with data referents. Drawing on examples from visualization, ubiquitous computing, and art, we explore the role of spatial indirection, scale, and interaction for embedded representations. We also examine the tradeoffs between non-situated, situated, and embedded data displays, including both visualizations and physicalizations. Based on our observations, we identify a variety of design challenges for embedded data representation, and suggest opportunities for future research and applications.

  7. Using Simulated Partial Dynamic Run-Time Reconfiguration to Share Embedded FPGA Compute and Power Resources across a Swarm of Unpiloted Airborne Vehicles

    Directory of Open Access Journals (Sweden)

    Kearney David

    2007-01-01

    Full Text Available We show how the limited electrical power and FPGA compute resources available in a swarm of small UAVs can be shared by moving FPGA tasks from one UAV to another. A software and hardware infrastructure that supports the mobility of embedded FPGA applications on a single FPGA chip and across a group of networked FPGA chips is an integral part of the work described here. It is shown how to allocate a single FPGA's resources at run time and to share a single device through the use of application checkpointing, a memory controller, and an on-chip run-time reconfigurable network. A prototype distributed operating system is described for managing mobile applications across the swarm based on the contents of a fuzzy rule base. It can move applications between UAVs in order to equalize power use or to enable the continuous replenishment of fully fueled planes into the swarm.

  8. 弹载计算机CPU数字模型系统开发%CPU Numerical Model System of the Embedded Computer in Airborne Missile

    Institute of Scientific and Technical Information of China (English)

    罗阳; 侯俊刚

    2012-01-01

    提出弹载计算机数字模型系统的研制需求,在此基础上,分析了该系统的功能组成,然后从COFF文件解析、DSP软核、指令解析执行三个方面详细介绍了该系统的具体开发过程,最后给出应用结论。%The studying demand of numerical model system of the embedded computer in airborne missile is adverted in this article. On basis of this, the system composition is analyzed, and the develop- ment process of the numerical model system is introduced particularly in three ways, that is analysis of COFF file, DSP soft core and parsing command execution. Lastly, the applied conclusion is gained.

  9. Using Simulated Partial Dynamic Run-Time Reconfiguration to Share Embedded FPGA Compute and Power Resources across a Swarm of Unpiloted Airborne Vehicles

    Directory of Open Access Journals (Sweden)

    David Kearney

    2007-02-01

    Full Text Available We show how the limited electrical power and FPGA compute resources available in a swarm of small UAVs can be shared by moving FPGA tasks from one UAV to another. A software and hardware infrastructure that supports the mobility of embedded FPGA applications on a single FPGA chip and across a group of networked FPGA chips is an integral part of the work described here. It is shown how to allocate a single FPGA's resources at run time and to share a single device through the use of application checkpointing, a memory controller, and an on-chip run-time reconfigurable network. A prototype distributed operating system is described for managing mobile applications across the swarm based on the contents of a fuzzy rule base. It can move applications between UAVs in order to equalize power use or to enable the continuous replenishment of fully fueled planes into the swarm.

  10. Embedded Systems Design with FPGAs

    CERN Document Server

    Pnevmatikatos, Dionisios; Sklavos, Nicolas

    2013-01-01

    This book presents methodologies for modern applications of embedded systems design, using field programmable gate array (FPGA) devices.  Coverage includes state-of-the-art research from academia and industry on a wide range of topics, including advanced electronic design automation (EDA), novel system architectures, embedded processors, arithmetic, dynamic reconfiguration and applications. Describes a variety of methodologies for modern embedded systems design;  Implements methodologies presented on FPGAs; Covers a wide variety of applications for reconfigurable embedded systems, including Bioinformatics, Communications and networking, Application acceleration, Medical solutions, Experiments for high energy physics, Astronomy, Aerospace, Biologically inspired systems and Computational fluid dynamics (CFD).

  11. Polarizable Density Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus Haugaard; Steinmann, Casper; Ruud, Kenneth

    2015-01-01

    We present a new QM/QM/MM-based model for calculating molecular properties and excited states of solute-solvent systems. We denote this new approach the polarizable density embedding (PDE) model and it represents an extension of our previously developed polarizable embedding (PE) strategy. The PDE...... model is a focused computational approach in which a core region of the system studied is represented by a quantum-chemical method, whereas the environment is divided into two other regions: an inner and an outer region. Molecules belonging to the inner region are described by their exact densities...

  12. Metric embeddings bilipschitz and coarse embeddings into Banach spaces

    CERN Document Server

    Ostrovskii, Mikhail I

    2013-01-01

    Embeddings of discrete metric spaces into Banach spaces recently became an important tool in computer science and topology. The book will help readers to enter and to work in this very rapidly developing area having many important connections with different parts of mathematics and computer science. The purpose of the book is to present some of the most important techniques and results, mostly on bilipschitz and coarse embeddings. The topics include embeddability of locally finite metric spaces into Banach spaces is finitely determined, constructions of embeddings, distortion in terms of Poinc

  13. Analysis and Synthesis of Distributed Real-Time Embedded Systems

    DEFF Research Database (Denmark)

    Pop, Paul; Eles, Petru; Peng, Zebo

    Embedded computer systems are now everywhere: from alarm clocks to PDAs, from mobile phones to cars, almost all the devices we use are controlled by embedded computers. An important class of embedded computer systems is that of hard real-time systems, which have to fulfill strict timing...... in important reductions of design costs. Analysis and Synthesis of Distributed Real-Time Embedded Systems will be of interest to advanced undergraduates, graduate students, researchers and designers involved in the field of embedded systems....

  14. Computer-assisted machine-to-human protocols for authentication of a RAM-based embedded system

    Science.gov (United States)

    Idrissa, Abdourhamane; Aubert, Alain; Fournel, Thierry

    2012-06-01

    Mobile readers used for optical identification of manufactured products can be tampered in different ways: with hardware Trojan or by powering up with fake configuration data. How a human verifier can authenticate the reader to be handled for goods verification? In this paper, two cryptographic protocols are proposed to achieve the verification of a RAM-based system through a trusted auxiliary machine. Such a system is assumed to be composed of a RAM memory and a secure block (in practice a FPGA or a configurable microcontroller). The system is connected to an input/output interface and contains a Non Volatile Memory where the configuration data are stored. Here, except the secure block, all the blocks are exposed to attacks. At the registration stage of the first protocol, the MAC of both the secret and the configuration data, denoted M0 is computed by the mobile device without saving it then transmitted to the user in a secure environment. At the verification stage, the reader which is challenged with nonces sendsMACs / HMACs of both nonces and MAC M0 (to be recomputed), keyed with the secret. These responses are verified by the user through a trusted auxiliary MAC computer unit. Here the verifier does not need to tract a (long) list of challenge / response pairs. This makes the protocol tractable for a human verifier as its participation in the authentication process is increased. In counterpart the secret has to be shared with the auxiliary unit. This constraint is relaxed in a second protocol directly derived from Fiat-Shamir's scheme.

  15. Augmented design and analysis of computer experiments: a novel tolerance embedded global optimization approach applied to SWIR hyperspectral illumination design.

    Science.gov (United States)

    Keresztes, Janos C; John Koshel, R; D'huys, Karlien; De Ketelaere, Bart; Audenaert, Jan; Goos, Peter; Saeys, Wouter

    2016-12-26

    A novel meta-heuristic approach for minimizing nonlinear constrained problems is proposed, which offers tolerance information during the search for the global optimum. The method is based on the concept of design and analysis of computer experiments combined with a novel two phase design augmentation (DACEDA), which models the entire merit space using a Gaussian process, with iteratively increased resolution around the optimum. The algorithm is introduced through a series of cases studies with increasing complexity for optimizing uniformity of a short-wave infrared (SWIR) hyperspectral imaging (HSI) illumination system (IS). The method is first demonstrated for a two-dimensional problem consisting of the positioning of analytical isotropic point sources. The method is further applied to two-dimensional (2D) and five-dimensional (5D) SWIR HSI IS versions using close- and far-field measured source models applied within the non-sequential ray-tracing software FRED, including inherent stochastic noise. The proposed method is compared to other heuristic approaches such as simplex and simulated annealing (SA). It is shown that DACEDA converges towards a minimum with 1 % improvement compared to simplex and SA, and more importantly requiring only half the number of simulations. Finally, a concurrent tolerance analysis is done within DACEDA for to the five-dimensional case such that further simulations are not required.

  16. What is the value of embedding artificial emotional prosody in human computer interactions? Implications for theory and design in psychological science.

    Directory of Open Access Journals (Sweden)

    Rachel L. C. Mitchell

    2015-11-01

    Full Text Available In computerised technology, artificial speech is becoming increasingly important, and is already used in ATMs, online gaming and healthcare contexts. However, today’s artificial speech typically sounds monotonous, a main reason for this being the lack of meaningful prosody. One particularly important function of prosody is to convey different emotions. This is because successful encoding and decoding of emotions is vital for effective social cognition, which is increasingly recognised in human-computer interaction contexts. Current attempts to artificially synthesise emotional prosody are much improved relative to early attempts, but there remains much work to be done due to methodological problems, lack of agreed acoustic correlates, and lack of theoretical grounding. If the addition of synthetic emotional prosody is not of sufficient quality, it may risk alienating users instead of enhancing their experience. So the value of embedding emotion cues in artificial speech may ultimately depend on the quality of the synthetic emotional prosody. However, early evidence on reactions to synthesised nonverbal cues in the facial modality bodes well. Attempts to implement the recognition of emotional prosody into artificial applications and interfaces have perhaps been met with greater success, but the ultimate test of synthetic emotional prosody will be to critically compare how people react to synthetic emotional prosody vs. natural emotional prosody, at the behavioural, socio-cognitive and neural levels.

  17. Wave Propagation Due to an Embedded Seismic Source in a Graded Half-Plane with Relief Peculiarities Part I: Mechanical Model and Computational Technique

    Directory of Open Access Journals (Sweden)

    Fontara I.-K.

    2015-03-01

    Full Text Available This work addresses the evaluation of the seismic wave field in a graded half-plane with free-surface and/or sub-surface relief subjected to shear horizontally (SH-polarized wave, radiating from an embedded seismic source. The considered boundary value problem is transformed into a system of boundary integral equations (BIEs along the boundaries of the free-surface and of any sub-surface relief, using an analytically derived frequency-dependent Green’s function for a quadratically inhomogeneous in depth half-plane. The numerical solution yields synthetic seismic signals at any point of the half-plane in both frequency and time domain following application of Fast Fourier Transform (FFT. Finally, in the companion paper, the verification and numerical simulation studies demonstrate the accuracy and efficiency of the present computational approach. The proposed BIE tool possesses the potential to reveal the sensitivity of the seismic signal to the type and properties of the seismic source, to the existence and type of the material gradient and to the lateral inhomogeneity, due to the free-surface and/or sub-surface relief peculiarities.

  18. What is the Value of Embedding Artificial Emotional Prosody in Human-Computer Interactions? Implications for Theory and Design in Psychological Science.

    Science.gov (United States)

    Mitchell, Rachel L C; Xu, Yi

    2015-01-01

    In computerized technology, artificial speech is becoming increasingly important, and is already used in ATMs, online gaming and healthcare contexts. However, today's artificial speech typically sounds monotonous, a main reason for this being the lack of meaningful prosody. One particularly important function of prosody is to convey different emotions. This is because successful encoding and decoding of emotions is vital for effective social cognition, which is increasingly recognized in human-computer interaction contexts. Current attempts to artificially synthesize emotional prosody are much improved relative to early attempts, but there remains much work to be done due to methodological problems, lack of agreed acoustic correlates, and lack of theoretical grounding. If the addition of synthetic emotional prosody is not of sufficient quality, it may risk alienating users instead of enhancing their experience. So the value of embedding emotion cues in artificial speech may ultimately depend on the quality of the synthetic emotional prosody. However, early evidence on reactions to synthesized non-verbal cues in the facial modality bodes well. Attempts to implement the recognition of emotional prosody into artificial applications and interfaces have perhaps been met with greater success, but the ultimate test of synthetic emotional prosody will be to critically compare how people react to synthetic emotional prosody vs. natural emotional prosody, at the behavioral, socio-cognitive and neural levels.

  19. Embedding potentials for excited states of embedded species.

    Science.gov (United States)

    Wesolowski, Tomasz A

    2014-05-14

    Frozen-Density-Embedding Theory (FDET) is a formalism to obtain the upper bound of the ground-state energy of the total system and the corresponding embedded wavefunction by means of Euler-Lagrange equations [T. A. Wesolowski, Phys. Rev. A 77(1), 012504 (2008)]. FDET provides the expression for the embedding potential as a functional of the electron density of the embedded species, electron density of the environment, and the field generated by other charges in the environment. Under certain conditions, FDET leads to the exact ground-state energy and density of the whole system. Following Perdew-Levy theorem on stationary states of the ground-state energy functional, the other-than-ground-state stationary states of the FDET energy functional correspond to excited states. In the present work, we analyze such use of other-than-ground-state embedded wavefunctions obtained in practical calculations, i.e., when the FDET embedding potential is approximated. Three computational approaches based on FDET, that assure self-consistent excitation energy and embedded wavefunction dealing with the issue of orthogonality of embedded wavefunctions for different states in a different manner, are proposed and discussed.

  20. Embedded Hardware

    CERN Document Server

    Ganssle, Jack G; Eady, Fred; Edwards, Lewin; Katz, David J; Gentile, Rick

    2007-01-01

    The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!. Circuit design using microcontrollers is both a science and an art. This book covers it all. It details all of the essential theory and facts to help an engineer design a robust embedded system. Processors, memory, and the hot topic of interconnects (I/O) are completely covered. Our authors bring a wealth of experience and ideas; thi

  1. Multilingual Word Embeddings using Multigraphs

    OpenAIRE

    Soricut, Radu; Ding, Nan

    2016-01-01

    We present a family of neural-network--inspired models for computing continuous word representations, specifically designed to exploit both monolingual and multilingual text. This framework allows us to perform unsupervised training of embeddings that exhibit higher accuracy on syntactic and semantic compositionality, as well as multilingual semantic similarity, compared to previous models trained in an unsupervised fashion. We also show that such multilingual embeddings, optimized for semant...

  2. Graph Embedding for Pattern Analysis

    CERN Document Server

    Ma, Yunqian

    2013-01-01

    Graph Embedding for Pattern Analysis covers theory methods, computation, and applications widely used in statistics, machine learning, image processing, and computer vision. This book presents the latest advances in graph embedding theories, such as nonlinear manifold graph, linearization method, graph based subspace analysis, L1 graph, hypergraph, undirected graph, and graph in vector spaces. Real-world applications of these theories are spanned broadly in dimensionality reduction, subspace learning, manifold learning, clustering, classification, and feature selection. A selective group of experts contribute to different chapters of this book which provides a comprehensive perspective of this field.

  3. Embedded Compilers

    NARCIS (Netherlands)

    Baars, A.I.

    2009-01-01

    For automation it is important to express the knowledge of the experts in a form that is understood by a computer. Each area of knowledge has its own terminology and ways of formulating things; be it by drawing diagrams, using formulae, or using formalized languages. In the last case we say we have

  4. Software for Embedded Control Systems

    NARCIS (Netherlands)

    Broenink, Jan F.; Hilderink, Gerald H.; Jovanovic, Dusko S.

    2001-01-01

    The research of our team deals with the realization of control schemes on digital computers. As such the emphasis is on embedded control software implementation. Applications are in the field of mechatronic devices, using a mechatronic design approach (the integrated and optimal design of a mechanic

  5. Teaching Embedded System Concepts for Technological Literacy

    Science.gov (United States)

    Winzker, M.; Schwandt, A.

    2011-01-01

    A basic understanding of technology is recognized as important knowledge even for students not connected with engineering and computer science. This paper shows that embedded system concepts can be taught in a technological literacy course. An embedded system teaching block that has been used in an electronics module for non-engineers is…

  6. Conceptualizing Embedded Configuration

    DEFF Research Database (Denmark)

    Oddsson, Gudmundur Valur; Hvam, Lars; Lysgaard, Ole

    2006-01-01

    and services. The general idea can be named embedded configuration. In this article we intend to conceptualize embedded configuration, what it is and is not. The difference between embedded configuration, sales configuration and embedded software is explained. We will look at what is needed to make embedded...... configuration systems. That will include requirements to product modelling techniques. An example with consumer electronics will illuminate the elements of embedded configuration in settings that most can relate to. The question of where embedded configuration would be relevant is discussed, and the current...

  7. Extrinsic Curvature Embedding Diagrams

    CERN Document Server

    Lu, J L

    2003-01-01

    Embedding diagrams have been used extensively to visualize the properties of curved space in Relativity. We introduce a new kind of embedding diagram based on the {\\it extrinsic} curvature (instead of the intrinsic curvature). Such an extrinsic curvature embedding diagram, when used together with the usual kind of intrinsic curvature embedding diagram, carries the information of how a surface is {\\it embedded} in the higher dimensional curved space. Simple examples are given to illustrate the idea.

  8. Hilbert-Twin – A Novel Hilbert Transform-Based Method To Compute Envelope Of Free Decaying Oscillations Embedded In Noise, And The Logarithmic Decrement In High-Resolution Mechanical Spectroscopy HRMS

    Directory of Open Access Journals (Sweden)

    Magalas L.B.

    2015-06-01

    Full Text Available In this work, we present a novel Hilbert-twin method to compute an envelope and the logarithmic decrement, δ, from exponentially damped time-invariant harmonic strain signals embedded in noise. The results obtained from five computing methods: (1 the parametric OMI (Optimization in Multiple Intervals method, two interpolated discrete Fourier transform-based (IpDFT methods: (2 the Yoshida-Magalas (YM method and (3 the classic Yoshida (Y method, (4 the novel Hilbert-twin (H-twin method based on the Hilbert transform, and (5 the conventional Hilbert transform (HT method are analyzed and compared. The fundamental feature of the Hilbert-twin method is the efficient elimination of intrinsic asymmetrical oscillations of the envelope, aHT (t, obtained from the discrete Hilbert transform of analyzed signals. Excellent performance in estimation of the logarithmic decrement from the Hilbert-twin method is comparable to that of the OMI and YM for the low- and high-damping levels. The Hilbert-twin method proved to be robust and effective in computing the logarithmic decrement and the resonant frequency of exponentially damped free decaying signals embedded in experimental noise. The Hilbert-twin method is also appropriate to detect nonlinearities in mechanical loss measurements of metals and alloys.

  9. A randomized model for communicating embedded systems

    NARCIS (Netherlands)

    Bujorianu, M.C.; Bujorianu, L.M.

    2008-01-01

    Nowadays, there is an intense research activity in designing systems that operate in real life, physical environments. This research is spanned by various areas in computer science and engineering: embedded systems, reactive systems, wireless communications, hybrid systems, stochastic processes, etc

  10. A randomized model for communicating embedded systems

    NARCIS (Netherlands)

    Bujorianu, M.C.; Bujorianu, L.M.

    2008-01-01

    Nowadays, there is an intense research activity in designing systems that operate in real life, physical environments. This research is spanned by various areas in computer science and engineering: embedded systems, reactive systems, wireless communications, hybrid systems, stochastic processes,

  11. Unsteady Flame Embedding

    KAUST Repository

    El-Asrag, Hossam A.

    2011-01-01

    Direct simulation of all the length and time scales relevant to practical combustion processes is computationally prohibitive. When combustion processes are driven by reaction and transport phenomena occurring at the unresolved scales of a numerical simulation, one must introduce a dynamic subgrid model that accounts for the multiscale nature of the problem using information available on a resolvable grid. Here, we discuss a model that captures unsteady flow-flame interactions- including extinction, re-ignition, and history effects-via embedded simulations at the subgrid level. The model efficiently accounts for subgrid flame structure and incorporates detailed chemistry and transport, allowing more accurate prediction of the stretch effect and the heat release. In this chapter we first review the work done in the past thirty years to develop the flame embedding concept. Next we present a formulation for the same concept that is compatible with Large Eddy Simulation in the flamelet regimes. The unsteady flame embedding approach (UFE) treats the flame as an ensemble of locally one-dimensional flames, similar to the flamelet approach. However, a set of elemental one-dimensional flames is used to describe the turbulent flame structure directly at the subgrid level. The calculations employ a one-dimensional unsteady flame model that incorporates unsteady strain rate, curvature, and mixture boundary conditions imposed by the resolved scales. The model is used for closure of the subgrid terms in the context of large eddy simulation. Direct numerical simulation (DNS) data from a flame-vortex interaction problem is used for comparison. © Springer Science+Business Media B.V. 2011.

  12. 锥形束CT检查在颌骨埋伏牙定位中的应用%Application of cone beam computed tomography in locating of embedded teeth in jaw

    Institute of Scientific and Technical Information of China (English)

    蒋蕾; 张来健; 李向新; 马跃翠; 徐伟; 徐宏志

    2014-01-01

    目的:探讨锥形束CT检查在颌骨内埋伏牙定位中的应用。方法对55例埋伏牙患者行锥形束CT检查,通过数据处理获得任意平面图像、曲面断层图像及牙体表面三维立体图像,从而获得埋伏牙的准确定位。结果55例87颗埋伏牙通过锥形束CT多种重建技术的组合应用,均得以清晰显示埋伏牙的位置、形态、大小、萌出方向及其与周围组织的关系,且定位情况与术中埋伏牙实际位置情况一致,诊断准确率100%。术后创口均一期愈合,无感染、邻牙压根和根尖血管损伤等并发症发生。结论锥形束CT检查可提供埋伏牙位置的准确数据,为治疗方案的选择提供客观依据,具有重要的临床应用价值。%Objective To evaluate the application of cone beam computed tomography (CT) in locating of embedded teeth in jaw. Methods Fifty five patients with 87 embedded teeth in jaw were scanned by cone beam CT.The exact location of the embedded teeth in jaws was acquired by using multiplanar reconstruction from difference direction images,panoramic im-ages and the three- dimensional images. Results The location, shape,size,erupted orientation and relationship with surround-ing tissues of 87 embedded teeth in 55 patients were displayed clearly by cone beam CT. The positions were completely con-firmed by surgery. The minimal intraoperative trauma and no postoperative complications were achieved by the accurate choice of surgical approaches. Conclusion Cone beam CT can provide detailed information and objective evidence of embedded teeth in jaw, which is of value in planning clinical treatment.

  13. Corrosion Monitors for Embedded Evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Robinson, Alex L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pfeifer, Kent B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Casias, Adrian L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Howell, Stephen W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sorensen, Neil R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Missert, Nancy A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-05-01

    We have developed and characterized novel in-situ corrosion sensors to monitor and quantify the corrosive potential and history of localized environments. Embedded corrosion sensors can provide information to aid health assessments of internal electrical components including connectors, microelectronics, wires, and other susceptible parts. When combined with other data (e.g. temperature and humidity), theory, and computational simulation, the reliability of monitored systems can be predicted with higher fidelity.

  14. Embedded multiprocessors scheduling and synchronization

    CERN Document Server

    Sriram, Sundararajan

    2009-01-01

    Techniques for Optimizing Multiprocessor Implementations of Signal Processing ApplicationsAn indispensable component of the information age, signal processing is embedded in a variety of consumer devices, including cell phones and digital television, as well as in communication infrastructure, such as media servers and cellular base stations. Multiple programmable processors, along with custom hardware running in parallel, are needed to achieve the computation throughput required of such applications. Reviews important research in key areas related to the multiprocessor implementation of multi

  15. ET: An Energy-efficient Processor Architecture for Embedded Tera-scale Computing%ET:一种能耗有效的高性能嵌入式处理器

    Institute of Scientific and Technical Information of China (English)

    杨乾明; 伍楠; 管茂林; 张春元; 全巍; 黄达飞

    2011-01-01

    As criterions and algorithms evolve and become molt complex,high performance embedded application demands the high performance and energy efficiency.The challenge,however,is how to turn the VLSI capability into the actual computing performance.This research proposed an energy efficient processor architecture named ET(Embedded Tera-scale Computing),which is composed of many lightweight VLIW processor cores.Also named small COILS.Each core executes a thread witll the mechanisms for explicitly managing the data and instructions.ET uses a hierarchical data registers to reduce the cost of delivering data,and the asymmetric and distributed instruction registers to deliver the instructions.In order to further reduce the energy,ET employs non-deep pipeline and simple control flow and optimizes the execution of loop body of applications.The primary result shows that ET Can achieve the 1TOPS performance and the 100GOPS/W efficiency when scaled to 40nm.%随着标准和算法的不断演进,高端嵌入式应用对性能和能耗提出了越来越高的要求.然而,能耗问题成为将VLSI潜力转换为实际应用需求的最大挑战,基于此,提出ET( Embedded Tera-scale Computing)处理器设计.ET以众多轻量级处理器(称为小核)来搭建目标处理器,每个小核都是一个基于显式数据和指令管理的VLIW处理器,能单独执行一个线程,采用层次化的寄存器文件和非对称全分布式指令寄存器来分别降低数据和指令的供应能耗.为了进一步降低功耗,ET处理器采用了较短的运算流水线和简单的循环控制结构,并面向应用领域针对循环体进行优化.初步的实验结果表明,在40nm工艺下,ET处理器可以获得单芯片1TOPS以上的性能,同时保持操作能效比在100GOPS/W以上.

  16. Embedded ubiquitous services on hospital information systems.

    Science.gov (United States)

    Kuroda, Tomohiro; Sasaki, Hiroshi; Suenaga, Takatoshi; Masuda, Yasushi; Yasumuro, Yoshihiro; Hori, Kenta; Ohboshi, Naoki; Takemura, Tadamasa; Chihara, Kunihiro; Yoshihara, Hiroyuki

    2012-11-01

    A Hospital Information Systems (HIS) have turned a hospital into a gigantic computer with huge computational power, huge storage and wired/wireless local area network. On the other hand, a modern medical device, such as echograph, is a computer system with several functional units connected by an internal network named a bus. Therefore, we can embed such a medical device into the HIS by simply replacing the bus with the local area network. This paper designed and developed two embedded systems, a ubiquitous echograph system and a networked digital camera. Evaluations of the developed systems clearly show that the proposed approach, embedding existing clinical systems into HIS, drastically changes productivity in the clinical field. Once a clinical system becomes a pluggable unit for a gigantic computer system, HIS, the combination of multiple embedded systems with application software designed under deep consideration about clinical processes may lead to the emergence of disruptive innovation in the clinical field.

  17. On Injective Embeddings of Tree Patterns

    CERN Document Server

    Michaliszyn, Jakub; Staworko, Sławek; Wieczorek, Piotr; Wu, Zhilin

    2012-01-01

    We study three different kinds of embeddings of tree patterns: weakly-injective, ancestor-preserving, and lca-preserving. While each of them is often referred to as injective embedding, they form a proper hierarchy and their computational properties vary (from P to NP-complete). We present a thorough study of the complexity of the model checking problem i.e., is there an embedding of a given tree pattern in a given tree, and we investigate the impact of various restrictions imposed on the tree pattern: bound on the degree of a node, bound on the height, and type of allowed labels and edges.

  18. Indirect adaptive soft computing based wavelet-embedded control paradigms for WT/PV/SOFC in a grid/charging station connected hybrid power system.

    Science.gov (United States)

    Mumtaz, Sidra; Khan, Laiq; Ahmed, Saghir; Bader, Rabiah

    2017-01-01

    This paper focuses on the indirect adaptive tracking control of renewable energy sources in a grid-connected hybrid power system. The renewable energy systems have low efficiency and intermittent nature due to unpredictable meteorological conditions. The domestic load and the conventional charging stations behave in an uncertain manner. To operate the renewable energy sources efficiently for harvesting maximum power, instantaneous nonlinear dynamics should be captured online. A Chebyshev-wavelet embedded NeuroFuzzy indirect adaptive MPPT (maximum power point tracking) control paradigm is proposed for variable speed wind turbine-permanent synchronous generator (VSWT-PMSG). A Hermite-wavelet incorporated NeuroFuzzy indirect adaptive MPPT control strategy for photovoltaic (PV) system to extract maximum power and indirect adaptive tracking control scheme for Solid Oxide Fuel Cell (SOFC) is developed. A comprehensive simulation test-bed for a grid-connected hybrid power system is developed in Matlab/Simulink. The robustness of the suggested indirect adaptive control paradigms are evaluated through simulation results in a grid-connected hybrid power system test-bed by comparison with conventional and intelligent control techniques. The simulation results validate the effectiveness of the proposed control paradigms.

  19. The Effects of Embedded Generative Learning Strategies and Collaboration on Knowledge Acquisition in a Cognitive Flexibility-Based Computer Learning Environment

    Science.gov (United States)

    1998-08-07

    collaboratively in computer-based instruction perform as well as students working alone (Carrier & Sales, 1987; Makuch , Robillard, & Yoder, 1992; Webb, 1985...others find no significant differences between individuals and small groups (Carrier & Sales, 1987; Makuch et al., 1992; Webb, 1985). Webb (1987...skills; meanwhile, in a study of adult learners (considered high ability), Makuch , Robillard, and Yoder (1992) found no significant difference in

  20. Embedded systems handbook

    CERN Document Server

    Zurawski, Richard

    2005-01-01

    Embedded systems are nearly ubiquitous, and books on individual topics or components of embedded systems are equally abundant. Unfortunately, for those designers who thirst for knowledge of the big picture of embedded systems there is not a drop to drink. Until now. The Embedded Systems Handbook is an oasis of information, offering a mix of basic and advanced topics, new solutions and technologies arising from the most recent research efforts, and emerging trends to help you stay current in this ever-changing field.With preeminent contributors from leading industrial and academic institutions

  1. Pro Linux Embedded Systems

    CERN Document Server

    Sally, Gene

    2010-01-01

    Today, Linux is included with nearly every embedded platform. Embedded developers can take a more modern route and spend more time tuning Linux and taking advantage of open source code to build more robust, feature-rich applications. While Gene Sally does not neglect porting Linux to new hardware, modern embedded hardware is more sophisticated than ever: most systems include the capabilities found on desktop systems. This book is written from the perspective of a user employing technologies and techniques typically reserved for desktop systems. * Modern guide for developing embedded Linux syst

  2. Embedding beyond electrostatics

    DEFF Research Database (Denmark)

    Nåbo, Lina J.; Olsen, Jógvan Magnus Haugaard; Holmgaard List, Nanna;

    2016-01-01

    We study excited states of cholesterol in solution and show that, in this specific case, solute wave-function confinement is the main effect of the solvent. This is rationalized on the basis of the polarizable density embedding scheme, which in addition to polarizable embedding includes non-electrostatic...... repulsion that effectively confines the solute wave function to its cavity. We illustrate how the inclusion of non-electrostatic repulsion results in a successful identification of the intense π → π∗ transition, which was not possible using an embedding method that only includes electrostatics....... This underlines the importance of non-electrostatic repulsion in quantum-mechanical embedding-based methods....

  3. Embedded systems handbook networked embedded systems

    CERN Document Server

    Zurawski, Richard

    2009-01-01

    Considered a standard industry resource, the Embedded Systems Handbook provided researchers and technicians with the authoritative information needed to launch a wealth of diverse applications, including those in automotive electronics, industrial automated systems, and building automation and control. Now a new resource is required to report on current developments and provide a technical reference for those looking to move the field forward yet again. Divided into two volumes to accommodate this growth, the Embedded Systems Handbook, Second Edition presents a comprehensive view on this area

  4. 高功耗嵌入式单板计算机的电源设计与实现%Design and implementation of power supply for embedded single board computer with high consumption

    Institute of Scientific and Technical Information of China (English)

    刘宝明; 苏培培

    2012-01-01

    In order to satisfy the power supply of embedded single board computer based on high-powered dual cores processor MPC8641D, the feature of the MPC8641D and function of computer are analyzed, the circuits of power supply based on various DC-DC chips is designed, and by design the controller of power on sequence based on CPLD, the sequence control of all kinds of power supply and the management of reset are implemented. The practice indicated the stability and flexibility of the design.%为了满足基于高性能双核MPC8641D处理器的高功耗嵌入式单板计算机的电源设计,分析了处理器的供电要求和单板计算机的整体电路功能,开展了基于多种电源转换芯片的供电设计,解决了高功耗嵌入式单板计算机的供电问题.通过设计基于可编程逻辑器件CPLD的上电时序控制器,实现了多种电源之间的加电时序控制以及复位管理.单板计算机的实际应用结果表明该电源设计稳定可靠、灵活通用.

  5. Piecewise flat embeddings for hyperspectral image analysis

    Science.gov (United States)

    Hayes, Tyler L.; Meinhold, Renee T.; Hamilton, John F.; Cahill, Nathan D.

    2017-05-01

    Graph-based dimensionality reduction techniques such as Laplacian Eigenmaps (LE), Local Linear Embedding (LLE), Isometric Feature Mapping (ISOMAP), and Kernel Principal Components Analysis (KPCA) have been used in a variety of hyperspectral image analysis applications for generating smooth data embeddings. Recently, Piecewise Flat Embeddings (PFE) were introduced in the computer vision community as a technique for generating piecewise constant embeddings that make data clustering / image segmentation a straightforward process. In this paper, we show how PFE arises by modifying LE, yielding a constrained ℓ1-minimization problem that can be solved iteratively. Using publicly available data, we carry out experiments to illustrate the implications of applying PFE to pixel-based hyperspectral image clustering and classification.

  6. Multipole moments for embedding potentials

    DEFF Research Database (Denmark)

    Nørby, Morten Steen; Olsen, Jógvan Magnus Haugaard; Kongsted, Jacob

    2016-01-01

    Polarizable quantum mechanical (QM)/molecular mechanics (MM)-embedding methods are currently among the most promising methods for computationally feasible, yet reliable, production calculations of localized excitations and molecular response properties of large molecular complexes, such as proteins...... extended with site polarizabilities including internal charge transfer terms. We present a new way of dealing with well-known problems in relation to the use of basis sets with diffuse functions in conventional atomic allocation algorithms, avoiding numerical integration schemes. Using this approach, we...

  7. The Use of Video-Gaming Devices as a Motivation for Learning Embedded Systems Programming

    Science.gov (United States)

    Gonzalez, J.; Pomares, H.; Damas, M.; Garcia-Sanchez,P.; Rodriguez-Alvarez, M.; Palomares, J. M.

    2013-01-01

    As embedded systems are becoming prevalent in everyday life, many universities are incorporating embedded systems-related courses in their undergraduate curricula. However, it is not easy to motivate students in such courses since they conceive of embedded systems as bizarre computing elements, different from the personal computers with which they…

  8. Autonomous Multicamera Tracking on Embedded Smart Cameras

    Directory of Open Access Journals (Sweden)

    Bischof Horst

    2007-01-01

    Full Text Available There is currently a strong trend towards the deployment of advanced computer vision methods on embedded systems. This deployment is very challenging since embedded platforms often provide limited resources such as computing performance, memory, and power. In this paper we present a multicamera tracking method on distributed, embedded smart cameras. Smart cameras combine video sensing, processing, and communication on a single embedded device which is equipped with a multiprocessor computation and communication infrastructure. Our multicamera tracking approach focuses on a fully decentralized handover procedure between adjacent cameras. The basic idea is to initiate a single tracking instance in the multicamera system for each object of interest. The tracker follows the supervised object over the camera network, migrating to the camera which observes the object. Thus, no central coordination is required resulting in an autonomous and scalable tracking approach. We have fully implemented this novel multicamera tracking approach on our embedded smart cameras. Tracking is achieved by the well-known CamShift algorithm; the handover procedure is realized using a mobile agent system available on the smart camera network. Our approach has been successfully evaluated on tracking persons at our campus.

  9. Adaptive Embedded Digital System for Plasma Diagnostics

    Science.gov (United States)

    González, Angel; Rodríguez, Othoniel; Mangual, Osvaldo; Ponce, Eduardo; Vélez, Xavier

    2014-05-01

    An Adaptive Embedded Digital System to perform plasma diagnostics using electrostatic probes was developed at the Plasma Engineering Laboratory at Polytechnic University of Puerto Rico. The system will replace the existing instrumentation at the Laboratory, using reconfigurable hardware to minimize the equipment and software needed to perform diagnostics. The adaptability of the design resides on the possibility of replacing the computational algorithm on the fly, allowing to use the same hardware for different probes. The system was prototyped using Very High Speed Integrated Circuits Hardware Description Language (VHDL) into an Field Programmable Gate Array (FPGA) board. The design of the Embedded Digital System includes a Zero Phase Digital Filter, a Derivative Unit, and a Computational Unit designed using the VHDL-2008 Support Library. The prototype is able to compute the Plasma Electron Temperature and Density from a Single Langmuir probe. The system was tested using real data previously acquired from a single Langmuir probe. The plasma parameters obtained from the embedded system were compared with results computed using matlab yielding excellent matching. The new embedded system operates on 4096 samples versus 500 on the previous system, and completes its computations in 26 milliseconds compared with about 15 seconds on the previous system.

  10. Embedded Web Technology: Applying World Wide Web Standards to Embedded Systems

    Science.gov (United States)

    Ponyik, Joseph G.; York, David W.

    2002-01-01

    Embedded Systems have traditionally been developed in a highly customized manner. The user interface hardware and software along with the interface to the embedded system are typically unique to the system for which they are built, resulting in extra cost to the system in terms of development time and maintenance effort. World Wide Web standards have been developed in the passed ten years with the goal of allowing servers and clients to intemperate seamlessly. The client and server systems can consist of differing hardware and software platforms but the World Wide Web standards allow them to interface without knowing about the details of system at the other end of the interface. Embedded Web Technology is the merging of Embedded Systems with the World Wide Web. Embedded Web Technology decreases the cost of developing and maintaining the user interface by allowing the user to interface to the embedded system through a web browser running on a standard personal computer. Embedded Web Technology can also be used to simplify an Embedded System's internal network.

  11. Embedded Fragments Registry (EFR)

    Data.gov (United States)

    Department of Veterans Affairs — In 2009, the Department of Defense estimated that approximately 40,000 service members who served in OEF/OIF may have embedded fragment wounds as the result of small...

  12. Electronics for embedded systems

    CERN Document Server

    Bindal, Ahmet

    2017-01-01

    This book provides semester-length coverage of electronics for embedded systems, covering most common analog and digital circuit-related issues encountered while designing embedded system hardware. It is written for students and young professionals who have basic circuit theory background and want to learn more about passive circuits, diode and bipolar transistor circuits, the state-of-the-art CMOS logic family and its interface with older logic families such as TTL, sensors and sensor physics, operational amplifier circuits to condition sensor signals, data converters and various circuits used in electro-mechanical device control in embedded systems. The book also provides numerous hardware design examples by integrating the topics learned in earlier chapters. The last chapter extensively reviews the combinational and sequential logic design principles to be able to design the digital part of embedded system hardware.

  13. Smart Multicore Embedded Systems

    DEFF Research Database (Denmark)

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very...... specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention...... and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generation. Describes tools and programming models for multicore embedded systems Emphasizes throughout performance per watt scalability Discusses realistic limits of software parallelization Enables...

  14. Scheduling of network access for feedback-based embedded systems

    Science.gov (United States)

    Liberatore, Vincenzo

    2002-07-01

    nd communication capabilities. Examples range from smart dust embedded in building materials to networks of appliances in the home. Embedded devices will be deployed in unprecedented numbers, will enable pervasive distributed computing, and will radically change the way people interact with the surrounding environment [EGH00a]. The paper targets embedded systems and their real-time (RT) communication requirements. RT requirements arise from the

  15. On Verification Modelling of Embedded Systems

    NARCIS (Netherlands)

    Brinksma, Ed; Mader, Angelika

    2004-01-01

    Computer-aided verification of embedded systems hinges on the availability of good verification models of the systems at hand. Such models must be much simpler than full design models or specifications to be of practical value, because of the unavoidable combinatorial complexities in the verificatio

  16. Integrated Design Tools for Embedded Control Systems

    NARCIS (Netherlands)

    Jovanovic, D.S.; Hilderink, G.H.; Broenink, Johannes F.; Karelse, F.

