首页 > 最新文献

2008 Fifth IEEE International Symposium on Embedded Computing最新文献

英文 中文
Designation and Realization of Ship Navigation System Embedded Platform Based on ARM 基于ARM的船舶导航系统嵌入式平台设计与实现
Pub Date : 2008-10-06 DOI: 10.1109/SEC.2008.20
Jianqi Liu, Bi Zeng, Xiuwen Yin, B. Zhong, Xiuzhang Zheng
This paper discussed advantage and disadvantage of solution scheme of embedded ship navigation system platform, established a ship navigation embedded terminal platform base on S3C2440 which has high price performance ratio. Introduced bootloader designation, Linux kernel porting and graphic library QTE porting, as well as ship navigation application framework and implemented result based on this platform. With combination of global satellite, position technology, wireless communication technology and embedded system technology, realized embedded platform and confirmed the practicability of platform by navigation application.
本文讨论了嵌入式船舶导航系统平台解决方案的优缺点,建立了一个基于S3C2440的具有较高性价比的船舶导航嵌入式终端平台。介绍了引导程序设计、Linux内核移植和图形库QTE移植,以及船舶导航应用框架和基于该平台的实现结果。结合全球卫星、定位技术、无线通信技术和嵌入式系统技术,实现了嵌入式平台,并通过导航应用验证了平台的实用性。
{"title":"Designation and Realization of Ship Navigation System Embedded Platform Based on ARM","authors":"Jianqi Liu, Bi Zeng, Xiuwen Yin, B. Zhong, Xiuzhang Zheng","doi":"10.1109/SEC.2008.20","DOIUrl":"https://doi.org/10.1109/SEC.2008.20","url":null,"abstract":"This paper discussed advantage and disadvantage of solution scheme of embedded ship navigation system platform, established a ship navigation embedded terminal platform base on S3C2440 which has high price performance ratio. Introduced bootloader designation, Linux kernel porting and graphic library QTE porting, as well as ship navigation application framework and implemented result based on this platform. With combination of global satellite, position technology, wireless communication technology and embedded system technology, realized embedded platform and confirmed the practicability of platform by navigation application.","PeriodicalId":231129,"journal":{"name":"2008 Fifth IEEE International Symposium on Embedded Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124806869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fuzzy Dynamic Programming Based Trusted Routing Decision in Mobile Ad Hoc Networks 基于模糊动态规划的移动自组网可信路由决策
Pub Date : 2008-10-06 DOI: 10.1109/SEC.2008.46
Zhiwei Qin, Zhiping Jia, Xihui Chen
In pure mobile ad hoc networks, trust based routing protocol is much more efficient at coping with the dynamic topology, open network environments and works well at identifying malicious behaviors. A number of trust routing protocols proposed restrict at standard routing protocols, therefore, lack accuracy in routing selection and rationality at trust evaluation. In this paper, a novel trust routing decision algorithm based on fuzzy dynamic programming theory has been proposed, which, to the best of our knowledge, is the first such solution proposed. Moreover, we have also proposed a model for trust evaluation and trust update that can be used with our trusted routing protocol. The model is different from other schemes in that it tries to analyze the physical requirements and psychology of the malicious attackers. Extensive simulation has been carried out on verifying the performance of our protocol.
