首页 > 最新文献

International Conference on Pervasive and Embedded Computing and Communication Systems最新文献

英文 中文
Tiled Cellular Automata for Area-efficient Distributed Random Number Generators 区域高效分布式随机数生成器的平铺元胞自动机
B. Girau, N. Vlassopoulos
Generating multiple random numbers in a parallel fashion for scientific simulations is an intense task that requires significant hardware resources. In our present work we focus on an existing Cellular Automaton and present an efficient architecture that reuses this CA to generate pseudo random numbers in a two dimensional context.
以并行方式为科学模拟生成多个随机数是一项繁重的任务,需要大量的硬件资源。在我们目前的工作中,我们专注于现有的元胞自动机,并提出了一个有效的架构,该架构重用该CA在二维上下文中生成伪随机数。
{"title":"Tiled Cellular Automata for Area-efficient Distributed Random Number Generators","authors":"B. Girau, N. Vlassopoulos","doi":"10.5220/0003371103970404","DOIUrl":"https://doi.org/10.5220/0003371103970404","url":null,"abstract":"Generating multiple random numbers in a parallel fashion for scientific simulations is an intense task that requires significant hardware resources. In our present work we focus on an existing Cellular Automaton and present an efficient architecture that reuses this CA to generate pseudo random numbers in a two dimensional context.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115594107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Latent Semantic Indexing using Multiresolution Analysis 使用多分辨率分析的潜在语义索引
Tareq Jaber, A. Amira, P. Milligan
Latent semantic indexing (LSI) is commonly used to match queries to documents in information retrieval (IR) applications. It has been shown to improve the retrieval performance, as it can deal with synonymy and polysemy problems. This paper proposes a hybrid approach which can improve result accuracy significantly. Evaluation of the approach based on using the Haar wavelet transform (HWT) as a preprocessing step for the singular value decomposition (SVD) in the LSI system is presented, using Donoho′s thresholding with the transformation in HWT. Furthermore, the effect of different levels of decomposition in the HWT process is investigated. The experimental results presented in the paper confirm a significant improvement in performance by applying the HWT as a preprocessing step using Donoho′s thresholding.
潜在语义索引(LSI)是信息检索(IR)应用中常用的一种匹配查询和文档的方法。该方法可以处理同义词和多义问题,提高了检索性能。本文提出了一种混合方法,可以显著提高结果的准确性。采用多诺霍阈值法对基于Haar小波变换(HWT)的LSI系统奇异值分解(SVD)预处理方法进行了评价。此外,还研究了不同程度的分解对HWT过程的影响。实验结果表明,采用多诺霍阈值法将HWT作为预处理步骤,可以显著提高系统的性能。
{"title":"Latent Semantic Indexing using Multiresolution Analysis","authors":"Tareq Jaber, A. Amira, P. Milligan","doi":"10.5220/0003313203270332","DOIUrl":"https://doi.org/10.5220/0003313203270332","url":null,"abstract":"Latent semantic indexing (LSI) is commonly used to match queries to documents in information retrieval (IR) applications. It has been shown to improve the retrieval performance, as it can deal with synonymy and polysemy problems. This paper proposes a hybrid approach which can improve result accuracy significantly. Evaluation of the approach based on using the Haar wavelet transform (HWT) as a preprocessing step for the singular value decomposition (SVD) in the LSI system is presented, using Donoho′s thresholding with the transformation in HWT. Furthermore, the effect of different levels of decomposition in the HWT process is investigated. The experimental results presented in the paper confirm a significant improvement in performance by applying the HWT as a preprocessing step using Donoho′s thresholding.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116259839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Pedestrian Identification by Associating Walking Rhythms from Wearable Acceleration Sensors and Biped Tracking Results 基于可穿戴加速传感器和双足跟踪结果的步行节奏关联的行人识别
Tetsushi Ikeda, H. Ishiguro, T. Miyashita, N. Hagita
Providing personal and location-dependent services is one of the promising services in public spaces like a shopping mall. So far, sensors in the environment have reliably detected the current positions of humans, but it is difficult to identify people using these sensors. On the other hand, wearable devices can send their personal identity information, but precise position estimation remains problematic. In this paper, we propose a novel method of integrating laser range finders (LRFs) in the environment and wearable accelerometers. The legs of pedestrians in the environment are tracked by using LRFs, and acceleration signals from pedestrians are simultaneously observed. Since the tracking results of biped feet and the body oscillation of the same pedestrian show same walking rhythm patterns, we associate these signals from same pedestrian that maximizes correlation between them and identify the pedestrian. Example results of tracking individuals in the environment confirm the effectiveness of this method.