    2001-01-01

    Currently, computer-based control systems are still being implemented using the same techniques as 10 years ago. The purpose of this project is the development of a design framework, consisting of tools and libraries, which allows the designer to build high reliable heterogeneous real-time embedded

  17. Embedding capacity estimation of reversible watermarking schemes

    Indian Academy of Sciences (India)

    Rishabh Iyer; Rushikesh Borse; Subhasis Chaudhuri

    2014-12-01

    Estimation of the embedding capacity is an important problem specifically in reversible multi-pass watermarking and is required for analysis before any image can be watermarked. In this paper, we propose an efficient method for estimating the embedding capacity of a given cover image under multi-pass embedding, without actually embedding the watermark. We demonstrate this for a class of reversible watermarking schemes which operate on a disjoint group of pixels, specifically for pixel pairs. The proposed algorithm iteratively updates the co-occurrence matrix at every stage to estimate the multi-pass embedding capacity, and is much more efficient vis-a-vis actual watermarking. We also suggest an extremely efficient, pre-computable tree based implementation which is conceptually similar to the cooccurrence based method, but provides the estimates in a single iteration, requiring a complexity akin to that of single pass capacity estimation. We also provide upper bounds on the embedding capacity.We finally evaluate performance of our algorithms on recent watermarking algorithms.

  18. Arm To Arm Interface Using Embedded C

    Directory of Open Access Journals (Sweden)

    Mohanraj.C

    2013-02-01

    Full Text Available Embedded systems are the most emerging field in these recent years. In this paper a different number of ARM processors (LPC2148 and LPC2378 are interconnected using C for distributed services. N numbers of processors are connected as the network and each processing devices are interlinked with each other, so that the each data that is processed by the devices and it can be used by the other device to activate their entire process. All the processed data’s are communicated to other device through Xbee interface card. LPC2148 and LPC2378 ARM processors are used in this prototype and winXtalk is used as a software terminal window. In this paper, the ultimate benefits of multiple processor interactions related to the embedded applications and design issues of processor interconnection are discussed. The features of multiple processor interaction in inter process communication and executions of embedded multitasking are also discussed. In modern embedded computing platform, embedded processor used in various applications like home automation, industrial control, medical system, access control, etc. In this paper, using embedded processor interactions, the several data communication is established.

  19. Accurate basis set truncation for wavefunction embedding

    Science.gov (United States)

    Barnes, Taylor A.; Goodpaster, Jason D.; Manby, Frederick R.; Miller, Thomas F.

    2013-07-01

    Density functional theory (DFT) provides a formally exact framework for performing embedded subsystem electronic structure calculations, including DFT-in-DFT and wavefunction theory-in-DFT descriptions. In the interest of efficiency, it is desirable to truncate the atomic orbital basis set in which the subsystem calculation is performed, thus avoiding high-order scaling with respect to the size of the MO virtual space. In this study, we extend a recently introduced projection-based embedding method [F. R. Manby, M. Stella, J. D. Goodpaster, and T. F. Miller III, J. Chem. Theory Comput. 8, 2564 (2012)], 10.1021/ct300544e to allow for the systematic and accurate truncation of the embedded subsystem basis set. The approach is applied to both covalently and non-covalently bound test cases, including water clusters and polypeptide chains, and it is demonstrated that errors associated with basis set truncation are controllable to well within chemical accuracy. Furthermore, we show that this approach allows for switching between accurate projection-based embedding and DFT embedding with approximate kinetic energy (KE) functionals; in this sense, the approach provides a means of systematically improving upon the use of approximate KE functionals in DFT embedding.

  20. Embedded Systems Design: Optimization Challenges

    DEFF Research Database (Denmark)

    Pop, Paul

    2005-01-01

    Summary form only given. Embedded systems are everywhere: from alarm clocks to PDAs, from mobile phones to cars, almost all the devices we use are controlled by embedded systems. Over 99% of the microprocessors produced today are used in embedded systems, and recently the number of embedded systems...

  1. EMBEDDING FLOWS AND SMOOTH CONJUGACY

    Institute of Scientific and Technical Information of China (English)

    ZHANGMEIRONG; LIWEIGU

    1997-01-01

    The authors use the functional equation for embedding vector fields to study smooth embedding flows of one-dimensional diffeomorphisms. The existence and uniqueness for smooth embedding flows and vector fields are proved. As an application of embedding flows, some classification results about local and giobal diffeomorphisms under smooth conjugacy are given.

  2. COMPUTING

    CERN Multimedia

    M. Kasemann

    Overview In autumn the main focus was to process and handle CRAFT data and to perform the Summer08 MC production. The operational aspects were well covered by regular Computing Shifts, experts on duty and Computing Run Coordination. At the Computing Resource Board (CRB) in October a model to account for service work at Tier 2s was approved. The computing resources for 2009 were reviewed for presentation at the C-RRB. The quarterly resource monitoring is continuing. Facilities/Infrastructure operations Operations during CRAFT data taking ran fine. This proved to be a very valuable experience for T0 workflows and operations. The transfers of custodial data to most T1s went smoothly. A first round of reprocessing started at the Tier-1 centers end of November; it will take about two weeks. The Computing Shifts procedure was tested full scale during this period and proved to be very efficient: 30 Computing Shifts Persons (CSP) and 10 Computing Resources Coordinators (CRC). The shift program for the shut down w...

  3. 采棉机智能监控系统的设计与研究-基于嵌入式云计算平台%Design and Research of Intelligent Monitoring System for Embedded Cotton Picking Machine-Based on the Embeded Cloud Computing Platform

    Institute of Scientific and Technical Information of China (English)

    钱坤; 齐莉

    2017-01-01

    近年来,越来越多的虚拟仪器技术及相应的机械设备得到了一定的推广普及,且在工业生产、农业生产领域取得了巨大效益。为此,基于嵌入式云计算平台设计了一种车载式采棉机自动监测控制系统。以我国新疆棉花生产、采摘作为探究对象,重点介绍了安装车载监控终端如何对采棉机作业位置信息与状态数据进行实时自动采集。%In recent years, more and more virtual instrument technology and corresponding mechanical equipment has been popularized, and in the field of industrial production, agricultural production has made great benefits. In this paper, based on the embedded cloud computing platform cotton intelligent monitoring system design and Research on the subject, in order to improve cotton picker has the ability of autonomous navigation, and cotton path planning of the online control of the proposed and designed a vehicle type cotton picker real-time and automatic monitoring control system terminal. Here in China's cotton production in Xinjiang, picking as a research object and focuses on vehicle monitoring terminal in-stallation of cotton job location information and state data real time automatic acquisition. The research in cotton intelli-gent monitoring system structure design, mainly consists of two layers, namely hardware design, software design.

  4. COMPUTING

    CERN Multimedia

    M. Kasemann

    Overview During the past three months activities were focused on data operations, testing and re-enforcing shift and operational procedures for data production and transfer, MC production and on user support. Planning of the computing resources in view of the new LHC calendar in ongoing. Two new task forces were created for supporting the integration work: Site Commissioning, which develops tools helping distributed sites to monitor job and data workflows, and Analysis Support, collecting the user experience and feedback during analysis activities and developing tools to increase efficiency. The development plan for DMWM for 2009/2011 was developed at the beginning of the year, based on the requirements from the Physics, Computing and Offline groups (see Offline section). The Computing management meeting at FermiLab on February 19th and 20th was an excellent opportunity discussing the impact and for addressing issues and solutions to the main challenges facing CMS computing. The lack of manpower is particul...

  5. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction CMS distributed computing system performed well during the 2011 start-up. The events in 2011 have more pile-up and are more complex than last year; this results in longer reconstruction times and harder events to simulate. Significant increases in computing capacity were delivered in April for all computing tiers, and the utilisation and load is close to the planning predictions. All computing centre tiers performed their expected functionalities. Heavy-Ion Programme The CMS Heavy-Ion Programme had a very strong showing at the Quark Matter conference. A large number of analyses were shown. The dedicated heavy-ion reconstruction facility at the Vanderbilt Tier-2 is still involved in some commissioning activities, but is available for processing and analysis. Facilities and Infrastructure Operations Facility and Infrastructure operations have been active with operations and several important deployment tasks. Facilities participated in the testing and deployment of WMAgent and WorkQueue+Request...

  6. COMPUTING

    CERN Multimedia

    P. McBride

    The Computing Project is preparing for a busy year where the primary emphasis of the project moves towards steady operations. Following the very successful completion of Computing Software and Analysis challenge, CSA06, last fall, we have reorganized and established four groups in computing area: Commissioning, User Support, Facility/Infrastructure Operations and Data Operations. These groups work closely together with groups from the Offline Project in planning for data processing and operations. Monte Carlo production has continued since CSA06, with about 30M events produced each month to be used for HLT studies and physics validation. Monte Carlo production will continue throughout the year in the preparation of large samples for physics and detector studies ramping to 50 M events/month for CSA07. Commissioning of the full CMS computing system is a major goal for 2007. Site monitoring is an important commissioning component and work is ongoing to devise CMS specific tests to be included in Service Availa...

  7. Physical Activity Recognition from Smartphone Embedded Sensors

    DEFF Research Database (Denmark)

    Prudêncio, João; Aguiar, Ana; Roetter, Daniel Enrique Lucani

    2013-01-01

    The ubiquity of smartphones has motivated efforts to use the embedded sensors to detect various aspects of user context to transparently provide personalized and contextualized services to the user. One relevant piece of context is the physical activity of the smartphone user. In this paper, we...... propose a novel set of features for distinguishing five physical activities using only sensors embedded in the smartphone. Specifically, we introduce features that are normalized using the orientation sensor such that horizontal and vertical movements are explicitly computed. We evaluate a neural network...

  8. Converting VSAM in COBOL to embedded SQL

    Energy Technology Data Exchange (ETDEWEB)

    Huang, Hai; Wang, Yamin; Tsai, Wei-Tek [Univ. of Minnesota, Minneapolis, MN (United States)

    1996-12-31

    VSAM databases we widely used on IBM mainframe systems. As new technology, such as relational database and client-server computing, becomes popular, there is a need to reengineer the VSAM databases to relational databases. This paper addresses the issues on converting COBOL programs that access VSAM database to COBOL programs that access relational databases with embedded SQL. It proposed a semi-automatic approach to the conversion of VSAM data sets to SQL tables and VSAM operations in COBOL program to embedded SQL queries. The proposed approach has been experimented on several industrial COBOL programs and a tool implementing the approach is under development.

  9. The art of programming embedded systems

    CERN Document Server

    Ganssle, Jack

    1992-01-01

    Embedded systems are products such as microwave ovens, cars, and toys that rely on an internal microprocessor. This book is oriented toward the design engineer or programmer who writes the computer code for such a system. There are a number of problems specific to the embedded systems designer, and this book addresses them and offers practical solutions.Key Features* Offers cookbook routines, algorithms, and design techniques* Includes tips for handling debugging management and testing* Explores the philosophy of tightly coupling software and hardware in programming and dev

  10. Physical Activity Recognition from Smartphone Embedded Sensors

    DEFF Research Database (Denmark)

    Prudêncio, João; Aguiar, Ana; Roetter, Daniel Enrique Lucani

    2013-01-01

    The ubiquity of smartphones has motivated efforts to use the embedded sensors to detect various aspects of user context to transparently provide personalized and contextualized services to the user. One relevant piece of context is the physical activity of the smartphone user. In this paper, we...... propose a novel set of features for distinguishing five physical activities using only sensors embedded in the smartphone. Specifically, we introduce features that are normalized using the orientation sensor such that horizontal and vertical movements are explicitly computed. We evaluate a neural network...

  11. Smart multicore embedded systems

    CERN Document Server

    Bertels, Koen; Karlsson, Sven; Pacull, François

    2014-01-01

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very often they are forced to rewrite sequential programs into parallel software, taking into account all the low level features and peculiarities of the underlying platforms. Readers will benefit from these authors’ approach, which takes into account both the application requirements and the platform specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generati...

  12. Embedded data representations

    DEFF Research Database (Denmark)

    Willett, Wesley; Jansen, Yvonne; Dragicevic, Pierre

    2017-01-01

    We introduce embedded data representations, the use of visual and physical representations of data that are deeply integrated with the physical spaces, objects, and entities to which the data refers. Technologies like lightweight wireless displays, mixed reality hardware, and autonomous vehicles...... are making it increasingly easier to display data in-context. While researchers and artists have already begun to create embedded data representations, the benefits, trade-offs, and even the language necessary to describe and compare these approaches remain unexplored. In this paper, we formalize the notion...... of physical data referents – the real-world entities and spaces to which data corresponds – and examine the relationship between referents and the visual and physical representations of their data. We differentiate situated representations, which display data in proximity to data referents, and embedded...

  13. Using a Cluster for Securing Embedded Systems

    Directory of Open Access Journals (Sweden)

    Mohamed Salim LMIMOUNI

    2016-09-01

    Full Text Available In today's increasingly interconnected world, the deployment of an Intrusion Detection System (IDS is becoming very important for securing embedded systems from viruses, worms, attacks, etc. But IDSs face many challenges like computational resources and ubiquitous threats. Many of these challenges can be resolved by running the IDS in a cluster to allow tasks to be parallelly executed. In this paper, we propose to secure embedded systems by using a cluster of embedded cards that can run multiple instances of an IDS in a parallel way. This proposition is now possible with the availability of new low-power single-board computers (Raspberry Pi, BeagleBoard, Cubieboard, Galileo, etc.. To test the feasibility of our proposed architecture, we run two instances of the Bro IDS on two Raspberry Pi. The results show that we can effectively run multiple instances of an IDS in a parallel way on a cluster of new low-power single-board computers to secure embedded systems.

  14. Trusted Computing in Embedded Systems Workshop

    Science.gov (United States)

    2011-03-01

    AFRL http://www.cert.org/tces/pdf/duane%20gilmour.pdf Tom Schaffnit, Ford http://www.cert.org/tces/pdf/tom%20schaffnit.pdf Bob Thibadeau, Wave...Grumman Markham, Tom Honeywell McNamee, Dylan Galois Millen, Jon Wave O Murchu, Liam Symantec Peirce, Ken GM Perez, Ron AMD Prowell, Stacy...ORNL Schaffnit, Tom Ford Thibadeau, Bob Wave Academia Andrews, Archie CMU Blough, Doug Georgia Tech Chen, Peter CMU Eisenbarth

  15. Computational Deception

    NARCIS (Netherlands)

    Nijholt, Antinus; Acosta, P.S.; Cravo, P.

    2010-01-01

    In the future our daily life interactions with other people, with computers, robots and smart environments will be recorded and interpreted by computers or embedded intelligence in environments, furniture, robots, displays, and wearables. These sensors record our activities, our behaviour, and our

  16. COMPUTING

    CERN Multimedia

    I. Fisk

    2013-01-01

    Computing activity had ramped down after the completion of the reprocessing of the 2012 data and parked data, but is increasing with new simulation samples for analysis and upgrade studies. Much of the Computing effort is currently involved in activities to improve the computing system in preparation for 2015. Operations Office Since the beginning of 2013, the Computing Operations team successfully re-processed the 2012 data in record time, not only by using opportunistic resources like the San Diego Supercomputer Center which was accessible, to re-process the primary datasets HTMHT and MultiJet in Run2012D much earlier than planned. The Heavy-Ion data-taking period was successfully concluded in February collecting almost 500 T. Figure 3: Number of events per month (data) In LS1, our emphasis is to increase efficiency and flexibility of the infrastructure and operation. Computing Operations is working on separating disk and tape at the Tier-1 sites and the full implementation of the xrootd federation ...

  17. Computer

    CERN Document Server

    Atkinson, Paul

    2011-01-01

    The pixelated rectangle we spend most of our day staring at in silence is not the television as many long feared, but the computer-the ubiquitous portal of work and personal lives. At this point, the computer is almost so common we don't notice it in our view. It's difficult to envision that not that long ago it was a gigantic, room-sized structure only to be accessed by a few inspiring as much awe and respect as fear and mystery. Now that the machine has decreased in size and increased in popular use, the computer has become a prosaic appliance, little-more noted than a toaster. These dramati

  18. Locally Linear Discriminate Embedding for Face Recognition

    Directory of Open Access Journals (Sweden)

    Eimad E. Abusham

    2009-01-01

    Full Text Available A novel method based on the local nonlinear mapping is presented in this research. The method is called Locally Linear Discriminate Embedding (LLDE. LLDE preserves a local linear structure of a high-dimensional space and obtains a compact data representation as accurately as possible in embedding space (low dimensional before recognition. For computational simplicity and fast processing, Radial Basis Function (RBF classifier is integrated with the LLDE. RBF classifier is carried out onto low-dimensional embedding with reference to the variance of the data. To validate the proposed method, CMU-PIE database has been used and experiments conducted in this research revealed the efficiency of the proposed methods in face recognition, as compared to the linear and non-linear approaches.

  19. Embedded Based Miniaturized Universal Electrochemical Sensing Platform

    Directory of Open Access Journals (Sweden)

    Jiamin Chen

    2016-01-01

    Full Text Available We created an embedded sensing platform based on STM32 embedded system, with integrated carbon-electrode ionic sensor by using a self-made plug. Given ration of concentration-unknown nitrate liquid samples, this platform is able to measure the nitrate concentration in neutral environment. Response signals which were transmitted by the sensor can be displayed via a serial port to the computer screen or via Bluetooth to the smartphone. Processed by a fitting function, signals are transformed into related concentration. Through repeating the experiment many times, the accuracy and repeatability turned out to be excellent. The results can be automatically stored on smartphone via Bluetooth. We created this embedded sensing platform for field water quality measurement. This platform also can be applied for other micro sensors’ signal acquisition and data processing.

  20. Embedded Thermal Control for Spacecraft Subsystems Miniaturization

    Science.gov (United States)

    Didion, Jeffrey R.

    2014-01-01

    Optimization of spacecraft size, weight and power (SWaP) resources is an explicit technical priority at Goddard Space Flight Center. Embedded Thermal Control Subsystems are a promising technology with many cross cutting NSAA, DoD and commercial applications: 1.) CubeSatSmallSat spacecraft architecture, 2.) high performance computing, 3.) On-board spacecraft electronics, 4.) Power electronics and RF arrays. The Embedded Thermal Control Subsystem technology development efforts focus on component, board and enclosure level devices that will ultimately include intelligent capabilities. The presentation will discuss electric, capillary and hybrid based hardware research and development efforts at Goddard Space Flight Center. The Embedded Thermal Control Subsystem development program consists of interrelated sub-initiatives, e.g., chip component level thermal control devices, self-sensing thermal management, advanced manufactured structures. This presentation includes technical status and progress on each of these investigations. Future sub-initiatives, technical milestones and program goals will be presented.

  1. 多重嵌套的可计算非线性动态投入产出模型及其平衡增长解%MULTIPLE EMBEDDED COMPUTABLE NONLINEAR DYNAMIC INPUT OUTPUTMODEL AND ITS BALANCED GROWTH SOLUTIONS

    Institute of Scientific and Technical Information of China (English)

    张金水

    2000-01-01

    给出多重嵌套的可计算非线性动态投入产出模型,并给出相应的价格、利润率、产出结构、增长率的平衡增长解计算公式.从本文给出的模型可以看出非线性投入产出模型可以有无穷多种不同形式,其中只有1种为众所周知的列昂惕夫线性投入产出模型.本文模型的重要意义在于:它是线性投入产出模型与CGE(可计算一般均衡)模型的统一.它既克服了线性投入产出模型资本与劳动不可替代的缺点,又可方便地求解动态CGE的平衡增长解.%The multiple embedded computable nonlinear dynamic inputoutput model is given in this paper, and its balanced growth solutionsabout prices, output level, growth rate, profit rate are discussed. Wecan see from this model that there are infinite different cases ofnonlinear dynamic input output models, and only one of them is thewell-known Leontief I-O model. The significance of the model is that itunifies linear I-O model and dynamic CGE model . It not only overcomes the shortcoming of linear I-O model that the capital and labor can not be substituted, but also can easily find the balanced growth solutions of dynamic CGE model.

  2. Embedded foveation image coding.

    Science.gov (United States)

    Wang, Z; Bovik, A C

    2001-01-01

    The human visual system (HVS) is highly space-variant in sampling, coding, processing, and understanding. The spatial resolution of the HVS is highest around the point of fixation (foveation point) and decreases rapidly with increasing eccentricity. By taking advantage of this fact, it is possible to remove considerable high-frequency information redundancy from the peripheral regions and still reconstruct a perceptually good quality image. Great success has been obtained previously by a class of embedded wavelet image coding algorithms, such as the embedded zerotree wavelet (EZW) and the set partitioning in hierarchical trees (SPIHT) algorithms. Embedded wavelet coding not only provides very good compression performance, but also has the property that the bitstream can be truncated at any point and still be decoded to recreate a reasonably good quality image. In this paper, we propose an embedded foveation image coding (EFIC) algorithm, which orders the encoded bitstream to optimize foveated visual quality at arbitrary bit-rates. A foveation-based image quality metric, namely, foveated wavelet image quality index (FWQI), plays an important role in the EFIC system. We also developed a modified SPIHT algorithm to improve the coding efficiency. Experiments show that EFIC integrates foveation filtering with foveated image coding and demonstrates very good coding performance and scalability in terms of foveated image quality measurement.

  3. Embedded-monolith armor

    Science.gov (United States)

    McElfresh, Michael W.; Groves, Scott E; Moffet, Mitchell L.; Martin, Louis P.

    2016-07-19

    A lightweight armor system utilizing a face section having a multiplicity of monoliths embedded in a matrix supported on low density foam. The face section is supported with a strong stiff backing plate. The backing plate is mounted on a spall plate.

  4. COMPUTING

    CERN Multimedia

    I. Fisk

    2010-01-01

    Introduction It has been a very active quarter in Computing with interesting progress in all areas. The activity level at the computing facilities, driven by both organised processing from data operations and user analysis, has been steadily increasing. The large-scale production of simulated events that has been progressing throughout the fall is wrapping-up and reprocessing with pile-up will continue. A large reprocessing of all the proton-proton data has just been released and another will follow shortly. The number of analysis jobs by users each day, that was already hitting the computing model expectations at the time of ICHEP, is now 33% higher. We are expecting a busy holiday break to ensure samples are ready in time for the winter conferences. Heavy Ion An activity that is still in progress is computing for the heavy-ion program. The heavy-ion events are collected without zero suppression, so the event size is much large at roughly 11 MB per event of RAW. The central collisions are more complex and...

  5. COMPUTING

    CERN Multimedia

    M. Kasemann P. McBride Edited by M-C. Sawley with contributions from: P. Kreuzer D. Bonacorsi S. Belforte F. Wuerthwein L. Bauerdick K. Lassila-Perini M-C. Sawley

    Introduction More than seventy CMS collaborators attended the Computing and Offline Workshop in San Diego, California, April 20-24th to discuss the state of readiness of software and computing for collisions. Focus and priority were given to preparations for data taking and providing room for ample dialog between groups involved in Commissioning, Data Operations, Analysis and MC Production. Throughout the workshop, aspects of software, operating procedures and issues addressing all parts of the computing model were discussed. Plans for the CMS participation in STEP’09, the combined scale testing for all four experiments due in June 2009, were refined. The article in CMS Times by Frank Wuerthwein gave a good recap of the highly collaborative atmosphere of the workshop. Many thanks to UCSD and to the organizers for taking care of this workshop, which resulted in a long list of action items and was definitely a success. A considerable amount of effort and care is invested in the estimate of the comput...

  6. Diverse Power Iteration Embeddings and Its Applications

    Energy Technology Data Exchange (ETDEWEB)

    Huang H.; Yoo S.; Yu, D.; Qin, H.

    2014-12-14

    Abstract—Spectral Embedding is one of the most effective dimension reduction algorithms in data mining. However, its computation complexity has to be mitigated in order to apply it for real-world large scale data analysis. Many researches have been focusing on developing approximate spectral embeddings which are more efficient, but meanwhile far less effective. This paper proposes Diverse Power Iteration Embeddings (DPIE), which not only retains the similar efficiency of power iteration methods but also produces a series of diverse and more effective embedding vectors. We test this novel method by applying it to various data mining applications (e.g. clustering, anomaly detection and feature selection) and evaluating their performance improvements. The experimental results show our proposed DPIE is more effective than popular spectral approximation methods, and obtains the similar quality of classic spectral embedding derived from eigen-decompositions. Moreover it is extremely fast on big data applications. For example in terms of clustering result, DPIE achieves as good as 95% of classic spectral clustering on the complex datasets but 4000+ times faster in limited memory environment.

  7. Power optimized programmable embedded controller

    CERN Document Server

    Kamaraju, M; Tilak, A V N; 10.5121/ijcnc.2010.2409

    2010-01-01

    Now a days, power has become a primary consideration in hardware design, and is critical in computer systems especially for portable devices with high performance and more functionality. Clock-gating is the most common technique used for reducing processor's power. In this work clock gating technique is applied to optimize the power of fully programmable Embedded Controller (PEC) employing RISC architecture. The CPU designed supports i) smart instruction set, ii) I/O port, UART iii) on-chip clocking to provide a range of frequencies , iv) RISC as well as controller concepts. The whole design is captured using VHDL and is implemented on FPGA chip using Xilinx .The architecture and clock gating technique together is found to reduce the power consumption by 33.33% of total power consumed by this chip.

  8. The embedded operating system project

    Science.gov (United States)

    Campbell, R. H.

    1985-01-01

    The design and construction of embedded operating systems for real-time advanced aerospace applications was investigated. The applications require reliable operating system support that must accommodate computer networks. Problems that arise in the construction of such operating systems, reconfiguration, consistency and recovery in a distributed system, and the issues of real-time processing are reported. A thesis that provides theoretical foundations for the use of atomic actions to support fault tolerance and data consistency in real-time object-based system is included. The following items are addressed: (1) atomic actions and fault-tolerance issues; (2) operating system structure; (3) program development; (4) a reliable compiler for path Pascal; and (5) mediators, a mechanism for scheduling distributed system processes.

  9. COMPUTING

    CERN Multimedia

    I. Fisk

    2010-01-01

    Introduction The first data taking period of November produced a first scientific paper, and this is a very satisfactory step for Computing. It also gave the invaluable opportunity to learn and debrief from this first, intense period, and make the necessary adaptations. The alarm procedures between different groups (DAQ, Physics, T0 processing, Alignment/calibration, T1 and T2 communications) have been reinforced. A major effort has also been invested into remodeling and optimizing operator tasks in all activities in Computing, in parallel with the recruitment of new Cat A operators. The teams are being completed and by mid year the new tasks will have been assigned. CRB (Computing Resource Board) The Board met twice since last CMS week. In December it reviewed the experience of the November data-taking period and could measure the positive improvements made for the site readiness. It also reviewed the policy under which Tier-2 are associated with Physics Groups. Such associations are decided twice per ye...

  10. COMPUTING

    CERN Multimedia

    P. McBride

    It has been a very active year for the computing project with strong contributions from members of the global community. The project has focused on site preparation and Monte Carlo production. The operations group has begun processing data from P5 as part of the global data commissioning. Improvements in transfer rates and site availability have been seen as computing sites across the globe prepare for large scale production and analysis as part of CSA07. Preparations for the upcoming Computing Software and Analysis Challenge CSA07 are progressing. Ian Fisk and Neil Geddes have been appointed as coordinators for the challenge. CSA07 will include production tests of the Tier-0 production system, reprocessing at the Tier-1 sites and Monte Carlo production at the Tier-2 sites. At the same time there will be a large analysis exercise at the Tier-2 centres. Pre-production simulation of the Monte Carlo events for the challenge is beginning. Scale tests of the Tier-0 will begin in mid-July and the challenge it...

  11. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction During the past six months, Computing participated in the STEP09 exercise, had a major involvement in the October exercise and has been working with CMS sites on improving open issues relevant for data taking. At the same time operations for MC production, real data reconstruction and re-reconstructions and data transfers at large scales were performed. STEP09 was successfully conducted in June as a joint exercise with ATLAS and the other experiments. It gave good indication about the readiness of the WLCG infrastructure with the two major LHC experiments stressing the reading, writing and processing of physics data. The October Exercise, in contrast, was conducted as an all-CMS exercise, where Physics, Computing and Offline worked on a common plan to exercise all steps to efficiently access and analyze data. As one of the major results, the CMS Tier-2s demonstrated to be fully capable for performing data analysis. In recent weeks, efforts were devoted to CMS Computing readiness. All th...

  12. COMPUTING

    CERN Multimedia

    M. Kasemann

    CCRC’08 challenges and CSA08 During the February campaign of the Common Computing readiness challenges (CCRC’08), the CMS computing team had achieved very good results. The link between the detector site and the Tier0 was tested by gradually increasing the number of parallel transfer streams well beyond the target. Tests covered the global robustness at the Tier0, processing a massive number of very large files and with a high writing speed to tapes.  Other tests covered the links between the different Tiers of the distributed infrastructure and the pre-staging and reprocessing capacity of the Tier1’s: response time, data transfer rate and success rate for Tape to Buffer staging of files kept exclusively on Tape were measured. In all cases, coordination with the sites was efficient and no serious problem was found. These successful preparations prepared the ground for the second phase of the CCRC’08 campaign, in May. The Computing Software and Analysis challen...

  13. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction It has been a very active quarter in Computing with interesting progress in all areas. The activity level at the computing facilities, driven by both organised processing from data operations and user analysis, has been steadily increasing. The large-scale production of simulated events that has been progressing throughout the fall is wrapping-up and reprocessing with pile-up will continue. A large reprocessing of all the proton-proton data has just been released and another will follow shortly. The number of analysis jobs by users each day, that was already hitting the computing model expectations at the time of ICHEP, is now 33% higher. We are expecting a busy holiday break to ensure samples are ready in time for the winter conferences. Heavy Ion The Tier 0 infrastructure was able to repack and promptly reconstruct heavy-ion collision data. Two copies were made of the data at CERN using a large CASTOR disk pool, and the core physics sample was replicated ...

  14. COMPUTING

    CERN Multimedia

    I. Fisk

    2012-01-01

    Introduction Computing continued with a high level of activity over the winter in preparation for conferences and the start of the 2012 run. 2012 brings new challenges with a new energy, more complex events, and the need to make the best use of the available time before the Long Shutdown. We expect to be resource constrained on all tiers of the computing system in 2012 and are working to ensure the high-priority goals of CMS are not impacted. Heavy ions After a successful 2011 heavy-ion run, the programme is moving to analysis. During the run, the CAF resources were well used for prompt analysis. Since then in 2012 on average 200 job slots have been used continuously at Vanderbilt for analysis workflows. Operations Office As of 2012, the Computing Project emphasis has moved from commissioning to operation of the various systems. This is reflected in the new organisation structure where the Facilities and Data Operations tasks have been merged into a common Operations Office, which now covers everything ...

  15. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction More than seventy CMS collaborators attended the Computing and Offline Workshop in San Diego, California, April 20-24th to discuss the state of readiness of software and computing for collisions. Focus and priority were given to preparations for data taking and providing room for ample dialog between groups involved in Commissioning, Data Operations, Analysis and MC Production. Throughout the workshop, aspects of software, operating procedures and issues addressing all parts of the computing model were discussed. Plans for the CMS participation in STEP’09, the combined scale testing for all four experiments due in June 2009, were refined. The article in CMS Times by Frank Wuerthwein gave a good recap of the highly collaborative atmosphere of the workshop. Many thanks to UCSD and to the organizers for taking care of this workshop, which resulted in a long list of action items and was definitely a success. A considerable amount of effort and care is invested in the estimate of the co...

  16. Emerging Trends in Embedded Processors

    Directory of Open Access Journals (Sweden)

    Gurvinder Singh

    2014-05-01

    Full Text Available An Embedded Processors is simply a µProcessors that has been “Embedded” into a device. Embedded systems are important part of human life. For illustration, one cannot visualize life without mobile phones for personal communication. Embedded systems are used in many places like healthcare, automotive, daily life, and in different offices and industries.Embedded Processors develop new research area in the field of hardware designing.

  17. Embedment of Employee?

    DEFF Research Database (Denmark)

    Buhl, Henrik

    1998-01-01

    The purpose of the paper is to discuss the influence of different approaches and work life conditions on the conception of embedment of employee participation. The discussion is based on three connected approaches: a theoretical research, a research into participation in working life and an empir......The purpose of the paper is to discuss the influence of different approaches and work life conditions on the conception of embedment of employee participation. The discussion is based on three connected approaches: a theoretical research, a research into participation in working life...... and an empirical case study. My starting point will be a case study of a Danish ABB company which will form the framework of my discussion and reflect my present experience. This analysis will emphasize the possibilities of making employee participation a permanent part of the company at all levels....

  18. Embeddings of Iteration Trees

    OpenAIRE

    Mitchell, William

    1992-01-01

    This paper, dating from May 1991, contains preliminary (and unpublishable) notes on investigations about iteration trees. They will be of interest only to the specialist. In the first two sections I define notions of support and embeddings for tree iterations, proving for example that every tree iteration is a direct limit of finite tree iterations. This is a generalization to models with extenders of basic ideas of iterated ultrapowers using only ultrapowers. In the final section (which is m...

  19. Security Embedding Codes

    CERN Document Server

    Ly, Hung D; Blankenship, Yufei

    2011-01-01

    This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is shown to achieve the secrecy capacity region of the channel in several scenarios. Specifying these results to both scalar and independent parallel Gaussian channels (under an average individual per-subchannel power constraint), it is shown that the high-security message can be embedded into the low-security message at full rate (as if the low-security message does not exist) without incurring any loss on the overall rate of communication (as if both messages are low-security messages). Extensions to the wiretap channel II setting of Ozarow and Wyner are also considered, where it is shown that "perfect" security embedding...

  20. Joint Grid System Used in Embedding Technique

    Institute of Scientific and Technical Information of China (English)

    李孝伟; 范绪箕

    2003-01-01

    The joint grid system, which consists of the developed collar grid, the virtual grid and other grids, wasused in the embedding technique to solve the problem of finding interpolating cells of the internal and externalboundary points near the joint regions. With different boundary plane generated along different fixed surface, thecollar grid obtained using hyperbolic partial equations can ensure to generate high-quality grids and to provide realinterpolating cells for the boundary points in the blanking regions. The virtual grid was used to convert solid wallboundary conditions into an interface condition, however, no fluid flow computations were conducted within thevirtual grid. The computational result of body-strake-wing shows that the current developed embedding techniquewith joint grid system can effectively treat the geometry and can more accurately predict the flow over complexcon-figuration with intersecting surfaces.

  1. COMPUTING

    CERN Multimedia

    Matthias Kasemann

    Overview The main focus during the summer was to handle data coming from the detector and to perform Monte Carlo production. The lessons learned during the CCRC and CSA08 challenges in May were addressed by dedicated PADA campaigns lead by the Integration team. Big improvements were achieved in the stability and reliability of the CMS Tier1 and Tier2 centres by regular and systematic follow-up of faults and errors with the help of the Savannah bug tracking system. In preparation for data taking the roles of a Computing Run Coordinator and regular computing shifts monitoring the services and infrastructure as well as interfacing to the data operations tasks are being defined. The shift plan until the end of 2008 is being put together. User support worked on documentation and organized several training sessions. The ECoM task force delivered the report on “Use Cases for Start-up of pp Data-Taking” with recommendations and a set of tests to be performed for trigger rates much higher than the ...

  2. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction A large fraction of the effort was focused during the last period into the preparation and monitoring of the February tests of Common VO Computing Readiness Challenge 08. CCRC08 is being run by the WLCG collaboration in two phases, between the centres and all experiments. The February test is dedicated to functionality tests, while the May challenge will consist of running at all centres and with full workflows. For this first period, a number of functionality checks of the computing power, data repositories and archives as well as network links are planned. This will help assess the reliability of the systems under a variety of loads, and identifying possible bottlenecks. Many tests are scheduled together with other VOs, allowing the full scale stress test. The data rates (writing, accessing and transfer¬ring) are being checked under a variety of loads and operating conditions, as well as the reliability and transfer rates of the links between Tier-0 and Tier-1s. In addition, the capa...

  3. COMPUTING

    CERN Multimedia

    P. MacBride

    The Computing Software and Analysis Challenge CSA07 has been the main focus of the Computing Project for the past few months. Activities began over the summer with the preparation of the Monte Carlo data sets for the challenge and tests of the new production system at the Tier-0 at CERN. The pre-challenge Monte Carlo production was done in several steps: physics generation, detector simulation, digitization, conversion to RAW format and the samples were run through the High Level Trigger (HLT). The data was then merged into three "Soups": Chowder (ALPGEN), Stew (Filtered Pythia) and Gumbo (Pythia). The challenge officially started when the first Chowder events were reconstructed on the Tier-0 on October 3rd. The data operations teams were very busy during the the challenge period. The MC production teams continued with signal production and processing while the Tier-0 and Tier-1 teams worked on splitting the Soups into Primary Data Sets (PDS), reconstruction and skimming. The storage sys...

  4. COMPUTING

    CERN Multimedia

    Contributions from I. Fisk

    2012-01-01

    Introduction The start of the 2012 run has been busy for Computing. We have reconstructed, archived, and served a larger sample of new data than in 2011, and we are in the process of producing an even larger new sample of simulations at 8 TeV. The running conditions and system performance are largely what was anticipated in the plan, thanks to the hard work and preparation of many people. Heavy ions Heavy Ions has been actively analysing data and preparing for conferences.  Operations Office Figure 6: Transfers from all sites in the last 90 days For ICHEP and the Upgrade efforts, we needed to produce and process record amounts of MC samples while supporting the very successful data-taking. This was a large burden, especially on the team members. Nevertheless the last three months were very successful and the total output was phenomenal, thanks to our dedicated site admins who keep the sites operational and the computing project members who spend countless hours nursing the...

  5. COMPUTING

    CERN Multimedia

    I. Fisk

    2012-01-01

      Introduction Computing activity has been running at a sustained, high rate as we collect data at high luminosity, process simulation, and begin to process the parked data. The system is functional, though a number of improvements are planned during LS1. Many of the changes will impact users, we hope only in positive ways. We are trying to improve the distributed analysis tools as well as the ability to access more data samples more transparently.  Operations Office Figure 2: Number of events per month, for 2012 Since the June CMS Week, Computing Operations teams successfully completed data re-reconstruction passes and finished the CMSSW_53X MC campaign with over three billion events available in AOD format. Recorded data was successfully processed in parallel, exceeding 1.2 billion raw physics events per month for the first time in October 2012 due to the increase in data-parking rate. In parallel, large efforts were dedicated to WMAgent development and integrati...

  6. COMPUTING

    CERN Document Server

    2010-01-01

    Introduction Just two months after the “LHC First Physics” event of 30th March, the analysis of the O(200) million 7 TeV collision events in CMS accumulated during the first 60 days is well under way. The consistency of the CMS computing model has been confirmed during these first weeks of data taking. This model is based on a hierarchy of use-cases deployed between the different tiers and, in particular, the distribution of RECO data to T1s, who then serve data on request to T2s, along a topology known as “fat tree”. Indeed, during this period this model was further extended by almost full “mesh” commissioning, meaning that RECO data were shipped to T2s whenever possible, enabling additional physics analyses compared with the “fat tree” model. Computing activities at the CMS Analysis Facility (CAF) have been marked by a good time response for a load almost evenly shared between ALCA (Alignment and Calibration tasks - highest p...

  7. COMPUTING

    CERN Multimedia

    I. Fisk

    2013-01-01

    Computing operation has been lower as the Run 1 samples are completing and smaller samples for upgrades and preparations are ramping up. Much of the computing activity is focusing on preparations for Run 2 and improvements in data access and flexibility of using resources. Operations Office Data processing was slow in the second half of 2013 with only the legacy re-reconstruction pass of 2011 data being processed at the sites.   Figure 1: MC production and processing was more in demand with a peak of over 750 Million GEN-SIM events in a single month.   Figure 2: The transfer system worked reliably and efficiently and transferred on average close to 520 TB per week with peaks at close to 1.2 PB.   Figure 3: The volume of data moved between CMS sites in the last six months   The tape utilisation was a focus for the operation teams with frequent deletion campaigns from deprecated 7 TeV MC GEN-SIM samples to INVALID datasets, which could be cleaned up...