在纯移动自组织网络中,基于信任的路由协议在应对动态拓扑、开放网络环境和识别恶意行为方面效率更高。目前提出的许多信任路由协议都局限于标准路由协议,因此在路由选择上缺乏准确性,在信任评估上缺乏合理性。本文提出了一种新的基于模糊动态规划理论的信任路由决策算法,据我们所知,这是第一次提出这种算法。此外,我们还提出了一个可用于可信路由协议的信任评估和信任更新模型。该模型与其他方案的不同之处在于,它试图分析恶意攻击者的物理需求和心理。为了验证我们的协议的性能,进行了大量的仿真。
{"title":"Fuzzy Dynamic Programming Based Trusted Routing Decision in Mobile Ad Hoc Networks","authors":"Zhiwei Qin, Zhiping Jia, Xihui Chen","doi":"10.1109/SEC.2008.46","DOIUrl":"https://doi.org/10.1109/SEC.2008.46","url":null,"abstract":"In pure mobile ad hoc networks, trust based routing protocol is much more efficient at coping with the dynamic topology, open network environments and works well at identifying malicious behaviors. A number of trust routing protocols proposed restrict at standard routing protocols, therefore, lack accuracy in routing selection and rationality at trust evaluation. In this paper, a novel trust routing decision algorithm based on fuzzy dynamic programming theory has been proposed, which, to the best of our knowledge, is the first such solution proposed. Moreover, we have also proposed a model for trust evaluation and trust update that can be used with our trusted routing protocol. The model is different from other schemes in that it tries to analyze the physical requirements and psychology of the malicious attackers. Extensive simulation has been carried out on verifying the performance of our protocol.","PeriodicalId":231129,"journal":{"name":"2008 Fifth IEEE International Symposium on Embedded Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125502641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Adaptive Multiple-Copy Multiple-Hop Forwarding in Intermittently Connected Mobile Networks 间歇连接移动网络中的自适应多拷贝多跳转发
Pub Date : 2008-10-06 DOI: 10.1109/SEC.2008.53
J. Niu, Hang Zhou, Linmin Sun, Yongping Xiong
First we analyze the shortcomings of existing routing protocols in intermittently connected mobile networks (ICMN) such as high delivery delay, low success rate and cannot adaptive to the different network environment. With this in mind, we propose a new routing scheme called adaptive multiple copy multiple hop algorithm (AMM). By collecting the simple information about the status of the network, AMM dynamically adjusts the number of message copies and forwarding conditions in the process of message delivery. Furthermore, AMM takes use of the stability of the network topology during a short period of time in some local area, and establishes group connected domain to help data transmission. The simulation results show that AMM achieves a good performance on delivery delay, and reduces the network load and the energy consumption in guarantee of certain delivery rate.
首先分析了间歇性连接移动网络(ICMN)中现有路由协议传输时延高、成功率低、不能适应不同网络环境等缺点;考虑到这一点,我们提出了一种新的路由方案,称为自适应多拷贝多跳算法(AMM)。AMM通过收集简单的网络状态信息,在消息传递过程中动态调整消息的拷贝数和转发条件。此外,AMM利用网络拓扑结构在某一局部区域短时间内的稳定性,建立群组连通域,帮助数据传输。仿真结果表明,AMM算法在保证一定的配送率的前提下,取得了较好的配送延迟性能,降低了网络负荷和能耗。
{"title":"Adaptive Multiple-Copy Multiple-Hop Forwarding in Intermittently Connected Mobile Networks","authors":"J. Niu, Hang Zhou, Linmin Sun, Yongping Xiong","doi":"10.1109/SEC.2008.53","DOIUrl":"https://doi.org/10.1109/SEC.2008.53","url":null,"abstract":"First we analyze the shortcomings of existing routing protocols in intermittently connected mobile networks (ICMN) such as high delivery delay, low success rate and cannot adaptive to the different network environment. With this in mind, we propose a new routing scheme called adaptive multiple copy multiple hop algorithm (AMM). By collecting the simple information about the status of the network, AMM dynamically adjusts the number of message copies and forwarding conditions in the process of message delivery. Furthermore, AMM takes use of the stability of the network topology during a short period of time in some local area, and establishes group connected domain to help data transmission. The simulation results show that AMM achieves a good performance on delivery delay, and reduces the network load and the energy consumption in guarantee of certain delivery rate.","PeriodicalId":231129,"journal":{"name":"2008 Fifth IEEE International Symposium on Embedded Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122802783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Security Scheme for Video Conference System with Wireless Terminals 一种新的无线终端视频会议系统安全方案
Pub Date : 2008-10-06 DOI: 10.1109/SEC.2008.62
Chen Xiao, Shilong Ma, Jianwei Niu, Lifeng Wang, Baosong Shan, Tan Chen
Transmission security of media data in video conference system has been a challenging task, since those data are high volume and latency sensitive. Partial encryption and other media encryption schemes are effective approaches to encrypt those data. However, a partial disclosure of media data can leak the secret about the conference, moreover when wireless terminals joint in those systems, the limited wireless bandwidth and computational capability will lead to new security challenges. To solve those problems, a novel security scheme for video conference system with wireless terminals is proposed, which integrates three key modules seamlessly: 1) wireless access gateway based on adaptive selective forwarding; 2) dynamic optimal selective control mechanism for securing multi-data stream in the system; 3) a novel lightweight fast media data encryption algorithm. A prototype has been implemented in an actual video conferencing system: Admire. Experimental results show the efficiency of the scheme is suitable for real-time applications.