在购物中心等公共场所,提供个性化和位置相关的服务是很有前途的服务之一。到目前为止,环境中的传感器已经可靠地检测到人类的当前位置,但使用这些传感器很难识别人。另一方面,可穿戴设备可以发送他们的个人身份信息,但精确的位置估计仍然是个问题。本文提出了一种将环境中的激光测距仪与可穿戴式加速度计相结合的新方法。利用lrf跟踪环境中行人的腿部,同时观察行人的加速信号。由于同一行人的双脚和身体振荡的跟踪结果显示出相同的步行节奏模式,因此我们将来自同一行人的这些信号关联起来,从而最大化它们之间的相关性并识别行人。环境中个体跟踪的实例结果证实了该方法的有效性。
{"title":"Pedestrian Identification by Associating Walking Rhythms from Wearable Acceleration Sensors and Biped Tracking Results","authors":"Tetsushi Ikeda, H. Ishiguro, T. Miyashita, N. Hagita","doi":"10.5220/0003826400210028","DOIUrl":"https://doi.org/10.5220/0003826400210028","url":null,"abstract":"Providing personal and location-dependent services is one of the promising services in public spaces like a shopping mall. So far, sensors in the environment have reliably detected the current positions of humans, but it is difficult to identify people using these sensors. On the other hand, wearable devices can send their personal identity information, but precise position estimation remains problematic. In this paper, we propose a novel method of integrating laser range finders (LRFs) in the environment and wearable accelerometers. The legs of pedestrians in the environment are tracked by using LRFs, and acceleration signals from pedestrians are simultaneously observed. Since the tracking results of biped feet and the body oscillation of the same pedestrian show same walking rhythm patterns, we associate these signals from same pedestrian that maximizes correlation between them and identify the pedestrian. Example results of tracking individuals in the environment confirm the effectiveness of this method.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115159589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Portable Low Vision Aid based on GPU 一种基于GPU的便携式弱视辅助设备
R. Ureña, P. Martínez-Cañada, J. M. Gómez-López, C. Morillas, F. Pelayo
The purpose of this work is to describe a customizable aid system based on GPU for low vision. The system aims to transform images taken from the patient's environment and tries to convey the best information possible through his visual rest, applying various transformations to the input image and projecting the processed image on a head-mounted-display, HMD. The system easily enables implementing and testing different kinds of vision enhancements adapted to the pathologies of each low vision affected, his particular visual field, and the evolution of his disease. We have implemented several types of visual enhancements based on extracting an overlaying edges, image filtering, and contrast enhancement. We have developed a complete image processing library for GPUs compatible with CUDA in order the system can perform real time processing employing a light-weight netbook with an integrated GPU NVIDIA ION2. We briefly summarize here their computational cost (in terms of processed frames per second) for three different
本工作的目的是描述一个基于GPU的可定制的低视力辅助系统。该系统旨在转换从患者环境中获取的图像,并试图通过他的视觉休息来传达尽可能最好的信息,对输入图像进行各种转换,并将处理后的图像投射到头戴式显示器(HMD)上。该系统可以很容易地实现和测试不同种类的视力增强,以适应每个低视力患者的病理、他的特定视野和他的疾病的演变。我们已经实现了几种基于提取叠加边缘、图像过滤和对比度增强的视觉增强。我们为兼容CUDA的GPU开发了一个完整的图像处理库,以便系统可以使用集成GPU NVIDIA ION2的轻型上网本进行实时处理。我们在这里简要地总结了它们的计算成本(以每秒处理的帧数计算)
{"title":"A Portable Low Vision Aid based on GPU","authors":"R. Ureña, P. Martínez-Cañada, J. M. Gómez-López, C. Morillas, F. Pelayo","doi":"10.5220/0003366702010206","DOIUrl":"https://doi.org/10.5220/0003366702010206","url":null,"abstract":"The purpose of this work is to describe a customizable aid system based on GPU for low vision. The system aims to transform images taken from the patient's environment and tries to convey the best information possible through his visual rest, applying various transformations to the input image and projecting the processed image on a head-mounted-display, HMD. The system easily enables implementing and testing different kinds of vision enhancements adapted to the pathologies of each low vision affected, his particular visual field, and the evolution of his disease. We have implemented several types of visual enhancements based on extracting an overlaying edges, image filtering, and contrast enhancement. We have developed a complete image processing library for GPUs compatible with CUDA in order the system can perform real time processing employing a light-weight netbook with an integrated GPU NVIDIA ION2. We briefly summarize here their computational cost (in terms of processed frames per second) for three different","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115362276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mixed Precision Tuning with Salsa 萨尔萨混合精密调谐