  8. Automatic Labelling of Topics with Neural Embeddings

    OpenAIRE

    Bhatia, Shraey; Lau, Jey Han; Baldwin, Timothy

    2016-01-01

    Topics generated by topic models are typically represented as list of terms. To reduce the cognitive overhead of interpreting these topics for end-users, we propose labelling a topic with a succinct phrase that summarises its theme or idea. Using Wikipedia document titles as label candidates, we compute neural embeddings for documents and words to select the most relevant labels for topics. Compared to a state-of-the-art topic labelling system, our methodology is simpler, more efficient, and ...

  9. Integrated Design Tools for Embedded Control Systems

    OpenAIRE

    Jovanovic, D.S.; Hilderink, G.H.; Broenink, Johannes F.; Karelse, F.

    2001-01-01

    Currently, computer-based control systems are still being implemented using the same techniques as 10 years ago. The purpose of this project is the development of a design framework, consisting of tools and libraries, which allows the designer to build high reliable heterogeneous real-time embedded systems in a very short time at a fraction of the present day costs. The ultimate focus of current research is on transformation control laws to efficient concurrent algorithms, with concerns about...

  10. Compressive Spectral Embedding: Sidestepping the SVD

    Science.gov (United States)

    2015-09-28

    rows of A into a k-dimensional space using the rows of E = [f(σ1)u1 f(σ2) u2 · · · f(σk)uk], for some function f(·). The embedding of the variable...random projections to compute an approximate histogram of the number of eigenvectors across different bands of the spectrum: [a, b] ⊆ [λmin, λmax]. 3

  11. Drill Embedded Nanosensors For Planetary Subsurface Exploration

    Science.gov (United States)

    Li, Jing

    2014-01-01

    We have developed a carbon nanotube (CNT) sensor for water vapor detection under Martian Conditions and the miniaturized electronics can be embedded in the drill bit for collecting sensor data and transmit it to a computer wirelessly.This capability will enable the real time measurement of ice during drilling. With this real time and in-situ measurement, subsurface ice detection can be easy, fast, precise and low cost.

  12. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction The Computing Team successfully completed the storage, initial processing, and distribution for analysis of proton-proton data in 2011. There are still a variety of activities ongoing to support winter conference activities and preparations for 2012. Heavy ions The heavy-ion run for 2011 started in early November and has already demonstrated good machine performance and success of some of the more advanced workflows planned for 2011. Data collection will continue until early December. Facilities and Infrastructure Operations Operational and deployment support for WMAgent and WorkQueue+Request Manager components, routinely used in production by Data Operations, are provided. The GlideInWMS and components installation are now deployed at CERN, which is added to the GlideInWMS factory placed in the US. There has been new operational collaboration between the CERN team and the UCSD GlideIn factory operators, covering each others time zones by monitoring/debugging pilot jobs sent from the facto...

  13. Intelligence for embedded systems a methodological approach

    CERN Document Server

    Alippi, Cesare

    2014-01-01

    Addressing current issues of which any engineer or computer scientist should be aware, this monograph is a response to the need to adopt a new computational paradigm as the methodological basis for designing pervasive embedded systems with sensor capabilities. The requirements of this paradigm are to control complexity, to limit cost and energy consumption, and to provide adaptation and cognition abilities allowing the embedded system to interact proactively with the real world. The quest for such intelligence requires the formalization of a new generation of intelligent systems able to exploit advances in digital architectures and in sensing technologies. The book sheds light on the theory behind intelligence for embedded systems with specific focus on: ·        robustness (the robustness of a computational flow and its evaluation); ·        intelligence (how to mimic the adaptation and cognition abilities of the human brain), ·        the capacity to learn in non-stationary and evolv...

  14. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  15. Embedded WENO: A design strategy to improve existing WENO schemes

    Science.gov (United States)

    van Lith, Bart S.; ten Thije Boonkkamp, Jan H. M.; IJzerman, Wilbert L.

    2017-02-01

    Embedded WENO methods utilise all adjacent smooth substencils to construct a desirable interpolation. Conventional WENO schemes under-use this possibility close to large gradients or discontinuities. We develop a general approach for constructing embedded versions of existing WENO schemes. Embedded methods based on the WENO schemes of Jiang and Shu [1] and on the WENO-Z scheme of Borges et al. [2] are explicitly constructed. Several possible choices are presented that result in either better spectral properties or a higher order of convergence for sufficiently smooth solutions. However, these improvements carry over to discontinuous solutions. The embedded methods are demonstrated to be indeed improvements over their standard counterparts by several numerical examples. All the embedded methods presented have no added computational effort compared to their standard counterparts.

  16. Security Processing for High End Embedded System with Cryptographic Algorithms

    Directory of Open Access Journals (Sweden)

    M.Shankar

    2012-01-01

    Full Text Available This paper is intended to introduce embedded system designers and design tool developers to the challenges involved in designing secure embedded systems. The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation. Security processing, which refers to the computations that must be performed in a system for the purpose of security, can easily overwhelm thecomputational capabilities of processors in both low- and highendembedded systems. The paper also briefs on the security enforced in a device by the use of proprietary security technology and also discusses the security measures taken during the production of the device. We also survey solution techniques to address these challenges, drawing from both current practice and emerging esearch, and identify open research problems that will require innovations in embedded system architecture and design methodologies.

  17. A new embedding quality assessment method for manifold learning

    CERN Document Server

    Zhang, Peng; Zhang, Bo

    2011-01-01

    Manifold learning is a hot research topic in the field of computer science. A crucial issue with current manifold learning methods is that they lack a natural quantitative measure to assess the quality of learned embeddings, which greatly limits their applications to real-world problems. In this paper, a new embedding quality assessment method for manifold learning, named as Normalization Independent Embedding Quality Assessment (NIEQA), is proposed. Compared with current assessment methods which are limited to isometric embeddings, the NIEQA method has a much larger application range due to two features. First, it is based on a new measure which can effectively evaluate how well local neighborhood geometry is preserved under normalization, hence it can be applied to both isometric and normalized embeddings. Second, it can provide both local and global evaluations to output an overall assessment. Therefore, NIEQA can serve as a natural tool in model selection and evaluation tasks for manifold learning. Experi...

  18. The Embedding Capacity of Information Flows Under Renewal Traffic

    CERN Document Server

    Marano, Stefano; He, Ting; Tong, Lang

    2011-01-01

    Given two independent point processes and a certain rule for matching points between them, what is the fraction of matched points over infinitely long streams? In many application contexts, e.g., secure networking, a meaningful matching rule is that of a maximum causal delay, and the problem is related to embedding a flow of packets in cover traffic such that no traffic analysis can detect it. We study the best undetectable embedding policy and the corresponding maximum flow rate ---that we call the embedding capacity--- under the assumption that the cover traffic can be modeled as arbitrary renewal processes. We find that computing the embedding capacity requires the inversion of very structured linear systems that, for a broad range of renewal models encountered in practice, admits a fully analytical expression in terms of the renewal function of the processes. Our main theoretical contribution is a simple closed form of such relationship. This result enables us to explore properties of the embedding capaci...

  19. COMPUTING

    CERN Multimedia

    M. Kasemann

    CMS relies on a well functioning, distributed computing infrastructure. The Site Availability Monitoring (SAM) and the Job Robot submission have been very instrumental for site commissioning in order to increase availability of more sites such that they are available to participate in CSA07 and are ready to be used for analysis. The commissioning process has been further developed, including "lessons learned" documentation via the CMS twiki. Recently the visualization, presentation and summarizing of SAM tests for sites has been redesigned, it is now developed by the central ARDA project of WLCG. Work to test the new gLite Workload Management System was performed; a 4 times increase in throughput with respect to LCG Resource Broker is observed. CMS has designed and launched a new-generation traffic load generator called "LoadTest" to commission and to keep exercised all data transfer routes in the CMS PhE-DEx topology. Since mid-February, a transfer volume of about 12 P...

  20. Spatially Embedded Inequality

    DEFF Research Database (Denmark)

    Holck, Lotte

    2016-01-01

    /methodology/approach: – The (re)production of inequality is explored by linking research on organizational space with HRM diversity management. Data from an ethnographic study undertaken in a Danish municipal center illustrates how a substructure of inequality is spatially upheld alongside a formal diversity policy. Archer...... the more subtle, spatially embedded forms of inequality. Originality/value: – Theoretical and empirical connections between research on organizational space and HRM diversity management have thus far not been systematically studied. This combination might advance knowledge on the persistence of micro...

  1. Quantization of submanifold embeddings

    Energy Technology Data Exchange (ETDEWEB)

    Bahns, Dorothea; Zahn, Jochen [Courant Research Centre ' ' Higher Order Structures' ' , Universitaet Goettingen (Germany); Rejzner, Katarzyna [II. Institut fuer Theoretische Physik, Universitaet Hamburg (Germany)

    2013-07-01

    We describe a perturbative quantization of the embedding of d-dimensional submanifolds into n-dimensional Minkowski space, based on suitable generalizations of the Nambu-Goto action. We use tools from perturbative algebraic quantum field theory, quantum field theory on curved spacetimes, and the Batalin-Vilkovisky formalism. The resulting theory is perturbatively non-renormalizable, but well-defined as an effective theory, i.e., there are no anomalies, for any dimension d,n. In particular there is no critical dimension for the case of string theory (d=2).

  2. Shutters with embedded microprocessors

    Science.gov (United States)

    Stephenson, S.

    2015-06-01

    Shutters are used to periodically provide a non-uniformity correction (NUC) calibration surface to micro bolometers. Many bolometer applications, such as TWS and DVE, require compact, power efficient actuators. Actuators in these applications, such as bistable solenoids and stepper motors, benefit from complex drive schemes. Consumer electronics products have generated compact, low-cost drive components that can be used to embed complex drives into these shutters. Shutter drives using these components maintain compactness and power efficiency while simplifying interfaces at minimal cost. Recently, several commercially available shutter systems have been created that incorporate embedded microprocessors into shutters usable for NUC correction of micro bolometers.

  3. Embedded microcontroller interfacing

    CERN Document Server

    Gupta, Gourab Sen

    2010-01-01

    Mixed-Signal Embedded Microcontrollers are commonly used in integrating analog components needed to control non-digital electronic systems. They are used in automatically controlled devices and products, such as automobile engine control systems, wireless remote controllers, office machines, home appliances, power tools, and toys. Microcontrollers make it economical to digitally control even more devices and processes by reducing the size and cost, compared to a design that uses a separate microprocessor, memory, and input/output devices. In many undergraduate and post-graduate courses, teachi

  4. A Cartesian embedded boundary method for hyperbolic conservation laws

    Energy Technology Data Exchange (ETDEWEB)

    Sjogreen, B; Petersson, N A

    2006-12-04

    The authors develop an embedded boundary finite difference technique for solving the compressible two- or three-dimensional Euler equations in complex geometries on a Cartesian grid. The method is second order accurate with an explicit time step determined by the grid size away from the boundary. Slope limiters are used on the embedded boundary to avoid non-physical oscillations near shock waves. They show computed examples of supersonic flow past a cylinder and compare with results computed on a body fitted grid. Furthermore, they discuss the implementation of the method for thin geometries, and show computed examples of transonic flow past an airfoil.

  5. Programming Memory-Constrained Networked Embedded Systems. PhD thesis

    OpenAIRE

    Dunkels, Adam

    2007-01-01

    Ten years after the Internet revolution are we standing on the brink of another revolution: networked embedded systems that connect the physical world with the computers, enabling new applications ranging from environmental monitoring and wildlife tracking to improvements in health care and medicine. 98% of all microprocessors sold today are used in embedded systems. Those systems have much smaller amounts of memory than PC computers. An embedded system may have as little has a few hundred by...

  6. Type-based homeomorphic embedding for online termination

    DEFF Research Database (Denmark)

    Albert, Elvira; Gallagher, John Patrick; Gómez-Zamalloa, Miguel

    2009-01-01

    Online termination techniques dynamically guarantee termination of computations by supervising them in such a way that computations whose termination can no longer be guaranteed are stopped. Homeomorphic Embedding (HEm) has proven to be very useful for online termination provided that the computa...

  7. Hybrid manifold embedding.

    Science.gov (United States)

    Liu, Yang; Liu, Yan; Chan, Keith C C; Hua, Kien A

    2014-12-01

    In this brief, we present a novel supervised manifold learning framework dubbed hybrid manifold embedding (HyME). Unlike most of the existing supervised manifold learning algorithms that give linear explicit mapping functions, the HyME aims to provide a more general nonlinear explicit mapping function by performing a two-layer learning procedure. In the first layer, a new clustering strategy called geodesic clustering is proposed to divide the original data set into several subsets with minimum nonlinearity. In the second layer, a supervised dimensionality reduction scheme called locally conjugate discriminant projection is performed on each subset for maximizing the discriminant information and minimizing the dimension redundancy simultaneously in the reduced low-dimensional space. By integrating these two layers in a unified mapping function, a supervised manifold embedding framework is established to describe both global and local manifold structure as well as to preserve the discriminative ability in the learned subspace. Experiments on various data sets validate the effectiveness of the proposed method.

  8. Bootstrap embedding: An internally consistent fragment-based method

    Science.gov (United States)

    Welborn, Matthew; Tsuchimochi, Takashi; Van Voorhis, Troy

    2016-08-01

    Strong correlation poses a difficult problem for electronic structure theory, with computational cost scaling quickly with system size. Fragment embedding is an attractive approach to this problem. By dividing a large complicated system into smaller manageable fragments "embedded" in an approximate description of the rest of the system, we can hope to ameliorate the steep cost of correlated calculations. While appealing, these methods often converge slowly with fragment size because of small errors at the boundary between fragment and bath. We describe a new electronic embedding method, dubbed "Bootstrap Embedding," a self-consistent wavefunction-in-wavefunction embedding theory that uses overlapping fragments to improve the description of fragment edges. We apply this method to the one dimensional Hubbard model and a translationally asymmetric variant, and find that it performs very well for energies and populations. We find Bootstrap Embedding converges rapidly with embedded fragment size, overcoming the surface-area-to-volume-ratio error typical of many embedding methods. We anticipate that this method may lead to a low-scaling, high accuracy treatment of electron correlation in large molecular systems.

  9. Efficient and Secure Fingerprint Verification for Embedded Devices

    OpenAIRE

    Sakiyama Kazuo; Verbauwhede Ingrid; Yang Shenglin

    2006-01-01

    This paper describes a secure and memory-efficient embedded fingerprint verification system. It shows how a fingerprint verification module originally developed to run on a workstation can be transformed and optimized in a systematic way to run real-time on an embedded device with limited memory and computation power. A complete fingerprint recognition module is a complex application that requires in the order of 1000 M unoptimized floating-point instruction cycles. The goal is to run both t...

  10. Design Methods for Embedded Security

    Directory of Open Access Journals (Sweden)

    I. Verbauwhede

    2009-11-01

    Full Text Available Embedded devices need both an efficient and a secure implementation of cryptographic algorithms. In this overview paper we show a typical top-down approach for secure and efficient implementation of embedded systems. We outline the security pyramid by illustrating the five primary abstraction levels in an embedded system. Focusing only on two levels - architecture and circuit level - we show how the design can be implemented to be both efficient and secure.

  11. Communicating embedded systems networks applications

    CERN Document Server

    Krief, Francine

    2013-01-01

    Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and network

  12. The Low Power Energy Aware Processing (LEAP) Embedded Networked Sensor System

    OpenAIRE

    Dustin McIntire; Kei Ho; Bernie Yip; Amarjeet Singh; Winston Wu; Kaiser, William J.

    2005-01-01

    A broad range of embedded networked sensor (ENS) systems for critical environmental monitoring applications now require complex, high peak power dissipation sensor devices as well as on-demand high performance computing and high bandwidth communication. Embedded computing demands for these new platforms include support for computationally intensive image and signal processing as well as optimization and statistical computing. To meet these new requirements while maintaining critical support ...

  13. Embedded sensor systems

    CERN Document Server

    Agrawal, Dharma Prakash

    2017-01-01

    This inspiring textbook provides an introduction to wireless technologies for sensors, explores potential use of sensors for numerous applications, and utilizes probability theory and mathematical methods as a means of embedding sensors in system design. It discusses the need for synchronization and underlying limitations, inter-relation between given coverage and connectivity to number of sensors needed, and the use of geometrical distance to determine location of the base station for data collection and explore use of anchor nodes for relative position determination of sensors. The book explores energy conservation, communication using TCP, the need for clustering and data aggregation, and residual energy determination and energy harvesting. It covers key topics of sensor communication like mobile base stations and relay nodes, delay-tolerant sensor networks, and remote sensing and possible applications. The book defines routing methods and do performance evaluation for random and regular sensor topology an...

  14. Watermark Embedding and Detection

    CERN Document Server

    Zhong, Jidong

    2006-01-01

    The embedder and the detector (or decoder) are the two most important components of the digital watermarking systems. Thus in this work, we discuss how to design a better embedder and detector (or decoder). I first give a summary of the prospective applications of watermarking technology and major watermarking schemes in the literature. My review on the literature closely centers upon how the side information is exploited at both embedders and detectors. In Chapter 3, I explore the optimum detector or decoder according to a particular probability distribution of the host signals. We found that the performance of both multiplicative and additive spread spectrum schemes depends on the shape parameter of the host signals. For spread spectrum schemes, the performance of the detector or the decoder is reduced by the host interference. Thus I present a new host-interference rejection technique for the multiplicative spread spectrum schemes. Its embedding rule is tailored to the optimum detection or decoding rule. T...

  15. Adaptable Embedded Systems

    CERN Document Server

    Lisbôa, Carlos; Carro, Luigi

    2013-01-01

    As embedded systems become more complex, designers face a number of challenges at different levels: they need to boost performance, while keeping energy consumption as low as possible, they need to reuse existent software code, and at the same time they need to take advantage of the extra logic available in the chip, represented by multiple processors working together.  This book describes several strategies to achieve such different and interrelated goals, by the use of adaptability. Coverage includes reconfigurable systems, dynamic optimization techniques such as binary translation and trace reuse, new memory architectures including homogeneous and heterogeneous multiprocessor systems, communication issues and NOCs, fault tolerance against fabrication defects and soft errors, and finally, how one can combine several of these techniques together to achieve higher levels of performance and adaptability.  The discussion also includes how to employ specialized software to improve this new adaptive system, and...

  16. Engineering embedded systems physics, programs, circuits

    CERN Document Server

    Hintenaus, Peter

    2015-01-01

    This is a textbook for graduate and final-year-undergraduate computer-science and electrical-engineering students interested in the hardware and software aspects of embedded and cyberphysical systems design. It is comprehensive and self-contained, covering everything from the basics to case-study implementation. Emphasis is placed on the physical nature of the problem domain and of the devices used. The reader is assumed to be familiar on a theoretical level with mathematical tools like ordinary differential equation and Fourier transforms. In this book these tools will be put to practical use. Engineering Embedded Systems begins by addressing basic material on signals and systems, before introducing to electronics. Treatment of digital electronics accentuating synchronous circuits and including high-speed effects proceeds to micro-controllers, digital signal processors and programmable logic. Peripheral units and decentralized networks are given due weight. The properties of analog circuits and devices like ...

  17. A New and Better Algorithm for Evaluation of Overall Performance of Embedded Computer through Combining Grey Correlation with Assignment Weight%基于组合权重的嵌入式计算机综合性能灰色关联评价算法

    Institute of Scientific and Technical Information of China (English)

    周延年; 朱怡安

    2011-01-01

    文章针对嵌入式计算机的自身特点,建立了嵌入式计算机性能评估指标体系.同时,将组合赋权法和灰色关联度相结合,提出了组合权重的灰色关联评价模型.该模型将组合赋权法确定指标的权重系数代替灰色关联分析中的均值权重系数,用来修正各评价指标的差异,并对嵌入式计算机性能进行综合评估.实验结果表明,该方法有效地解决了部分指标信息不完全和部分指标信息模糊的问题,提高了计算机性能评估的可靠性,为今后嵌入式计算机综合性能的评价提供了有价值的参考.%Aim. The introduction of the full paper reviews some papers in the open literature, all in Chinese, and then proposes our better algorithm, which is explained in sections 1,2 and 3. Section 1 establishes the embedded computer performance appraisal indicator system, whose hierarchical structure for six main indexes is given in Fig.1. Section 2 explains the evaluation algorithm through combining grey correlation with assignment weight; its core consists of: ( 1 ) we combine the analytic hierarchy process (AHP) with the entropy weight to calculate the weight of each index and replace the average value weighting for the gray correlation analysis; (2) we carry out the comprehensive evaluation of the performance of embedded computer with our evaluation algorithm. Section 3 improves the grey correlation evaluation algorithm in section 2. Section 4 gives an illustrative example to verify the effectiveness of our evaluation algorithm and applies it to the comprehensive evaluation of embedded computer; the evaluation results, given in Table 3, and their analysis show preliminarily that our evaluation algorithm can effectively evaluate the performance of embedded computer.

  18. Embedded distributed vision system for humanoid soccer robot

    OpenAIRE

    Blanes Noguera, Francisco; Muñoz Benavent, Pau; Muñoz Alcobendas, Manuel; Simó Ten, José Enrique; CORONEL PARADA, JAVIER OSVALDO; Albero Gil, Miguel

    2011-01-01

    [EN] Computer vision is one of the most challenging applications in sensor systems since the signal is complex from spatial and logical point of view. Due to these characteristics vision applications require high computing resources, which makes them especially difficult to use in embedded systems, like mobile robots with reduced amount memory and computing power. In this work a distributed architecture for humanoid visual control is presented using specific nodes ...

  19. Molecular Properties through Polarizable Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus Haugaard; Kongsted, Jacob

    2011-01-01

    We review the theory related to the calculation of electric and magnetic molecular properties through polarizable embedding. In particular, we derive the expressions for the response functions up to the level of cubic response within the density functional theory-based polarizable embedding (PE-D...

  20. Certifiable Java for Embedded Systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Dalsgaard, Andreas Engelbredt; Hansen, Rene Rydhof

    2014-01-01

    The Certifiable Java for Embedded Systems (CJ4ES) project aimed to develop a prototype development environment and platform for safety-critical software for embedded applications. There are three core constituents: A profile of the Java programming language that is tailored for safety...

  1. Collaborative development of embedded systems

    NARCIS (Netherlands)

    Verhoef, Marcel; Pierce, Kenneth; Gamble, Carl; Broenink, Jan; Fitzgerald, John; Larsen, Peter Gorm; Verhoef, Marcel

    2014-01-01

    This chapter presents motivation for taking a collaborative multi-disciplinary approach to the model-based development of embedded systems. Starting from a consideration of the ubiquity of embedded systems in daily life it identifies challenges faced by industry in developing products in a timely ma

  2. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2003-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply...

  3. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2002-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply...

  4. Asymmetric distances for binary embeddings.

    Science.gov (United States)

    Gordo, Albert; Perronnin, Florent; Gong, Yunchao; Lazebnik, Svetlana

    2014-01-01

    In large-scale query-by-example retrieval, embedding image signatures in a binary space offers two benefits: data compression and search efficiency. While most embedding algorithms binarize both query and database signatures, it has been noted that this is not strictly a requirement. Indeed, asymmetric schemes that binarize the database signatures but not the query still enjoy the same two benefits but may provide superior accuracy. In this work, we propose two general asymmetric distances that are applicable to a wide variety of embedding techniques including locality sensitive hashing (LSH), locality sensitive binary codes (LSBC), spectral hashing (SH), PCA embedding (PCAE), PCAE with random rotations (PCAE-RR), and PCAE with iterative quantization (PCAE-ITQ). We experiment on four public benchmarks containing up to 1M images and show that the proposed asymmetric distances consistently lead to large improvements over the symmetric Hamming distance for all binary embedding techniques.

  5. Maximum Genus of Strong Embeddings

    Institute of Scientific and Technical Information of China (English)

    Er-ling Wei; Yan-pei Liu; Han Ren

    2003-01-01

    The strong embedding conjecture states that any 2-connected graph has a strong embedding on some surface. It implies the circuit double cover conjecture: Any 2-connected graph has a circuit double cover.Conversely, it is not true. But for a 3-regular graph, the two conjectures are equivalent. In this paper, a characterization of graphs having a strong embedding with exactly 3 faces, which is the strong embedding of maximum genus, is given. In addition, some graphs with the property are provided. More generally, an upper bound of the maximum genus of strong embeddings of a graph is presented too. Lastly, it is shown that the interpolation theorem is true to planar Halin graph.

  6. Lattice Embedding of Heronian Simplices

    CERN Document Server

    Lunnon, W Fred

    2012-01-01

    A rational triangle has rational edge-lengths and area; a rational tetrahedron has rational faces and volume; either is Heronian when its edge-lengths are integer, and proper when its content is nonzero. A variant proof is given, via complex number GCD, of the previously known result that any Heronian triangle may be embedded in the Cartesian lattice Z^2; it is then shown that, for a proper triangle, such an embedding is unique modulo lattice isometry; finally the method is extended via quaternion GCD to tetrahedra in Z^3, where uniqueness no longer obtains, and embeddings also exist which are unobtainable by this construction. The requisite complex and quaternionic number theoretic background is summarised beforehand. Subsequent sections engage with subsidiary implementation issues: initial rational embedding, canonical reduction, exhaustive search for embeddings additional to those yielded via GCD; and illustrative numerical examples are provided. A counter-example shows that this approach must fail in high...

  7. Self-Organization in Embedded Real-Time Systems

    CERN Document Server

    Brinkschulte, Uwe; Rettberg, Achim

    2013-01-01

    This book describes the emerging field of self-organizing, multicore, distributed and real-time embedded systems.  Self-organization of both hardware and software can be a key technique to handle the growing complexity of modern computing systems. Distributed systems running hundreds of tasks on dozens of processors, each equipped with multiple cores, requires self-organization principles to ensure efficient and reliable operation. This book addresses various, so-called Self-X features such as self-configuration, self-optimization, self-adaptation, self-healing and self-protection. Presents open components for embedded real-time adaptive and self-organizing applications; Describes innovative techniques in: scheduling, memory management, quality of service, communications supporting organic real-time applications; Covers multi-/many-core embedded systems supporting real-time adaptive systems and power-aware, adaptive hardware and software systems; Includes case studies of open embedded real-time self-organizi...

  8. Implementation and Optimization of Image Processing Algorithms on Embedded GPU

    Science.gov (United States)

    Singhal, Nitin; Yoo, Jin Woo; Choi, Ho Yeol; Park, In Kyu

    In this paper, we analyze the key factors underlying the implementation, evaluation, and optimization of image processing and computer vision algorithms on embedded GPU using OpenGL ES 2.0 shader model. First, we present the characteristics of the embedded GPU and its inherent advantage when compared to embedded CPU. Additionally, we propose techniques to achieve increased performance with optimized shader design. To show the effectiveness of the proposed techniques, we employ cartoon-style non-photorealistic rendering (NPR), speeded-up robust feature (SURF) detection, and stereo matching as our example algorithms. Performance is evaluated in terms of the execution time and speed-up achieved in comparison with the implementation on embedded CPU.

  9. The dynamic power management for embedded system with Poisson process

    Institute of Scientific and Technical Information of China (English)

    CHEN Tian-zhou; HUANG Jiang-wei; DAI Hong-jun

    2005-01-01

    The mass of the embedded systems are driven by second batteries, not by wired power supply. So saving energy is one of the main design goals for embedded system. In this paper we present a new technique for modelling and solving the dynamic power management (DPM) problem for embedded systems with complex behavioural characteristics. First we model a power-managed embedded computing system as a controllable Flow Chart. Then we use the Poisson process for optimisation, and give the power management algorithm by the help of Dynamic Voltage Scaling (DVS) technology. At last we built the experimental model using the PXA 255 Processors. The experimental results showed that the proposed technique can achieve more than12% power saving compared to other existing DPM techniques.

  10. Research of Embedded Tower Crane Monitoring System Based on FCS

    Directory of Open Access Journals (Sweden)

    Xijian Zheng

    2013-09-01

    Full Text Available To compensate for the lack of traditional safety limit device of tower crane, a design scheme of embedded tower crane intelligent monitoring system based on Fieldbus Control System was proposed. By this, online collection and transmission of tower crane real-time conditions were achieved, which could effectively improve the reliability and anti-interference of the system. Embedded development technology was used to build ARM-based master control platform. Embedded Linux cross-compiler environment was also built. Combining with embedded programming software, human-computer interaction interface of tower crane intelligent monitoring system was built, storage and display of tower crane’s online parameters were also realized. The use of the technology has opened up a new field of tower crane condition monitoring application. The research of this paper may provide reference for tower crane safety monitoring and fault diagnosing.

  11. Embedded active surfaces for volume visualization

    Science.gov (United States)

    Whitaker, Ross T.; Chen, David

    1994-05-01

    We propose a new technique for use in the visualization of sparse, fuzzy, or noisy 3D data. This technique incorporates the methods of deformable or active models that have been developed in 2D computer vision. In this paper we generalize such models to 3D in a manner that is both practical and mathematically elegant, and we thereby avoid many of the problems associated with previous attempts to generalize deformable models. When generalizing to 3D, deformable models have several drawbacks-- including their acute sensitivity to topology, parameterization, and initial conditions--which limit their effectiveness. Many of these problems stem from the underlying parameterization of the model. This paper presents an implicit representation of deformable models. The implicit representation is an embedding of objects as level sets of grayscale functions which serve as templates. The evolution equation associated with the energy minimization process for a model has an analogous partial differential equation which governs the behavior of the corresponding grayscale template. We show that the 'active blobs' associated with the embedding of active models have several useful properties. First, they are topologically flexible. Second, grayscale images represent families of models. Third, when surfaces are embedded as grayscale images, they are described by a natural scale space. This scale space provides the ability to solve these equations in a multi-scale manner. Several 2D examples of technique are presented, as well as some visualization results from 3D ultrasound.

  12. The polarizable embedding coupled cluster method

    DEFF Research Database (Denmark)

    Sneskov, Kristian; Schwabe, Tobias; Kongsted, Jacob

    2011-01-01

    We formulate a new combined quantum mechanics/molecular mechanics (QM/MM) method based on a self-consistent polarizable embedding (PE) scheme. For the description of the QM region, we apply the popular coupled cluster (CC) method detailing the inclusion of electrostatic and polarization effects...... all coupled to a polarizable MM environment. In the process, we identify CC densitylike intermediates that allow for a very efficient implementation retaining a computational low cost of the QM/MM terms even when the number of MM sites increases. The strengths of the new implementation are illustrated...

  13. Embedded systems for controlling LED matrix displays

    Science.gov (United States)

    Marghescu, Cristina; Drumea, Andrei

    2016-12-01

    LED matrix displays are a common presence in everyday life - they can be found in trains, buses, tramways, office information tables or outdoor media. The structure of the display unit is similar for all these devices, a matrix of light emitting diodes coupled between row and column lines, but there are many options for the display controller that switches these lines. Present paper analyzes different types of embedded systems that can control the LED matrix, based on single board computers, on microcontrollers with different peripheral devices or with programmable logic devices like field programmable gate arrays with implemented soft processor cores. Scalability, easiness of implementation and costs are analyzed for all proposed solutions.

  14. Small private key MQPKS on an embedded microprocessor.

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  15. Phylogenetic trees and Euclidean embeddings.

    Science.gov (United States)

    Layer, Mark; Rhodes, John A

    2017-01-01

    It was recently observed by de Vienne et al. (Syst Biol 60(6):826-832, 2011) that a simple square root transformation of distances between taxa on a phylogenetic tree allowed for an embedding of the taxa into Euclidean space. While the justification for this was based on a diffusion model of continuous character evolution along the tree, here we give a direct and elementary explanation for it that provides substantial additional insight. We use this embedding to reinterpret the differences between the NJ and BIONJ tree building algorithms, providing one illustration of how this embedding reflects tree structures in data.

  16. Embedded systems circuits and programming

    CERN Document Server

    Sanchez, Julio

    2012-01-01

    During the development of an engineered product, developers often need to create an embedded system--a prototype--that demonstrates the operation/function of the device and proves its viability. Offering practical tools for the development and prototyping phases, Embedded Systems Circuits and Programming provides a tutorial on microcontroller programming and the basics of embedded design. The book focuses on several development tools and resources: Standard and off-the-shelf components, such as input/output devices, integrated circuits, motors, and programmable microcontrollers The implementat

  17. SHM of Galaxies Embedded within Condensed Neutrino Matter

    CERN Document Server

    Morley, Peter D

    2014-01-01

    We re-examine the question of condensed neutrino objects (de- generate neutrino matter) based on new calculations. The potential show-stopper issue of free-streaming light neutrinos inhibiting galaxy formation is addressed. We compute the period associated with sim- ple harmonic motion (SHM) of galaxies embedded within condensed neutrino objects. For observational consequences, we examine the ro- tational velocities of embedded galaxies using Hickson 88A (N6978) as the prototype. Finally, we point out that degenerate neutrino objects repel each other in overlap and we compute directly the repulsive force between two interesting and relevant con?gurations. An outstanding issue is whether the accompanying tidal forces generated by condensed neutrino matter on embedded galaxies give rise to galactic bulges and halos.

  18. Observability of multivariate differential embeddings

    Energy Technology Data Exchange (ETDEWEB)

    Aguirre, Luis Antonio [Laboratorio de Modelagem, Analise e Controle de Sistemas Nao Lineares, Departamento de Engenharia Eletronica, Universidade Federeal de Minas Gerais, Av. Antonio Carlos 6627, 31270-901 Belo Horizonte, MG (Brazil); Letellier, Christophe [Universite de Rouen-CORIA UMR 6614, Av. de l' Universite, BP 12, F-76801 Saint-Etienne du Rouvray Cedex (France)

    2005-07-15

    The present paper extends some results recently developed for the analysis of observability in nonlinear dynamical systems. The aim of the paper is to address the problem of embedding an attractor using more than one observable. A multivariate nonlinear observability matrix is proposed which includes the monovariable nonlinear and linear observability matrices as particular cases. Using the developed framework and a number of worked examples, it is shown that the choice of embedding coordinates is critical. Moreover, in some cases, to reconstruct the dynamics using more than one observable could be worse than to reconstruct using a scalar measurement. Finally, using the developed framework it is shown that increasing the embedding dimension, observability problems diminish and can even be eliminated. This seems to be a physically meaningful interpretation of the Takens embedding theorem.

  19. Embedded Systems Design: Optimization Challenges

    DEFF Research Database (Denmark)

    Pop, Paul

    2005-01-01

    of designing such systems is becoming increasingly important and difficult at the same time. New automated design optimization techniques are needed, which are able to: successfully manage the complexity of embedded systems, meet the constraints imposed by the application domain, shorten the time...... in use has become larger than the number of humans on the planet. The complexity of embedded systems is growing at a very high pace and the constraints in terms of functionality, performance, low energy consumption, reliability, cost and time-to-market are getting tighter. Therefore, the task......-to-market, and reduce development and manufacturing costs. In this paper, the author introduces several embedded systems design problems, and shows how they can be formulated as optimization problems. Solving such challenging design optimization problems are the key to the success of the embedded systems design...

  20. Visualizing spacetimes via embedding diagrams

    CERN Document Server

    Hledik, Stanislav; Cipko, Alois

    2016-01-01

    It is hard to imagine curved spacetimes of General Relativity. A simple but powerful way how to achieve this is visualizing them via embedding diagrams of both ordinary geometry and optical reference geometry. They facilitate to gain an intuitive insight into the gravitational field rendered into a curved spacetime, and to assess the influence of parameters like electric charge and spin of a black hole, magnetic field or cosmological constant. Optical reference geometry and related inertial forces and their relationship to embedding diagrams are particularly useful for investigation of test particles motion. Embedding diagrams of static and spherically symmetric, or stationary and axially symmetric black-hole and naked-singularity spacetimes thus present a useful concept for intuitive understanding of these spacetimes' nature. We concentrate on general way of embedding into 3-dimensional Euclidean space, and give a set of illustrative examples.

  1. A new method of determining the optimal embedding dimension based on nonlinear prediction

    Institute of Scientific and Technical Information of China (English)

    Meng Qing-Fang; Peng Yu-Hua; Xue Pei-Jun

    2007-01-01

    A new method is proposed to determine the optimal embedding dimension from a scalar time series in this paper. This method determines the optimal embedding dimension by optimizing the nonlinear autoregressive prediction model parameterized by the embedding dimension and the nonlinear degree. Simulation results show the effectiveness of this method. And this method is applicable to a short time series, stable to noise, computationally efficient, and without any purposely introduced parameters.

  2. TINY TCP/IP PROTOCOL SUITE FOR EMBEDDED SYSTEMS WITH 32 BIT MICROCONTROLLER

    OpenAIRE

    Mr. Praful M. Godhankar; Mr. Maske Vishnu Dattatraya; Prof. Shahzia Sayyad

    2015-01-01

    The scope of embedded devices is increasing day by day and the demand will be further more when networking technology is incorporated into these devices. Many embedded systems not only communicate with each other, but also with computers using a network. All systems connected to the Internet, wireless networks such as WLAN and GPRS, and many local area networks communicate using the standard TCP/IP protocol suite. An embedded system may have as little memory, the memory constraints make progr...

  3. Hardware Support for Embedded Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2012-01-01

    The general Java runtime environment is resource hungry and unfriendly for real-time systems. To reduce the resource consumption of Java in embedded systems, direct hardware support of the language is a valuable option. Furthermore, an implementation of the Java virtual machine in hardware enables...... worst-case execution time analysis of Java programs. This chapter gives an overview of current approaches to hardware support for embedded and real-time Java....

  4. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2002-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply...... be answered affirmatively for an idealized Haskell-like language and discuss to which extent Haskell can be used as a meta-language....

  5. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2003-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply...... be answered affirmatively for an idealized Haskell-like language and discuss to which extent Haskell can be used as a meta-language....

  6. Hardware Support for Embedded Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2012-01-01

    The general Java runtime environment is resource hungry and unfriendly for real-time systems. To reduce the resource consumption of Java in embedded systems, direct hardware support of the language is a valuable option. Furthermore, an implementation of the Java virtual machine in hardware enables...... worst-case execution time analysis of Java programs. This chapter gives an overview of current approaches to hardware support for embedded and real-time Java....

  7. Fresnel Lens with Embedded Vortices

    Directory of Open Access Journals (Sweden)

    Sunil Vyas

    2012-01-01

    Full Text Available Vortices of different charges are embedded in a wavefront that has quadratic phase variation, and the intensity distribution near the focal plane is studied. This method may be useful in realizing complicated beam profiles. We have experimentally demonstrated the generation of vortex arrays having integer as well as fractional topological charges that produce different intensity profiles at the focal plane. The phase variation realized on a spatial light modulator (SLM acts as a Fresnel lens with embedded vortices.

  8. A Cartesian Embedded Boundary Method for the Compressible Navier-Stokes Equations

    Energy Technology Data Exchange (ETDEWEB)

    Kupiainen, M; Sjogreen, B

    2008-03-21

    We here generalize the embedded boundary method that was developed for boundary discretizations of the wave equation in second order formulation in [6] and for the Euler equations of compressible fluid flow in [11], to the compressible Navier-Stokes equations. We describe the method and we implement it on a parallel computer. The implementation is tested for accuracy and correctness. The ability of the embedded boundary technique to resolve boundary layers is investigated by computing skin-friction profiles along the surfaces of the embedded objects. The accuracy is assessed by comparing the computed skin-friction profiles with those obtained by a body fitted discretization.

  9. Compact Acoustic Models for Embedded Speech Recognition

    Directory of Open Access Journals (Sweden)

    Lévy Christophe

    2009-01-01

    Full Text Available Speech recognition applications are known to require a significant amount of resources. However, embedded speech recognition only authorizes few KB of memory, few MIPS, and small amount of training data. In order to fit the resource constraints of embedded applications, an approach based on a semicontinuous HMM system using state-independent acoustic modelling is proposed. A transformation is computed and applied to the global model in order to obtain each HMM state-dependent probability density functions, authorizing to store only the transformation parameters. This approach is evaluated on two tasks: digit and voice-command recognition. A fast adaptation technique of acoustic models is also proposed. In order to significantly reduce computational costs, the adaptation is performed only on the global model (using related speaker recognition adaptation techniques with no need for state-dependent data. The whole approach results in a relative gain of more than 20% compared to a basic HMM-based system fitting the constraints.