视频会议系统中媒体数据的传输安全是一个具有挑战性的任务,因为这些数据是大容量和延迟敏感的数据。部分加密和其他媒体加密方案是对这些数据进行加密的有效方法。然而,媒体数据的部分泄露可能会泄露会议的秘密,而且当无线终端在这些系统中连接时,有限的无线带宽和计算能力将带来新的安全挑战。针对这些问题,提出了一种新的无线终端视频会议系统安全方案,该方案将三个关键模块无缝集成:1)基于自适应选择转发的无线接入网关;2)保护系统中多数据流的动态最优选择控制机制;3)一种新型的轻量级快速媒体数据加密算法。一个原型已经在一个实际的视频会议系统中实现:钦佩。实验结果表明,该方案具有较好的实时性。
{"title":"A Novel Security Scheme for Video Conference System with Wireless Terminals","authors":"Chen Xiao, Shilong Ma, Jianwei Niu, Lifeng Wang, Baosong Shan, Tan Chen","doi":"10.1109/SEC.2008.62","DOIUrl":"https://doi.org/10.1109/SEC.2008.62","url":null,"abstract":"Transmission security of media data in video conference system has been a challenging task, since those data are high volume and latency sensitive. Partial encryption and other media encryption schemes are effective approaches to encrypt those data. However, a partial disclosure of media data can leak the secret about the conference, moreover when wireless terminals joint in those systems, the limited wireless bandwidth and computational capability will lead to new security challenges. To solve those problems, a novel security scheme for video conference system with wireless terminals is proposed, which integrates three key modules seamlessly: 1) wireless access gateway based on adaptive selective forwarding; 2) dynamic optimal selective control mechanism for securing multi-data stream in the system; 3) a novel lightweight fast media data encryption algorithm. A prototype has been implemented in an actual video conferencing system: Admire. Experimental results show the efficiency of the scheme is suitable for real-time applications.","PeriodicalId":231129,"journal":{"name":"2008 Fifth IEEE International Symposium on Embedded Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133494141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Rapid Secret Sharing Scheme for Resource Constrained Environments 一种资源受限环境下的快速秘密共享方案
Pub Date : 2008-10-06 DOI: 10.1109/SEC.2008.36
Zheng Chen, Xiaojing Wang, Sheng Cao, Dan Tang
A method of rapid secret sharing scheme based on STAR codes is proposed. Due to the characteristic of array codes such as STAR codes, the computation in secret sharing scheme need only XOR operation on GF(2), which is distinguished with the modulation and other complex operation on GF(q) in the traditional schemes. Thus, it's more rapid and suitable for large capacity secret sharing, and also appropriate for resource constrained environments, such as embedded systems. The process of distribution and reconstruction of the secret key in our scheme is depicted in details, and an example of (5, 8) threshold secret sharing scheme based on (8, 5, 4) STAR code is demonstrated. Our scheme is proved to be perfect and ideal.
提出了一种基于STAR码的快速秘密共享方案。由于STAR码等阵列码的特点,秘密共享方案的计算只需要对GF(2)进行异或运算,而传统方案需要对GF(q)进行调制等复杂运算。因此,它更快速,更适合大容量的秘密共享,也适用于资源受限的环境,如嵌入式系统。详细描述了该方案中密钥的分发和重构过程,并给出了一个基于(8,5,4)STAR码的(5,8)门限密钥共享方案的实例。实践证明,我们的方案是完善和理想的。
{"title":"A Rapid Secret Sharing Scheme for Resource Constrained Environments","authors":"Zheng Chen, Xiaojing Wang, Sheng Cao, Dan Tang","doi":"10.1109/SEC.2008.36","DOIUrl":"https://doi.org/10.1109/SEC.2008.36","url":null,"abstract":"A method of rapid secret sharing scheme based on STAR codes is proposed. Due to the characteristic of array codes such as STAR codes, the computation in secret sharing scheme need only XOR operation on GF(2), which is distinguished with the modulation and other complex operation on GF(q) in the traditional schemes. Thus, it's more rapid and suitable for large capacity secret sharing, and also appropriate for resource constrained environments, such as embedded systems. The process of distribution and reconstruction of the secret key in our scheme is depicted in details, and an example of (5, 8) threshold secret sharing scheme based on (8, 5, 4) STAR code is demonstrated. Our scheme is proved to be perfect and ideal.","PeriodicalId":231129,"journal":{"name":"2008 Fifth IEEE International Symposium on Embedded Computing","volume":"318 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134525498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Comparison of Decentralized Workload Control through Code Migration in Distributed Desktop Computing Grids 分布式桌面计算网格中基于代码迁移的分散工作负载控制性能比较
Pub Date : 2008-10-06 DOI: 10.1109/SEC.2008.38
M. Yoshida, K. Sakamoto
Large scale loosely coupled PCs can organize a cluster and form desktop computing grids on sharing each processing power; power of PCs, transaction distributions and load balancing characterize the performance of the computing grids. This paper describes performance comparison of load balancing control through code migration in distributed desktop computing grids. A prototype of the middleware which migrates object code for computing was implemented, and the trade-off of code migration was observed. Based on the prototype experiment, several centralized and decentralized algorithms for location policy were examined on simulations, and the methodology to control code migration to have suitable response time in the system is derived. The result will be applied to design the grid computing systems and the peer to peer computing systems to maintain the proper performance.