Nasrine Damouche, M. Martel
Precision tuning consists of finding the least floating-point formats enabling a program to compute some results with an accuracy requirement. In mixed precision, this problem has a huge combinatory since any value may have its own format. Precision tuning has given rise to the development of several tools that aim at guarantying a desired precision on the outputs of programs doing floating-point computations, by minimizing the initial, over-estimated, precision of the inputs and intermediary results. In this article, we present an extension of our tool for numerical accuracy, Salsa, which performs precision tuning. Originally, Salsa is a program transformation tool based on static analysis and which improves the accuracy of floating-point computations. We have extended Salsa with a precision tuning static analysis. We present experimental results showing the efficiency of this new feature as well as the additional gains that we obtain by performing Salsa’s program transformation before the precision tuning analysis. We experiment our tool on a set of programs coming from various domains like embedded systems and numerical analysis.
精度调优包括查找最小的浮点格式,使程序能够计算具有精度要求的某些结果。在混合精度中,这个问题非常复杂,因为任何值都可能有自己的格式。精度调优已经引起了一些工具的发展,这些工具旨在通过最小化输入和中间结果的初始、高估的精度来保证进行浮点计算的程序输出的所需精度。在本文中,我们介绍了我们的数值精度工具Salsa的扩展,它执行精确调优。Salsa最初是一个基于静态分析的程序转换工具,它提高了浮点计算的精度。我们用精确调优静态分析扩展了Salsa。我们给出的实验结果显示了这种新特征的效率以及我们在精确调谐分析之前执行Salsa程序变换所获得的额外收益。我们在一组来自不同领域的程序上实验我们的工具,比如嵌入式系统和数值分析。
{"title":"Mixed Precision Tuning with Salsa","authors":"Nasrine Damouche, M. Martel","doi":"10.5220/0006915501850194","DOIUrl":"https://doi.org/10.5220/0006915501850194","url":null,"abstract":"Precision tuning consists of finding the least floating-point formats enabling a program to compute some results with an accuracy requirement. In mixed precision, this problem has a huge combinatory since any value may have its own format. Precision tuning has given rise to the development of several tools that aim at guarantying a desired precision on the outputs of programs doing floating-point computations, by minimizing the initial, over-estimated, precision of the inputs and intermediary results. In this article, we present an extension of our tool for numerical accuracy, Salsa, which performs precision tuning. Originally, Salsa is a program transformation tool based on static analysis and which improves the accuracy of floating-point computations. We have extended Salsa with a precision tuning static analysis. We present experimental results showing the efficiency of this new feature as well as the additional gains that we obtain by performing Salsa’s program transformation before the precision tuning analysis. We experiment our tool on a set of programs coming from various domains like embedded systems and numerical analysis.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116644478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Password based Secure Authentication Methodology for Wireless Sensor Network 基于密码的无线传感器网络安全认证方法
G. Khan, M. Z. Ali
Wireless Sensor Network (WSN) is a promising solution for next generation real-time monitoring applications due to its ubiquitous nature, ease of deployment and wide range of applications. The main requirements of a secure WSN architecture are confidentiality, integrity and authentication. User Authentication for wireless sensor networks is a fundamental issue in designing secure WSN systems, where legitimate users are allowed to login and access data from the sensor and gateway nodes. A large number of dynamic strong password and two-factor authentication solutions have been proposed. However, all of these protocols rely on network synchronization and suffer from replay and many logged in users with same login ID threats. We present a secure authentication protocol that avoids replay and multiple login attacks. Our scheme eliminates the need for network synchronization. The scheme is analysed and evaluated for various attacks using SystemC and it provides enhanced security for no extra computing at sensor nodes.