  10. Embedded Empiricisms in Soft Soil Technology

    Science.gov (United States)

    Wijeyesekera, D. C.; John, L. M. S. Alvin; Adnan, Z.

    2016-07-01

    Civil engineers of today are continuously challenged by innovative projects that push further the knowledge boundaries with conceptual and/or ingenious solutions leading to the realization of that once was considered impossible in the realms of geotechnology. Some of the forward developments rely on empirical methods embedded within soft soil technology and the spectral realms of engineering in its entirety. Empiricisms unlike folklore are not always shrouded in mysticism but can find scientific reasoning to justify them being adopted in design and tangible construction projects. This lecture therefore is an outline exposition of how empiricism has been integrally embedded in total empirical beginnings in the evolution of soft soil technology from the Renaissance time, through the developments of soil mechanics in the 19th century which in turn has paved the way to the rise of computational soil mechanics. Developments in computational soil mechanics has always embraced and are founded on a wide backdrop of empirical geoenvironment simulations. However, it is imperative that a competent geotechnical engineer needs postgraduate training combined with empiricism that is based on years of well- winnowed practical experience to fathom the diverseness and complexity of nature. However, experience being regarded more highly than expertise can, perhaps inadvertently, inhibit development and innovation.

  11. Integrated Optical Interconnect Architectures for Embedded Systems

    CERN Document Server

    Nicolescu, Gabriela

    2013-01-01

    This book provides a broad overview of current research in optical interconnect technologies and architectures. Introductory chapters on high-performance computing and the associated issues in conventional interconnect architectures, and on the fundamental building blocks for integrated optical interconnect, provide the foundations for the bulk of the book which brings together leading experts in the field of optical interconnect architectures for data communication. Particular emphasis is given to the ways in which the photonic components are assembled into architectures to address the needs of data-intensive on-chip communication, and to the performance evaluation of such architectures for specific applications.   Provides state-of-the-art research on the use of optical interconnects in Embedded Systems; Begins with coverage of the basics for high-performance computing and optical interconnect; Includes a variety of on-chip optical communication topologies; Features coverage of system integration and opti...

  12. Run-time mapping: dynamic resource allocation in embedded systems

    NARCIS (Netherlands)

    Braak, ter Timon David

    2016-01-01

    Many desired features of computing platforms, such as increased fault tolerance, variable quality of service, and improved energy efficiency, can be achieved by postponing resource management decisions from design-time to run-time. While multiprocessing has been widespread in embedded systems for q

  13. Run-time mapping: dynamic resource allocation in embedded systems

    NARCIS (Netherlands)

    ter Braak, T.D.

    2016-01-01

    Many desired features of computing platforms, such as increased fault tolerance, variable quality of service, and improved energy efficiency, can be achieved by postponing resource management decisions from design-time to run-time. While multiprocessing has been widespread in embedded systems for

  14. A structured approach to embedded control systems implementation

    NARCIS (Netherlands)

    Broenink, J.F.; Hilderink, G.H.; Spong, M.W.; Repperger, D.; Zannatha, J.M.I.

    2001-01-01

    The method presented aims at supporting the development of control software for embedded control systems. The method considers the implementation process as a stepwise refinement from physical system models and control laws to efficient control computer code, and that all phases are verified by simu

  15. Real-time depth processing for embedded platforms

    Science.gov (United States)

    Rahnama, Oscar; Makarov, Aleksej; Torr, Philip

    2017-05-01

    Obtaining depth information of a scene is an important requirement in many computer-vision and robotics applications. For embedded platforms, passive stereo systems have many advantages over their active counterparts (i.e. LiDAR, Infrared). They are power efficient, cheap, robust to lighting conditions and inherently synchronized to the RGB images of the scene. However, stereo depth estimation is a computationally expensive task that operates over large amounts of data. For embedded applications which are often constrained by power consumption, obtaining accurate results in real-time is a challenge. We demonstrate a computationally and memory efficient implementation of a stereo block-matching algorithm in FPGA. The computational core achieves a throughput of 577 fps at standard VGA resolution whilst consuming less than 3 Watts of power. The data is processed using an in-stream approach that minimizes memory-access bottlenecks and best matches the raster scan readout of modern digital image sensors.

  16. A fast video watermarking scheme for embedded device identity verification

    Science.gov (United States)

    Liu, Jun; Hu, Fang; Wang, Jianzong

    2009-08-01

    This paper presents a new fast video watermarking scheme in spatial domain for embedded device identity verification. A binary watermark signal, which is produced by the identity of the embedded device such as the disc video player, is permutated using sequence numbers generated by a secret key. And then it is encoded by Gray code. Each bit of the binary encoded watermark is embedded four times in different positions, by modifying the intensities of a nonoverlapping block of 8*8 of the blue component of the frames in host video. In watermarking extract scheme, the frame of the watermarked video and the original video are decoded to images. And the intensities of a block of 8*8 of all components of the frame images in the watermarked and the original video are compared to calculate the probability of detecting '0' or '1' for extracting binary watermark. Both the embedding and the extraction of watermarks are done in the spatial domain, so the computational cost is low. Then the digital watermark with the identity information is embedded in real time to the video image when the embedded devices play their videos. Experimental results show that the algorithm has obvious low complexity, and the strong robustness against distortion, deleting, and cropping operations.

  17. An Embedded Middleware Platform for Pervasive and Immersive Environments for-All

    NARCIS (Netherlands)

    Baldoni, R.; Ciccio, C. Di; Mecella, M.; Patrizi, F.; Querzoni, L.; Santucci, G.; Dustdar, S.; Li, F.; Truong, H.-L.; Albornos, L.; Milagro, F.; Antolin Rafael, P.; Ayani, R.; Rasch, K.; Garcia Lozano, M.; Aiello, M.; Lazovik, A.; Denaro, A.; Lasala, G.; Pucci, P.; Holzner, C.; Cincotti, F.; Aloise, F.

    2009-01-01

    Embedded systems are specialized computers used in larger systems or machines to control equipments such as automobiles, home appliances, communication, control and office machines. Such pervasivity is particularly evident in immersive realities, i.e., scenarios in which invisible embedded systems n

  18. Optimal embedding for shape indexing in medical image databases.

    Science.gov (United States)

    Qian, Xiaoning; Tagare, Hemant D; Fulbright, Robert K; Long, Rodney; Antani, Sameer

    2010-06-01

    This paper addresses the problem of indexing shapes in medical image databases. Shapes of organs are often indicative of disease, making shape similarity queries important in medical image databases. Mathematically, shapes with landmarks belong to shape spaces which are curved manifolds with a well defined metric. The challenge in shape indexing is to index data in such curved spaces. One natural indexing scheme is to use metric trees, but metric trees are prone to inefficiency. This paper proposes a more efficient alternative. We show that it is possible to optimally embed finite sets of shapes in shape space into a Euclidean space. After embedding, classical coordinate-based trees can be used for efficient shape retrieval. The embedding proposed in the paper is optimal in the sense that it least distorts the partial Procrustes shape distance. The proposed indexing technique is used to retrieve images by vertebral shape from the NHANES II database of cervical and lumbar spine X-ray images maintained at the National Library of Medicine. Vertebral shape strongly correlates with the presence of osteophytes, and shape similarity retrieval is proposed as a tool for retrieval by osteophyte presence and severity. Experimental results included in the paper evaluate (1) the usefulness of shape similarity as a proxy for osteophytes, (2) the computational and disk access efficiency of the new indexing scheme, (3) the relative performance of indexing with embedding to the performance of indexing without embedding, and (4) the computational cost of indexing using the proposed embedding versus the cost of an alternate embedding. The experimental results clearly show the relevance of shape indexing and the advantage of using the proposed embedding.

  19. Embedded Linux projects using Yocto project cookbook

    CERN Document Server

    González, Alex

    2015-01-01

    If you are an embedded developer learning about embedded Linux with some experience with the Yocto project, this book is the ideal way to become proficient and broaden your knowledge with examples that are immediately applicable to your embedded developments. Experienced embedded Yocto developers will find new insight into working methodologies and ARM specific development competence.

  20. Design of embedded endoscopic ultrasonic imaging system

    Science.gov (United States)

    Li, Ming; Zhou, Hao; Wen, Shijie; Chen, Xiodong; Yu, Daoyin

    2008-12-01

    Endoscopic ultrasonic imaging system is an important component in the endoscopic ultrasonography system (EUS). Through the ultrasonic probe, the characteristics of the fault histology features of digestive organs is detected by EUS, and then received by the reception circuit which making up of amplifying, gain compensation, filtering and A/D converter circuit, in the form of ultrasonic echo. Endoscopic ultrasonic imaging system is the back-end processing system of the EUS, with the function of receiving digital ultrasonic echo modulated by the digestive tract wall from the reception circuit, acquiring and showing the fault histology features in the form of image and characteristic data after digital signal processing, such as demodulation, etc. Traditional endoscopic ultrasonic imaging systems are mainly based on image acquisition and processing chips, which connecting to personal computer with USB2.0 circuit, with the faults of expensive, complicated structure, poor portability, and difficult to popularize. To against the shortcomings above, this paper presents the methods of digital signal acquisition and processing specially based on embedded technology with the core hardware structure of ARM and FPGA for substituting the traditional design with USB2.0 and personal computer. With built-in FIFO and dual-buffer, FPGA implement the ping-pong operation of data storage, simultaneously transferring the image data into ARM through the EBI bus by DMA function, which is controlled by ARM to carry out the purpose of high-speed transmission. The ARM system is being chosen to implement the responsibility of image display every time DMA transmission over and actualizing system control with the drivers and applications running on the embedded operating system Windows CE, which could provide a stable, safe and reliable running platform for the embedded device software. Profiting from the excellent graphical user interface (GUI) and good performance of Windows CE, we can not

  1. Embedded Face Detection and Recognition

    Directory of Open Access Journals (Sweden)

    Göksel Günlü

    2012-10-01

    Full Text Available The need to increase security in open or public spaces has in turn given rise to the requirement to monitor these spaces and analyse those images on‐site and on‐time. At this point, the use of smart cameras ‐ of which the popularity has been increasing ‐ is one step ahead. With sensors and Digital Signal Processors (DSPs, smart cameras generate ad hoc results by analysing the numeric images transmitted from the sensor by means of a variety of image‐processing algorithms. Since the images are not transmitted to a distance processing unit but rather are processed inside the camera, it does not necessitate high‐ bandwidth networks or high processor powered systems; it can instantaneously decide on the required access. Nonetheless, on account of restricted memory, processing power and overall power, image processing algorithms need to be developed and optimized for embedded processors. Among these algorithms, one of the most important is for face detection and recognition. A number of face detection and recognition methods have been proposed recently and many of these methods have been tested on general‐purpose processors. In smart cameras ‐ which are real‐life applications of such methods ‐ the widest use is on DSPs. In the present study, the Viola‐Jones face detection method ‐ which was reported to run faster on PCs ‐ was optimized for DSPs; the face recognition method was combined with the developed sub‐region and mask‐based DCT (Discrete Cosine Transform. As the employed DSP is a fixed‐point processor, the processes were performed with integers insofar as it was possible. To enable face recognition, the image was divided into sub‐ regions and from each sub‐region the robust coefficients against disruptive elements ‐ like face expression, illumination, etc. ‐ were selected as the features. The discrimination of the selected features was enhanced via LDA (Linear Discriminant Analysis and then employed for

  2. Embedded Face Detection and Recognition

    Directory of Open Access Journals (Sweden)

    Göksel Günlü

    2012-10-01

    Full Text Available The need to increase security in open or public spaces has in turn given rise to the requirement to monitor these spaces and analyse those images on-site and on-time. At this point, the use of smart cameras – of which the popularity has been increasing – is one step ahead. With sensors and Digital Signal Processors (DSPs, smart cameras generate ad hoc results by analysing the numeric images transmitted from the sensor by means of a variety of image-processing algorithms. Since the images are not transmitted to a distance processing unit but rather are processed inside the camera, it does not necessitate high-bandwidth networks or high processor powered systems; it can instantaneously decide on the required access. Nonetheless, on account of restricted memory, processing power and overall power, image processing algorithms need to be developed and optimized for embedded processors. Among these algorithms, one of the most important is for face detection and recognition. A number of face detection and recognition methods have been proposed recently and many of these methods have been tested on general-purpose processors. In smart cameras – which are real-life applications of such methods – the widest use is on DSPs. In the present study, the Viola-Jones face detection method – which was reported to run faster on PCs – was optimized for DSPs; the face recognition method was combined with the developed sub-region and mask-based DCT (Discrete Cosine Transform. As the employed DSP is a fixed-point processor, the processes were performed with integers insofar as it was possible. To enable face recognition, the image was divided into sub-regions and from each sub-region the robust coefficients against disruptive elements – like face expression, illumination, etc. – were selected as the features. The discrimination of the selected features was enhanced via LDA (Linear Discriminant Analysis and then employed for recognition. Thanks to its

  3. Small gold species supported on alumina. A computational study of {alpha}-Al{sub 2}O{sub 3}(0001) and {gamma}-Al{sub 2}O{sub 3}(001) using an embedded-cluster approach

    Energy Technology Data Exchange (ETDEWEB)

    Nasluzov, Vladimir A. [Institute of Chemistry and Chemical Technology, Russian Academy of Sciences, Krasnoyarsk (Russian Federation); Siberian Federal University, Krasnoyarsk (Russian Federation); Shulimovich, Tatyana V.; Shor, Aleksey M. [Institute of Chemistry and Chemical Technology, Russian Academy of Sciences, Krasnoyarsk (Russian Federation); Bukhtiyarov, Valery I. [Boreskov Institute of Catalysis, Russian Academy of Sciences, Novosibirsk (Russian Federation); Roesch, Notker [Department Chemie and Catalysis Research Center, Technische Universitaet Muenchen, Garching (Germany)

    2010-05-15

    We calculated the structures of and analyzed the bonding in adsorption complexes of small gold species Au{sub n} on {alpha}-Al{sub 2}O{sub 3}(0001), n=1-6, and {gamma}-Al{sub 2}O{sub 3}(001), n=1-5. We applied a scalar-relativistic gradient-corrected density functional (DF) method to cluster models of the support that were embedded in an extended elastic polarizable environment (EPE). The shortest Au-O distances, 204-211 pm, are consistent with extended X-ray adsorption fine structure (EXAFS) data for gold clusters on alumina surfaces. The calculated total adsorption energies increase with cluster nuclearity, up to n=4, but drop for larger adsorbed species. In the gas phase, these small gold clusters exhibit a planar structure which they keep, oriented parallel to the surface, as adsorbates on {alpha}-Al{sub 2}O{sub 3}(0001). Unfavorable energy contributions result for larger clusters as their planar shape is notably distorted by the interaction with the support which amounts to 0.5-1.5 eV. On {gamma}-Al{sub 2}O{sub 3}(001), also the larger gold clusters retain their intrinsic planar structure as they adsorb oriented perpendicular to the surface. The corresponding adsorption energies are slightly smaller, 0.3-1.2 eV. (Abstract Copyright [2010], Wiley Periodicals, Inc.)

  4. Design Methodologies for Secure Embedded Systems

    CERN Document Server

    Biedermann, Alexander

    2011-01-01

    Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? And how can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration o

  5. Modeling and optimization of parallel and distributed embedded systems

    CERN Document Server

    Munir, Arslan; Ranka, Sanjay

    2016-01-01

    This book introduces the state-of-the-art in research in parallel and distributed embedded systems, which have been enabled by developments in silicon technology, micro-electro-mechanical systems (MEMS), wireless communications, computer networking, and digital electronics. These systems have diverse applications in domains including military and defense, medical, automotive, and unmanned autonomous vehicles. The emphasis of the book is on the modeling and optimization of emerging parallel and distributed embedded systems in relation to the three key design metrics of performance, power and dependability.

  6. Embedding Graphs in Lorentzian Spacetime

    CERN Document Server

    Clough, James R

    2016-01-01

    Geometric approaches to network analysis combine simply defined models with great descriptive power. In this work we provide a method for embedding directed acyclic graphs into Minkowski spacetime using Multidimensional scaling (MDS). First we generalise the classical MDS algorithm, defined only for metrics with a Euclidean signature, to manifolds of any metric signature. We then use this general method to develop an algorithm to be used on networks which have causal structure allowing them to be embedded in Lorentzian manifolds. The method is demonstrated by calculating embeddings for both causal sets and citation networks in Minkowski spacetime. We finally suggest a number of applications in citation analysis such as paper recommendation, identifying missing citations and fitting citation models to data using this geometric approach.

  7. Embedded Processor Oriented Compiler Infrastructure

    Directory of Open Access Journals (Sweden)

    DJUKIC, M.

    2014-08-01

    Full Text Available In the recent years, research of special compiler techniques and algorithms for embedded processors broaden the knowledge of how to achieve better compiler performance in irregular processor architectures. However, industrial strength compilers, besides ability to generate efficient code, must also be robust, understandable, maintainable, and extensible. This raises the need for compiler infrastructure that provides means for convenient implementation of embedded processor oriented compiler techniques. Cirrus Logic Coyote 32 DSP is an example that shows how traditional compiler infrastructure is not able to cope with the problem. That is why the new compiler infrastructure was developed for this processor, based on research. in the field of embedded system software tools and experience in development of industrial strength compilers. The new infrastructure is described in this paper. Compiler generated code quality is compared with code generated by the previous compiler for the same processor architecture.

  8. Phase space embedding of electrocardiograms

    CERN Document Server

    Richter, M; Richter, Marcus; Schreiber, Thomas

    1998-01-01

    We study properties of the human electrocardiogram under the working hypothesis that fluctuations beyond the regular structure of single cardiac cycles are unpredictable. On this background we discuss the possibility to use the phase space embedding method for this kind of signal. In particular, the specific nature of the stochastic or high dimensional component allows to use phase space embeddings for certain signal processing tasks. As practical applications, we discuss noise filtering, fetal ECG extraction, and the automatic detection of clinically relevant features. The main purpose of the paper is to connect results of embedding theory which had not been previously applied in practise, and practical applications which had not yet been justified theoretically.

  9. Strong embeddings of minimum genus

    CERN Document Server

    Mohar, Bojan

    2009-01-01

    A "folklore conjecture, probably due to Tutte" (as described in [P.D. Seymour, Sums of circuits, Graph theory and related topics (Proc. Conf., Univ. Waterloo, 1977), pp. 341-355, Academic Press, 1979]) asserts that every bridgeless cubic graph can be embedded on a surface of its own genus in such a way that the face boundaries are cycles of the graph. In this paper we consider closed 2-cell embeddings of graphs and show that certain (cubic) graphs (of any fixed genus) have closed 2-cell embedding only in surfaces whose genus is very large (proportional to the order of these graphs), thus providing plethora of strong counterexamples to the above conjecture. The main result yielding such counterexamples may be of independent interest.

  10. Reconfigurable Computing

    CERN Document Server

    Cardoso, Joao MP

    2011-01-01

    As the complexity of modern embedded systems increases, it becomes less practical to design monolithic processing platforms. As a result, reconfigurable computing is being adopted widely for more flexible design. Reconfigurable Computers offer the spatial parallelism and fine-grained customizability of application-specific circuits with the postfabrication programmability of software. To make the most of this unique combination of performance and flexibility, designers need to be aware of both hardware and software issues. FPGA users must think not only about the gates needed to perform a comp

  11. Co-simulation of Distributed Embedded Real-Time Control Systems

    NARCIS (Netherlands)

    Verhoef, M.; Visser, P.M.; Hooman, J.; Broenink, Johannes F.; Davies, J.; Gibbons, J.

    2007-01-01

    Development of computerized embedded control systems is difficult because it brings together systems theory, electrical engineering and computer science. The engineering and analysis approaches advocated by these disciplines are fundamentally different which complicates reasoning about e.g. performa

  12. Certifiable Java for Embedded Systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Dalsgaard, Andreas Engelbredt; Hansen, Rene Rydhof

    2014-01-01

    The Certifiable Java for Embedded Systems (CJ4ES) project aimed to develop a prototype development environment and platform for safety-critical software for embedded applications. There are three core constituents: A profile of the Java programming language that is tailored for safety......-critical applications, a predictable Java processor built with FPGA technology, and an Eclipse based application development environment that binds the profile and the platform together and provides analyses that help to provide evidence that can be used as part of a safety case. This paper summarizes key contributions...

  13. Homogeneous Spaces and Equivariant Embeddings

    CERN Document Server

    Timashev, DA

    2011-01-01

    Homogeneous spaces of linear algebraic groups lie at the crossroads of algebraic geometry, theory of algebraic groups, classical projective and enumerative geometry, harmonic analysis, and representation theory. By standard reasons of algebraic geometry, in order to solve various problems on a homogeneous space it is natural and helpful to compactify it keeping track of the group action, i.e. to consider equivariant completions or, more generally, open embeddings of a given homogeneous space. Such equivariant embeddings are the subject of this book. We focus on classification of equivariant em

  14. Certifiable Java for Embedded Systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Hansen, René Rydhof; Ravn, Anders P.;

    2014-01-01

    The Certifiable Java for Embedded Systems (CJ4ES) project aimed to develop a prototype development environment and platform for safety-critical software for embedded applications. There are three core constituents: A profile of the Java programming language that is tailored for safety......-critical applications, a predictable Java processor built with FPGA technology, and an Eclipse based application development environment that binds the profile and the platform together and provides analyses that help to provide evidence that can be used as part of a safety case. This paper summarizes key contributions...

  15. Habitual Tastes and Embedded Taste

    DEFF Research Database (Denmark)

    Hedegaard, Liselotte

    2016-01-01

    of the national cuisine indicates continuity over time. There seems, hence, to be a gap between the multiplicity of instances of experience and recollection that belongs to the sphere of the individual and a historical memory embedded in the larger context of a society. From a common-sense perspective, this gap...... may be bridged by story-telling or other ways of handing over historically embedded practices, but this leaves a more fundamental question unanswered. Namely, that given that all remembrance has individual recollection as the point of departure, then how does individual recollection of tastes...

  16. Perturbation Theory of Embedded Eigenvalues

    DEFF Research Database (Denmark)

    Engelmann, Matthias

    We study problems connected to perturbation theory of embedded eigenvalues in two different setups. The first part deals with second order perturbation theory of mass shells in massive translation invariant Nelson type models. To this end an expansion of the eigenvalues w.r.t. fiber parameter up...... project gives a general and systematic approach to analytic perturbation theory of embedded eigenvalues. The spectral deformation technique originally developed in the theory of dilation analytic potentials in the context of Schrödinger operators is systematized by the use of Mourre theory. The group...

  17. Evolution of Deeply Embedded Protostars

    DEFF Research Database (Denmark)

    Frimann, Søren

    of this comparison is both to benchmark the simulations by testing if observational results can be reproduced, and to use the simulations to aid in the interpretation of the observations. The research deals with the earliest stages of star formation – the protostellar phase – where the protostars are still embedded...... tolink evidence of accretion bursts together with evidence of circumstellardisks. The study targets 20 embedded protostars in the Perseusmolecular cloud, and reveals plenty of evidence for variable accretionthrough observations of C18O (an optically thin isotopologue of CO).The study also reveals...

  18. Embedded EZ-Source Inverters

    DEFF Research Database (Denmark)

    Chiang Loh, Poh; Gao, Feng; Blaabjerg, Frede

    2010-01-01

    of embedded EZ-source inverters that can produce the same gain as the Z-source inverters but with smoother and smaller current/voltage maintained across the dc input source and within the impedance network. These latter features are attained without using any additional passive filter, which surely...... is a favorable advantage, since an added filter will raise the system cost and, at times, can complicate the dynamic tuning and resonant consideration of the inverters. The same embedded concept can also be used for designing a full range of voltage- and current-type inverters with each of them tested...

  19. Embedded EZ-Source Inverters

    DEFF Research Database (Denmark)

    Blaabjerg, Frede; Loh, Poh Chiang; Gao, F.

    2008-01-01

    -voltage oscillations to the system. Therefore, Z-source inverters are in effect safer and less complex, and can be implemented using only passive elements with no additional active semiconductor needed. Believing in the prospects of Z-source inverters, this paper contributes by introducing a new family of embedded EZ...... since an added filter will raise the system cost, and at times can complicate the dynamic tuning and resonant consideration of the inverters. The same embedded concept can also be used for designing a full range of voltage and current-type inverters with each of them tested experimentally using a number...

  20. Averaged Solvent Embedding Potential Parameters for Multiscale Modeling of Molecular Properties

    DEFF Research Database (Denmark)

    Beerepoot, Maarten; Steindal, Arnfinn Hykkerud; List, Nanna Holmgaard

    2016-01-01

    We derive and validate averaged solvent parameters for embedding potentials to be used in polarizable embedding quantum mechanics/molecular mechanics (QM/MM) molecular property calculations of solutes in organic solvents. The parameters are solvent-specific atom-centered partial charges and isotr......We derive and validate averaged solvent parameters for embedding potentials to be used in polarizable embedding quantum mechanics/molecular mechanics (QM/MM) molecular property calculations of solutes in organic solvents. The parameters are solvent-specific atom-centered partial charges...... embedding multiscale modeling without compromising the accuracy. The results are promising for the development of general embedding parameters for biomolecules, where the reduction in computational cost can be considerable....

  1. Estimation of the Embedding Capacity in Pixel-pair based Watermarking Schemes

    CERN Document Server

    Iyer, Rishabh; Shah, Ronak; Chaudhuri, Subhasis

    2011-01-01

    Estimation of the Embedding capacity is an important problem specifically in reversible multi-pass watermarking and is required for analysis before any image can be watermarked. In this paper, we propose an efficient method for estimating the embedding capacity of a given cover image under multi-pass embedding, without actually embedding the watermark. We demonstrate this for a class of reversible watermarking schemes which operate on a disjoint group of pixels, specifically for pixel pairs. The proposed algorithm iteratively updates the co-occurrence matrix at every stage, to estimate the multi-pass embedding capacity, and is much more efficient vis-a-vis actual watermarking. We also suggest an extremely efficient, pre-computable tree based implementation which is conceptually similar to the co-occurrence based method, but provides the estimates in a single iteration, requiring a complexity akin to that of single pass capacity estimation. We also provide bounds on the embedding capacity. We finally show how ...

  2. A Low-Cost Remote Healthcare Monitor System Based on Embedded Server

    Directory of Open Access Journals (Sweden)

    He Liu

    2013-04-01

    Full Text Available In the paper, we propose a scheme about a low-cost remote healthcare monitor system based on embedded server between home and hospital. In the scheme, we design an embedded server based on an ARM9 microprocessor. The embedded server supplies all kinds of interfaces such as GPIO interfaces, serial interfaces. These interfaces can acquire all kinds of physiology signals such as Electrocardiograph, heart rate, respiration wave, blood pressure, oxygen saturation, body temperature and so on through connecting the sensor modules. The network is based on local area network and adopts the Browser/Server model. Each home with an embedded server is as a server endpoint and the hospital is as a Browser endpoint. Every embedded server owns an independent static internet protocol address. The doctors can easily acquire patients’ physiology information through writing patients’ internet protocol address on any computer browser. The embedded server can store patients’ physiology information using database in an 8 GB SD card. The doctor can download the database information into the local computers. The system can conveniently upgrade all software in the embedded server only on a remote hospital computer. The remote healthcare monitor system based on embedded server has advantages of low-cost, convenience and feasibility.

  3. Averaged Solvent Embedding Potential Parameters for Multiscale Modeling of Molecular Properties.

    Science.gov (United States)

    Beerepoot, Maarten T P; Steindal, Arnfinn Hykkerud; List, Nanna Holmgaard; Kongsted, Jacob; Olsen, Jógvan Magnus Haugaard

    2016-04-12

    We derive and validate averaged solvent parameters for embedding potentials to be used in polarizable embedding quantum mechanics/molecular mechanics (QM/MM) molecular property calculations of solutes in organic solvents. The parameters are solvent-specific atom-centered partial charges and isotropic polarizabilities averaged over a large number of geometries of solvent molecules. The use of averaged parameters reduces the computational cost to obtain the embedding potential, which can otherwise be a rate-limiting step in calculations involving large environments. The parameters are evaluated by analyzing the quality of the resulting molecular electrostatic potentials with respect to full QM potentials. We show that a combination of geometry-specific parameters for solvent molecules close to the QM region and averaged parameters for solvent molecules further away allows for efficient polarizable embedding multiscale modeling without compromising the accuracy. The results are promising for the development of general embedding parameters for biomolecules, where the reduction in computational cost can be considerable.

  4. Messaging Performance of FIPA Interaction Protocols in Networked Embedded Controllers

    Directory of Open Access Journals (Sweden)

    Omar Jehovani López Orozco

    2007-12-01

    Full Text Available Agent-based technologies in production control systems could facilitate seamless reconfiguration and integration of mechatronic devices/modules into systems. Advances in embedded controllers which are continuously improving computational capabilities allow for software modularization and distribution of decisions. Agent platforms running on embedded controllers could hide the complexity of bootstrap and communication. Therefore, it is important to investigate the messaging performance of the agents whose main motivation is the resource allocation in manufacturing systems (i.e., conveyor system. The tests were implemented using the FIPA-compliant JADE-LEAP agent platform. Agent containers were distributed through networked embedded controllers, and agents were communicating using request and contract-net FIPA interaction protocols. The test scenarios are organized in intercontainer and intracontainer communications. The work shows the messaging performance for the different test scenarios using both interaction protocols.

  5. Messaging Performance of FIPA Interaction Protocols in Networked Embedded Controllers

    Directory of Open Access Journals (Sweden)

    García JoséAPérez

    2008-01-01

    Full Text Available Abstract Agent-based technologies in production control systems could facilitate seamless reconfiguration and integration of mechatronic devices/modules into systems. Advances in embedded controllers which are continuously improving computational capabilities allow for software modularization and distribution of decisions. Agent platforms running on embedded controllers could hide the complexity of bootstrap and communication. Therefore, it is important to investigate the messaging performance of the agents whose main motivation is the resource allocation in manufacturing systems (i.e., conveyor system. The tests were implemented using the FIPA-compliant JADE-LEAP agent platform. Agent containers were distributed through networked embedded controllers, and agents were communicating using request and contract-net FIPA interaction protocols. The test scenarios are organized in intercontainer and intracontainer communications. The work shows the messaging performance for the different test scenarios using both interaction protocols.

  6. The art of software thermal management for embedded systems

    CERN Document Server

    Benson, Mark

    2014-01-01

    This book introduces Software Thermal Management (STM) as a means of reducing power consumption in a computing system, in order to manage heat, improve component reliability, and increase system safety.  Readers will benefit from this pragmatic guide to the field of STM for embedded systems and its catalog of software power management techniques.  Since thermal management is a key bottleneck in embedded systems design, this book focuses on power as the root cause of heat. Since software has an enormous impact on power consumption in an embedded system, this book guides readers to manage heat effectively by understanding, categorizing, and developing new ways to reduce dynamic power. Whereas most books on thermal management describe mechanisms to remove heat, this book focuses on ways to avoid generating heat in the first place.   • Explains fundamentals of software thermal management, application techniques and advanced optimization strategies; • Describes a novel method for managing dynamic power, e...

  7. Direct coupling information measure from non-uniform embedding

    CERN Document Server

    Kugiumtzis, Dimitris

    2013-01-01

    A measure to estimate the direct and directional coupling in multivariate time series is proposed. The measure is an extension of a recently published measure of conditional Mutual Information from Mixed Embedding (MIME) for bivariate time series. In the proposed measure of Partial MIME (PMIME), the embedding is on all observed variables, and it is optimized in explaining the response variable. It is shown that PMIME detects correctly direct coupling, and outperforms the (linear) conditional Granger causality and the partial transfer entropy. We demonstrate that PMIME does not rely on significance test and embedding parameters, and the number of observed variables has no effect on its statistical accuracy, it may only slow the computations. The importance of these points is shown in simulations and in an application to epileptic multi-channel scalp EEG.

  8. Research on Face Recognition Based on Embedded System

    Directory of Open Access Journals (Sweden)

    Hong Zhao

    2013-01-01

    Full Text Available Because a number of image feature data to store, complex calculation to execute during the face recognition, therefore the face recognition process was realized only by PCs with high performance. In this paper, the OpenCV facial Haar-like features were used to identify face region; the Principal Component Analysis (PCA was employed in quick extraction of face features and the Euclidean Distance was also adopted in face recognition; as thus, data amount and computational complexity would be reduced effectively in face recognition, and the face recognition could be carried out on embedded platform. Finally, based on Tiny6410 embedded platform, a set of embedded face recognition systems was constructed. The test results showed that the system has stable operation and high recognition rate can be used in portable and mobile identification and authentication.

  9. Morphware - Fremtidens Embedded System Platform

    DEFF Research Database (Denmark)

    Madsen, Jan

    2006-01-01

    FPGA'er bliver i stigende grad brugt som komponenter i embedded systemer. Faldende priser, større kapacitet og en større felksibilitet har gjort FPGA'en til en attraktiv og konkurrencedygtig teknologi der tillader en stadig stigende grad af system integration, hvor traditionel hardware og software...

  10. Simulation and Embedded Smart Control

    DEFF Research Database (Denmark)

    Conrad, Finn; Fan, Zhun; Sørensen, Torben

    2006-01-01

    The paper presents results obtained from a Danish mechatronic research program focusing on intelligent motion control, simulation and embedded smart controllers for hydraulic actuators and robots as well as results from the EU projects. A mechatronic test facility with digital controllers...... and algorithms. Furthermore, a developed IT-tool concept for controller and system design utilizing the ISO 10303 STEP Standard is proposed....

  11. Embedding Sensors During Additive Manufacturing

    Energy Technology Data Exchange (ETDEWEB)

    Sbriglia, Lexey Raylene [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-08-10

    This PowerPoint presentation had the following headings: Fused deposition modeling (FDM); Open source 3D printing; Objectives; Vibration analysis; Equipment; Design; Material choices; Failure causes, such as tension, bubbling; Potential solutions; Simulations; Embedding the sensors; LabView programming; Alternate data acquisition; Problem and proposed solution; and, Conclusions

  12. Embedding Laboratory Experience in Lectures

    Science.gov (United States)

    Morgan, James R.; Barroso, Luciana R.; Simpson, Nancy

    2009-01-01

    Demonstrations can be very effective at enhancing student learning and represent a mechanism for embedding laboratory experiences within a classroom setting. A key component to an effective demonstration is active student engagement throughout the entire process, leading to a guided laboratory experience in a lecture setting. Students are involved…

  13. A New Evolutionary Algorithm for Global Optimization Embedded in the Mind Evolutionary Computation%一种嵌入思维进化的新的进化算法

    Institute of Scientific and Technical Information of China (English)

    杜金玲; 刘大莲; 李奇会

    2012-01-01

    对于运筹学问题学中的函数优化问题,本文提出一种嵌入思维进化的新的进化算法,将思维进化计算(Mind Evolutionary Computation,MEC)的“趋同”和“异化”操作加入到进化算法中,充分利用其特有记忆机制、定向机制和探测与开采功能之间的协调机制的好性能,并加入K-meams聚类算法,保证群体多样性.最后,数值模拟验证了新算法的有效性.%A new evolutionary algorithm for global optimization embe dded in the mind evolutionary computation for optimal problem in operational reserch is offered in this paper. Operations of similartaxis and dissimilation of mind evolutionary computation join in with the EC to make the best of the good quality of the evolutionary directionality mechanism, memory mechanism and harmony mechanism between exploitation and exploration. Also, K-meams clustering algorithm is used to ensure the diversity of the population. At last, the numerical results also show that the new approach is efficient.

  14. Standardised Embedded Data framework for Drones [SEDD

    Science.gov (United States)

    Wyngaard, J.; Barbieri, L.; Peterson, F. S.

    2015-12-01

    A number of barriers to entry remain for UAS use in science. One in particular is that of implementing an experiment and UAS specific software stack. Currently this stack is most often developed in-house and customised for a particular UAS-sensor pairing - limiting its reuse. Alternatively, when adaptable a suitable commercial package may be used, but such systems are both costly and usually suboptimal.In order to address this challenge the Standardised Embedded Data framework for Drones [SEDD] is being developed in μpython. SEDD provides an open source, reusable, and scientist-accessible drop in solution for drone data capture and triage. Targeted at embedded hardware, and offering easy access to standard I/O interfaces, SEDD provides an easy solution for simply capturing data from a sensor. However, the intention is rather to enable more complex systems of multiple sensors, computer hardware, and feedback loops, via 3 primary components.A data asset manager ensures data assets are associated with appropriate metadata as they are captured. Thereafter, the asset is easily archived or otherwise redirected, possibly to - onboard storage, onboard compute resource for processing, an interface for transmission, another sensor control system, remote storage and processing (such as EarthCube's CHORDS), or to any combination of the above.A service workflow managerenables easy implementation of complex onboard systems via dedicated control of multiple continuous and periodic services. Such services will include the housekeeping chores of operating a UAS and multiple sensors, but will also permit a scientist to drop in an initial scientific data processing code utilising on-board compute resources beyond the autopilot. Having such capabilities firstly enables easy creation of real-time feedback, to the human- or auto- pilot, or other sensors, on data quality or needed flight path changes. Secondly, compute hardware provides the opportunity to carry out real-time data triage

  15. Embedding Color Watermarks in Color Images

    Directory of Open Access Journals (Sweden)

    Wu Tung-Lin

    2003-01-01

    Full Text Available Robust watermarking with oblivious detection is essential to practical copyright protection of digital images. Effective exploitation of the characteristics of human visual perception to color stimuli helps to develop the watermarking scheme that fills the requirement. In this paper, an oblivious watermarking scheme that embeds color watermarks in color images is proposed. Through color gamut analysis and quantizer design, color watermarks are embedded by modifying quantization indices of color pixels without resulting in perceivable distortion. Only a small amount of information including the specification of color gamut, quantizer stepsize, and color tables is required to extract the watermark. Experimental results show that the proposed watermarking scheme is computationally simple and quite robust in face of various attacks such as cropping, low-pass filtering, white-noise addition, scaling, and JPEG compression with high compression ratios.

  16. Global Embedding of Fibre Inflation Models

    CERN Document Server

    Cicoli, Michele; Shukla, Pramod

    2016-01-01

    We present concrete embeddings of fibre inflation models in globally consistent type IIB Calabi-Yau orientifolds with closed string moduli stabilisation. After performing a systematic search through the existing list of toric Calabi-Yau manifolds, we find several examples that reproduce the minimal setup to embed fibre inflation models. This involves Calabi-Yau manifolds with $h^{1,1}= 3$ which are K3 fibrations over a $\\mbb{P}^1$ base with an additional shrinkable rigid divisor. We then provide different consistent choices of the underlying brane set-up which generate a non-perturbative superpotential suitable for moduli stabilisation and string loop corrections with the correct form to drive inflation. For each Calabi-Yau orientifold setting, we also compute the effect of higher derivative contributions and study their influence on the inflationary dynamics.

  17. Design for embedded image processing on FPGAs

    CERN Document Server

    Bailey, Donald G

    2011-01-01

    "Introductory material will consider the problem of embedded image processing, and how some of the issues may be solved using parallel hardware solutions. Field programmable gate arrays (FPGAs) are introduced as a technology that provides flexible, fine-grained hardware that can readily exploit parallelism within many image processing algorithms. A brief review of FPGA programming languages provides the link between a software mindset normally associated with image processing algorithms, and the hardware mindset required for efficient utilization of a parallel hardware design. The bulk of the book will focus on the design process, and in particular how designing an FPGA implementation differs from a conventional software implementation. Particular attention is given to the techniques for mapping an algorithm onto an FPGA implementation, considering timing, memory bandwidth and resource constraints, and efficient hardware computational techniques. Extensive coverage will be given of a range of image processing...