大规模松散耦合的pc机可以在共享各处理能力的基础上组织集群,形成桌面计算网格;pc的能力、事务分布和负载平衡是计算网格性能的特征。本文描述了分布式桌面计算网格中通过代码迁移实现负载均衡控制的性能比较。实现了一个用于计算目标代码迁移的中间件原型,并观察了代码迁移的权衡。在原型实验的基础上,对几种集中式和分散式定位策略算法进行了仿真研究,并推导了控制代码迁移以使系统具有合适响应时间的方法。研究结果将应用于网格计算系统和点对点计算系统的设计,以保持适当的性能。
{"title":"Performance Comparison of Decentralized Workload Control through Code Migration in Distributed Desktop Computing Grids","authors":"M. Yoshida, K. Sakamoto","doi":"10.1109/SEC.2008.38","DOIUrl":"https://doi.org/10.1109/SEC.2008.38","url":null,"abstract":"Large scale loosely coupled PCs can organize a cluster and form desktop computing grids on sharing each processing power; power of PCs, transaction distributions and load balancing characterize the performance of the computing grids. This paper describes performance comparison of load balancing control through code migration in distributed desktop computing grids. A prototype of the middleware which migrates object code for computing was implemented, and the trade-off of code migration was observed. Based on the prototype experiment, several centralized and decentralized algorithms for location policy were examined on simulations, and the methodology to control code migration to have suitable response time in the system is derived. The result will be applied to design the grid computing systems and the peer to peer computing systems to maintain the proper performance.","PeriodicalId":231129,"journal":{"name":"2008 Fifth IEEE International Symposium on Embedded Computing","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133784889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Routing Protocol of Structured Peer-to-Peer Overlay Networks 一种新的结构化点对点覆盖网络路由协议
Pub Date : 2008-10-06 DOI: 10.1109/SEC.2008.14
Zhenhua Tan, G. Chang, Wei Cheng, Xiaoxing Gao, He Wang, Lili
The routing protocol of structured peer-to-peer overlay networks influences the p2p network performances in route table maintenance, routing hops, and network churning. Current protocols we used usually maintain a O(logN) route table and O(logN) routing hops. To get better routing speed with less scale routing table, using O(1) node finger to get O(N) route path, a new protocol named CSSP was presented. A short routing table was made to record ldquoLrdquo cache nodes, one super node and one successor node. Algorithms for maintaining the route table was presented in this paper. A selection algorithm was presented to select the super node who could cache all of the nodes. And the cache-nodes, super-node and successor-node ensure the high performance of the CSSP. Compared to chord, pastry and etc., the CSSP increases the performance in routing table maintaining, routing hops, fault-tolerance and the amount of churning nodes while some nodes inject and eject the CSSP p2p system. The simulations and analysis shows that the CSSP is an efficient route algorithm, but also some problems waiting for further study.