无线传感器网络(WSN)由于其无处不在的特性、易于部署和广泛的应用范围,是下一代实时监控应用的一个很有前途的解决方案。安全WSN体系结构的主要要求是保密性、完整性和认证。无线传感器网络的用户认证是设计安全WSN系统的一个基本问题,允许合法用户从传感器和网关节点登录和访问数据。目前已经提出了大量的动态强密码和双因素认证方案。然而,所有这些协议都依赖于网络同步,并遭受重播和许多登录用户具有相同登录ID的威胁。我们提出了一种安全的身份验证协议,可以避免重播和多次登录攻击。我们的方案消除了网络同步的需要。该方案使用SystemC对各种攻击进行了分析和评估,并提供了增强的安全性,无需在传感器节点上进行额外的计算。
{"title":"Password based Secure Authentication Methodology for Wireless Sensor Network","authors":"G. Khan, M. Z. Ali","doi":"10.5220/0004307400350041","DOIUrl":"https://doi.org/10.5220/0004307400350041","url":null,"abstract":"Wireless Sensor Network (WSN) is a promising solution for next generation real-time monitoring applications due to its ubiquitous nature, ease of deployment and wide range of applications. The main requirements of a secure WSN architecture are confidentiality, integrity and authentication. User Authentication for wireless sensor networks is a fundamental issue in designing secure WSN systems, where legitimate users are allowed to login and access data from the sensor and gateway nodes. A large number of dynamic strong password and two-factor authentication solutions have been proposed. However, all of these protocols rely on network synchronization and suffer from replay and many logged in users with same login ID threats. We present a secure authentication protocol that avoids replay and multiple login attacks. Our scheme eliminates the need for network synchronization. The scheme is analysed and evaluated for various attacks using SystemC and it provides enhanced security for no extra computing at sensor nodes.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"20 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126093326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Robust Technique for Multiuser Detection in the Presence of Signature Uncertainties 签名不确定性下的多用户检测鲁棒技术
V. K. Pamula, S. R. Vempati, S. Balaji, H. Khan, A. K. Tipparti
This paper presents a robust multiuser detection technique to combat multiple access interference (MAI) and impulsive noise for synchronous code-division multiple-access (CDMA) communication systems in the presence of signature uncertainties. A new M-estimator (modified Hampel) proposed to robustify the detector is studied and analyzed. The approach is corroborated with simulation results to evaluate the performance of the proposed robust multiuser detector in comparison with the linear decorrelating detector, Huber and Hampel estimator based detectors. Simulation results show that the new M-estimator based detector offers significant performance gain over the linear decorrelating detector, the Huber, and the Hampel estimator based detectors with little attendant increase in the computational complexity.
针对同步码分多址(CDMA)通信系统中存在特征不确定性的情况,提出了一种抗多址干扰和脉冲噪声的鲁棒多用户检测技术。研究和分析了一种新的m估计量(改进的Hampel)对检测器的鲁棒性。仿真结果验证了该方法的有效性,并与线性去相关检测器、基于Huber和Hampel估计的检测器进行了比较。仿真结果表明,与线性去相关检测器、Huber检测器和Hampel检测器相比,基于m估计的检测器提供了显著的性能增益,而计算复杂度几乎没有增加。
{"title":"A Robust Technique for Multiuser Detection in the Presence of Signature Uncertainties","authors":"V. K. Pamula, S. R. Vempati, S. Balaji, H. Khan, A. K. Tipparti","doi":"10.5220/0003813603030307","DOIUrl":"https://doi.org/10.5220/0003813603030307","url":null,"abstract":"This paper presents a robust multiuser detection technique to combat multiple access interference (MAI) and impulsive noise for synchronous code-division multiple-access (CDMA) communication systems in the presence of signature uncertainties. A new M-estimator (modified Hampel) proposed to robustify the detector is studied and analyzed. The approach is corroborated with simulation results to evaluate the performance of the proposed robust multiuser detector in comparison with the linear decorrelating detector, Huber and Hampel estimator based detectors. Simulation results show that the new M-estimator based detector offers significant performance gain over the linear decorrelating detector, the Huber, and the Hampel estimator based detectors with little attendant increase in the computational complexity.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125342762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Router Architecture for Network on Chip 一种高效的片上网络路由器结构
A. Shahrabi, A. Ahmadinia
Efficient buffer management is not only instrumental in the overall performance of the on-chip networks but also greatly affects the network energy consumption. In fact, any improvement or deterioration of network performance and energy budget is the net result of increasing buffer utilisation (storing blocked flits) and reducing buffer utilisation (delivering buffered flits). In order to improve the network performance and efficiently utilising the available routers buffer space in NoCs, a new router architecture, called PoolBuffering (PB), is proposed in this paper. By exploiting a flexible ring buffer structure, the buffer space of the proposed architecture is shared amongst all input channels; allocating more buffer to the busy input channels and less to the idle ones. Implementation results show up to 50% in reducing power consumption when compared to a traditional router. Moreover, our extensive simulation study shows that the proposed router architecture enhances the network performance by increasing the acceptance traffic rate and decreasing the average message latency.