  18. Efficient Design Methods for Embedded Communication Systems

    Directory of Open Access Journals (Sweden)

    Holzer M

    2006-01-01

    Full Text Available Nowadays, design of embedded systems is confronted with complex signal processing algorithms and a multitude of computational intensive multimedia applications, while time to product launch has been extremely reduced. Especially in the wireless domain, those challenges are stacked with tough requirements on power consumption and chip size. Unfortunately, design productivity did not undergo a similar progression, and therefore fails to cope with the heterogeneity of modern architectures. Electronic design automation tools exhibit deep gaps in the design flow like high-level characterization of algorithms, floating-point to fixed-point conversion, hardware/software partitioning, and virtual prototyping. This tutorial paper surveys several promising approaches to solve the widespread design problems in this field. An overview over consistent design methodologies that establish a framework for connecting the different design tasks is given. This is followed by a discussion of solutions for the integrated automation of specific design tasks.

  19. Efficient Design Methods for Embedded Communication Systems

    Directory of Open Access Journals (Sweden)

    M. Rupp

    2006-06-01

    Full Text Available Nowadays, design of embedded systems is confronted with complex signal processing algorithms and a multitude of computational intensive multimedia applications, while time to product launch has been extremely reduced. Especially in the wireless domain, those challenges are stacked with tough requirements on power consumption and chip size. Unfortunately, design productivity did not undergo a similar progression, and therefore fails to cope with the heterogeneity of modern architectures. Electronic design automation tools exhibit deep gaps in the design flow like high-level characterization of algorithms, floating-point to fixed-point conversion, hardware/software partitioning, and virtual prototyping. This tutorial paper surveys several promising approaches to solve the widespread design problems in this field. An overview over consistent design methodologies that establish a framework for connecting the different design tasks is given. This is followed by a discussion of solutions for the integrated automation of specific design tasks.

  20. Constraint Embedding for Vehicle Suspension Dynamics

    Directory of Open Access Journals (Sweden)

    Jain Abhinandan

    2016-06-01

    Full Text Available The goal of this research is to achieve close to real-time dynamics performance for allowing auto-pilot in-the-loop testing of unmanned ground vehicles (UGV for urban as well as off-road scenarios. The overall vehicle dynamics performance is governed by the multibody dynamics model for the vehicle, the wheel/terrain interaction dynamics and the onboard control system. The topic of this paper is the development of computationally efficient and accurate dynamics model for ground vehicles with complex suspension dynamics. A challenge is that typical vehicle suspensions involve closed-chain loops which require expensive DAE integration techniques. In this paper, we illustrate the use the alternative constraint embedding technique to reduce the cost and improve the accuracy of the dynamics model for the vehicle.

  1. Proceedings Papers of the AFSC (Air Force Systems Command) Avionics Standardization Conference (2nd) Held at Dayton, Ohio on 30 November-2 December 1982. Volume 3. Embedded Computer Resources Governing Documents.

    Science.gov (United States)

    1982-11-01

    THE NAVY HEADQUARTERS NAVAL MATERIAL COMMAND WASHINGTON, D.C. 20360 ON v 0L Afo 08Y/DCR Ser 230 TACTICAL DIGITAL STANDARD (TADSTAND) Afaa aeil~;uyia...HEADQUARTERS NAVAL MATERIAL COMMAND WASHINGTON, D.c. 20360 .N RE,, REFER TADSTAND B (Revision 1) J MAT 08Y 21 June 1982 TACTICAL DIGITAL STANDARD B (Revision...8217 ’ ’ ° " T-9. 2 July 1980 TACTICAL DIGITAL STANDARD (TADSTAND) C From: Chief of Naval Material Subj: Computer Programming Language Standardization Policy

  2. Density Matrix Embedding: A Strong-Coupling Quantum Embedding Theory.

    Science.gov (United States)

    Knizia, Gerald; Chan, Garnet Kin-Lic

    2013-03-12

    We extend our density matrix embedding theory (DMET) [Phys. Rev. Lett.2012, 109, 186404] from lattice models to the full chemical Hamiltonian. DMET allows the many-body embedding of arbitrary fragments of a quantum system, even when such fragments are open systems and strongly coupled to their environment (e.g., by covalent bonds). In DMET, empirical approaches to strong coupling, such as link atoms or boundary regions, are replaced by a small, rigorous quantum bath designed to reproduce the entanglement between a fragment and its environment. We describe the theory and demonstrate its feasibility in strongly correlated hydrogen ring and grid models; these are not only beyond the scope of traditional embeddings but even challenge conventional quantum chemistry methods themselves. We find that DMET correctly describes the notoriously difficult symmetric dissociation of a 4 × 3 hydrogen atom grid, even when the treated fragments are as small as single hydrogen atoms. We expect that DMET will open up new ways of treating complex strongly coupled, strongly correlated systems in terms of their individual fragments.

  3. On Embeddings of Tori in Euclidean Spaces

    Institute of Scientific and Technical Information of China (English)

    Matija CENCELJ; Du(s)an REPOV(S)

    2005-01-01

    Using the relation between the set of embeddings of tori into Euclidean spaces modulo ambient isotopies and the homotopy groups of Stiefel manifolds, we prove new results on embeddings of tori into Euclidean spaces.

  4. STFTP: Secure TFTP Protocol for Embedded Multi-Agent Systems Communication

    Directory of Open Access Journals (Sweden)

    ZAGAR, D.

    2013-05-01

    Full Text Available Today's embedded systems have evolved into multipurpose devices moving towards an embedded multi-agent system (MAS infrastructure. With the involvement of MAS in embedded systems, one remaining issues is establishing communication between agents in low computational power and low memory embedded systems without present Embedded Operating System (EOS. One solution is the extension of an outdated Trivial File Transfer Protocol (TFTP. The main advantage of using TFTP in embedded systems is the easy implementation. However, the problem at hand is the overall lack of security mechanisms in TFTP. This paper proposes an extension to the existing TFTP in a form of added security mechanisms: STFTP. The authentication is proposed using Digest Access Authentication process whereas the data encryption can be performed by various cryptographic algorithms. The proposal is experimentally tested using two embedded systems based on micro-controller architecture. Communication is analyzed for authentication, data rate and transfer time versus various data encryption ciphers and files sizes. STFTP results in an expected drop in performance, which is in the range of similar encryption algorithms. The system could be improved by using embedded systems of higher computational power or by the use of hardware encryption modules.

  5. Embedding complementarity in HCI methods

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Levinsen, Karin

    2007-01-01

    Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...... in the techniques and the tools that we apply. We lack a framework for discussing what and who we are, when we talk about a person as the user of an ICT system that has to be designed, developed and implemented. As a framework, we suggest a theory of complementary positions that insists on solid accounts from all...... observer posi-tions in relation to perspective, standpoint and focus. We need to develop com-plementary theories that embed complexity, and we need to reflect critically upon forty years of dominance by rationalistic, empirical understandings of the user as illustrated in the literature and practice within...

  6. Characterization of Embedded BPM Collimators

    CERN Document Server

    VALENTINO, Gianluca

    2015-01-01

    During LS1, 16 tertiary collimators (TCTs) and 2 secondary collimators (TCSGs) in IR6 were replaced by new embedded BPM collimators. The BPM functionality allows the possibility to align the collimators more quickly and therefore be able to respond faster to machine configuration changes, as well as a direct monitoring of the beam orbit at the collimators. Following an initial commissioning phase, an MD was carried out to test the new collimators and acquisition electronics with beam in the LHC.

  7. Fundamental cycles and graph embeddings

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    In this paper, we investigate fundamental cycles in a graph G and their relations with graph embeddings. We show that a graph G may be embedded in an orientable surface with genus at least g if and only if for any spanning tree T , there exists a sequence of fundamental cycles C1, C2, . . . , C2g with C2i-1 ∩ C2i≠ф for 1≤ i ≤g. In particular, among β(G) fundamental cycles of any spanning tree T of a graph G, there are exactly 2γM (G) cycles C1, C2, . . . , C2γM (G) such that C2i-1 ∩ C2i≠ф for 1 ≤i≤γM (G), where β(G) and γM (G) are the Betti number and the maximum genus of G, respectively. This implies that it is possible to construct an orientable embedding with large genus of a graph G from an arbitrary spanning tree T (which may have very large number of odd components in G\\E(T )). This is different from the earlier work of Xuong and Liu, where spanning trees with small odd components are needed. In fact, this makes a common generalization of Xuong, Liu and Fu et al. Furthermore, we show that (1) this result is useful for locating the maximum genus of a graph having a specific edge-cut. Some known results for embedded graphs are also concluded; (2) the maximum genus problem may be reduced to the maximum matching problem. Based on this result and the algorithm of Micali-Vazirani, we present a new efficient algorithm to determine the maximum genus of a graph in O((β(G)) 25 ) steps. Our method is straight and quite different from the algorithm of Furst, Gross and McGeoch which depends on a result of Giles where matroid parity method is needed.

  8. Embedding initial data for black hole collisions

    CERN Document Server

    Romano, J D; Romano, Joseph D; Price, Richard H

    1994-01-01

    We discuss isometric embedding diagrams for the visualization of initial data for the problem of the head-on collision of two black holes. The problem of constructing the embedding diagrams is explicitly presented for the best studied initial data, the Misner geometry. We present a partial solution of the embedding diagrams and discuss issues related to completing the solution.

  9. Embedded Services in Chinese Academic Libraries

    Science.gov (United States)

    Si, Li; Xing, Wenming; Zhou, Limei; Liu, Sha

    2012-01-01

    Embedded librarianship service describes the practice of librarians integrating actively into the user's environment, rather than remaining in the library to await requests for service. This paper examines the concept of embedded service in the recent literature, within the past 5 years. It reports on a survey of embedded service in Chinese…

  10. Real-Time Configuration of Networked Embedded Systems

    Science.gov (United States)

    2005-05-01

    Patashnik, Concrete Mathematics : A Foundation for Computer Science, 2nd ed. Reading, MA: Addison-Wesley, 1994. [22] G. Arfken , Mathematical Methods for...using simple graph methods (JAVA). The points were being read from a file. The interface was as shown below. 26 The second step was to create a...net- works of embedded systems require sound mathematical models that capture the probabilistic and dynamic character of these networks, including the

  11. Reversed graph embedding resolves complex single-cell trajectories.

    Science.gov (United States)

    Qiu, Xiaojie; Mao, Qi; Tang, Ying; Wang, Li; Chawla, Raghav; Pliner, Hannah A; Trapnell, Cole

    2017-10-01

    Single-cell trajectories can unveil how gene regulation governs cell fate decisions. However, learning the structure of complex trajectories with multiple branches remains a challenging computational problem. We present Monocle 2, an algorithm that uses reversed graph embedding to describe multiple fate decisions in a fully unsupervised manner. We applied Monocle 2 to two studies of blood development and found that mutations in the genes encoding key lineage transcription factors divert cells to alternative fates.

  12. Software Design and Implementation of Brain-Computer Interface Applied in Embedded System%嵌入式脑机接口系统的软件设计与实现

    Institute of Scientific and Technical Information of China (English)

    李波; 刘杨; 周宗潭

    2007-01-01

    脑机接口的出现使得人与外设之间新型交互方式的实现成为可能,为了加强其实验平台的便携性和灵活性,文中着重探讨了基于先进精简指令微处理器(Advanced RISC Machines)的嵌入式脑机接口(brain-computer interface)系统的数据采集、数据传输、数据处理以及应用控制等方面的设计;采用基于TCP/IP协议的方法实现脑电采集和主模块之间的通信;并利用高性能处理器和多线程技术构建了具有实时数据处理能力、可衔接不同脑电实验应用程序的实验平台.

  13. [Acupoint catgut-embedding therapy: superiorities and principles of application].

    Science.gov (United States)

    Zhang, Xuan-Ping; Jia, Chun-Sheng; Wang, Jian-Ling; Shi, Jing; Zhang, Xin; Li, Xiao-Feng; Xu, Xiao-Kang; Qin, Liang; Zhang, Mei-Ling; Kang, Su-Gang; Duan, Xiao-Dong

    2012-10-01

    To analyze the superiorities of acupoint catgut-embedding therapy, discuss its law of clinical application and provide scientific decision-making for clinical treatment. Literatures on acupoint catgut-embedding therapy in the recent 40 years were selected, input, examined and verified, picked up and analyzed by establishing database with the modern computer technology. (1) One thousand and seventy-five literatures were input. It shows that the acupoint catgut-embedding therapy has an extensive application in all departments, especially in the internal department, accounting for 48.54% (50/103) of the total disease category. It has the most extensive application on treatment of epigastric pain, with the frequency of 102 times, and obesity of 74 times. The next is surgery, accounting for 14.56% (15/103). The major application is on low back pain and leg pain with the frequency of 79 times. Psoriasis, with the frequency of 30 times, holds the major application in dermatological department. And blepharoplasty, with the frequency of 30 times, gains the most application in department of ophthalmology and otorhinolaryngology. (2) In the included literatures, selection of adjacent acupoints and distal acupoints are held as the major method of acupoint selection. The adjusted lumbar puncture needle is taken as the major tool for the acupoint catgut-embedding therapy. And catguts of different sizes are adopted for the operation. (3) Analysis of the therapeutic effect shows that acupoint catgut-embedding therapy has obvious effect in all departments, especially in surgery and dermatology, with the total effective rate over 90%. Epigastric pain, obesity, epilepsy, asthma, abdominal pain, facial paralysis and constipation of the internal medicine, low back pain and leg pain of the surgical department, psoriasis of the dermatological department and blepharoplasty of the department of ophthalmology and otorhinolaryngology are considered as the dominant diseases for acupoint

  14. Isometric embeddings in cosmology and astrophysics

    Indian Academy of Sciences (India)

    Gareth Amery; Jothi Moodley; James Paul Londal

    2011-09-01

    Recent interest in higher-dimensional cosmological models has prompted some signifi-cant work on the mathematical technicalities of how one goes about embedding spacetimes into some higher-dimensional space. We survey results in the literature (existence theorems and simple explicit embeddings); briefly outline our work on global embeddings as well as explicit results for more complex geometries; and provide some examples. These results are contextualized physically, so as to provide a foundation for a detailed commentary on several key issues in the field such as: the meaning of `Ricci equivalent’ embeddings; the uniqueness of local (or global) embeddings; symmetry inheritance properties; and astrophysical constraints.

  15. Node Embedding via Word Embedding for Network Community Discovery

    CERN Document Server

    Ding, Weicong; Ishwar, Prakash

    2016-01-01

    Neural node embeddings have recently emerged as a powerful representation for supervised learning tasks involving graph-structured data. We leverage this recent advance to develop a novel algorithm for unsupervised community discovery in graphs. Through extensive experimental studies on simulated and real-world data, we demonstrate that the proposed approach consistently improves over the current state-of-the-art. Specifically, our approach empirically attains the information-theoretic limits for community recovery under the benchmark Stochastic Block Models for graph generation and exhibits better stability and accuracy over both Spectral Clustering and Acyclic Belief Propagation in the community recovery limits.

  16. A Literary Study on Embedding Therapy

    Directory of Open Access Journals (Sweden)

    Kwang-Ho Lee

    2003-12-01

    Full Text Available Background : This study focuses on a new acupuncture method of embedding method which inserts a substance on the acupuncture points for continuous stimulation. Clinical applications and cautions were examined through literary investigations. Results : Based on the literary consideration of embedding method, the following results were obtained: 1. Embedding method is a combination of traditional and embedding technique to provide longer duration of stimulation on the acupuncture points. 2. To administer the embedding method, one needs to utilize a embedding thread besides acupuncture apparatus. Sheep gut is commonly used in China and the surgical thread is the choice in Korea. 3. Embedding method may vary from the patient to patient, depending on the nature and location of the illness. Piercing, embedding, and tying are some of the possibilities. 4. Embedding method may have different arrangement of threads based on the choice of usage. 5. Embedding method is effective for various chronic illnesses such as aches, functional diseases, and the diseases of internal organs. 6. When using the embedding methods, cautions against infection and side effects due to strong stimulation are mandatory.

  17. Architecture design of a virtualized embedded system

    Directory of Open Access Journals (Sweden)

    A.Sbaa

    2013-01-01

    Full Text Available Nowadays, embedded systems have become a major driver of technological developments particularly in the industrial sector. In an embedded system, the hardware and software components are so intertwined that evolution is often a big issue. Thanks to the contributions of virtualization it is possible to design more flexible and scalable embedded systems. In fact, virtualization adds an abstraction layer between the hardware and the software to make it less intimately dependent. In this paper we propose system architecture based on embedded virtualization that will be modeled by the multi-agent systems. In the first part, we will discuss the state of the art with respect to embedded systems, multi-agent systems and the concept of virtualization. In the second part, we explain theissues related to traditional embedded systems and the constraints associated with their architecture. Subsequently, we propose a virtualization based architecture for embedded systems. In the last part we will showcase this architecture through a prototype.

  18. Embedded Implementation of VHR Satellite Image Segmentation.

    Science.gov (United States)

    Li, Chao; Balla-Arabé, Souleymane; Ginhac, Dominique; Yang, Fan

    2016-05-27

    Processing and analysis of Very High Resolution (VHR) satellite images provide a mass of crucial information, which can be used for urban planning, security issues or environmental monitoring. However, they are computationally expensive and, thus, time consuming, while some of the applications, such as natural disaster monitoring and prevention, require high efficiency performance. Fortunately, parallel computing techniques and embedded systems have made great progress in recent years, and a series of massively parallel image processing devices, such as digital signal processors or Field Programmable Gate Arrays (FPGAs), have been made available to engineers at a very convenient price and demonstrate significant advantages in terms of running-cost, embeddability, power consumption flexibility, etc. In this work, we designed a texture region segmentation method for very high resolution satellite images by using the level set algorithm and the multi-kernel theory in a high-abstraction C environment and realize its register-transfer level implementation with the help of a new proposed high-level synthesis-based design flow. The evaluation experiments demonstrate that the proposed design can produce high quality image segmentation with a significant running-cost advantage.

  19. Laplacian embedded regression for scalable manifold regularization.

    Science.gov (United States)

    Chen, Lin; Tsang, Ivor W; Xu, Dong

    2012-06-01

    Semi-supervised learning (SSL), as a powerful tool to learn from a limited number of labeled data and a large number of unlabeled data, has been attracting increasing attention in the machine learning community. In particular, the manifold regularization framework has laid solid theoretical foundations for a large family of SSL algorithms, such as Laplacian support vector machine (LapSVM) and Laplacian regularized least squares (LapRLS). However, most of these algorithms are limited to small scale problems due to the high computational cost of the matrix inversion operation involved in the optimization problem. In this paper, we propose a novel framework called Laplacian embedded regression by introducing an intermediate decision variable into the manifold regularization framework. By using ∈-insensitive loss, we obtain the Laplacian embedded support vector regression (LapESVR) algorithm, which inherits the sparse solution from SVR. Also, we derive Laplacian embedded RLS (LapERLS) corresponding to RLS under the proposed framework. Both LapESVR and LapERLS possess a simpler form of a transformed kernel, which is the summation of the original kernel and a graph kernel that captures the manifold structure. The benefits of the transformed kernel are two-fold: (1) we can deal with the original kernel matrix and the graph Laplacian matrix in the graph kernel separately and (2) if the graph Laplacian matrix is sparse, we only need to perform the inverse operation for a sparse matrix, which is much more efficient when compared with that for a dense one. Inspired by kernel principal component analysis, we further propose to project the introduced decision variable into a subspace spanned by a few eigenvectors of the graph Laplacian matrix in order to better reflect the data manifold, as well as accelerate the calculation of the graph kernel, allowing our methods to efficiently and effectively cope with large scale SSL problems. Extensive experiments on both toy and real

  20. Dissecting psychiatric spectrum disorders by generative embedding.

    Science.gov (United States)

    Brodersen, Kay H; Deserno, Lorenz; Schlagenhauf, Florian; Lin, Zhihao; Penny, Will D; Buhmann, Joachim M; Stephan, Klaas E

    2014-01-01

    network dynamics such as DCM. The results corroborate our previous findings in stroke patients that generative embedding, compared to analyses of more conventional measures such as functional connectivity or regional activity, can significantly enhance both the interpretability and performance of computational approaches to clinical classification.

  1. Dissecting psychiatric spectrum disorders by generative embedding

    Directory of Open Access Journals (Sweden)

    Kay H. Brodersen

    2014-01-01

    generative model of network dynamics such as DCM. The results corroborate our previous findings in stroke patients that generative embedding, compared to analyses of more conventional measures such as functional connectivity or regional activity, can significantly enhance both the interpretability and performance of computational approaches to clinical classification.

  2. Multicomponent density functional theory embedding formulation.

    Science.gov (United States)

    Culpitt, Tanner; Brorsen, Kurt R; Pak, Michael V; Hammes-Schiffer, Sharon

    2016-07-28

    Multicomponent density functional theory (DFT) methods have been developed to treat two types of particles, such as electrons and nuclei, quantum mechanically at the same level. In the nuclear-electronic orbital (NEO) approach, all electrons and select nuclei, typically key protons, are treated quantum mechanically. For multicomponent DFT methods developed within the NEO framework, electron-proton correlation functionals based on explicitly correlated wavefunctions have been designed and used in conjunction with well-established electronic exchange-correlation functionals. Herein a general theory for multicomponent embedded DFT is developed to enable the accurate treatment of larger systems. In the general theory, the total electronic density is separated into two subsystem densities, denoted as regular and special, and different electron-proton correlation functionals are used for these two electronic densities. In the specific implementation, the special electron density is defined in terms of spatially localized Kohn-Sham electronic orbitals, and electron-proton correlation is included only for the special electron density. The electron-proton correlation functional depends on only the special electron density and the proton density, whereas the electronic exchange-correlation functional depends on the total electronic density. This scheme includes the essential electron-proton correlation, which is a relatively local effect, as well as the electronic exchange-correlation for the entire system. This multicomponent DFT-in-DFT embedding theory is applied to the HCN and FHF(-) molecules in conjunction with two different electron-proton correlation functionals and three different electronic exchange-correlation functionals. The results illustrate that this approach provides qualitatively accurate nuclear densities in a computationally tractable manner. The general theory is also easily extended to other types of partitioning schemes for multicomponent systems.

  3. Multicomponent density functional theory embedding formulation

    Science.gov (United States)

    Culpitt, Tanner; Brorsen, Kurt R.; Pak, Michael V.; Hammes-Schiffer, Sharon

    2016-07-01

    Multicomponent density functional theory (DFT) methods have been developed to treat two types of particles, such as electrons and nuclei, quantum mechanically at the same level. In the nuclear-electronic orbital (NEO) approach, all electrons and select nuclei, typically key protons, are treated quantum mechanically. For multicomponent DFT methods developed within the NEO framework, electron-proton correlation functionals based on explicitly correlated wavefunctions have been designed and used in conjunction with well-established electronic exchange-correlation functionals. Herein a general theory for multicomponent embedded DFT is developed to enable the accurate treatment of larger systems. In the general theory, the total electronic density is separated into two subsystem densities, denoted as regular and special, and different electron-proton correlation functionals are used for these two electronic densities. In the specific implementation, the special electron density is defined in terms of spatially localized Kohn-Sham electronic orbitals, and electron-proton correlation is included only for the special electron density. The electron-proton correlation functional depends on only the special electron density and the proton density, whereas the electronic exchange-correlation functional depends on the total electronic density. This scheme includes the essential electron-proton correlation, which is a relatively local effect, as well as the electronic exchange-correlation for the entire system. This multicomponent DFT-in-DFT embedding theory is applied to the HCN and FHF- molecules in conjunction with two different electron-proton correlation functionals and three different electronic exchange-correlation functionals. The results illustrate that this approach provides qualitatively accurate nuclear densities in a computationally tractable manner. The general theory is also easily extended to other types of partitioning schemes for multicomponent systems.

  4. Embedded programmable blood pressure monitoring system

    Science.gov (United States)

    Hasan, Md. Mahmud-Ul; Islam, Md. Kafiul; Shawon, Mehedi Azad; Nowrin, Tasnuva Faruk

    2010-02-01

    A more efficient newer algorithm of detecting systolic and diastolic pressure of human body along with a complete package of an effective user-friendly embedded programmable blood pressure monitoring system has been proposed in this paper to reduce the overall workload of medical personals as well as to monitor patient's condition more conveniently and accurately. Available devices for measuring blood pressure have some problems and limitations in case of both analog and digital devices. The sphygmomanometer, being analog device, is still being used widely because of its reliability and accuracy over digital ones. But it requires a skilled person to measure the blood pressure and obviously not being automated as well as time consuming. Our proposed system being a microcontroller based embedded system has the advantages of the available digital blood pressure machines along with a much improved form and has higher accuracy at the same time. This system can also be interfaced with computer through serial port/USB to publish the measured blood pressure data on the LAN or internet. The device can be programmed to determine the patient's blood pressure after each certain interval of time in a graphical form. To sense the pressure of human body, a pressure to voltage transducer is used along with a cuff in our system. During the blood pressure measurement cycle, the output voltage of the transducer is taken by the built-in ADC of microcontroller after an amplifier stage. The recorded data are then processed and analyzed using the effective software routine to determine the blood pressure of the person under test. Our proposed system is thus expected to certainly enhance the existing blood pressure monitoring system by providing accuracy, time efficiency, user-friendliness and at last but not the least the 'better way of monitoring patient's blood pressure under critical care' all together at the same time.

  5. Ubiquitous Computing: Potentials and Challenges

    OpenAIRE

    Sen, Jaydip

    2010-01-01

    The world is witnessing the birth of a revolutionary computing paradigm that promises to have a profound effect on the way we interact with computers, devices, physical spaces, and other people. This new technology, called ubiquitous computing, envisions a world where embedded processors, computers, sensors, and digital communications are inexpensive commodities that are available everywhere. This paper presents a comprehensive discussion on the central trends in ubiquitous computing consider...

  6. Digital design (Verilog) an embedded systems approach using Verilog

    CERN Document Server

    Ashenden, Peter J

    2007-01-01

    Digital Design: An Embedded Systems Approach Using Verilog provides a foundation in digital design for students in computer engineering, electrical engineering and computer science courses. It takes an up-to-date and modern approach of presenting digital logic design as an activity in a larger systems design context. Rather than focus on aspects of digital design that have little relevance in a realistic design context, this book concentrates on modern and evolving knowledge and design skills. Hardware description language (HDL)-based design and verification is emphasized--Veril

  7. Digital design (VHDL) an embedded systems approach using VHDL

    CERN Document Server

    Ashenden, Peter J

    2007-01-01

    Digital Design: An Embedded Systems Approach Using VHDL provides a foundation in digital design for students in computer engineering, electrical engineering and computer science courses. It takes an up-to-date and modern approach of presenting digital logic design as an activity in a larger systems design context. Rather than focus on aspects of digital design that have little relevance in a realistic design context, this book concentrates on modern and evolving knowledge and design skills. Hardware description language (HDL)-based design and verification is emphasized--VHDL exa

  8. Testing Complex and Embedded Systems

    CERN Document Server

    Pries, Kim H

    2010-01-01

    Many enterprises regard system-level testing as the final piece of the development effort, rather than as a tool that should be integrated throughout the development process. As a consequence, test teams often execute critical test plans just before product launch, resulting in much of the corrective work being performed in a rush and at the last minute. Presenting combinatorial approaches for improving test coverage, Testing Complex and Embedded Systems details techniques to help you streamline testing and identify problems before they occur--including turbocharged testing using Six Sigma and

  9. Professional Windows Embedded Compact 7

    CERN Document Server

    Phung, Samuel; Joubert, Thierry; Hall, Mike

    2011-01-01

    Learn to program an array of customized devices and solutions As a compact, highly efficient, scalable operating system, Windows Embedded Compact 7 (WEC7) is one of the best options for developing a new generation of network-enabled, media-rich, and service-oriented devices. This in-depth resource takes you through the benefits and capabilities of WEC7 so that you can start using this performance development platform today. Divided into several major sections, the book begins with an introduction and then moves on to coverage of OS design, application development, advanced application developm

  10. Stagnant Timing investigation of Embedded Software on Advanced Processor Architectures

    Directory of Open Access Journals (Sweden)

    M.Shankar

    2012-01-01

    Full Text Available Most processors today are embedded inproducts like mobile phones, microwave owns, weldingmachines etc and are not used in PC’s as many believeSince some of these embedded computers are used in time-critical or safety-critical systems it is very important thatthe behaviour of these systems are well known. One part ofthat is to know the Worst Case Execution Time (WCET ofthe different tasks in the embedded system. First,shortcomings in current as well as future standards tocontrolling the power grid are outlined. From theseeconomic and safety threats, we derive an immediate needto invest in research on the protection of the power grid,both from the perspective of cyber attacks and distributedcontrol system problems. Second, current software designpractice does not adequately verify and validate worst-casetiming scenarios that have to be guaranteed in order tomeet deadlines in safety-critical embedded systems. Thisequally applies to avionics and the automotive industry,both of which are increasingly requiring their suppliers toprovide variable bounds on worst-case execution time ofsoftware.

  11. Embedding the multiple instance problem: applications to landmine detection with ground penetrating radar

    Science.gov (United States)

    Bolton, Jeremy; Gader, Paul; Frigui, Hichem

    2013-06-01

    Multiple Instance Learning is a recently researched learning paradigm in machine intelligence which operates under conditions of uncertainty with the cost of increased computational burden. This increase in computational burden can be avoided by embedding these so-called multiple instances using a kernel function or other embedding function. In the following, a family of fast multiple instance relevance vector machines are used to learn and classify landmine signatures in ground penetrating radar data. Results indicate a significant reduction in computational complexity without a loss in classification accuracy in operating conditions.

  12. Modification of fourier transform infrared spectrometer electrical system by CPLD and USB technique combining with embedded computer%基于CPLD和嵌入式微机技术的傅立叶变换红外光谱仪的电气系统

    Institute of Scientific and Technical Information of China (English)

    刘志国

    2012-01-01

    This text using embedded computer, combining with CPLD and USB technique have improved the spectrometer electrical system. Old CPU and chips were replaced by new models, a large number of logic circuits and counters were integrated in CPLD chips, So that the normal production of the spectrometer is guaranted, and the volume of the electric box is reduced, as well as the debugging steps are simplified. Old LAN communication pattern was replaced by USB. The results showed that all of the features of the new spectrometer are same as or better than the old one's. It is completely a new spectrometer with our technique property. The some cost performance of it is higher than inward instruments.%本文利用嵌入式微机(PC104),结合CPLD技术、USB技术对傅立叶变换红外光谱仪的电气系统进行了改造.实现了CPU及旧器件的更新换代,用CPLD芯片集成了大量逻辑电路和计数器,这样,既保证了仪器的正常生产、缩小了电路板,又简化了调试步骤,用USB的通讯方式取代了老的LAN的通讯方式.仪器的各项技术指标达到或超过了原光谱仪的水平.

  13. Adaptive Probabilistic Tracking Embedded in Smart Cameras for Distributed Surveillance in a 3D Model

    Directory of Open Access Journals (Sweden)

    Sven Fleck

    2006-12-01

    Full Text Available Tracking applications based on distributed and embedded sensor networks are emerging today, both in the fields of surveillance and industrial vision. Traditional centralized approaches have several drawbacks, due to limited communication bandwidth, computational requirements, and thus limited spatial camera resolution and frame rate. In this article, we present network-enabled smart cameras for probabilistic tracking. They are capable of tracking objects adaptively in real time and offer a very bandwidthconservative approach, as the whole computation is performed embedded in each smart camera and only the tracking results are transmitted, which are on a higher level of abstraction. Based on this, we present a distributed surveillance system. The smart cameras' tracking results are embedded in an integrated 3D environment as live textures and can be viewed from arbitrary perspectives. Also a georeferenced live visualization embedded in Google Earth is presented.

  14. Audio Steganography with Embedded Text

    Science.gov (United States)

    Teck Jian, Chua; Chai Wen, Chuah; Rahman, Nurul Hidayah Binti Ab.; Hamid, Isredza Rahmi Binti A.

    2017-08-01

    Audio steganography is about hiding the secret message into the audio. It is a technique uses to secure the transmission of secret information or hide their existence. It also may provide confidentiality to secret message if the message is encrypted. To date most of the steganography software such as Mp3Stego and DeepSound use block cipher such as Advanced Encryption Standard or Data Encryption Standard to encrypt the secret message. It is a good practice for security. However, the encrypted message may become too long to embed in audio and cause distortion of cover audio if the secret message is too long. Hence, there is a need to encrypt the message with stream cipher before embedding the message into the audio. This is because stream cipher provides bit by bit encryption meanwhile block cipher provide a fixed length of bits encryption which result a longer output compare to stream cipher. Hence, an audio steganography with embedding text with Rivest Cipher 4 encryption cipher is design, develop and test in this project.

  15. Testing framework for embedded languages

    Science.gov (United States)

    Leskó, Dániel; Tejfel, Máté

    2012-09-01

    Embedding a new programming language into an existing one is a widely used technique, because it fastens the development process and gives a part of a language infrastructure for free (e.g. lexical, syntactical analyzers). In this paper we are presenting a new advantage of this development approach regarding to adding testing support for these new languages. Tool support for testing is a crucial point for a newly designed programming language. It could be done in the hard way by creating a testing tool from scratch, or we could try to reuse existing testing tools by extending them with an interface to our new language. The second approach requires less work, and also it fits very well for the embedded approach. The problem is that the creation of such interfaces is not straightforward at all, because the existing testing tools were mostly not designed to be extendable and to be able to deal with new languages. This paper presents an extendable and modular model of a testing framework, in which the most basic design decision was to keep the - previously mentioned - interface creation simple and straightforward. Other important aspects of our model are the test data generation, the oracle problem and the customizability of the whole testing phase.

  16. Information embedding meets distributed control

    CERN Document Server

    Grover, Pulkit; Sahai, Anant

    2010-01-01

    We consider the problem of information embedding where the encoder modifies a white Gaussian host signal in a power-constrained manner to encode the message, and the decoder recovers both the embedded message and the modified host signal. This extends the recent work of Sumszyk and Steinberg to the continuous-alphabet Gaussian setting. We show that a dirty-paper-coding based strategy achieves the optimal rate for perfect recovery of the modified host and the message. We also provide bounds for the extension wherein the modified host signal is recovered only to within a specified distortion. When specialized to the zero-rate case, our results provide the tightest known lower bounds on the asymptotic costs for the vector version of a famous open problem in distributed control -- the Witsenhausen counterexample. Using this bound, we characterize the asymptotically optimal costs for the vector Witsenhausen problem numerically to within a factor of 1.3 for all problem parameters, improving on the earlier best know...

  17. Drilling azimuth gamma embedded design

    Directory of Open Access Journals (Sweden)

    Zhou Yi Ren

    2016-01-01

    Full Text Available Embedded drilling azimuth gamma design, the use of radioactive measuring principle embedded gamma measurement while drilling a short section analysis. Monte Carlo method, in response to the density of horizontal well logging numerical simulation of 16 orientation, the orientation of horizontal well analysed, calliper, bed boundary location, space, different formation density, formation thickness, and other factors inclined strata dip the impact by simulating 137Cs sources under different formation conditions of the gamma distribution, to determine the orientation of drilling density tool can detect window size and space, draw depth of the logging methods. The data 360° azimuth imaging, image processing method to obtain graph, display density of the formation, dip and strata thickness and other parameters, the logging methods obtain real-time geo-steering. To establish a theoretical basis for the orientation density logging while drilling method implementation and application of numerical simulation in-depth study of the MWD azimuth and density log response factors of horizontal wells.

  18. Sensor Selection method for IoT systems – focusing on embedded system requirements

    Directory of Open Access Journals (Sweden)

    Hirayama Masayuki

    2016-01-01

    Full Text Available Recently, various types of sensors have been developed. Using these sensors, IoT systems have become hot topics in embedded system domain. However, sensor selections for embedded systems are not well discussed up to now. This paper focuses on embedded system’s features and architecture, and proposes a sensor selection method which is composed seven steps. In addition, we applied the proposed method to a simple example – a sensor selection for computer scored answer sheet reader unit. From this case study, an idea to use FTA in sensor selection is also discussed.

  19. Introduction to Embedded Systems Using ANSI C and the Arduino Development Environment

    CERN Document Server

    Russell, David

    2010-01-01

    Many electrical and computer engineering projects involve some kind of embedded system in which a microcontroller sits at the center as the primary source of control. The recently-developed Arduino development platform includes an inexpensive hardware development board hosting an eight-bit ATMEL ATmega-family processor and a Java-based software-development environment. These features allow an embedded systems beginner the ability to focus their attention on learning how to write embedded software instead of wasting time overcoming the engineering CAD tools learning curve. The goal of this text

  20. DNS and Embedded DNS as Tools for Investigating Unsteady Heat Transfer Phenomena in Turbines

    Science.gov (United States)

    vonTerzi, Dominic; Bauer, H.-J.

    2010-01-01

    DNS is a powerful tool with high potential for investigating unsteady heat transfer and fluid flow phenomena, in particular for cases involving transition to turbulence and/or large coherent structures. - DNS of idealized configurations related to turbomachinery components is already possible. - For more realistic configurations and the inclusion of more effects, reduction of computational cost is key issue (e.g., hybrid methods). - Approach pursued here: Embedded DNS ( segregated coupling of DNS with LES and/or RANS). - Embedded DNS is an enabling technology for many studies. - Pre-transitional heat transfer and trailing-edge cutback film-cooling are good candidates for (embedded) DNS studies.

  1. A Real-Time Embedded Control System for Electro-Fused Magnesia Furnace

    Directory of Open Access Journals (Sweden)

    Fang Zheng

    2013-01-01

    Full Text Available Since smelting process of electro-fused magnesia furnace is a complicated process which has characteristics like complex operation conditions, strong nonlinearities, and strong couplings, traditional linear controller cannot control it very well. Advanced intelligent control strategy is a good solution to this kind of industrial process. However, advanced intelligent control strategy always involves huge programming task and hard debugging and maintaining problems. In this paper, a real-time embedded control system is proposed for the process control of electro-fused magnesia furnace based on intelligent control strategy and model-based design technology. As for hardware, an embedded controller based on an industrial Single Board Computer (SBC is developed to meet industrial field environment demands. As for software, a Linux based on Real-Time Application Interface (RTAI is used as the real-time kernel of the controller to improve its real-time performance. The embedded software platform is also modified to support generating embedded code automatically from Simulink/Stateflow models. Based on the proposed embedded control system, the intelligent embedded control software of electro-fused magnesium furnace can be directly generated from Simulink/Stateflow models. To validate the effectiveness of the proposed embedded control system, hardware-in-the-loop (HIL and industrial field experiments are both implemented. Experiments results show that the embedded control system works very well in both laboratory and industry environments.

  2. Conditional mean embeddings as regressors - supplementary

    CERN Document Server

    Grünewälder, Steffen; Baldassarre, Luca; Patterson, Sam; Gretton, Arthur; Pontil, Massimilano

    2012-01-01

    We demonstrate an equivalence between reproducing kernel Hilbert space (RKHS) embeddings of conditional distributions and vector-valued regressors. This connection introduces a natural regularized loss function which the RKHS embeddings minimise, providing an intuitive understanding of the embeddings and a justification for their use. Furthermore, the equivalence allows the application of vector-valued regression methods and results to the problem of learning conditional distributions. Using this link we derive a sparse version of the embedding by considering alternative formulations. Further, by applying convergence results for vector-valued regression to the embedding problem we derive minimax convergence rates which are O(\\log(n)/n) -- compared to current state of the art rates of O(n^{-1/4}) -- and are valid under milder and more intuitive assumptions. These minimax upper rates coincide with lower rates up to a logarithmic factor, showing that the embedding method achieves nearly optimal rates. We study o...

  3. Operating System Performance Analyzer for Embedded Systems

    Directory of Open Access Journals (Sweden)

    Shahzada Khayyam Nisar

    2011-11-01

    Full Text Available RTOS provides a number of services to an embedded system designs such as case management, memory management, and Resource Management to build a program. Choosing the best OS for an embedded system is based on the available OS for system designers and their previous knowledge and experience. This can cause an imbalance between the OS and embedded systems. RTOS performance analysis is critical in the design and integration of embedded software to ensure that limits the application meet at runtime. To select an appropriate operating system for an embedded system for a particular application, the OS services to be analyzed. These OS services are identified by parameters to establish performance metrics. Performance Metrics selected include context switching, Preemption time and interrupt latency. Performance Metrics are analyzed to choose the right OS for an embedded system for a particular application.