结构化点对点覆盖网络的路由协议影响着p2p网络在路由表维护、路由跳数和网络搅动等方面的性能。我们使用的当前协议通常维护O(logN)路由表和O(logN)路由跳数。为了在路由表规模较小的情况下获得更好的路由速度,采用O(1)个节点指来获得O(N)条路由路径,提出了一种新的CSSP协议。创建一个短路由表,记录ldquoLrdquo缓存节点、一个超级节点和一个后继节点。提出了维护路由表的算法。提出了一种选择算法来选择能够缓存所有节点的超级节点。缓存节点、超级节点和继承节点保证了CSSP的高性能。与chord、pastry等相比,CSSP在路由表维护、路由跳数、容错性和搅拌节点数量等方面的性能都有所提高,同时也有一些节点注入和退出CSSP p2p系统。仿真和分析表明,CSSP算法是一种有效的路由算法,但也存在一些有待进一步研究的问题。
{"title":"A New Routing Protocol of Structured Peer-to-Peer Overlay Networks","authors":"Zhenhua Tan, G. Chang, Wei Cheng, Xiaoxing Gao, He Wang, Lili","doi":"10.1109/SEC.2008.14","DOIUrl":"https://doi.org/10.1109/SEC.2008.14","url":null,"abstract":"The routing protocol of structured peer-to-peer overlay networks influences the p2p network performances in route table maintenance, routing hops, and network churning. Current protocols we used usually maintain a O(logN) route table and O(logN) routing hops. To get better routing speed with less scale routing table, using O(1) node finger to get O(N) route path, a new protocol named CSSP was presented. A short routing table was made to record ldquoLrdquo cache nodes, one super node and one successor node. Algorithms for maintaining the route table was presented in this paper. A selection algorithm was presented to select the super node who could cache all of the nodes. And the cache-nodes, super-node and successor-node ensure the high performance of the CSSP. Compared to chord, pastry and etc., the CSSP increases the performance in routing table maintaining, routing hops, fault-tolerance and the amount of churning nodes while some nodes inject and eject the CSSP p2p system. The simulations and analysis shows that the CSSP is an efficient route algorithm, but also some problems waiting for further study.","PeriodicalId":231129,"journal":{"name":"2008 Fifth IEEE International Symposium on Embedded Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129674181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Recognizing Geometric Path from Polygon-Based Integrated Circuit Layout 基于多边形集成电路版图的几何路径识别
Pub Date : 2008-10-06 DOI: 10.1109/SEC.2008.22
Zhaohui Yuan, Shilei Sun, Gaofeng Wang
As the continual decrease of the feature size, the parasitic inductance and capacitance effect play important role in IC design and verification. Previous works on layout extraction mainly concentrated on how to find out the type of devices and connections between them, few works has addressed the information of centerlines and widths of IC interconnects in a polygon-based VLSI layout, which are required in inductance calculation and other applications. In this paper, an efficient scheme for the centerline-based path recognition from an IC mask layout is presented. Unlike the division-based methods, a tree-traverse-based approach is proposed. This new scheme can be realized as a reverse procedure of the layout generation from wire routing trees. Moreover, this scheme can handle complex all-angle wires. Experimental results show that this scheme has nearly linear computational complexity yet generates precise results.
随着特征尺寸的不断减小,寄生电感和电容效应在集成电路的设计和验证中起着重要的作用。以往在版图提取方面的工作主要集中在如何找出器件的类型以及器件之间的连接,而对于电感计算等应用中需要的基于多边形的VLSI版图中IC互连线的中心线和宽度信息的研究较少。本文提出了一种有效的基于中心线的IC掩模路径识别方法。与基于划分的方法不同,本文提出了一种基于树遍历的方法。这种新方案可以通过从布线树生成版图的逆向过程来实现。此外,该方案可以处理复杂的全角导线。实验结果表明,该方案具有接近线性的计算复杂度,但能产生精确的结果。
{"title":"Recognizing Geometric Path from Polygon-Based Integrated Circuit Layout","authors":"Zhaohui Yuan, Shilei Sun, Gaofeng Wang","doi":"10.1109/SEC.2008.22","DOIUrl":"https://doi.org/10.1109/SEC.2008.22","url":null,"abstract":"As the continual decrease of the feature size, the parasitic inductance and capacitance effect play important role in IC design and verification. Previous works on layout extraction mainly concentrated on how to find out the type of devices and connections between them, few works has addressed the information of centerlines and widths of IC interconnects in a polygon-based VLSI layout, which are required in inductance calculation and other applications. In this paper, an efficient scheme for the centerline-based path recognition from an IC mask layout is presented. Unlike the division-based methods, a tree-traverse-based approach is proposed. This new scheme can be realized as a reverse procedure of the layout generation from wire routing trees. Moreover, this scheme can handle complex all-angle wires. Experimental results show that this scheme has nearly linear computational complexity yet generates precise results.","PeriodicalId":231129,"journal":{"name":"2008 Fifth IEEE International Symposium on Embedded Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116418098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Speaker Verification Based on GMM-UBM for PDA 基于GMM-UBM的PDA实时说话人验证
Pub Date : 2008-10-06 DOI: 10.1109/SEC.2008.56
Yan Chen, Q. Hong, Xiaoyang Chen, Caihong Zhang
Personal digital assistant (PDA) is more and more popular due to its powerful functions. To protect the personal information of PDA, we adopt the technology of text-independent speaker verification (SV) for this kind of embedded system. In this paper, Gaussian mixture model (GMM) and universal background model (UBM) are addressed in detail. The optimization of mathematical computation of GMM-UBM guarantees the real-time performance of our SV system.