有效的缓冲区管理不仅有助于提高片上网络的整体性能,而且对网络能耗也有很大的影响。事实上,网络性能和能量预算的任何改善或恶化都是增加缓冲区利用率(存储阻塞的flits)和减少缓冲区利用率(提供缓冲的flits)的最终结果。为了提高网络性能并有效利用noc中可用的路由器缓冲空间,本文提出了一种新的路由器架构——池缓冲(PoolBuffering, PB)。通过利用灵活的环形缓冲结构,所提出的架构的缓冲空间在所有输入通道之间共享;为繁忙的输入通道分配更多的缓冲区,为空闲的输入通道分配更少的缓冲区。实施结果显示,与传统路由器相比,功耗降低了50%。此外,我们广泛的仿真研究表明,所提出的路由器架构通过提高接收流量率和降低平均消息延迟来提高网络性能。
{"title":"An Efficient Router Architecture for Network on Chip","authors":"A. Shahrabi, A. Ahmadinia","doi":"10.5220/0003371604050412","DOIUrl":"https://doi.org/10.5220/0003371604050412","url":null,"abstract":"Efficient buffer management is not only instrumental in the overall performance of the on-chip networks but also greatly affects the network energy consumption. In fact, any improvement or deterioration of network performance and energy budget is the net result of increasing buffer utilisation (storing blocked flits) and reducing buffer utilisation (delivering buffered flits). In order to improve the network performance and efficiently utilising the available routers buffer space in NoCs, a new router architecture, called PoolBuffering (PB), is proposed in this paper. By exploiting a flexible ring buffer structure, the buffer space of the proposed architecture is shared amongst all input channels; allocating more buffer to the busy input channels and less to the idle ones. Implementation results show up to 50% in reducing power consumption when compared to a traditional router. Moreover, our extensive simulation study shows that the proposed router architecture enhances the network performance by increasing the acceptance traffic rate and decreasing the average message latency.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116130434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Contactless Mobile Fingerprinting System 自动非接触式移动指纹识别系统
M. Baier, S. Foret, V. O. Kunnil, M. Paradis, P. Bustos, Samson Mil'shtein
Increased security requirements relevant to the worldwide war against terrorism and cyber crime recently prompted the development of biometric systems for use in identifying individuals at commercial facilities, border crossings, airports, and government building access points. Fingerprinting is one of the oldest means of biometric identification; however, the current methods of fingerprint capture carry inherent limitations on image quality. The current study describes the development of a novel, mobile, and contactless fingerprinting system. This system combines the advantages of contactless fingerprinting with the ability to create a digital map of the blood vessels within a finger for use as a second data set for use in biometric identification. The distinguishing feature of the system is the use of line scanning technology which allows for the acquisition of nearly distortion-less 180 or “nail-to-nail” fingerprints. The study describes a fully automatic system and assesses the technical aspects of this novel device. We describe the design of the subsystems: adaptive lighting, optical image formation, power management methods, wireless data transfer, and subsystem synchronization techniques. We will also discuss the system’s embedded software, which synchronizes the operation of all subsystems and allows for fingerprint visualization on an onboard touch
最近,随着全球反恐战争和网络犯罪的增加,对安全的要求越来越高,生物识别系统的发展被用于商业设施、边境口岸、机场和政府大楼接入点的个人识别。指纹识别是最古老的生物识别手段之一;然而,目前的指纹采集方法在图像质量上存在固有的局限性。目前的研究描述了一种新颖的、移动的、非接触的指纹识别系统的发展。该系统结合了非接触式指纹识别的优点,并能够创建手指内血管的数字地图,作为生物识别的第二数据集。该系统的显著特点是使用线扫描技术,该技术允许获取几乎不失真的180或“钉子到钉子”指纹。该研究描述了一个全自动系统,并评估了这种新设备的技术方面。我们描述了子系统的设计:自适应照明、光学成像、电源管理方法、无线数据传输和子系统同步技术。我们还将讨论系统的嵌入式软件,它可以同步所有子系统的操作,并允许在板载触摸上实现指纹可视化