  4. Graphical Model Debugger Framework for Embedded Systems

    DEFF Research Database (Denmark)

    Zeng, Kebin; Guo, Yu; Angelov, Christo K.

    2010-01-01

    Model Driven Software Development has offered a faster way to design and implement embedded real-time software by moving the design to a model level, and by transforming models to code. However, the testing of embedded systems has remained at the code level. This paper presents a Graphical Model...... Debugger Framework, providing an auxiliary avenue of analysis of system models at runtime by executing generated code and updating models synchronously, which allows embedded developers to focus on the model level. With the model debugger, embedded developers can graphically test their design model...

  5. Constraint Embedding Technique for Multibody System Dynamics

    Science.gov (United States)

    Woo, Simon S.; Cheng, Michael K.

    2011-01-01

    Multibody dynamics play a critical role in simulation testbeds for space missions. There has been a considerable interest in the development of efficient computational algorithms for solving the dynamics of multibody systems. Mass matrix factorization and inversion techniques and the O(N) class of forward dynamics algorithms developed using a spatial operator algebra stand out as important breakthrough on this front. Techniques such as these provide the efficient algorithms and methods for the application and implementation of such multibody dynamics models. However, these methods are limited only to tree-topology multibody systems. Closed-chain topology systems require different techniques that are not as efficient or as broad as those for tree-topology systems. The closed-chain forward dynamics approach consists of treating the closed-chain topology as a tree-topology system subject to additional closure constraints. The resulting forward dynamics solution consists of: (a) ignoring the closure constraints and using the O(N) algorithm to solve for the free unconstrained accelerations for the system; (b) using the tree-topology solution to compute a correction force to enforce the closure constraints; and (c) correcting the unconstrained accelerations with correction accelerations resulting from the correction forces. This constraint-embedding technique shows how to use direct embedding to eliminate local closure-loops in the system and effectively convert the system back to a tree-topology system. At this point, standard tree-topology techniques can be brought to bear on the problem. The approach uses a spatial operator algebra approach to formulating the equations of motion. The operators are block-partitioned around the local body subgroups to convert them into aggregate bodies. Mass matrix operator factorization and inversion techniques are applied to the reformulated tree-topology system. Thus in essence, the new technique allows conversion of a system with

  6. A Rapid Prototyping Environment for Wireless Communication Embedded Systems

    Science.gov (United States)

    Jones, Bryan A.; Cavallaro, Joseph R.

    2003-12-01

    This paper introduces a rapid prototyping methodology which overcomes important barriers in the design and implementation of digital signal processing (DSP) algorithms and systems on embedded hardware platforms, such as cellular phones. This paper describes rapid prototyping in terms of a simulation/prototype bridge and in terms of appropriate language design. The simulation/prototype bridge combines the strengths of simulation and of prototyping, allowing the designer to develop and evaluate next-generation communications systems, partly in simulation on a host computer and partly as a prototype on embedded hardware. Appropriate language design allows designers to express a communications system as a block diagram, in which each block represents an algorithm specified by a set of equations. Software tools developed for this paper implement both concepts, and have been successfully used in the development of a next-generation code division multiple access (CDMA) cellular wireless communications system.

  7. Component-based analysis of embedded control applications

    DEFF Research Database (Denmark)

    Angelov, Christo K.; Guan, Wei; Marian, Nicolae

    2011-01-01

    presents an analysis technique that can be used to validate COMDES design models in SIMULINK. It is based on a transformation of the COMDES design model into a SIMULINK analysis model, which preserves the functional and timing behaviour of the application. This technique has been employed to develop...... configuration of applications from validated design models and trusted components. This design philosophy has been instrumental for developing COMDES—a component-based framework for distributed embedded control systems. A COMDES application is conceived as a network of embedded actors that are configured from...... instances of reusable, executable components—function blocks (FBs). System actors operate in accordance with a timed multitasking model of computation, whereby I/O signals are exchanged with the controlled plant at precisely specified time instants, resulting in the elimination of I/O jitter. The paper...

  8. An Embedded System for Tracking Human Motion and Humanoid Interfaces

    Directory of Open Access Journals (Sweden)

    Ming-June Tsai

    2012-12-01

    Full Text Available The aim of this research is using embedded CPU to develop a human motion tracking system and construct a motion replication interface for a humanoid robot. In the motion tracking system, we use a CPLD (Complex Programmable Logic Device which is built in a central control unit (CCU to generate synchronous signals for all the periphery devices and control the data flow from CCD boards to a PC via a USB chip. An embedded DSP on the CCD board is adopted to control the CCD exposure and conduct image processing. The peak position of exposure was computed by the on-board DSP within sub-pixel accuracy. In the construction of a motion replication interface, the same CCU is used to generate the PWM signals to drive the motors of the humanoid robot. All of the respective firmware coding methods are discussed in this article.

  9. Multiple-Source Shortest Paths in Embedded Graphs

    CERN Document Server

    Cabello, Sergio; Erickson, Jeff

    2012-01-01

    Let G be a directed graph with n vertices and non-negative weights in its directed edges, embedded on a surface of genus g, and let F be an arbitrary face of G. We describe an algorithm to preprocess the graph in O(gn log n) time, so that the shortest-path distance from any vertex on the boundary of F to any other vertex in G can be retrieved in O(log n) time. Our result directly generalizes the O(n log n)-time algorithm of Klein [SODA 2005] for multiple-source shortest paths in planar graphs. Intuitively, our preprocessing algorithm maintains a shortest-path tree as its source point moves continuously around the boundary of F. As an application of our algorithm, we describe algorithms to compute a shortest non-contractible or non-separating cycle in embedded, undirected graphs in O(g^2 n log n) time.

  10. A Rapid Prototyping Environment for Wireless Communication Embedded Systems

    Directory of Open Access Journals (Sweden)

    Bryan A. Jones

    2003-05-01

    Full Text Available This paper introduces a rapid prototyping methodology which overcomes important barriers in the design and implementation of digital signal processing (DSP algorithms and systems on embedded hardware platforms, such as cellular phones. This paper describes rapid prototyping in terms of a simulation/prototype bridge and in terms of appropriate language design. The simulation/prototype bridge combines the strengths of simulation and of prototyping, allowing the designer to develop and evaluate next-generation communications systems, partly in simulation on a host computer and partly as a prototype on embedded hardware. Appropriate language design allows designers to express a communications system as a block diagram, in which each block represents an algorithm specified by a set of equations. Software tools developed for this paper implement both concepts, and have been successfully used in the development of a next-generation code division multiple access (CDMA cellular wireless communications system.

  11. PC/104 Embedded IOCs at Jefferson Lab

    Energy Technology Data Exchange (ETDEWEB)

    Jianxun Yan, Trent Allison, Sue Witherspoon, Anthony Cuffe

    2009-10-01

    Jefferson Lab has developed embedded IOCs based on PC/104 single board computers (SBC) for low level control systems. The PC/104 IOCs run EPICS on top of the RTEMS operating system. Two types of control system configurations are used in different applications, PC/104 SBC with commercial PC/104 I/O cards and PC/104 SBC with custom designed FPGA-based boards. RTEMS was built with CEXP shell to run on the PC/104 SBC. CEXP shell provides the function of dynamic object loading, which is similar to the widely used VxWorks operating system. Standard software configurations were setup for PC/104 IOC application development to provide a familiar format for new projects as well as ease the conversion of applications from VME based IOCs to PC/104 IOCs. Many new projects at Jefferson Lab are going to employ PC/104 SBCs as IOCs and some applications have already been running them for accelerator operations. The PC/104 - RTEMS IOC provides a free open source Real-Time Operating System (RTOS), low cost/maintenance, easily installed/ configured, flexible, and reliable solution for accelerator control and 12GeV Upgrade projects.

  12. Modular control system for embedded applications

    Directory of Open Access Journals (Sweden)

    Dostálek Petr

    2016-01-01

    Full Text Available This paper deals with hardware design of a modular control system intended for embedded applications demanding high computational power while maintaining low cost. The control system central unit is based on 32bit microcontroller MK60DN512 with ARM Cortex-M4 core manufactured by NXP Semiconductor. Module provides all the necessary signals on the two 2-row 40 pin headers and Ethernet communication interface in the form of a small daughter board. It is connected to the mainboard which must always contain 5 V stabilized power supply; other circuits are application specific. In our application the mainboard is equipped with SD card slot, RS232 and RS485 interface which is used for high speed interconnection with up to 15 expansion peripheral modules. This concept enables high flexibility to specific application demands without necessity of redesigning the control system. Controller is freely programmable in C language using any compatible integrated development environment – NXP Kinetis Design Studio, for example. Software development and debugging is simplified by our support program libraries including necessary routines for control and monitoring tasks.

  13. Embedded systems to high performance computing using STT-MRAM

    OpenAIRE

    Senni, Sophiane; Delobelle, Thibaud; Coi, Odilia; Péneau, Pierre-Yves; Torres, Lionel; Gamatié, Abdoulaye; Benoit, Pascal; Sassatelli, Gilles

    2017-01-01

    International audience; The scaling limits of CMOS have pushed many researchers to explore alternative technologies for beyond CMOS circuits. In addition to the increased device variability and process complexity led by the continuous decreasing size of CMOS transistors, heat dissipation effects limit the density and speed of current systems-on-chip. For beyond CMOS systems, the emerging memory technology STT-MRAM is seen as a promising alternative solution. This paper shows first how STT-MRA...

  14. Computing Flow through Well Screens Using an Embedded Well Technique

    Science.gov (United States)

    2015-08-01

    the three- dimensional (3D) groundwater (GW) flow simulation using the finite element (FE) method. BACKGROUND: Accurate estimation of flow rates...equations of the coupled GW/well system that include the 3D Richards equation for subsurface flow and a one- dimensional (1D) steady-state equation...fluxes from multi- dimensional finite element flow simulations. ERDC TN-SWWRP-10-4. Vicksburg, MS: U.S. Army Engineer Research and Development Center

  15. Real-Time Embedded High Performance Computing: Communications Scheduling.

    Science.gov (United States)

    1995-06-01

    big disadvantage of STDM in our context is that it does not attempt to make use of the distributed nature of the network, it may be unacceptably...are attained. We are motivated by situations where most messages are relatively long and are sent broken up into many packets of size Adata . There...may be different packet sizes for different messages, but we start by assuming that Adata is fixed. On the other hand, the optimal value for Adata is

  16. Results in Computational Geometry: Geometric Embeddings and Query- Retrieval Problems

    Science.gov (United States)

    1990-11-01

    D. Bolker. Generalized dirichlet tesselations. Geometriae Dedicata, 20:209-243, 1986. [5] F. Aurenhammer. Power diagrams: properties, algorithms, and...voronoi diagrams. Geometriae Dedicata, 27:65-75, 1988. [9] V. E. Benes. Optimal rearrangeable multistage connecting networks. Bell System Technical

  17. An Embedded Boundary Algorithm for Large Eddy Simulations in Complex Geometries

    Directory of Open Access Journals (Sweden)

    Cristian CARLANESCU

    2012-06-01

    Full Text Available The paper presents a novel implementation of the embedded boundary algorithm in a Large Eddy Simulation CFD algorithm. The embedded boundary method aims at allowing the simulation of complex geometry flows on Cartesian computational grids, increasing the numerical accuracy of the method, while maintaining acceptable computational requirements and ease of implementation. The novelty of the present implementation consists in a new method for determining the interpolation points required for computing the state vector at the location required for a correct embedded boundary condition application. The paper also includes method validation results for two flow cases: a laminar Poiseuille flow and laminar and turbulent flows past circular cylinders. The simulation results are in good agreement with the analytical solution (where available and with experimental measurements in the literature.

  18. First-Principles Atomic Force Microscopy Image Simulations with Density Embedding Theory.

    Science.gov (United States)

    Sakai, Yuki; Lee, Alex J; Chelikowsky, James R

    2016-05-11

    We present an efficient first-principles method for simulating noncontact atomic force microscopy (nc-AFM) images using a "frozen density" embedding theory. Frozen density embedding theory enables one to efficiently compute the tip-sample interaction by considering a sample as a frozen external field. This method reduces the extensive computational load of first-principles AFM simulations by avoiding consideration of the entire tip-sample system and focusing on the tip alone. We demonstrate that our simulation with frozen density embedding theory accurately reproduces full density functional theory simulations of freestanding hydrocarbon molecules while the computational time is significantly reduced. Our method also captures the electronic effect of a Cu(111) substrate on the AFM image of pentacene and reproduces the experimental AFM image of Cu2N on a Cu(100) surface. This approach is applicable for theoretical imaging applications on large molecules, two-dimensional materials, and materials surfaces.

  19. Improvements of embedded zerotree wavelet (EZW) coding

    Science.gov (United States)

    Li, Jin; Cheng, Po-Yuen; Kuo, C.-C. Jay

    1995-04-01

    In this research, we investigate several improvements of embedded zerotree wavelet (EZW) coding. Several topics addressed include: the choice of wavelet transforms and boundary conditions, the use of arithmetic coder and arithmetic context and the design of encoding order for effective embedding. The superior performance of our improvements is demonstrated with extensive experimental results.

  20. Solid methane toward deeply embedded protostars

    NARCIS (Netherlands)

    Boogert, ACA; Schutte, WA; Tielens, AGGM; Whittet, DCB; Helmich, FP; Ehrenfreund, P; Wesselius, PR; deGraauw, T; Prusti, T

    1996-01-01

    We report on the detection of an absorption feature near 7.67 mu m toward the deeply embedded protostellar objects W 33A and NGC 7538 : IRS9. Comparison with laboratory spectra shows that this feature can be identified as the v(4) ('deformation') mode of solid state CH4 embedded in polar molecules

  1. Multithreading for Embedded Reconfigurable Multicore Systems

    NARCIS (Netherlands)

    Zaykov, P.G.

    2014-01-01

    In this dissertation, we address the problem of performance efficient multithreading execution on heterogeneous multicore embedded systems. By heterogeneous multicore embedded systems we refer to those, which have real-time requirements and consist of processor tiles with General Purpose Processor

  2. Verification and Performance Analysis for Embedded Systems

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2009-01-01

    This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems.......This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems....

  3. Embedded Systems Design with 8051 Microcontrollers

    DEFF Research Database (Denmark)

    Karakahayov, Zdravko; Winther, Ole; Christensen, Knud Smed

    Textbook on embedded microcontrollers. Example microcontroller family: Intel 8051 with special emphasis on Philips 80C552. Structure, design examples and programming in C and assembler. Hardware - software codesign. EProm emulator.......Textbook on embedded microcontrollers. Example microcontroller family: Intel 8051 with special emphasis on Philips 80C552. Structure, design examples and programming in C and assembler. Hardware - software codesign. EProm emulator....

  4. Virtually Embedded: Library Instruction within Second Life

    Science.gov (United States)

    Davis, Marian G.; Smith, Carol E.

    2009-01-01

    Embedded librarianship in distance learning courses taught within virtual environments such as Second Life is an emerging, leading-edge practice. This paper describes the experiences of librarians embedded in undergraduate English composition courses taught entirely in Second Life and presents the results of an empirical research study to assess…

  5. Free Embedding Potentials in General Relativity

    CERN Document Server

    Bustamante, M D; Brachet, M E; Bustamante, Miguel D.; Debbasch, Fabrice; Brachet, Marc-Etienne

    2005-01-01

    The embedding approach to General Relativity (GR), in which the 4-dimensional space-time is embedded in a N-dimensional ($N\\geq 10$) flat host space with hyperbolic signature, is reconsidered. All objections raised by previous authors against this approach are answered. The equations for the embedding potentials are shown to be completely equivalent to the standard GR Einstein equations for the metric, provided that two conditions are met. The first condition is that the embedding fulfills a property closely related to Nash's freeness and the second that physically consistent boundary conditions are considered in the Einstein-Hilbert action. Explicit examples of embeddings whose deformations DO describe gravitational waves around their respective backgrounds are given for both (4-D) cases of flat space-time and Schwarzschild black hole. Beside the Einstein-Hilbert action, a new action principle is considered that is also equivalent to standard GR at both levels of equations of motion and perturbations (waves)...

  6. Graphical Model Debugger Framework for Embedded Systems

    DEFF Research Database (Denmark)

    Zeng, Kebin

    2010-01-01

    Debugger Framework, providing an auxiliary avenue of analysis of system models at runtime by executing generated code and updating models synchronously, which allows embedded developers to focus on the model level. With the model debugger, embedded developers can graphically test their design model......Model Driven Software Development has offered a faster way to design and implement embedded real-time software by moving the design to a model level, and by transforming models to code. However, the testing of embedded systems has remained at the code level. This paper presents a Graphical Model...... and check the running status of the system, which offers a debugging capability on a higher level of abstraction. The framework intends to contribute a tool to the Eclipse society, especially suitable for model-driven development of embedded systems....

  7. Stellar Properties of Embedded Protostars

    CERN Document Server

    White, R J; Doppmann, G W; Covey, Kevin R; Hillenbrand, L A

    2006-01-01

    (Abridged) High dispersion spectrographs on large aperture telescopes have recently allowed observers to study the stellar and accretion properties of deeply embedded young stars, commonly referred to as Class I stars. We summarize these newly determined properties and compare them with observations of more optically revealed Class II (T Tauri) stars. Class I stars have spectral types and stellar luminosities similar to those of Class II stars, suggesting similar masses and ages. Estimates of stellar luminosity and age, however, are especially uncertain given the large extinctions, scattered light emission and continuum excesses typical of Class I stars. Several candidate Class I brown dwarfs are identified. Class I stars appear to rotate more rapidly than T Tauri stars, by roughly a factor of 2. Likewise, Class I disk accretion rates are only a factor of two larger than those of T Tauri stars, less than the mass infall rates predicted by envelope models by 1-2 orders of magnitude. In at least a few cases the...

  8. Moving Object Detection in Heterogeneous Conditions in Embedded Systems

    Directory of Open Access Journals (Sweden)

    Alessandro Garbo

    2017-07-01

    Full Text Available This paper presents a system for moving object exposure, focusing on pedestrian detection, in external, unfriendly, and heterogeneous environments. The system manipulates and accurately merges information coming from subsequent video frames, making small computational efforts in each single frame. Its main characterizing feature is to combine several well-known movement detection and tracking techniques, and to orchestrate them in a smart way to obtain good results in diversified scenarios. It uses dynamically adjusted thresholds to characterize different regions of interest, and it also adopts techniques to efficiently track movements, and detect and correct false positives. Accuracy and reliability mainly depend on the overall receipt, i.e., on how the software system is designed and implemented, on how the different algorithmic phases communicate information and collaborate with each other, and on how concurrency is organized. The application is specifically designed to work with inexpensive hardware devices, such as off-the-shelf video cameras and small embedded computational units, eventually forming an intelligent urban grid. As a matter of fact, the major contribution of the paper is the presentation of a tool for real-time applications in embedded devices with finite computational (time and memory resources. We run experimental results on several video sequences (both home-made and publicly available, showing the robustness and accuracy of the overall detection strategy. Comparisons with state-of-the-art strategies show that our application has similar tracking accuracy but much higher frame-per-second rates.

  9. Dimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction

    Science.gov (United States)

    Mardhiyah, I.; Madenda, S.; Salim, R. A.; Wiryana, I. M.

    2016-06-01

    Laplacian eigenbases are the important thing that we have to process from 3D mesh information. The information of geometric 3D mesh are include vertices locations and the connectivity of graph. Due to spectral analysis, geometric 3D mesh for large and sparse graphs with thousands of vertices is not practical to compute all the eigenvalues and eigenvector. Because of that, in this paper we discuss how to build 3D mesh reconstruction by reducing dimensionality on null eigenvalue but retain the corresponding eigenvector of Laplacian Embedding to simplify mesh processing. The result of reducing information should have to retained the connectivity of graph. The advantages of dimensionality reduction is for computational eficiency and problem simplification. Laplacian eigenbases is the point of dimensionality reduction for 3D mesh reconstruction. In this paper, we show how to reconstruct geometric 3D mesh after approximation step of 3D mesh by dimensionality reduction. Dimensionality reduction shown by Laplacian Embedding matrix. Furthermore, the effectiveness of 3D mesh reconstruction method will evaluated by geometric error, differential error, and final error. Numerical approximation error of our result are small and low complexity of computational.

  10. Design and Implementation of an Embedded NIOS II System for JPEG2000 Tier II Encoding

    Directory of Open Access Journals (Sweden)

    John M. McNichols

    2013-01-01

    Full Text Available This paper presents a novel implementation of the JPEG2000 standard as a system on a chip (SoC. While most of the research in this field centers on acceleration of the EBCOT Tier I encoder, this work focuses on an embedded solution for EBCOT Tier II. Specifically, this paper proposes using an embedded softcore processor to perform Tier II processing as the back end of an encoding pipeline. The Altera NIOS II processor is chosen for the implementation and is coupled with existing embedded processing modules to realize a fully embedded JPEG2000 encoder. The design is synthesized on a Stratix IV FPGA and is shown to out perform other comparable SoC implementations by 39% in computation time.

  11. Embedding global and collective in a torus network with message class map based tree path selection

    Science.gov (United States)

    Chen, Dong; Coteus, Paul W.; Eisley, Noel A.; Gara, Alan; Heidelberger, Philip; Senger, Robert M; Salapura, Valentina; Steinmacher-Burow, Burkhard; Sugawara, Yutaka; Takken, Todd E.

    2016-06-21

    Embodiments of the invention provide a method, system and computer program product for embedding a global barrier and global interrupt network in a parallel computer system organized as a torus network. The computer system includes a multitude of nodes. In one embodiment, the method comprises taking inputs from a set of receivers of the nodes, dividing the inputs from the receivers into a plurality of classes, combining the inputs of each of the classes to obtain a result, and sending said result to a set of senders of the nodes. Embodiments of the invention provide a method, system and computer program product for embedding a collective network in a parallel computer system organized as a torus network. In one embodiment, the method comprises adding to a torus network a central collective logic to route messages among at least a group of nodes in a tree structure.

  12. Efficient and Secure Fingerprint Verification for Embedded Devices

    Directory of Open Access Journals (Sweden)

    Sakiyama Kazuo

    2006-01-01

    Full Text Available This paper describes a secure and memory-efficient embedded fingerprint verification system. It shows how a fingerprint verification module originally developed to run on a workstation can be transformed and optimized in a systematic way to run real-time on an embedded device with limited memory and computation power. A complete fingerprint recognition module is a complex application that requires in the order of 1000 M unoptimized floating-point instruction cycles. The goal is to run both the minutiae extraction and the matching engines on a small embedded processor, in our case a 50 MHz LEON-2 softcore. It does require optimization and acceleration techniques at each design step. In order to speed up the fingerprint signal processing phase, we propose acceleration techniques at the algorithm level, at the software level to reduce the execution cycle number, and at the hardware level to distribute the system work load. Thirdly, a memory trace map-based memory reduction strategy is used for lowering the system memory requirement. Lastly, at the hardware level, it requires the development of specialized coprocessors. As results of these optimizations, we achieve a 65% reduction on the execution time and a 67% reduction on the memory storage requirement for the minutiae extraction process, compared against the reference implementation. The complete operation, that is, fingerprint capture, feature extraction, and matching, can be done in real-time of less than 4 seconds

  13. Efficient and Secure Fingerprint Verification for Embedded Devices

    Science.gov (United States)

    Yang, Shenglin; Sakiyama, Kazuo; Verbauwhede, Ingrid

    2006-12-01

    This paper describes a secure and memory-efficient embedded fingerprint verification system. It shows how a fingerprint verification module originally developed to run on a workstation can be transformed and optimized in a systematic way to run real-time on an embedded device with limited memory and computation power. A complete fingerprint recognition module is a complex application that requires in the order of 1000 M unoptimized floating-point instruction cycles. The goal is to run both the minutiae extraction and the matching engines on a small embedded processor, in our case a 50 MHz LEON-2 softcore. It does require optimization and acceleration techniques at each design step. In order to speed up the fingerprint signal processing phase, we propose acceleration techniques at the algorithm level, at the software level to reduce the execution cycle number, and at the hardware level to distribute the system work load. Thirdly, a memory trace map-based memory reduction strategy is used for lowering the system memory requirement. Lastly, at the hardware level, it requires the development of specialized coprocessors. As results of these optimizations, we achieve a 65% reduction on the execution time and a 67% reduction on the memory storage requirement for the minutiae extraction process, compared against the reference implementation. The complete operation, that is, fingerprint capture, feature extraction, and matching, can be done in real-time of less than 4 seconds

  14. Wireless embedded control system for atomically precise manufacturing

    KAUST Repository

    Khan, Yasser

    2011-04-01

    This paper will explore the possibilities of implementing a wireless embedded control system for atomically precise manufacturing. The manufacturing process, similar to Scanning Tunneling Microscopy, takes place within an Ultra High Vacuum (UHV) chamber at a pressure of 10-10 torr. In order to create vibration isolation, and to keep internal noise to a minimum, a wireless link inside the UHV chamber becomes essential. We present a MATLAB simulation of the problem, and then demonstrate a hardware scheme between a Gumstix computer and a Linux based laptop for controlling nano-manipulators with three degrees of freedom. © 2011 IEEE.

  15. Configuration spaces of an embedding torus and cubical spaces

    OpenAIRE

    Jourdan, Jean-Philippe

    2006-01-01

    For a smooth manifold M obtained as an embedding torus, A U Cx[-1,1], we consider the ordered configuration space F_k(M) of k distinct points in M. We show that there is a homotopical cubical resolution of F_k(M) defined from the configuration spaces of A and C. From it, we deduce a universal method for the computation of the pure braid groups of a manifold. We illustrate the method in the case of the Mobius band.

  16. GNU/Linux driver development for embedded data acquisition systems

    Directory of Open Access Journals (Sweden)

    Adrian Iglesias-Benitez

    2014-04-01

    Full Text Available The present work focuses on the development of a driver to handle a data acquisition system controlled by the MINI2440 single board computer based on the S3C2440 RISC processor from Samsung and equipped with an ARM920T 32 bits kernel, in which an embedded GNU/Linux operating system is executed. A global vision of the system is presented and the hardware and software components are described. Emphasis is made in the use of structures, functions and blocking and synchronization primitives GNU/Linux offers to solve problems of the producer´s/consumer´s kind.

  17. Sculptured 3D twister superlattices embedded with tunable vortex spirals.

    Science.gov (United States)

    Xavier, Jolly; Vyas, Sunil; Senthilkumaran, Paramasivam; Denz, Cornelia; Joseph, Joby

    2011-09-01

    We present diverse reconfigurable complex 3D twister vortex superlattice structures in a large area embedded with tunable vortex spirals as well as dark rings, threaded by vortex helices. We demonstrate these tunable complex chiral vortex superlattices by the superposition of relatively phase engineered plane waves. The generated complex 3D twister lattice vortex structures are computationally as well as experimentally analyzed using various tools to verify the presence of phase singularities. Our observation indicates the application-specific flexibility of our approach to tailor the transverse superlattice spatial irradiance profile of these longitudinally whirling vortex-cluster units and dark rings.

  18. Goal Selection for Embedded Systems with Oversubscribed Resources

    Science.gov (United States)

    Rabideau, Gregg; Chien, Steve; McLaren, David

    2010-01-01

    We describe an efficient, online goal selection algorithm and its use for selecting goals at runtime. Our focus is on the re-planning that must be performed in a timely manner on the embedded system where computational resources are limited. In particular, our algorithm generates near optimal solutions to problems with fully specified goal requests that oversubscribe available resources but have no temporal flexibility. By using a fast, incremental algorithm, goal selection can be postponed in a "just-in-time" fashion allowing requests to be changed or added at the last minute. This enables shorter response cycles and greater autonomy for the system under control.

  19. Mathematical Modelling for Micropiles Embedded in Salt Rock

    Directory of Open Access Journals (Sweden)

    Rădan (Toader Georgiana

    2016-03-01

    Full Text Available This study presents the results of the mathematical modelling for the micropiles foundation of an investement objective located in Slanic, Prahova county. Three computing models were created and analyzed with software, based on Finite Element Method. With Plaxis 2D model was analyzed the isolated micropile and the three-dimensional analysis was made with Plaxis 3D model, for group of micropiles. For the micropiles foundation was used Midas GTS-NX model. The mathematical models were calibrated based with the in-situ tests results for axially loaded micropiles, embedded in salt rock. The paper presents the results obtained with the three software, the calibration and validation models.

  20. Automating embedded analysis capabilities using template-based generic programming

    CERN Document Server

    Pawlowski, Roger P; Salinger, Andrew G

    2012-01-01

    An approach for incorporating embedded simulation and analysis capabilities in complex simulation codes through template-based generic programming is presented. This approach relies on templating and operator overloading within the C++ language to transform a given calculation into one that can compute a variety of additional quantities that are necessary for many state-of-the-art simulation and analysis algorithms. An approach for incorporating these ideas into complex simulation codes through general graph-based assembly is also presented. These ideas have been implemented within a set of packages in the Trilinos framework and are demonstrated on a simple problem from chemical engineering.

  1. Adaptive GDDA-BLAST: fast and efficient algorithm for protein sequence embedding.

    Directory of Open Access Journals (Sweden)

    Yoojin Hong

    Full Text Available A major computational challenge in the genomic era is annotating structure/function to the vast quantities of sequence information that is now available. This problem is illustrated by the fact that most proteins lack comprehensive annotations, even when experimental evidence exists. We previously theorized that embedded-alignment profiles (simply "alignment profiles" hereafter provide a quantitative method that is capable of relating the structural and functional properties of proteins, as well as their evolutionary relationships. A key feature of alignment profiles lies in the interoperability of data format (e.g., alignment information, physio-chemical information, genomic information, etc.. Indeed, we have demonstrated that the Position Specific Scoring Matrices (PSSMs are an informative M-dimension that is scored by quantitatively measuring the embedded or unmodified sequence alignments. Moreover, the information obtained from these alignments is informative, and remains so even in the "twilight zone" of sequence similarity (<25% identity. Although our previous embedding strategy was powerful, it suffered from contaminating alignments (embedded AND unmodified and high computational costs. Herein, we describe the logic and algorithmic process for a heuristic embedding strategy named "Adaptive GDDA-BLAST." Adaptive GDDA-BLAST is, on average, up to 19 times faster than, but has similar sensitivity to our previous method. Further, data are provided to demonstrate the benefits of embedded-alignment measurements in terms of detecting structural homology in highly divergent protein sequences and isolating secondary structural elements of transmembrane and ankyrin-repeat domains. Together, these advances allow further exploration of the embedded alignment data space within sufficiently large data sets to eventually induce relevant statistical inferences. We show that sequence embedding could serve as one of the vehicles for measurement of low

  2. The art of designing embedded systems

    CERN Document Server

    Ganssle, Jack G

    2000-01-01

    Art of Designing Embedded Systems is apart primer and part reference, aimed at practicing embedded engineers, whether working on the code or the hardware design. Embedded systems suffer from a chaotic, ad hoc development process. This books lays out a very simple seven-step plan to get firmware development under control. There are no formal methodologies to master; the ideas are immediately useful. Most designers are unaware that code complexity grows faster than code size. This book shows a number of ways to linearize the complexity/size curve and get products out faster

  3. Technology report on Railway Embedded Network solutions

    OpenAIRE

    Wahl, M; BERNOCCHI, M; Just, P.; WEISS, AH; GOIKOETXEA, J; BILLION, J; NEMORIN, J

    2007-01-01

    Deliverable D3D.3.1 Technology report on Railway Embedded Network solutions is a deliverable of Work Package SP3D_WP3 ICOM Specification & Telecom Interfaces of Onboard and Train Train Networks. It takes place within the InteGRail Task 3D_03.1 State of the Art in Embedded Networks. The objectives of this deliverable are: - to consider which embedded communication network technologies are already into ser-vice within the trains; - to analyse Ethernet-based technologies; - to evaluate how Ethe...

  4. Secure smart embedded devices, platforms and applications

    CERN Document Server

    Markantonakis, Konstantinos

    2013-01-01

    New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and consider

  5. Embedded Solenoid Transformer for Power Conversion

    DEFF Research Database (Denmark)

    2015-01-01

    A resonant power converter for operation in the radio frequency range, preferably in the VHF, comprises at least one PCB-embedded transformer. The transformer is configured for radio frequency operation and comprises a printed circuit board defining a horizontal plane, the printed circuit board...... and second embedded solenoids are formed in the conductive layers of the printed circuit board, wherein each full turn of an embedded solenoid has a horizontal top portion formed in an upper conductive layer, a horizontal bottom portion formed in a lower conductive layer, and two vertical side portions...

  6. Noise of Embedded High Aspect Ratio Nozzles

    Science.gov (United States)

    Bridges, James E.

    2011-01-01

    A family of high aspect ratio nozzles were designed to provide a parametric database of canonical embedded propulsion concepts. Nozzle throat geometries with aspect ratios of 2:1, 4:1, and 8:1 were chosen, all with convergent nozzle areas. The transition from the typical round duct to the rectangular nozzle was designed very carefully to produce a flow at the nozzle exit that was uniform and free from swirl. Once the basic rectangular nozzles were designed, external features common to embedded propulsion systems were added: extended lower lip (a.k.a. bevel, aft deck), differing sidewalls, and chevrons. For the latter detailed Reynolds-averaged Navier-Stokes (RANS) computational fluid dynamics (CFD) simulations were made to predict the thrust performance and to optimize parameters such as bevel length, and chevron penetration and azimuthal curvature. Seventeen of these nozzles were fabricated at a scale providing a 2.13 inch diameter equivalent area throat." ! The seventeen nozzles were tested for far-field noise and a few data were presented here on the effect of aspect ratio, bevel length, and chevron count and penetration. The sound field of the 2:1 aspect ratio rectangular jet was very nearly axisymmetric, but the 4:1 and 8:1 were not, the noise on their minor axes being louder than the major axes. Adding bevel length increased the noise of these nozzles, especially on their minor axes, both toward the long and short sides of the beveled nozzle. Chevrons were only added to the 2:1 rectangular jet. Adding 4 chevrons per wide side produced some decrease at aft angles, but increased the high frequency noise at right angles to the jet flow. This trend increased with increasing chevron penetration. Doubling the number of chevrons while maintaining their penetration decreased these effects. Empirical models of the parametric effect of these nozzles were constructed and quantify the trends stated above." Because it is the objective of the Supersonics Project that

  7. CURVATURE COMPUTATIONS OF 2-MANIFOLDS IN IRk

    Institute of Scientific and Technical Information of China (English)

    Guo-liang Xu; Chandrajit L. Bajaj

    2003-01-01

    In this paper, we provide simple and explicit formulas for computing Riemannian cur-vatures, mean curvature vectors, principal curvatures and principal directions for a 2-dimensional Riemannian manifold embedded in IRk with k ≥ 3.

  8. Power for Vehicle Embedded MEMS Sensors Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Embedded wireless sensors of the future will enable flight vehicle systems to be "highly aware" of onboard health and performance parameters, as well as the external...

  9. Conforming finite elements with embedded strong discontinuities

    NARCIS (Netherlands)

    Dias-da-Costa, D.; Alfaiate, J.; Sluys, L.J.; Areias, P.; Fernandes, C.; Julio, E.

    2012-01-01

    The possibility of embedding strong discontinuities into finite elements allowed the simulation of different problems, namely, brickwork masonry fracture, dynamic fracture, failure in finite strain problems and simulation of reinforcement concrete members. However, despite the significant contributi

  10. Power for Vehicle Embedded MEMS Sensors Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Embedded wireless sensors of the future will enable flight vehicle systems to be "highly aware" of onboard health and performance parameters, as well as the...

  11. Female Climacteric Syndrome Treated by Ear Embedding

    Institute of Scientific and Technical Information of China (English)

    王勤

    2003-01-01

    @@ Female climacteric syndrome is a common disease occurring before and after menopause. The author has treated the disease with ear embedding therapy, and achieved satisfactory therapeutic results. The following is a report of the clinical observation.

  12. Using Buildroot for building Embedded Linux Systems

    OpenAIRE

    Ruiz González, Mariano

    2013-01-01

    This document describes the basic steps to developed and embedded Linux-based system using the BeagleBoard. The document has been specifically written to use a BeagleBoard development system based on the OMAP `processor.

  13. Time-Scale Invariant Audio Data Embedding

    Directory of Open Access Journals (Sweden)

    Mansour Mohamed F

    2003-01-01

    Full Text Available We propose a novel algorithm for high-quality data embedding in audio. The algorithm is based on changing the relative length of the middle segment between two successive maximum and minimum peaks to embed data. Spline interpolation is used to change the lengths. To ensure smooth monotonic behavior between peaks, a hybrid orthogonal and nonorthogonal wavelet decomposition is used prior to data embedding. The possible data embedding rates are between 20 and 30 bps. However, for practical purposes, we use repetition codes, and the effective embedding data rate is around 5 bps. The algorithm is invariant after time-scale modification, time shift, and time cropping. It gives high-quality output and is robust to mp3 compression.

  14. Apparatuses And Systems For Embedded Thermoelectric Generators

    KAUST Repository

    Hussain, Muhammad M.

    2013-08-08

    An apparatus and a system for embedded thermoelectric generators are disclosed. In one embodiment, the apparatus is embedded in an interface where the ambient temperatures on two sides of the interface are different. In one embodiment, the apparatus is fabricated with the interface in integrity as a unitary piece. In one embodiment, the apparatus includes a first thermoelectric material embedded through the interface. The apparatus further includes a second thermoelectric material embedded through the interface. The first thermoelectric material is electrically coupled to the second thermoelectric material. In one embodiment, the apparatus further includes an output structure coupled to the first thermoelectric material and the second thermoelectric material and configured to output a voltage.

  15. Multimode FPGA with Flexible Embedded FPUS

    OpenAIRE

    G.Murugaboopathi; S.Hariharasitaraman; Sankar, G.

    2012-01-01

    The Performance of field-programmable gate arrays used for Floating-point applications are poor due to complexity of floating-point arithmetic. Implementing floating-point units on FPGAs consume a large amount of resources. This makes FPGAs less attractive for use in floating-point intensive applications. There is a need for embedded FPUs in FPGAs. We proposed a flexible multimode embedded FPU for FPGAs that can be configured to perform a wide range of operations. The floatingpoint adder and ...

  16. Embedded adhesive connection for laminated glass plates

    DEFF Research Database (Denmark)

    Hansen, Jens Zangenberg; Poulsen, S.H.; Bagger, A.

    2012-01-01

    The structural behavior of a new connection design, the embedded adhesive connection, used for laminated glass plates is investigated. The connection consists of an aluminum plate encapsulated in-between two adjacent triple layered laminated glass plates. Fastening between glass and aluminum...... usage in a design situation. The embedded connection shows promising potential as a future fastening system for load-carrying laminated glass plates....

  17. Five years of density matrix embedding theory

    CERN Document Server

    Wouters, Sebastian; Chan, Garnet K -L

    2016-01-01

    Density matrix embedding theory (DMET) describes finite fragments in the presence of a surrounding environment. In contrast to most embedding methods, DMET explicitly allows for quantum entanglement between both. In this chapter, we discuss both the ground-state and response theory formulations of DMET, and review several applications. In addition, a proof is given that the local density of states can be obtained by working with a Fock space of bath orbitals.

  18. Accelerated Monte Carlo by Embedded Cluster Dynamics

    Science.gov (United States)

    Brower, R. C.; Gross, N. A.; Moriarty, K. J. M.

    1991-07-01

    We present an overview of the new methods for embedding Ising spins in continuous fields to achieve accelerated cluster Monte Carlo algorithms. The methods of Brower and Tamayo and Wolff are summarized and variations are suggested for the O( N) models based on multiple embedded Z2 spin components and/or correlated projections. Topological features are discussed for the XY model and numerical simulations presented for d=2, d=3 and mean field theory lattices.

  19. Embedded Operating System for MicroBlaze

    OpenAIRE

    2006-01-01

    This paper presents a work in progress on experiments with embedded operating systems for the MicroBlaze processor. Modern embedded systems based on a configurable platform incorporating a similar processor core are gaining importance with the ongoing effort to minimize cost and development time. After an overview of the configurable platform based on this processor core, we devote our attention to uClinux OS. This OS has been successfully ported for the MicroBlaze processor, and we present o...