个人数字助理(PDA)由于其强大的功能而越来越受到人们的欢迎。为了保护PDA的个人信息,我们在这类嵌入式系统中采用了文本无关说话人验证(SV)技术。本文详细讨论了高斯混合模型(GMM)和通用背景模型(UBM)。GMM-UBM的数学计算优化保证了系统的实时性。
{"title":"Real-Time Speaker Verification Based on GMM-UBM for PDA","authors":"Yan Chen, Q. Hong, Xiaoyang Chen, Caihong Zhang","doi":"10.1109/SEC.2008.56","DOIUrl":"https://doi.org/10.1109/SEC.2008.56","url":null,"abstract":"Personal digital assistant (PDA) is more and more popular due to its powerful functions. To protect the personal information of PDA, we adopt the technology of text-independent speaker verification (SV) for this kind of embedded system. In this paper, Gaussian mixture model (GMM) and universal background model (UBM) are addressed in detail. The optimization of mathematical computation of GMM-UBM guarantees the real-time performance of our SV system.","PeriodicalId":231129,"journal":{"name":"2008 Fifth IEEE International Symposium on Embedded Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122193410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimization Research of PSO-PID Algorithm for the Design of Brushless Permanent Magnet Machines 无刷永磁电机设计中PSO-PID算法的优化研究
Pub Date : 2008-10-06 DOI: 10.1109/SEC.2008.40
Yu Ren, Xiaobai Xu
Aiming at a complicated coupling and non-linear brushless DC motor (BLDCM) servo system, the conventional algorithms have many disadvantages, such as less precision, lower speed response. Taking the mechanical characteristics of BLDCM into consideration, an improved particle swarm optimization algorithm is presented in this paper, which is applied in the speed control of the Brushless DC Motor (BLDCM) servo system. Firstly, an improved Particle Swarm Optimization algorithm is introduced. Secondly, the way of finding PID coefficient will be studied by using this algorithm. Finally, the mathematical model of the servo system speed control is built by MATLAB/Simulink.
针对复杂耦合非线性的无刷直流电动机伺服系统,传统算法存在精度低、速度响应低等缺点。针对无刷直流电动机的机械特性,提出了一种改进的粒子群优化算法,并将其应用于无刷直流电动机伺服系统的速度控制。首先介绍了一种改进的粒子群优化算法。其次,利用该算法研究PID系数的求值方法。最后,利用MATLAB/Simulink建立了伺服系统速度控制的数学模型。
{"title":"Optimization Research of PSO-PID Algorithm for the Design of Brushless Permanent Magnet Machines","authors":"Yu Ren, Xiaobai Xu","doi":"10.1109/SEC.2008.40","DOIUrl":"https://doi.org/10.1109/SEC.2008.40","url":null,"abstract":"Aiming at a complicated coupling and non-linear brushless DC motor (BLDCM) servo system, the conventional algorithms have many disadvantages, such as less precision, lower speed response. Taking the mechanical characteristics of BLDCM into consideration, an improved particle swarm optimization algorithm is presented in this paper, which is applied in the speed control of the Brushless DC Motor (BLDCM) servo system. Firstly, an improved Particle Swarm Optimization algorithm is introduced. Secondly, the way of finding PID coefficient will be studied by using this algorithm. Finally, the mathematical model of the servo system speed control is built by MATLAB/Simulink.","PeriodicalId":231129,"journal":{"name":"2008 Fifth IEEE International Symposium on Embedded Computing","volume":"81 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131626553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2008 Fifth IEEE International Symposium on Embedded Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1