{"title":"Automatic Contactless Mobile Fingerprinting System","authors":"M. Baier, S. Foret, V. O. Kunnil, M. Paradis, P. Bustos, Samson Mil'shtein","doi":"10.5220/0003362004450450","DOIUrl":"https://doi.org/10.5220/0003362004450450","url":null,"abstract":"Increased security requirements relevant to the worldwide war against terrorism and cyber crime recently prompted the development of biometric systems for use in identifying individuals at commercial facilities, border crossings, airports, and government building access points. Fingerprinting is one of the oldest means of biometric identification; however, the current methods of fingerprint capture carry inherent limitations on image quality. The current study describes the development of a novel, mobile, and contactless fingerprinting system. This system combines the advantages of contactless fingerprinting with the ability to create a digital map of the blood vessels within a finger for use as a second data set for use in biometric identification. The distinguishing feature of the system is the use of line scanning technology which allows for the acquisition of nearly distortion-less 180 or “nail-to-nail” fingerprints. The study describes a fully automatic system and assesses the technical aspects of this novel device. We describe the design of the subsystems: adaptive lighting, optical image formation, power management methods, wireless data transfer, and subsystem synchronization techniques. We will also discuss the system’s embedded software, which synchronizes the operation of all subsystems and allows for fingerprint visualization on an onboard touch","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116144717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using File Systems for Non-volatile Main Memory Management 使用文件系统进行非易失性主存管理
S. Oikawa
Non-volatile (NV) memory is next generation memory. It provides fast access speed comparable to DRAM and also persistently stores data without power supply. These features enable NV memory to be used as both main memory and secondary storage. While the active researches have been conducted on its use for either main memory or secondary storage, they were conducted independently. This paper proposes the integrated memory management methods, by which NV memory can be used as both main memory and secondary storage. The proposed methods use file systems as their basis for NV memory management. Such integration enables the memory allocation for processes and files from the same source, and processes can take advantage of a large amount of physical memory used for both main memory and storage. We implemented the proposed memory management methods in the Linux kernel. The evaluation results performed on a system emulator show that the memory allocation costs of the proposed methods are comparable to that of the existing DRAM and are significantly better than those of the page swapping.
非易失性(NV)存储器是下一代存储器。它可以提供与DRAM相当的快速访问速度,并且可以在没有电源的情况下持续存储数据。这些特性使得NV内存既可以用作主存储器,也可以用作辅助存储器。虽然对其用于主存储器或辅助存储器进行了积极的研究,但它们都是独立进行的。本文提出了一种集成存储器管理方法,使NV存储器既可作主存储器又可作副存储器。建议的方法使用文件系统作为NV内存管理的基础。这种集成支持为来自同一源的进程和文件分配内存,并且进程可以利用用于主内存和存储的大量物理内存。我们在Linux内核中实现了所提出的内存管理方法。在系统模拟器上进行的评估结果表明,所提出的方法的内存分配成本与现有的DRAM相当,并且明显优于页面交换。
{"title":"Using File Systems for Non-volatile Main Memory Management","authors":"S. Oikawa","doi":"10.5220/0004330702080213","DOIUrl":"https://doi.org/10.5220/0004330702080213","url":null,"abstract":"Non-volatile (NV) memory is next generation memory. It provides fast access speed comparable to DRAM and also persistently stores data without power supply. These features enable NV memory to be used as both main memory and secondary storage. While the active researches have been conducted on its use for either main memory or secondary storage, they were conducted independently. This paper proposes the integrated memory management methods, by which NV memory can be used as both main memory and secondary storage. The proposed methods use file systems as their basis for NV memory management. Such integration enables the memory allocation for processes and files from the same source, and processes can take advantage of a large amount of physical memory used for both main memory and storage. We implemented the proposed memory management methods in the Linux kernel. The evaluation results performed on a system emulator show that the memory allocation costs of the proposed methods are comparable to that of the existing DRAM and are significantly better than those of the page swapping.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116607196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Conference on Pervasive and Embedded Computing and Communication Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1