  20. Embedded Lattice and Properties of Gram Matrix

    Directory of Open Access Journals (Sweden)

    Futa Yuichi

    2017-03-01

    Full Text Available In this article, we formalize in Mizar [14] the definition of embedding of lattice and its properties. We formally define an inner product on an embedded module. We also formalize properties of Gram matrix. We formally prove that an inverse of Gram matrix for a rational lattice exists. Lattice of Z-module is necessary for lattice problems, LLL (Lenstra, Lenstra and Lov´asz base reduction algorithm [16] and cryptographic systems with lattice [17].

  1. Exponentially many maximum genus embeddings and genus embeddings for complete graphs

    Institute of Scientific and Technical Information of China (English)

    REN Han; BAI Yun

    2008-01-01

    There are many results on the maximum genus,among which most are written for the existence of values of such embeddings,and few attention has been paid to the estimation of such embeddings and their applications.In this paper we study the number of maximum genus embeddings for a graph and find an exponential lower bound for such numbers.Our results show that in general case,a simple connected graph has exponentially many distinct maximum genus embeddings.In particular,a connected cubie graph G of order n always has at least (√2)m+n+α/2 distinct maximum genus embeddings,where α and m denote,respectively,the number of inner vertices and odd compo-nents of an optimal tree T.What surprise us most is that such two extremal embeddings (i.e.,the maximum genus embeddings and the genus embeddings) are sometimes closely related with each other.In fact,as applications,we show that for a sufficient large natural number n,there are at least C2n/4 many genus embeddings for complete graph Kn with n=4,7,10 (mod12),where C is a constance depending on the Value of n of residue 12.These results improve the bounds obtained by Korzhik and Voss and the methods used here are much simpler and straight.

  2. Real-Time Video Convolutional Face Finder on Embedded Platforms

    Directory of Open Access Journals (Sweden)

    Franck Mamalet

    2007-03-01

    Full Text Available A high-level optimization methodology is applied for implementing the well-known convolutional face finder (CFF algorithm for real-time applications on mobile phones, such as teleconferencing, advanced user interfaces, image indexing, and security access control. CFF is based on a feature extraction and classification technique which consists of a pipeline of convolutions and subsampling operations. The design of embedded systems requires a good trade-off between performance and code size due to the limited amount of available resources. The followed methodology copes with the main drawbacks of the original implementation of CFF such as floating-point computation and memory allocation, in order to allow parallelism exploitation and perform algorithm optimizations. Experimental results show that our embedded face detection system can accurately locate faces with less computational load and memory cost. It runs on a 275 MHz Starcore DSP at 35 QCIF images/s with state-of-the-art detection rates and very low false alarm rates.

  3. Using Topic Modeling and Text Embeddings to Predict Deleted Tweets

    Energy Technology Data Exchange (ETDEWEB)

    Potash, Peter J.; Bell, Eric B.; Harrison, Joshua J.

    2016-02-29

    Predictive models for tweet deletion have been a relatively unexplored area of Twitter-related computational research. We first approach the deletion of tweets as a spam detection problem, applying a small set of handcrafted features to improve upon the current state-of-the- art in predicting deleted tweets. Next, we apply our approach to a dataset of deleted tweets that better reflects the current deletion rate. Since tweets are deleted for reasons beyond just the presence of spam, we apply topic modeling and text embeddings in order to capture the semantic content of tweets that can lead to tweet deletion. Our goal is to create an effective model that has a low-dimensional feature space and is also language-independent. A lean model would be computationally advantageous processing high-volumes of Twitter data, which can reach 9,885 tweets per second. Our results show that a small set of spam-related features combined with word topics and character-level text embeddings provide the best f1 when trained with a random forest model. The highest precision of the deleted tweet class is achieved by a modification of paragraph2vec to capture author identity.

  4. Efficient ghost cell reconstruction for embedded boundary methods

    Science.gov (United States)

    Rapaka, Narsimha; Al-Marouf, Mohamad; Samtaney, Ravi

    2016-11-01

    A non-iterative linear reconstruction procedure for Cartesian grid embedded boundary methods is introduced. The method exploits the inherent geometrical advantage of the Cartesian grid and employs batch sorting of the ghost cells to eliminate the need for an iterative solution procedure. This reduces the computational cost of the reconstruction procedure significantly, especially for large scale problems in a parallel environment that have significant communication overhead, e.g., patch based adaptive mesh refinement (AMR) methods. In this approach, prior computation and storage of the weightage coefficients for the neighbour cells is not required which is particularly attractive for moving boundary problems and memory intensive stationary boundary problems. The method utilizes a compact and unique interpolation stencil but also provides second order spatial accuracy. It provides a single step/direct reconstruction for the ghost cells that enforces the boundary conditions on the embedded boundary. The method is extendable to higher order interpolations as well. Examples that demonstrate the advantages of the present approach are presented. Supported by the KAUST Office of Competitive Research Funds under Award No. URF/1/1394-01.

  5. Real-Time Video Convolutional Face Finder on Embedded Platforms

    Directory of Open Access Journals (Sweden)

    Mamalet Franck

    2007-01-01

    Full Text Available A high-level optimization methodology is applied for implementing the well-known convolutional face finder (CFF algorithm for real-time applications on mobile phones, such as teleconferencing, advanced user interfaces, image indexing, and security access control. CFF is based on a feature extraction and classification technique which consists of a pipeline of convolutions and subsampling operations. The design of embedded systems requires a good trade-off between performance and code size due to the limited amount of available resources. The followed methodology copes with the main drawbacks of the original implementation of CFF such as floating-point computation and memory allocation, in order to allow parallelism exploitation and perform algorithm optimizations. Experimental results show that our embedded face detection system can accurately locate faces with less computational load and memory cost. It runs on a 275 MHz Starcore DSP at 35 QCIF images/s with state-of-the-art detection rates and very low false alarm rates.

  6. Modular neural tile architecture for compact embedded hardware spiking neural network

    NARCIS (Netherlands)

    Pande, Sandeep; Morgan, Fearghal; Cawley, Seamus; Bruintjes, Tom; Smit, Gerard; McGinley, Brian; Carrillo, Snaider; Harkin, Jim; McDaid, Liam

    2013-01-01

    Biologically-inspired packet switched network on chip (NoC) based hardware spiking neural network (SNN) architectures have been proposed as an embedded computing platform for classification, estimation and control applications. Storage of large synaptic connectivity (SNN topology) information in SNN

  7. Embedded-LES and experiment of turbulent boundary layer flow around a floor-mounted cube

    DEFF Research Database (Denmark)

    Jørgensen, Nina Gall; Koss, Holger; Bennetsen, Jens Chr.

    An Embedded LES approach is used to numerically simulate fluctuating surface pressures on a floor-mounted cube in a turbulent boundary layer flow and compared to wind tunnel experiments. The computation were performed with the CFD software ANSYS FLUENT at a Reynolds number at cube height of Reh = 1...

  8. Expressing Environment Assumptions and Real-time Requirements for a Distributed Embedded System with Shared Variables

    DEFF Research Database (Denmark)

    Tjell, Simon; Fernandes, João Miguel

    2008-01-01

    In a distributed embedded system, it is often necessary to share variables among its computing nodes to allow the distribution of control algorithms. It is therefore necessary to include a component in each node that provides the service of variable sharing. For that type of component, this paper...

  9. Creating a portable data-collection system with Microsoft Embedded Visual Tools for the Pocket PC.

    Science.gov (United States)

    Dixon, Mark R

    2003-01-01

    This paper describes an overview and illustrative example for creating a portable data-collection system using Microsoft Embedded Visual Tools for the Pocket PC. A description of the Visual Basic programming language is given, along with examples of computer code procedures for developing data-collection software. Program specifications, strategies for customizing the collection system, and troubleshooting tips are also provided.

  10. High-Reynolds Number Viscous Flow Simulations on Embedded-Boundary CartesianGrids

    Science.gov (United States)

    2016-05-05

    term goal of this research is to develop algorithms to simulate high Reynolds number turbulent flow in complicated geometries using embedded boundary...Spalding’s formula of matching the pro- files actually computed in the flow field by the Spalart-Allmaras turbulence model. In particular the profiles ...turbu- lent viscosity to be computed, see e.g. the profiles in the bottom row of Fig. 4. The streamwise velocity and especially the turbulent viscosity

  11. Embedded Control in Wearable Medical Devices: Application to the Artificial Pancreas

    Directory of Open Access Journals (Sweden)

    Stamatina Zavitsanou

    2016-09-01

    Full Text Available Significant increases in processing power, coupled with the miniaturization of processing units operating at low power levels, has motivated the embedding of modern control systems into medical devices. The design of such embedded decision-making strategies for medical applications is driven by multiple crucial factors, such as: (i guaranteed safety in the presence of exogenous disturbances and unexpected system failures; (ii constraints on computing resources; (iii portability and longevity in terms of size and power consumption; and (iv constraints on manufacturing and maintenance costs. Embedded control systems are especially compelling in the context of modern artificial pancreas systems (AP used in glucose regulation for patients with type 1 diabetes mellitus (T1DM. Herein, a review of potential embedded control strategies that can be leveraged in a fully-automated and portable AP is presented. Amongst competing controllers, emphasis is provided on model predictive control (MPC, since it has been established as a very promising control strategy for glucose regulation using the AP. Challenges involved in the design, implementation and validation of safety-critical embedded model predictive controllers for the AP application are discussed in detail. Additionally, the computational expenditure inherent to MPC strategies is investigated, and a comparative study of runtime performances and storage requirements among modern quadratic programming solvers is reported for a desktop environment and a prototype hardware platform.

  12. A Rapid Prototyping Tool for Embedded, Real-Time Hierarchical Control Systems

    Directory of Open Access Journals (Sweden)

    Ramamoorthy Subramanian

    2008-01-01

    Full Text Available Abstract Laboratory Virtual Instrumentation and Engineering Workbench (LabVIEW is a graphical programming tool based on the dataflow language G. Recently, runtime support for a hard real-time environment has become available for LabVIEW, which makes it an option for embedded systems prototyping. Due to its characteristics, the environment presents itself as an ideal tool for both the design and implementation of embedded software. In this paper, we study the design and implementation of embedded software by using G as the specification language and the LabVIEW RT real-time platform. One of the main advantages of this approach is that the environment leads itself to a very smooth transition from design to implementation, allowing for powerful cosimulation strategies (e.g., hardware in the loop, runtime modeling. We characterize the semantics and formal model of computation of G. We compare it to other models of computation and develop design rules and algorithms to propose sound embedded design in the language. We investigate the specification and mapping of hierarchical control systems in LabVIEW and G. Finally, we describe the development of a state-of-the-art embedded motion control system using LabVIEW as the specification, simulation and implementation tool, using the proposed design principles. The solution is state-of-the-art in terms of flexibility and control performance.

  13. A Rapid Prototyping Tool for Embedded, Real-Time Hierarchical Control Systems

    Directory of Open Access Journals (Sweden)

    Hugo Andrade

    2008-12-01

    Full Text Available Laboratory Virtual Instrumentation and Engineering Workbench (LabVIEW is a graphical programming tool based on the dataflow language G. Recently, runtime support for a hard real-time environment has become available for LabVIEW, which makes it an option for embedded systems prototyping. Due to its characteristics, the environment presents itself as an ideal tool for both the design and implementation of embedded software. In this paper, we study the design and implementation of embedded software by using G as the specification language and the LabVIEW RT real-time platform. One of the main advantages of this approach is that the environment leads itself to a very smooth transition from design to implementation, allowing for powerful cosimulation strategies (e.g., hardware in the loop, runtime modeling. We characterize the semantics and formal model of computation of G. We compare it to other models of computation and develop design rules and algorithms to propose sound embedded design in the language. We investigate the specification and mapping of hierarchical control systems in LabVIEW and G. Finally, we describe the development of a state-of-the-art embedded motion control system using LabVIEW as the specification, simulation and implementation tool, using the proposed design principles. The solution is state-of-the-art in terms of flexibility and control performance.

  14. Discussion on the Definition of Embedded System%嵌入式系统定义探讨

    Institute of Scientific and Technical Information of China (English)

    张玢; 孟开元; 田泽

    2011-01-01

    对目前国内流行的嵌入式系统定义提出质疑,认为嵌入式系统不是"专用计算机系统",嵌入式系统不只"以计算机技术为基础".从嵌入式系统的发展起源、体系结构、功能特点、知识技术体系等方面进行了分析论证,从而进一步完善了嵌入式系统的定义.%This paper discusses the popular definition of embedded system, and points out that embedded system is not “the special computer system” and not “based on computer technology” only. Then developmental origins, system structure, function characteristics,knowledge system of embedded system are analyzed, and the definition of embedded system is improved.

  15. Influence of embedding parameters and noise in center of pressure recurrence quantification analysis.

    Science.gov (United States)

    Hasson, Christopher J; Van Emmerik, Richard E A; Caldwell, Graham E; Haddad, Jeffrey M; Gagnon, Jeff L; Hamill, Joseph

    2008-04-01

    Recurrence quantification analysis (RQA) can extract the dynamics of postural control from center of pressure (CoP) data by quantifying the system's repeatability, complexity, and local dynamic stability through several variables. Computation of these variables requires the selection of suitable embedding parameters for state space reconstruction (i.e. time delay and embedding dimension); however, it is unclear how the parameters influence RQA variables when examining noisy CoP data. This study evaluated the sensitivity of RQA variables to embedding parameter values and noise level, and assessed methods of selecting embedding parameters for CoP data. Five healthy male subjects maintained quiet stance for 30s while the anterior-posterior CoP was measured. The effect of noise was evaluated by adding uniform white noise of increasing amplitude to the raw CoP signal. The magnitude of all RQA variables decreased with increasing noise amplitude for all subjects. A sensitivity analysis was performed by systematically altering the embedding parameters for the raw data with and without a selected level of added noise. The key result was that, for all subjects, the RQA variables were sensitive to the embedding parameter values and the level of noise in the CoP data. Finally, the performance of false nearest neighbors and average displacement algorithms for choosing embedding parameters was evaluated. Both methods gave clear and consistent results for all subjects with either raw or noisy data. The results suggest that careful selection of embedding parameters is essential when using RQA to examine postural control based on noisy CoP data.

  16. Effective scheme for partitioning covalent bonds in density-functional embedding theory: From molecules to extended covalent systems

    Science.gov (United States)

    Huang, Chen; Muñoz-García, Ana Belén; Pavone, Michele

    2016-12-01

    Density-functional embedding theory provides a general way to perform multi-physics quantum mechanics simulations of large-scale materials by dividing the total system's electron density into a cluster's density and its environment's density. It is then possible to compute the accurate local electronic structures and energetics of the embedded cluster with high-level methods, meanwhile retaining a low-level description of the environment. The prerequisite step in the density-functional embedding theory is the cluster definition. In covalent systems, cutting across the covalent bonds that connect the cluster and its environment leads to dangling bonds (unpaired electrons). These represent a major obstacle for the application of density-functional embedding theory to study extended covalent systems. In this work, we developed a simple scheme to define the cluster in covalent systems. Instead of cutting covalent bonds, we directly split the boundary atoms for maintaining the valency of the cluster. With this new covalent embedding scheme, we compute the dehydrogenation energies of several different molecules, as well as the binding energy of a cobalt atom on graphene. Well localized cluster densities are observed, which can facilitate the use of localized basis sets in high-level calculations. The results are found to converge faster with the embedding method than the other multi-physics approach ONIOM. This work paves the way to perform the density-functional embedding simulations of heterogeneous systems in which different types of chemical bonds are present.

  17. Runtime support for reconfigurable real-time embedded systems

    NARCIS (Netherlands)

    Papp, Z.

    2001-01-01

    As the embedding environment becomes more and more complex so does the embedded system itself. An aspect of the complexity, the demand for robust and fault tolerant embedded solutions is ever increasing. Consequently the embedded system design and development face new challenges including modeling,

  18. Group Theory for Embedded Random Matrix Ensembles

    CERN Document Server

    Kota, V K B

    2014-01-01

    Embedded random matrix ensembles are generic models for describing statistical properties of finite isolated quantum many-particle systems. For the simplest spinless fermion (or boson) systems with say $m$ fermions (or bosons) in $N$ single particle states and interacting with say $k$-body interactions, we have EGUE($k$) [embedded GUE of $k$-body interactions) with GUE embedding and the embedding algebra is $U(N)$. In this paper, using EGUE($k$) representation for a Hamiltonian that is $k$-body and an independent EGUE($t$) representation for a transition operator that is $t$-body and employing the embedding $U(N)$ algebra, finite-$N$ formulas for moments up to order four are derived, for the first time, for the transition strength densities (transition strengths multiplied by the density of states at the initial and final energies). In the asymptotic limit, these formulas reduce to those derived for the EGOE version and establish that in general bivariate transition strength densities take bivariate Gaussian ...

  19. Orthogonality of embedded wave functions for different states in frozen-density embedding theory

    Energy Technology Data Exchange (ETDEWEB)

    Zech, Alexander; Wesolowski, Tomasz A. [Département de Chimie Physique, Université de Genève, 30 quai Ernest-Ansermet, CH-1211 Genève 4 (Switzerland); Aquilante, Francesco [Dipartimento di Chimica “G. Ciamician,” Università di Bologna, Via Selmi 2, IT-40126 Bologna (Italy)

    2015-10-28

    Other than lowest-energy stationary embedded wave functions obtained in Frozen-Density Embedding Theory (FDET) [T. A. Wesolowski, Phys. Rev. A 77, 012504 (2008)] can be associated with electronic excited states but they can be mutually non-orthogonal. Although this does not violate any physical principles — embedded wave functions are only auxiliary objects used to obtain stationary densities — working with orthogonal functions has many practical advantages. In the present work, we show numerically that excitation energies obtained using conventional FDET calculations (allowing for non-orthogonality) can be obtained using embedded wave functions which are strictly orthogonal. The used method preserves the mathematical structure of FDET and self-consistency between energy, embedded wave function, and the embedding potential (they are connected through the Euler-Lagrange equations). The orthogonality is built-in through the linearization in the embedded density of the relevant components of the total energy functional. Moreover, we show formally that the differences between the expectation values of the embedded Hamiltonian are equal to the excitation energies, which is the exact result within linearized FDET. Linearized FDET is shown to be a robust approximation for a large class of reference densities.

  20. Exponentially many maximum genus embeddings and genus embeddings for complete graphs

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    There are many results on the maximum genus, among which most are written for the existence of values of such embeddings, and few attention has been paid to the estimation of such embeddings and their applications. In this paper we study the number of maximum genus embeddings for a graph and find an exponential lower bound for such numbers. Our results show that in gen-eral case, a simple connected graph has exponentially many distinct maximum genus embeddings. In particular, a connected cubic graph G of order n always has at least 2~1/2m+n+ α2 distinct maximum genus embeddings, where α and m denote, respectively, the number of inner vertices and odd compo-nents of an optimal tree T . What surprise us most is that such two extremal embeddings (i.e., the maximum genus embeddings and the genus embeddings) are sometimes closely related with each other. In fact, as applications, we show that for a suffcient large natural number n, there are at least C2 n4 dmeapneyn dgienngu os ne mthbee vdadliuneg soffonrocf ormespidleutee 1g2r.a pThh eKsen rwesiuthlt sn i m≡p r4o,v 7e, 1th0e ( mbooudn1d2)s, owbthaeirnee dC b iys Ka ocroznhsikta anncde Voss and the methods used here are much simpler and straight.

  1. IMB3-Miner: Mining Induced/Embedded Subtrees by Constraining the Level of Embedding

    NARCIS (Netherlands)

    Tan, H.; Dillon, T.S.; Hadzic, F.; Chang, E.; Feng, L.

    Tree mining has recently attracted a lot of interest in areas such as Bioinformatics, XML mining, Web mining, etc. We are mainly concerned with mining frequent induced and embedded subtrees. While more interesting patterns can be obtained when mining embedded subtrees, unfortunately mining such

  2. Efficient audio signal processing for embedded systems

    Science.gov (United States)

    Chiu, Leung Kin

    As mobile platforms continue to pack on more computational power, electronics manufacturers start to differentiate their products by enhancing the audio features. However, consumers also demand smaller devices that could operate for longer time, hence imposing design constraints. In this research, we investigate two design strategies that would allow us to efficiently process audio signals on embedded systems such as mobile phones and portable electronics. In the first strategy, we exploit properties of the human auditory system to process audio signals. We designed a sound enhancement algorithm to make piezoelectric loudspeakers sound ”richer" and "fuller." Piezoelectric speakers have a small form factor but exhibit poor response in the low-frequency region. In the algorithm, we combine psychoacoustic bass extension and dynamic range compression to improve the perceived bass coming out from the tiny speakers. We also developed an audio energy reduction algorithm for loudspeaker power management. The perceptually transparent algorithm extends the battery life of mobile devices and prevents thermal damage in speakers. This method is similar to audio compression algorithms, which encode audio signals in such a ways that the compression artifacts are not easily perceivable. Instead of reducing the storage space, however, we suppress the audio contents that are below the hearing threshold, therefore reducing the signal energy. In the second strategy, we use low-power analog circuits to process the signal before digitizing it. We designed an analog front-end for sound detection and implemented it on a field programmable analog array (FPAA). The system is an example of an analog-to-information converter. The sound classifier front-end can be used in a wide range of applications because programmable floating-gate transistors are employed to store classifier weights. Moreover, we incorporated a feature selection algorithm to simplify the analog front-end. A machine

  3. Min-max model predictive control for constrained nonlinear systems via multiple LPV embeddings

    Institute of Scientific and Technical Information of China (English)

    ZHAO Min; LI Ning; LI ShaoYuan

    2009-01-01

    A min-max model predictive control strategy is proposed for a class of constrained nonlinear system whose trajectories can be embedded within those of a bank of linear parameter varying (LPV) models. The embedding LPV models can yield much better approximation of the nonlinear system dynamics than a single LTV model. For each LPV model, a parameter-dependent Lyapunov function is introduced to obtain poly-quadratically stable control law and to guarantee the feasibility and stability of the original nonlinear system. This approach can greatly reduce computational burden in traditional nonlinear predictive control strategy. Finally a simulation example illustrating the strategy is presented.

  4. Embedded systems analysis and modeling with SysML, UML and AADL

    CERN Document Server

    Kordon, Fabrice; Canals , Agusti; Dohet , Alain

    2013-01-01

    Since the construction of the first embedded system in the 1960s, embedded systems have continued to spread. They provide a continually increasing number of services and are part of our daily life. The development of these systems is a difficult problem which does not yet have a global solution. Another difficulty is that systems are plunged into the real world, which is not discrete (as is generally understood in computing), but has a richness of behaviors which sometimes hinders the formulation of simplifying assumptions due to their generally autonomous nature and they must face possibly

  5. Single Gaussian Chaotic Neuron: Numerical Study and Implementation in an Embedded System

    Directory of Open Access Journals (Sweden)

    Luis M. Torres-Treviño

    2013-01-01

    Full Text Available Artificial Gaussian neurons are very common structures of artificial neural networks like radial basis function. These artificial neurons use a Gaussian activation function that includes two parameters called the center of mass (cm and sensibility factor (λ. Changes on these parameters determine the behavior of the neuron. When the neuron has a feedback output, complex chaotic behavior is displayed. This paper presents a study and implementation of this particular neuron. Stability of fixed points, bifurcation diagrams, and Lyapunov exponents help to determine the dynamical nature of the neuron, and its implementation on embedded system illustrates preliminary results toward embedded chaos computation.

  6. Parallel embedded systems: where real-time and low-power meet

    DEFF Research Database (Denmark)

    Karakehayov, Zdravko; Guo, Yu

    2008-01-01

    This paper introduces a combination of models and proofs for optimal power management via Dynamic Frequency Scaling and Dynamic Voltage Scaling. The approach is suitable for systems on a chip or microcontrollers where processors run in parallel with embedded peripherals. We have developed...... a software tool, called CASTLE, to provide computer assistance in the design process of energy-aware embedded systems. The tool considers single processor and parallel architectures. An example shows an energy reduction of 23% when the tool allocates two microcontrollers for parallel execution....

  7. On the embedding of Weyl manifolds

    Science.gov (United States)

    Avalos, R.; Dahia, F.; Romero, C.

    2017-01-01

    We discuss the possibility of extending different versions of the Campbell-Magaard theorem, which have already been established in the context of semi-Riemannian geometry, to the context of Weyl's geometry. We show that some of the known results can be naturally extended to the new geometric scenario, although new difficulties arise. In pursuit of solving the embedding problem, we have obtained some no-go theorems. We also highlight some of the difficulties that appear in the embedding problem, which are typical of the Weylian character of the geometry. The establishing of these new results may be viewed as part of a program that highlights the possible significance of embedding theorems of increasing degrees of generality in the context of modern higher-dimensional space-time theories.

  8. Embedded and real-time operating systems

    CERN Document Server

    Wang, K C

    2017-01-01

    This book covers the basic concepts and principles of operating systems, showing how to apply them to the design and implementation of complete operating systems for embedded and real-time systems. It includes all the foundational and background information on ARM architecture, ARM instructions and programming, toolchain for developing programs, virtual machines for software implementation and testing, program execution image, function call conventions, run-time stack usage and link C programs with assembly code. It describes the design and implementation of a complete OS for embedded systems in incremental steps, explaining the design principles and implementation techniques. For Symmetric Multiprocessing (SMP) embedded systems, the author examines the ARM MPcore processors, which include the SCU and GIC for interrupts routing and interprocessor communication and synchronization by Software Generated Interrupts (SGIs). Throughout the book, complete working sample systems demonstrate the design principles and...

  9. Design Technology for Heterogeneous Embedded Systems

    CERN Document Server

    O'Connor, Ian; Piguet, Christian

    2012-01-01

    Designing technology to address the problem of heterogeneous embedded systems, while remaining compatible with standard “More Moore” flows, i.e. capable of handling simultaneously both silicon complexity and system complexity, represents one of the most important challenges facing the semiconductor industry today. While the micro-electronics industry has built its own specific design methods to focus mainly on the management of complexity through the establishment of abstraction levels, the emergence of device heterogeneity requires new approaches enabling the satisfactory design of physically heterogeneous embedded systems for the widespread deployment of such systems. This book, compiled largely from a set of contributions from participants of past editions of the Winter School on Heterogeneous Embedded Systems Design Technology (FETCH), proposes a broad and holistic overview of design techniques used to tackle the various facets of heterogeneity in terms of technology and opportunities at the physical ...

  10. Dynamic memory management for embedded systems

    CERN Document Server

    Atienza Alonso, David; Poucet, Christophe; Peón-Quirós, Miguel; Bartzas, Alexandros; Catthoor, Francky; Soudris, Dimitrios

    2015-01-01

    This book provides a systematic and unified methodology, including basic principles and reusable processes, for dynamic memory management (DMM) in embedded systems.  The authors describe in detail how to design and optimize the use of dynamic memory in modern, multimedia and network applications, targeting the latest generation of portable embedded systems, such as smartphones. Coverage includes a variety of design and optimization topics in electronic design automation of DMM, from high-level software optimization to microarchitecture-level hardware support. The authors describe the design of multi-layer dynamic data structures for the final memory hierarchy layers of the target portable embedded systems and how to create a low-fragmentation, cost-efficient, dynamic memory management subsystem out of configurable components for the particular memory allocation and de-allocation patterns for each type of application.  The design methodology described in this book is based on propagating constraints among de...

  11. On λ-Finitely Embedded Modules

    Institute of Scientific and Technical Information of China (English)

    O.A.S. Karamzadeh; Sh. Rahimpour

    2005-01-01

    In this article, we introduce and study the notion of λ-finitely embedded modules (a O-finitely embedded module is just a finitely embedded module). We extend some of the basic results of f.e. modules to λ-f.e. modules. We use this concept to give a new proof of a known result which essentially says that a module M has Krull dimension α if and only if each factor module of M is λ-f.e. for some λ≤α and α is the least ordinal with this property. It is observed that a semiprime ring R has Krull dimension λ if and only if R is λ-f.e. We improve the theorem of Matlis-Papp and some of its consequences.Finally, some known results in the literature are restated in terms of the above notion.

  12. Architecture for Pseudo Acausal Evolvable Embedded Systems

    CERN Document Server

    Abubakr, Mohd

    2007-01-01

    Advances in semiconductor technology are contributing to the increasing complexity in the design of embedded systems. Architectures with novel techniques such as evolvable nature and autonomous behavior have engrossed lot of attention. This paper demonstrates conceptually evolvable embedded systems can be characterized basing on acausal nature. It is noted that in acausal systems, future input needs to be known, here we make a mechanism such that the system predicts the future inputs and exhibits pseudo acausal nature. An embedded system that uses theoretical framework of acausality is proposed. Our method aims at a novel architecture that features the hardware evolability and autonomous behavior alongside pseudo acausality. Various aspects of this architecture are discussed in detail along with the limitations.

  13. Spatially Partitioned Embedded Runge--Kutta Methods

    KAUST Repository

    Ketcheson, David I.

    2013-10-30

    We study spatially partitioned embedded Runge--Kutta (SPERK) schemes for partial differential equations (PDEs), in which each of the component schemes is applied over a different part of the spatial domain. Such methods may be convenient for problems in which the smoothness of the solution or the magnitudes of the PDE coefficients vary strongly in space. We focus on embedded partitioned methods as they offer greater efficiency and avoid the order reduction that may occur in nonembedded schemes. We demonstrate that the lack of conservation in partitioned schemes can lead to nonphysical effects and propose conservative additive schemes based on partitioning the fluxes rather than the ordinary differential equations. A variety of SPERK schemes are presented, including an embedded pair suitable for the time evolution of fifth-order weighted nonoscillatory spatial discretizations. Numerical experiments are provided to support the theory.

  14. Neuroscience, brains, and computers

    Directory of Open Access Journals (Sweden)

    Giorno Maria Innocenti

    2013-07-01

    Full Text Available This paper addresses the role of the neurosciences in establishing what the brain is and how states of the brain relate to states of the mind. The brain is viewed as a computational deviceperforming operations on symbols. However, the brain is a special purpose computational devicedesigned by evolution and development for survival and reproduction, in close interaction with theenvironment. The hardware of the brain (its structure is very different from that of man-made computers.The computational style of the brain is also very different from traditional computers: the computationalalgorithms, instead of being sets of external instructions, are embedded in brain structure. Concerningthe relationships between brain and mind a number of questions lie ahead. One of them is why andhow, only the human brain grasped the notion of God, probably only at the evolutionary stage attainedby Homo sapiens.

  15. Symplectic embeddings and continued fractions: a survey

    CERN Document Server

    McDuff, Dusa

    2009-01-01

    As has been known since the time of Gromov's Nonsqueezing Theorem, symplectic embedding questions lie at the heart of symplectic geometry. After surveying some of the most important ways of measuring the size of a symplectic set, these notes discuss some recent developments concerning the question of when a 4-dimensional ellipsoid can be symplectically embedded in a ball. This problem turns out to have unexpected relations to the properties of continued fractions and of exceptional curves in blow ups of the complex projective plane. It is also related to questions of lattice packing of planar triangles.

  16. Communicating embedded systems software and design

    CERN Document Server

    Jard, Claude

    2013-01-01

    The increased complexity of embedded systems coupled with quick design cycles to accommodate faster time-to-market requires increased system design productivity that involves both model-based design and tool-supported methodologies. Formal methods are mathematically-based techniques and provide a clean framework in which to express requirements and models of the systems, taking into account discrete, stochastic and continuous (timed or hybrid) parameters with increasingly efficient tools. This book deals with these formal methods applied to communicating embedded systems by presenting the

  17. Embedding complementarity in HCI methods and techniques

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Tweddell Levinsen, Karin;

    2006-01-01

    in the techniques and the tools that we apply. We lack a framework for discussing what and who we are, when we talk about a person as the user of an ICT system that has to be designed, developed and implemented. As a framework, we suggest a theory of complementary positions that insists on solid accounts from all......Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...

  18. Global string embeddings for the nilpotent Goldstino

    Energy Technology Data Exchange (ETDEWEB)

    García-Etxebarria, Iñaki [Max Planck Institute for Physics,Föhringer Ring 6, 80805 Munich (Germany); Quevedo, Fernando [DAMTP, CMS, University of Cambridge,Wilberforce Road, Cambridge, CB3 0WA (United Kingdom); ICTP,Strada Costiera 11, 34151 Trieste (Italy); Valandro, Roberto [Dipartimento di Fisica, Università di Trieste,Strada Costiera 11, 34151 Trieste (Italy); INFN, Sezione di Trieste,Via Valerio 2, 34127 Trieste (Italy)

    2016-02-22

    We discuss techniques for embedding a nilpotent Goldstino sector both in weakly coupled type IIB compactifications and F-theory models at arbitrary coupling, providing examples of both scenarios in semi-realistic compactifications. We start by showing how to construct a local embedding for the nilpotent Goldstino in terms of an anti D3-brane in a local conifold throat, and then discuss how to engineer the required local structure in globally consistent compact models. We present two explicit examples, the last one supporting also chiral matter and Kähler moduli stabilisation.

  19. Global string embeddings for the nilpotent Goldstino

    Science.gov (United States)

    García-Etxebarria, Iñaki; Quevedo, Fernando; Valandro, Roberto

    2016-02-01

    We discuss techniques for embedding a nilpotent Goldstino sector both in weakly coupled type IIB compactifications and F-theory models at arbitrary coupling, providing examples of both scenarios in semi-realistic compactifications. We start by showing how to construct a local embedding for the nilpotent Goldstino in terms of an anti D3-brane in a local conifold throat, and then discuss how to engineer the required local structure in globally consistent compact models. We present two explicit examples, the last one supporting also chiral matter and Kähler moduli stabilisation.

  20. Global String Embeddings for the Nilpotent Goldstino

    CERN Document Server

    García-Etxebarria, Iñaki; Valandro, Roberto

    2015-01-01

    We discuss techniques for embedding a nilpotent Goldstino sector both in weakly coupled type IIB compactifications and F-theory models at arbitrary coupling, providing examples of both scenarios in semi-realistic compactifications. We start by showing how to construct a local embedding for the nilpotent Goldstino in terms of an anti D3-brane in a local conifold throat, and then discuss how to engineer the required local structure in globally consistent compact models. We present two explicit examples, the last one supporting also chiral matter and K\\"ahler moduli stabilisation.

  1. Modelling and Analyses of Embedded Systems Design

    DEFF Research Database (Denmark)

    Brekling, Aske Wiid

    We present the MoVES languages: a language with which embedded systems can be specified at a stage in the development process where an application is identified and should be mapped to an execution platform (potentially multi- core). We give a formal model for MoVES that captures and gives......-based verification is a promising approach for assisting developers of embedded systems. We provide examples of system verifications that, in size and complexity, point in the direction of industrially-interesting systems....

  2. Sentiment Analysis on Embedded Systems Blended Courses

    Directory of Open Access Journals (Sweden)

    Razvan Bogdan

    2017-04-01

    Full Text Available Massive Open Online Courses (MOOCs have been producing an electrified feeling in the academic circles since 2012. This was amplified once profit initiatives like Coursera and Udacity joined their forces with renowned universities like Stanford, Harvard and the Massachusetts Institute of Technology. This paper presents a modality of integrating Embedded Systems MOOCs into blended courses, but at the same time it provides an evaluation of this approach: the sentiment analysis technique. Such an evaluation not only reveals the polarity, but also valuable insights into improving the course content and integration of MOOCs into the intricacies of teaching embedded systems.

  3. Model-based testing for embedded systems

    CERN Document Server

    Zander, Justyna; Mosterman, Pieter J

    2011-01-01

    What the experts have to say about Model-Based Testing for Embedded Systems: "This book is exactly what is needed at the exact right time in this fast-growing area. From its beginnings over 10 years ago of deriving tests from UML statecharts, model-based testing has matured into a topic with both breadth and depth. Testing embedded systems is a natural application of MBT, and this book hits the nail exactly on the head. Numerous topics are presented clearly, thoroughly, and concisely in this cutting-edge book. The authors are world-class leading experts in this area and teach us well-used

  4. Application of invariant embedding to reactor physics

    CERN Document Server

    Shimizu, Akinao; Parsegian, V L

    1972-01-01

    Application of Invariant Embedding to Reactor Physics describes the application of the method of invariant embedding to radiation shielding and to criticality calculations of atomic reactors. The authors intend to show how this method has been applied to realistic problems, together with the results of applications which will be useful to shielding design. The book is organized into two parts. Part A deals with the reflection and transmission of gamma rays by slabs. The chapters in this section cover topics such as the reflection and transmission problem of gamma rays; formulation of the probl

  5. Source Code Verification for Embedded Systems using Prolog

    Directory of Open Access Journals (Sweden)

    Frank Flederer

    2017-01-01

    Full Text Available System relevant embedded software needs to be reliable and, therefore, well tested, especially for aerospace systems. A common technique to verify programs is the analysis of their abstract syntax tree (AST. Tree structures can be elegantly analyzed with the logic programming language Prolog. Moreover, Prolog offers further advantages for a thorough analysis: On the one hand, it natively provides versatile options to efficiently process tree or graph data structures. On the other hand, Prolog's non-determinism and backtracking eases tests of different variations of the program flow without big effort. A rule-based approach with Prolog allows to characterize the verification goals in a concise and declarative way. In this paper, we describe our approach to verify the source code of a flash file system with the help of Prolog. The flash file system is written in C++ and has been developed particularly for the use in satellites. We transform a given abstract syntax tree of C++ source code into Prolog facts and derive the call graph and the execution sequence (tree, which then are further tested against verification goals. The different program flow branching due to control structures is derived by backtracking as subtrees of the full execution sequence. Finally, these subtrees are verified in Prolog. We illustrate our approach with a case study, where we search for incorrect applications of semaphores in embedded software using the real-time operating system RODOS. We rely on computation tree logic (CTL and have designed an embedded domain specific language (DSL in Prolog to express the verification goals.

  6. Growing Embedded Librarians Like Kudzu: How the Embedded Extension Service Creates More Embedded Librarians without Creating New Positions

    Science.gov (United States)

    Coltrain, Mark

    2014-01-01

    In an era of exploding online enrollment and tight budgets, Central Piedmont Community College (CPCC) struggles to meet the needs of online students. CPCC librarians went one step towards solving that problem in 2009-2010 by launching an embedded librarian program. CPCC's program became so successful that it struggled to meet demand. In 2013, CPCC…

  7. Memory efficient and constant time 2D-recursive spatial averaging filter for embedded implementations

    Science.gov (United States)

    Gan, Qifeng; Seoud, Lama; Ben Tahar, Houssem; Langlois, J. M. Pierre

    2016-04-01

    Spatial Averaging Filters (SAF) are extensively used in image processing for image smoothing and denoising. Their latest implementations have already achieved constant time computational complexity regardless of kernel size. However, all the existing O(1) algorithms require additional memory for temporary data storage. In order to minimize memory usage in embedded systems, we introduce a new two-dimensional recursive SAF. It uses previous resultant pixel values along both rows and columns to calculate the current one. It can achieve constant time computational complexity without using any additional memory usage. Experimental comparisons with previous SAF implementations shows that the proposed 2D-Recursive SAF does not require any additional memory while offering a computational time similar to the most efficient existing SAF algorithm. These features make it especially suitable for embedded systems with limited memory capacity.

  8. PEXSI-$\\Sigma$: A Green's function embedding method for Kohn-Sham density functional theory

    CERN Document Server

    Li, Xiantao; Lu, Jianfeng

    2016-01-01

    As Kohn-Sham density functional theory (KSDFT) being applied to increasingly more complex materials, the periodic boundary condition associated with supercell approaches also becomes unsuitable for a number of important scenarios. Green's function embedding methods allow a more versatile treatment of complex boundary conditions, and hence provide an attractive alternative to describe complex systems that cannot be easily treated in supercell approaches. In this paper, we first revisit the literature of Green's function embedding methods from a numerical linear algebra perspective. We then propose a new Green's function embedding method called PEXSI-$\\Sigma$. The PEXSI-$\\Sigma$ method approximates the density matrix using a set of nearly optimally chosen Green's functions evaluated at complex frequencies. For each Green's function, the complex boundary conditions are described by a self energy matrix $\\Sigma$ constructed from a physical reference Green's function, which can be computed relatively easily. In th...

  9. Effect of Thread Level Parallelism on the Performance of Optimum Architecture for Embedded Applications

    CERN Document Server

    Alipour, Mehdi

    2012-01-01

    According to the increasing complexity of network application and internet traffic, network processor as a subset of embedded processors have to process more computation intensive tasks. By scaling down the feature size and emersion of chip multiprocessors (CMP) that are usually multi-thread processors, the performance requirements are somehow guaranteed. As multithread processors are the heir of uni-thread processors and there isn't any general design flow to design a multithread embedded processor, in this paper we perform a comprehensive design space exploration for an optimum uni-thread embedded processor based on the limited area and power budgets. Finally we run multiple threads on this architecture to find out the maximum thread level parallelism (TLP) based on performance per power and area optimum uni-thread architecture.

  10. Embedded System Implementation on FPGA System With {mu}CLinux OS

    Energy Technology Data Exchange (ETDEWEB)

    Amin, Ahmad Fairuz Muhd [Institute of Advanced Technology, Universiti Putra Malaysia, 43400 Serdang, Selangor (Malaysia); Aris, Ishak [Department of Electrical and Electronic Engineering, Universiti Putra Malaysia, 43400, Serdang, Selangor (Malaysia); Abdullah, Raja Syamsul Azmir Raja; Sahbudin, Ratna Kalos Zakiah, E-mail: gs20613@mutiara.upm.edu.my, E-mail: ishak@eng.upm.edu.my, E-mail: rsa@eng.upm.edu.my [Department of Computer and Communication Systems Engineering, Universiti Putra Malaysia, 43400, Serdang, Selangor (Malaysia)

    2011-02-15

    Embedded systems are taking on more complicated tasks as the processors involved become more powerful. The embedded systems have been widely used in many areas such as in industries, automotives, medical imaging, communications, speech recognition and computer vision. The complexity requirements in hardware and software nowadays need a flexibility system for further enhancement in any design without adding new hardware. Therefore, any changes in the design system will affect the processor that need to be changed. To overcome this problem, a System On Programmable Chip (SOPC) has been designed and developed using Field Programmable Gate Array (FPGA). A softcore processor, NIOS II 32-bit RISC, which is the microprocessor core was utilized in FPGA system together with the embedded operating system(OS), {mu}Clinux. In this paper, an example of web server is explained and demonstrated

  11. An Embedded Sensor Node Microcontroller with Crypto-Processors

    Directory of Open Access Journals (Sweden)

    Goran Panić

    2016-04-01

    Full Text Available Wireless sensor network applications range from industrial automation and control, agricultural and environmental protection, to surveillance and medicine. In most applications, data are highly sensitive and must be protected from any type of attack and abuse. Security challenges in wireless sensor networks are mainly defined by the power and computing resources of sensor devices, memory size, quality of radio channels and susceptibility to physical capture. In this article, an embedded sensor node microcontroller designed to support sensor network applications with severe security demands is presented. It features a low power 16-bitprocessor core supported by a number of hardware accelerators designed to perform complex operations required by advanced crypto algorithms. The microcontroller integrates an embedded Flash and an 8-channel 12-bit analog-to-digital converter making it a good solution for low-power sensor nodes. The article discusses the most important security topics in wireless sensor networks and presents the architecture of the proposed hardware solution. Furthermore, it gives details on the chip implementation, verification and hardware evaluation. Finally, the chip power dissipation and performance figures are estimated and analyzed.

  12. Intuitive Embedded Teaching System Design for Multi-Jointed Robots

    Directory of Open Access Journals (Sweden)

    Chin-Pao Hung

    2012-06-01

    Full Text Available This work describes the development of a novel embedded teaching system for multi‐jointed robots. Differing from the traditional teaching panel method, the proposed method does not require any complex computations for coordinate transformation and is a simpler scheme. The proposed teaching system includes a small teaching robot, which is scaled to the real jointed robot, however, joints are replaced with potentiometers. An embedded electrical control system contains the main control board and joint control cards. The main control board receives voltage signals from the teaching robot and transforms them into position commands for the motion of each joint. All the position commands are recorded on the main control board using the desired sample rate. In trajectory planning mode, the operator drags the teaching robot to generate the desired motion. The electrical control system drives the real jointed robot in response to the received voltage signals from the teaching robot. Trajectory teaching can be done naturally without expertise. The teaching system architecture, control board design and program flowchart are described and implemented.

  13. Local Linear Embedding Algorithm with Adaptively Determining Neighborhood

    Directory of Open Access Journals (Sweden)

    Zhenduo Wang

    2014-06-01

    Full Text Available Local linear embedding is a kind of very competitive nonlinear dimensionality reduction technique with good representational capacity for a broader range of manifolds and high computational efficiency. However, it is based on the assumption that the whole data manifolds are evenly distributed so that it determines the neighborhood for all points with the same neighborhood size. Accordingly, it fails to nicely deal with most real problems that are unevenly distributed. This paper presents a new approach that takes the general conceptual framework of Hessian locally linear embedding so as to guarantee its correctness in the setting of local isometry for an open connected subset, but dynamically determines the local neighborhood size for each point. This approach estimates the approximate geodesic distance between any two points by the shortest path in the local neighborhood graph, and then determines the neighborhood size for each point by using the relationship between its local estimated geodesic distance matrix and local Euclidean distance matrix. This approach has clear geometry intuition as well as the better performance and stability. It deals with the sparsely sampled or noise contaminated data sets that are often unevenly distributed. The conducted experiments on benchmark data sets validate the proposed approach

  14. Feature Importance in Nonlinear Embeddings (FINE): Applications in Digital Pathology.

    Science.gov (United States)

    Ginsburg, Shoshana B; Lee, George; Ali, Sahirzeeshan; Madabhushi, Anant

    2016-01-01

    Quantitative histomorphometry (QH) refers to the process of computationally modeling disease appearance on digital pathology images by extracting hundreds of image features and using them to predict disease presence or outcome. Since constructing a robust and interpretable classifier is challenging in a high dimensional feature space, dimensionality reduction (DR) is often implemented prior to classifier construction. However, when DR is performed it can be challenging to quantify the contribution of each of the original features to the final classification result. We have previously presented a method for scoring features based on their importance for classification on an embedding derived via principal components analysis (PCA). However, nonlinear DR involves the eigen-decomposition of a kernel matrix rather than the data itself, compounding the issue of classifier interpretability. In this paper we present feature importance in nonlinear embeddings (FINE), an extension of our PCA-based feature scoring method to kernel PCA (KPCA), as well as several NLDR algorithms that can be cast as variants of KPCA. FINE is applied to four digital pathology datasets to identify key QH features for predicting the risk of breast and prostate cancer recurrence. Measures of nuclear and glandular architecture and clusteredness were found to play an important role in predicting the likelihood of recurrence of both breast and prostate cancers. Compared to the t-test, Fisher score, and Gini index, FINE was able to identify a stable set of features that provide good classification accuracy on four publicly available datasets from the NIPS 2003 Feature Selection Challenge.

  15. STEGANOGRAPHIC METHOD VERIFYING THE INTEGRITY AND AUTHENTICITY OF EMBEDDED INFORMATION

    Directory of Open Access Journals (Sweden)

    Kobozeva A.A.

    2014-12-01

    Full Text Available The paper focuses on the steganographic method that carries out simultaneous effective solution for creation of covert communication channel within the channel for public use, check of the integrity and authenticity of the transmitted additional information. These tasks define the so-called three-pronged task (TT that is of current interest, but today, according to the data available from the open press, has no satisfactory solution. This is connected with the complexity of TT and moreover a covert communication channel itself requires additional guaranteeing the reliability of perception and insensitivity of formed steganomessage against disturbing influences. The digital image stands as a container. The additional embedded information that is the result of pre-primary encoding of confidential information and the subsequent secondary coding using a secret key for authentication is represented as a binary sequence. Developed steganomethod for solving TT, ensures the reliability of perception of formed steganomessage, is resistant to attacks against embedded messages and allows to effectively decode the transmitted information even in the event of a breach of its integrity, that is evidenced by the results of a computational experiment.

  16. An Embedded Sensor Node Microcontroller with Crypto-Processors.

    Science.gov (United States)

    Panić, Goran; Stecklina, Oliver; Stamenković, Zoran

    2016-04-27

    Wireless sensor network applications range from industrial automation and control, agricultural and environmental protection, to surveillance and medicine. In most applications, data are highly sensitive and must be protected from any type of attack and abuse. Security challenges in wireless sensor networks are mainly defined by the power and computing resources of sensor devices, memory size, quality of radio channels and susceptibility to physical capture. In this article, an embedded sensor node microcontroller designed to support sensor network applications with severe security demands is presented. It features a low power 16-bitprocessor core supported by a number of hardware accelerators designed to perform complex operations required by advanced crypto algorithms. The microcontroller integrates an embedded Flash and an 8-channel 12-bit analog-to-digital converter making it a good solution for low-power sensor nodes. The article discusses the most important security topics in wireless sensor networks and presents the architecture of the proposed hardware solution. Furthermore, it gives details on the chip implementation, verification and hardware evaluation. Finally, the chip power dissipation and performance figures are estimated and analyzed.

  17. A CASE FOR HYBRID INSTRUCTION ENCODING FOR REDUCING CODE SIZE IN EMBEDDED SYSTEM-ON-CHIPS BASED ON RISC PROCESSOR CORES

    Directory of Open Access Journals (Sweden)

    Govindarajalu Bakthavatsalam

    2014-01-01

    Full Text Available Embedded computing differs from general purpose computing in several aspects. In most embedded systems, size, cost and power consumption are more important than performance. In embedded System-on-Chips (SoC, memory is a scarce resource and it poses constraints on chip space, cost and power consumption. Whereas fixed instruction length feature of RISC architecture simplifies instruction decoding and pipeline implementation, its undesirable side effect is code size increase caused by large number of unused bits. Code size reduction minimizes memory size, chip space and power consumption all of which are significant for low power portable embedded systems. Though code size reduction has drawn the attention of architects and developers, the solutions currently used are more of cure than of prevention. Considering the huge number of embedded applications, there is a need for a dedicated processor optimized for low power and portable embedded systems. In the study, we propose a variation of Hybrid Instruction Encoding (HIE for the embedded processors. Our scheme uses fixed number of multiple instruction lengths with provision for hybrid sizes for the offset and the immediate fields thereby reducing the number of unused bits. We simulated the HIE for the MIPS32 processors and measured code sizes of various embedded applications of MiBench and MediaBench benchmarks using an offline tool developed newly. We noticed up to 27% code reduction for large and medium sized embedded applications respectively. This results in reduction of on-chip memory capacity up to 1 mega bytes that is very significant for SoC based embedded applications. Considering the large market share of embedded systems, it is worth investing in a new architecture and development of dedicated HIE-RISC processor cores for portable embedded systems based on SoCs.

  18. A Laboratory Testbed for Embedded Fuzzy Control

    Science.gov (United States)

    Srivastava, S.; Sukumar, V.; Bhasin, P. S.; Arun Kumar, D.

    2011-01-01

    This paper presents a novel scheme called "Laboratory Testbed for Embedded Fuzzy Control of a Real Time Nonlinear System." The idea is based upon the fact that project-based learning motivates students to learn actively and to use their engineering skills acquired in their previous years of study. It also fosters initiative and focuses…

  19. Web Service Architecture Framework for Embedded Devices

    Science.gov (United States)

    Yanzick, Paul David

    2009-01-01

    The use of Service Oriented Architectures, namely web services, has become a widely adopted method for transfer of data between systems across the Internet as well as the Enterprise. Adopting a similar approach to embedded devices is also starting to emerge as personal devices and sensor networks are becoming more common in the industry. This…

  20. Embedding Multiple Literacies into STEM Curricula

    Science.gov (United States)

    Soules, Aline; Nielsen, Sarah; LeDuc, Danika; Inouye, Caron; Singley, Jason; Wildy, Erica; Seitz, Jeff

    2014-01-01

    In fall 2012, an interdisciplinary team of science, English, and library faculty embedded reading, writing, and information literacy strategies in Science, Technology, Engineering, and Mathematics (STEM) curricula as a first step in improving student learning and retention in science courses and aligning them with the Next Generation Science and…

  1. Positioning embedded software maintenance within industrial maintenance

    OpenAIRE

    Karim, Ramin; Kajko-Mattsson, Mira; Söderholm, Peter; Candell, Olov; Tyrbern, Tommy; Öhlund, Hans; Johansson, Jan

    2008-01-01

    Little is known about of how software embedded in complex industrial technical systems is maintained. In this paper, we identify industrial maintenance process steps and position software maintenance activities within them. We do this in the context of JAS 39 Gripen, a multi-role combat aircraft developed by Saab.

  2. Views on Evolvability of Embedded Systems

    NARCIS (Netherlands)

    Laar, P. van de; Punter, T.

    2011-01-01

    Evolvability, the ability to respond effectively to change, represents a major challenge to today's high-end embedded systems, such as those developed in the medical domain by Philips Healthcare. These systems are typically developed by multi-disciplinary teams, located around the world, and are in

  3. Embedded-atom Potential for Oxygen

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The analytic embedded-atom potential for oxygen is developed from the experimental data and the results of the first-principle. The potential is used to predict the geometries and energies of O3, fcc, bcc, sc and diamond. The predictions are in good agreement with experimental data available and other theoretical results.

  4. Research on memory management in embedded systems

    Science.gov (United States)

    Huang, Xian-ying; Yang, Wu

    2005-12-01

    Memory is a scarce resource in embedded system due to cost and size. Thus, applications in embedded systems cannot use memory randomly, such as in desktop applications. However, data and code must be stored into memory for running. The purpose of this paper is to save memory in developing embedded applications and guarantee running under limited memory conditions. Embedded systems often have small memory and are required to run a long time. Thus, a purpose of this study is to construct an allocator that can allocate memory effectively and bear a long-time running situation, reduce memory fragmentation and memory exhaustion. Memory fragmentation and exhaustion are related to the algorithm memory allocated. Static memory allocation cannot produce fragmentation. In this paper it is attempted to find an effective allocation algorithm dynamically, which can reduce memory fragmentation. Data is the critical part that ensures an application can run regularly, which takes up a large amount of memory. The amount of data that can be stored in the same size of memory is relevant with the selected data structure. Skills for designing application data in mobile phone are explained and discussed also.

  5. An Integrated Specification Framework for Embedded Systems

    NARCIS (Netherlands)

    Bujorianu, Manuela L.; Bujorianu, Marius C.

    2007-01-01

    In this paper, we address the complex issue of representation of continuous behaviour of the environment of the embedded controllers. In our approach we propose two novel ideas. One is to consider the weak solutions to describe the evolutions of the dynamical systems. The second novelty is to make a

  6. A Laboratory Testbed for Embedded Fuzzy Control

    Science.gov (United States)

    Srivastava, S.; Sukumar, V.; Bhasin, P. S.; Arun Kumar, D.

    2011-01-01

    This paper presents a novel scheme called "Laboratory Testbed for Embedded Fuzzy Control of a Real Time Nonlinear System." The idea is based upon the fact that project-based learning motivates students to learn actively and to use their engineering skills acquired in their previous years of study. It also fosters initiative and focuses…

  7. Reusing knowledge in embedded system modelling

    NARCIS (Netherlands)

    Marincic, J.; Mader, Angelika H.; Wieringa, Roelf J.; Lucas, Yan

    2013-01-01

    Model-based design is a promising technique to improve the quality of software and the efficiency of the software development process. We are investigating how to efficiently model embedded software and its environment to verify the requirements for the system controlled by the software. The softwar

  8. Embeddings of the "New Massive Gravity"

    Science.gov (United States)

    Dalmazi, D.; Mendonça, E. L.

    2016-07-01

    Here we apply different types of embeddings of the equations of motion of the linearized "New Massive Gravity" in order to generate alternative and even higher-order (in derivatives) massive gravity theories in D=2+1. In the first part of the work we use the Weyl symmetry as a guiding principle for the embeddings. First we show that a Noether gauge embedding of the Weyl symmetry leads to a sixth-order model in derivatives with either a massive or a massless ghost, according to the chosen overall sign of the theory. On the other hand, if the Weyl symmetry is implemented by means of a Stueckelberg field we obtain a new scalar-tensor model for massive gravitons. It is ghost-free and Weyl invariant at the linearized level around Minkowski space. The model can be nonlinearly completed into a scalar field coupled to the NMG theory. The elimination of the scalar field leads to a nonlocal modification of the NMG. In the second part of the work we prove to all orders in derivatives that there is no local, ghost-free embedding of the linearized NMG equations of motion around Minkowski space when written in terms of one symmetric tensor. Regarding that point, NMG differs from the Fierz-Pauli theory, since in the latter case we can replace the Einstein-Hilbert action by specific f(R,Box R) generalizations and still keep the theory ghost-free at the linearized level.

  9. Scheduling Driven Partitioning of Heterogeneous Embedded Systems

    DEFF Research Database (Denmark)

    Pop, Paul; Eles, Petru; Peng, Zebo

    1998-01-01

    In this paper we present an algorithm for system level hardware/software partitioning of heterogeneous embedded systems. The system is represented as an abstract graph which captures both data-flow and the flow of control. Given an architecture consisting of several processors, ASICs and shared b...

  10. Optimization of Hierarchically Scheduled Heterogeneous Embedded Systems

    DEFF Research Database (Denmark)

    Pop, Traian; Pop, Paul; Eles, Petru;

    2005-01-01

    We present an approach to the analysis and optimization of heterogeneous distributed embedded systems. The systems are heterogeneous not only in terms of hardware components, but also in terms of communication protocols and scheduling policies. When several scheduling policies share a resource...

  11. Embedded Critique in a Tensed World

    DEFF Research Database (Denmark)

    Hansen, Ejvind

    2006-01-01

    , it is probably best not to criticize at all. I argue that this reaction is wrong. Descriptivism does on the one hand not solve the problem from which it originates: the description is itself embedded in a contingent validity. The postmodern insight does on the other hand not necessarily lead to absolute...

  12. Second order perturbation theory for embedded eigenvalues

    DEFF Research Database (Denmark)

    Faupin, Jeremy; Møller, Jacob Schach; Skibsted, Erik

    2011-01-01

    We study second order perturbation theory for embedded eigenvalues of an abstract class of self-adjoint operators. Using an extension of the Mourre theory, under assumptions on the regularity of bound states with respect to a conjugate operator, we prove upper semicontinuity of the point spectrum...

  13. Safety-critical Java for embedded systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Dalsgaard, Andreas Engelbredt; Hansen, René Rydhof

    2016-01-01

    This paper presents the motivation for and outcomes of an engineering research project on certifiable Javafor embedded systems. The project supports the upcoming standard for safety-critical Java, which defines asubset of Java and libraries aiming for development of high criticality systems...

  14. Is Embedded Librarianship Right for Your Institution?

    Science.gov (United States)

    Muir, Gordon; Heller-Ross, Holly

    2010-01-01

    Embedded librarians, connected with students and faculty inside the classroom, lab and studio, have new opportunities for preparing students for research and for collaborating with faculty on course-integrated information literacy, research assignment design, teaching, assignment interpretation, and timely student assistance. What makes embedded…

  15. Embedded solution for a microwave moisture meter

    Science.gov (United States)

    In this paper, the conversion of a PC or laptop-controlled microwave moisture meter to a stand-alone meter hosting its own embedded system is discussed. The moisture meter is based on the free-space transmission measurement technique and uses low-intensity microwaves to measure the attenuation and p...

  16. Excited States in Solution through Polarizable Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus; Aidas, Kestutis; Kongsted, Jacob

    2010-01-01

    We present theory and implementation of an advanced quantum mechanics/molecular mechanics (QM/MM) approach using a fully self-consistent polarizable embedding (PE) scheme. It is a polarizable layered model designed for effective yet accurate inclusion of an anisotropic medium in a quantum...

  17. Embeddings of the "New Massive Gravity"

    CERN Document Server

    Dalmazi, D

    2016-01-01

    Using different types of embeddings of equations of motion we investigate the existence of generalizations of the "New Massive Gravity" (NMG) model with the same particle content (massive gravitons). By using the Weyl symmetry as a guiding principle for the embeddings we show that the Noether gauge embedding approach leads us to a sixth order model in derivatives with either a massive or a massless ghost. If the Weyl symmetry is implemented by means of a Stueckelberg field we obtain a new scalar-tensor model for massive gravitons. It is ghost free and Weyl invariant at linearized level. The model can be nonlinearly completed into a scalar field coupled to the NMG theory. The elimination of the scalar field leads to a nonlocal modification of the NMG. We also prove to all orders in derivatives that there is no local, ghost free embedding of the linearized NMG equations of motion around Minkowski space when written in terms of one symmetric tensor. Regarding that point, NMG differs from the Fierz-Pauli theory, ...

  18. On Equivariant Embedding of Hilbert C^* modules

    OpenAIRE

    Goswami, Debashish

    2007-01-01

    We prove that an arbitrary (not necessarily countably generated) Hilbert $G$-$\\cla$ module on a G-C^* algebra $\\cla$ admits an equivariant embedding into a trivial $G-\\cla$ module, provided G is a compact Lie group and its action on $\\cla$ is ergodic.

  19. On Equivariant Embedding of Hilbert $C^*$ modules

    CERN Document Server

    Goswami, Debashish

    2007-01-01

    We prove that an arbitrary (not necessarily countably generated) Hilbert $G$-$\\cla$ module on a $G-C^*$ algebra $\\cla$ admits an equivariant embedding into a trivial $G-\\cla$ module, provided $G$ is a compact Lie group and its action on $\\cla$ is ergodic.

  20. Polarizable Embedding Density Matrix Renormalization Group.

    Science.gov (United States)

    Hedegård, Erik D; Reiher, Markus

    2016-09-13

    The polarizable embedding (PE) approach is a flexible embedding model where a preselected region out of a larger system is described quantum mechanically, while the interaction with the surrounding environment is modeled through an effective operator. This effective operator represents the environment by atom-centered multipoles and polarizabilities derived from quantum mechanical calculations on (fragments of) the environment. Thereby, the polarization of the environment is explicitly accounted for. Here, we present the coupling of the PE approach with the density matrix renormalization group (DMRG). This PE-DMRG method is particularly suitable for embedded subsystems that feature a dense manifold of frontier orbitals which requires large active spaces. Recovering such static electron-correlation effects in multiconfigurational electronic structure problems, while accounting for both electrostatics and polarization of a surrounding environment, allows us to describe strongly correlated electronic structures in complex molecular environments. We investigate various embedding potentials for the well-studied first excited state of water with active spaces that correspond to a full configuration-interaction treatment. Moreover, we study the environment effect on the first excited state of a retinylidene Schiff base within a channelrhodopsin protein. For this system, we also investigate the effect of dynamical correlation included through short-range density functional theory.

  1. When the set of embeddings is finite?

    CERN Document Server

    Skopenkov, Mikhail

    2011-01-01

    Given a manifold N and a number m, we study the following question: is the set of isotopy classes of embeddings N->S^m finite? In case when the manifold N is a sphere the answer was given by A. Haefliger in 1966. In case when the manifold N is a disjoint union of spheres the answer was given by D. Crowley, S. Ferry and the author in 2011. We consider the next natural case when N is a product of two spheres. In the following theorem, FCS(i,j) is a concrete subset of the integer lattice depending only on the parity of i and j which is defined in the paper. Theorem. Assume that m>2p+q+2 and m S^m is infinite if and only if either q+1 or p+q+1 is divisible by 4, or there exists a point (x,y) in the set FCS(m-p-q,m-q) such that (m-p-q-2)x+(m-q-2)y=m-3. Our approach is based on a group structure on the set of embeddings and a new exact sequence, which in some sense reduces the classification of embeddings S^p x S^q -> S^m to the classification of embeddings S^{p+q} |_| S^q -> S^m and D^p x S^q -> S^m. The latter cl...

  2. On Equivariant Embedding of Hilbert * Modules

    Indian Academy of Sciences (India)

    Debashish Goswami

    2009-02-01

    We prove that an arbitrary (not necessarily countably generated) Hilbert $G-\\mathcal{A}$ module on a -* algebra $\\mathcal{A}$ admits an equivariant embedding into a trivial $G-\\mathcal{A}$ module, provided is a compact Lie group and its action on $\\mathcal{A}$ is ergodic.

  3. Perturbation of eigenvalues embedded at a threshold

    DEFF Research Database (Denmark)

    Jensen, Arne; Melgaard, Michael

    2002-01-01

    Results are obtained on perturbation of eigenvalues and half-bound states (zero-resonances) embedded at a threshold. The results are obtained in a two-channel framework for small off-diagonal perturbations. The results are based on given asymptotic expansions of the component Hamiltonians....

  4. A Novel and High Capacity Audio Steganography Algorithm Based on Adaptive Data Embedding Positions

    Directory of Open Access Journals (Sweden)

    Haider Ismael Shahadi

    2014-03-01

    Full Text Available In this study, a novel and high embedding capacity audio steganography scheme based on Lifting Wavelet Transform (LWT and adaptive embedding positions is proposed. Specifically, the message data is inserted in the imperceptible positions that chosen from the coefficients of detail sub-bands taking advantage of our proposed Weighted Block Matching (WBM. The WBM is preceded by preparing the cover audio in order to select the bits-positions that can possibly be used for embedding from each detail coefficient based on coefficient amplitude then copy the contents of the selected bits-positions and arrange them in blocks of bits. Also, the message data is arranged in blocks of bits after preprocessed and encrypted. The WBM computes the matching between each message block and whole extracted cover blocks to find the similarity between them. This process help to provide optimal locations to hide the message blocks. These locations are considered as a stego-key that is ciphered and hided within the final detail sub-band which is specified for this purpose. The proposed approach attains higher security than other fixed embedding positions approaches because the random positions for the embedded message blocks based on adaptive selection for embedding positions. Experimental results show that the proposed technique is not only has very high embedding capacity (exceed 300 kbps with excellent transparency (above 35 dB for the cover to noise ratio, but also achieve lossless massage retrieved. Comparisons with the related audio steganography algorithms also show that our proposed scheme outperforms all the selected algorithms.

  5. Quantum annealing correction with minor embedding

    Science.gov (United States)

    Vinci, Walter; Albash, Tameem; Paz-Silva, Gerardo; Hen, Itay; Lidar, Daniel A.

    2015-10-01

    Quantum annealing provides a promising route for the development of quantum optimization devices, but the usefulness of such devices will be limited in part by the range of implementable problems as dictated by hardware constraints. To overcome constraints imposed by restricted connectivity between qubits, a larger set of interactions can be approximated using minor embedding techniques whereby several physical qubits are used to represent a single logical qubit. However, minor embedding introduces new types of errors due to its approximate nature. We introduce and study quantum annealing correction schemes designed to improve the performance of quantum annealers in conjunction with minor embedding, thus leading to a hybrid scheme defined over an encoded graph. We argue that this scheme can be efficiently decoded using an energy minimization technique provided the density of errors does not exceed the per-site percolation threshold of the encoded graph. We test the hybrid scheme using a D-Wave Two processor on problems for which the encoded graph is a two-level grid and the Ising model is known to be NP-hard. The problems we consider are frustrated Ising model problem instances with "planted" (a priori known) solutions. Applied in conjunction with optimized energy penalties and decoding techniques, we find that this approach enables the quantum annealer to solve minor embedded instances with significantly higher success probability than it would without error correction. Our work demonstrates that quantum annealing correction can and should be used to improve the robustness of quantum annealing not only for natively embeddable problems but also when minor embedding is used to extend the connectivity of physical devices.

  6. Fast and effective embedded systems design applying the ARM mbed

    CERN Document Server

    Toulson, Rob

    2012-01-01

    A hands-on introduction to the field of embedded systems; A focus on fast prototyping of embedded systems; All key embedded system concepts covered through simple and effective experimentation; An understanding of ARM technology, one of the world's leaders; A practical introduction to embedded C; Applies possibly the most accessible set of tools available in the embedded world.  This book is an introduction to embedded systems design, using the ARM mbed and C programming language as development tools. The mbed provides a compact, self-contained and low-cost hardware core, and the

  7. Embedded Systems Interfacing for Engineers using the Freescale HCS08 Microcontroller I Machine Language Programming

    CERN Document Server

    Summerville, Douglas

    2009-01-01

    The vast majority of computers in use today are encapsulated within other systems. In contrast to general-purpose computers that run an endless selection of software, these embedded computers are often programmed for a very specific, low-level and often mundane purpose. Low-end microcontrollers, costing as little as one dollar, are often employed by engineers in designs that utilize only a small fraction of the processing capability of the device because it is either more cost-effective than selecting an application-specific part or because programmability offers custom functionality not other

  8. Hybrid Spectral Difference/Embedded Finite Volume Method for Conservation Laws

    CERN Document Server

    Choi, Jung J

    2014-01-01

    A novel hybrid spectral difference/embedded finite volume method is introduced in order to apply a discontinuous high-order method for large scale engineering applications involving discontinuities in flows with complex geometries. In the proposed hybrid approach, structured finite volume (FV) cells are embedded in hexahedral SD elements containing discontinuities, and FV based high-order shock-capturing scheme is employed to overcome Gibbs phenomenon. Thus, discontinuities are captured at the resolution of embedded FV cells within an SD element. In smooth flow regions, the SD method is chosen for its low numerical dissipation and computational efficiency preserving spectral-like solutions. The coupling between the SD elements and the elements with embedded FV cells are achieved by the mortar method. In this paper, the 5th-order WENO scheme with characteristic decomposition is employed as the shock-capturing scheme in the embedded FV cells, and the 5th-order SD method is used in the smooth flow field. The ord...

  9. Strong-field tidal distortions of rotating black holes. III. Embeddings in hyperbolic three-space

    Science.gov (United States)

    Penna, Robert F.; Hughes, Scott A.; O'Sullivan, Stephen

    2017-09-01

    In previous work, we developed tools for quantifying the tidal distortion of a black hole's event horizon due to an orbiting companion. These tools use techniques which require large mass ratios (companion mass μ much smaller than black hole mass M ), but can be used for arbitrary bound orbits and for any black hole spin. We also showed how to visualize these distorted black holes by embedding their horizons in a global Euclidean three-space, E3. Such visualizations illustrate interesting and important information about horizon dynamics. Unfortunately, we could not visualize black holes with spin parameter a*>√{3 }/2 ≈0.866 : such holes cannot be globally embedded into E3. In this paper, we overcome this difficulty by showing how to embed the horizons of tidally distorted Kerr black holes in a hyperbolic three-space, H3. We use black hole perturbation theory to compute the Gaussian curvatures of tidally distorted event horizons, from which we build a two-dimensional metric of their distorted horizons. We develop a numerical method for embedding the tidally distorted horizons in H3. As an application, we give a sequence of embeddings into H3 of a tidally interacting black hole with spin a*=0.9999 . A small-amplitude, high-frequency oscillation seen in previous work shows up particularly clearly in these embeddings.

  10. Planning and Building Qualifiable Embedded Systems: Safety and Risk Properties Assessment for a Large and Complex System with Embedded Subsystems

    Science.gov (United States)

    Silva, N.; Lopes, R.; Barbosa, R.

    2012-01-01

    Systems based on embedded components and applications are today used in all markets. They are planned and developed by all types of institutions with different types of background experience, multidisciplinary teams and all types of capability and maturity levels. Organisational/engineering maturity has an impact on all aspects of the engineering of large and complex systems. An embedded system is a specific computer system designed to perform one or more dedicated functions, usually with real-time constraints. It is generally integrated as part of a more complex device typically composed of specific hardware such as sensors and actuators. This article presents an experimented technique to evaluate the organisation, processes, system and software engineering practices, methods, tools and the planned/produced artefacts themselves, leading towards certification/qualification. The safety and risk assessment of such core and complex systems is explained, described on a step-by- step manner, while presenting the main results and conclusions of the application of the technique to a real case study.

  11. Study of nanoscale damage evolution using embedded atom method potentials

    Science.gov (United States)

    Potirniche, Gabriel; Horstemeyer, Mark; Gullet, Phillip

    2004-03-01

    Damage evolution at nanoscale has been studied using embedded atom method (EAM) potentials based on molecular dynamics principles. The simulations were performed using WARP, a parallel computing atomistic stress simulator based on Lennard-Jones (LJ) potentials for Aluminum. By varying the number of atoms from a few hundred to a few hundred thousands, we analyzed void nucleation, growth and coalescence at increasing material length scale. Rectangular specimens with and without voids were subjected to uniaxial tension up to a total strain of 50rates. Uniaxial stress-strain curves, void-volume fraction evolution and stress triaxiality were monitored. The results indicated that nucleation process is highly dependent on the material length scale, while the void growth and void coalescence mechanisms were almost indifferent to the increasing length scale. Material length scale mostly affects dislocation nucleation mechanisms that lead to void formation. Strain rate also significantly influences the stress-strain response during plastic deformation at various length scales.

  12. Failure processes in embedded monolayer graphene under axial compression.

    Science.gov (United States)

    Androulidakis, Charalampos; Koukaras, Emmanuel N; Frank, Otakar; Tsoukleri, Georgia; Sfyris, Dimitris; Parthenios, John; Pugno, Nicola; Papagelis, Konstantinos; Novoselov, Kostya S; Galiotis, Costas

    2014-06-12

    Exfoliated monolayer graphene flakes were embedded in a polymer matrix and loaded under axial compression. By monitoring the shifts of the 2D Raman phonons of rectangular flakes of various sizes under load, the critical strain to failure was determined. Prior to loading care was taken for the examined area of the flake to be free of residual stresses. The critical strain values for first failure were found to be independent of flake size at a mean value of -0.60% corresponding to a yield stress up to -6 GPa. By combining Euler mechanics with a Winkler approach, we show that unlike buckling in air, the presence of the polymer constraint results in graphene buckling at a fixed value of strain with an estimated wrinkle wavelength of the order of 1-2 nm. These results were compared with DFT computations performed on analogue coronene/PMMA oligomers and a reasonable agreement was obtained.

  13. Embedded target toolbox for DSP control applications of BLDC motor

    Directory of Open Access Journals (Sweden)

    Benk Enikö

    2009-10-01

    Full Text Available This paper presents a Matlab embedded target toolbox used for the DC brushless (BLDC motor applications. The synthesis, code generation, and the implementation of the control program, and also the control task itself are carried out on the host PC, under the Simulink. The target system is a brushless DC motor control kit – MSK243, connected on serial port COM to the host computer. With this real time library, it is possible to develop a Rapid Control Prototyping and Hardware-in-the-Loop Simulations. During the running control task on the target, the full functionality of Matlab/Simulink can be used for parameter’s visualization without interrupting or impeding the control process on the MSK240 board.

  14. Computer organization, design, and architecture

    CERN Document Server

    Shiva, Sajjan G

    2007-01-01

    Suitable for a one- or two-semester undergraduate or beginning graduate course in computer science and computer engineering, Computer Organization, Design, and Architecture, Fourth Edition presents the operating principles, capabilities, and limitations of digital computers to enable development of complex yet efficient systems. With 40% updated material and four new chapters, this edition takes students through a solid, up-to-date exploration of single- and multiple-processor systems, embedded architectures, and performance evaluation. New to the Fourth Edition Additional material that cove

  15. Ubiquitous Computing: Potentials and Challenges

    CERN Document Server

    Sen, Jaydip

    2010-01-01

    The world is witnessing the birth of a revolutionary computing paradigm that promises to have a profound effect on the way we interact with computers, devices, physical spaces, and other people. This new technology, called ubiquitous computing, envisions a world where embedded processors, computers, sensors, and digital communications are inexpensive commodities that are available everywhere. Ubiquitous computing will surround users with a comfortable and convenient information environment that merges physical and computational infrastructures into an integrated habitat. This habitat will feature a proliferation of hundreds or thousands of computing devices and sensors that will provide new functionality, offer specialized services, and boost productivity and interaction. This paper presents a comprehensive discussion on the central trends in ubiquitous computing considering them form technical, social and economic perspectives. It clearly identifies different application areas and sectors that will benefit f...

  16. Rapid Manufacturing of Reconfigurable Satellite Panels with Embedded Electronics, Embedded Thermal Devices, and Novel Structural Features

    OpenAIRE

    Young, Quinn; Stucker, Brent

    2006-01-01

    The Center for Advanced Satellite Manufacturing (CASM) at Utah State University has been investigating the use of new, advanced manufacturing technologies for the rapid manufacture of highly capable satellite panels. Using Ultrasonic Consolidation it is now possible to additively manufacture (a.k.a. rapid prototype) aluminum structures with embedded electronics, thermal devices, internal structural features, and fibers. CASM has built and tested embedded USB networks, electronic devices, ther...

  17. The Activation of Embedded Words in Spoken Word Recognition.

    Science.gov (United States)

    Zhang, Xujin; Samuel, Arthur G

    2015-01-01

    The current study investigated how listeners understand English words that have shorter words embedded in them. A series of auditory-auditory priming experiments assessed the activation of six types of embedded words (2 embedded positions × 3 embedded proportions) under different listening conditions. Facilitation of lexical decision responses to targets (e.g., pig) associated with words embedded in primes (e.g., hamster) indexed activation of the embedded words (e.g., ham). When the listening conditions were optimal, isolated embedded words (e.g., ham) primed their targets in all six conditions (Experiment 1a). Within carrier words (e.g., hamster), the same set of embedded words produced priming only when they were at the beginning or comprised a large proportion of the carrier word (Experiment 1b). When the listening conditions were made suboptimal by expanding or compressing the primes, significant priming was found for isolated embedded words (Experiment 2a), but no priming was produced when the carrier words were compressed/expanded (Experiment 2b). Similarly, priming was eliminated when the carrier words were presented with one segment replaced by noise (Experiment 3). When cognitive load was imposed, priming for embedded words was again found when they were presented in isolation (Experiment 4a), but not when they were embedded in the carrier words (Experiment 4b). The results suggest that both embedded position and proportion play important roles in the activation of embedded words, but that such activation only occurs under unusually good listening conditions.

  18. An upscaling procedure for fractured reservoirs with embedded grids

    Science.gov (United States)

    Fumagalli, Alessio; Pasquale, Luca; Zonca, Stefano; Micheletti, Stefano

    2016-08-01

    Upscaling of geological models for reservoir simulation is an active and important area of research. In particular, we are interested in reservoirs where the rock matrix exhibits an intricate network of fractures, which usually acts as a preferential path to the flow. Accounting for fractures' contribution in the simulation of a reservoir is of paramount importance. Here we have focused on obtaining effective parameters (e.g., transmissibility) on a 3-D computational grid on the reservoir scale, which account for the presence, at a finer spatial scale, of fractures and a network of fractures. We have essentially followed the idea illustrated in Karimi-Fard et al. (2006), yet this work has some notable aspects of innovation in the way the procedure has been implemented, and in its capability to consider rather general corner-point grids, like the ones normally used in reservoir simulations in the industry, and complex and realistic fracture networks, possibly not fully connected inside the coarse cells. In particular, novel contribution is the employment of an Embedded Discrete Fracture Model (EDFM) for computing fracture-fracture and matrix-fracture transmissibilities, with a remarkable gain in speedup. The output is in the form of transmissibility that, although obtained by considering single-phase flow, can be used for coarse-scale multiphase reservoir simulations, also via industrial software, such as Eclipse, Intersect, or GPRS. The results demonstrate the effectiveness and computational efficiency of the numerical procedure which is now ready for further testing and industrialization.

  19. Rotating embedded black holes: Entropy and Hawking's radiation

    OpenAIRE

    2004-01-01

    In this paper we derive a class of rotating embedded black holes. Then we study Hawking's radiation effects on these embedded black holes. The surface gravity, entropy and angular velocity are given for each of these black holes.

  20. A High Performance Computer Architecture for Embedded And/Or Multi-Computer Applications

    Science.gov (United States)

    1990-09-01

    Intermetrics VHDL-1076 toolset and executes WM microcode instructions stored as bit patterns in a Unix text file. Similarly, the state of the model’s...memory is written to another Unix file at the end of an execution run. The model is implementation independent in that the WM’s architecture is...desired module utilization information for a particular implementation technology. 3. Compiler/Simulator/Assembler The WM compiler translates Kernighan