首页 > 最新文献

2010 International Conference on Anti-Counterfeiting, Security and Identification最新文献

英文 中文
Non-coherent detection for orthogonal space-time coded CPM systems 正交空时编码CPM系统的非相干检测
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551353
Wenli Shen, Yanping Yu
A non-coherent detection algorithm was proposed for orthogonal space-time coded multi-level continuous phase modulation (OST-MCPM) transmission systems of two transmit antennas, using a non-coherent maximum likelihood (ML) approach with different lengths of watch window. The noncoherent detection algorithm is suitable for any number of receive antennas and the receiver does not need to estimate the channel state information. Two suboptimal detectors of reduced complexity could be obtained through approximation and decision feedback. Simulation results show that the bit error rate (BER) performance degradation is very small compared with that of the coherent maximum likelihood sequence estimation (MLSE) algorithm over quasi-static flat Rayleigh fading channels and the performance is also satisfying when the watch window length is small enough over fast Rayleigh fading channels.
针对正交空时编码多级连续相位调制(OST-MCPM)双发射天线传输系统,采用不同观测窗长度的非相干极大似然方法,提出了一种非相干检测算法。该非相干检测算法适用于任意数量的接收天线,且不需要估计信道状态信息。通过近似和决策反馈可以得到两个复杂度降低的次优检测器。仿真结果表明,与相干最大似然序列估计(MLSE)算法相比,该算法在准静态平坦瑞利衰落信道上的误码率(BER)性能下降很小;在快速瑞利衰落信道上,当观察窗长度足够小时,该算法的性能也令人满意。
{"title":"Non-coherent detection for orthogonal space-time coded CPM systems","authors":"Wenli Shen, Yanping Yu","doi":"10.1109/ICASID.2010.5551353","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551353","url":null,"abstract":"A non-coherent detection algorithm was proposed for orthogonal space-time coded multi-level continuous phase modulation (OST-MCPM) transmission systems of two transmit antennas, using a non-coherent maximum likelihood (ML) approach with different lengths of watch window. The noncoherent detection algorithm is suitable for any number of receive antennas and the receiver does not need to estimate the channel state information. Two suboptimal detectors of reduced complexity could be obtained through approximation and decision feedback. Simulation results show that the bit error rate (BER) performance degradation is very small compared with that of the coherent maximum likelihood sequence estimation (MLSE) algorithm over quasi-static flat Rayleigh fading channels and the performance is also satisfying when the watch window length is small enough over fast Rayleigh fading channels.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132386766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Call admission control algorithm based on soft-blocking for TD-SCDMA system TD-SCDMA系统中基于软阻塞的呼叫接纳控制算法
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551345
Weichu Zhang, Lianfeng Huang, Zhibin Gao, Yuliang Tang
Call Admission control (CAC) is an important part of radio resource management (RRM) according to certain criteria, CAC determines whether the call is admitted to access or not. CAC is an important means to guarantee the quality of service (QoS) in wireless network. This paper analyses the multi-user detection factor on the uplink load of TD-SCDMA system and the effects of adjacent cell interference theoretically. A CAC algorithm based on the soft-block (SB) is proposed after discussing the shortage of traditional CAC algorithms in TD-SCDMA system in the paper. The simulation results show that the proposed algorithm has a lower blocking rate and call drop rates, and provides a better QoS to access users. At the same time, it has also higher resource utilization.
呼叫允许控制(Call Admission control, CAC)是无线电资源管理(radio resource management, RRM)的重要组成部分,CAC根据一定的标准决定呼叫是否被允许接入。CAC是无线网络中保证服务质量(QoS)的重要手段。本文从理论上分析了多用户检测因素对TD-SCDMA系统上行负载的影响以及相邻小区干扰的影响。针对TD-SCDMA系统中传统CAC算法的不足,提出了一种基于软块(SB)的CAC算法。仿真结果表明,该算法具有较低的阻塞率和掉话率,为接入用户提供了较好的QoS。同时,也具有较高的资源利用率。
{"title":"Call admission control algorithm based on soft-blocking for TD-SCDMA system","authors":"Weichu Zhang, Lianfeng Huang, Zhibin Gao, Yuliang Tang","doi":"10.1109/ICASID.2010.5551345","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551345","url":null,"abstract":"Call Admission control (CAC) is an important part of radio resource management (RRM) according to certain criteria, CAC determines whether the call is admitted to access or not. CAC is an important means to guarantee the quality of service (QoS) in wireless network. This paper analyses the multi-user detection factor on the uplink load of TD-SCDMA system and the effects of adjacent cell interference theoretically. A CAC algorithm based on the soft-block (SB) is proposed after discussing the shortage of traditional CAC algorithms in TD-SCDMA system in the paper. The simulation results show that the proposed algorithm has a lower blocking rate and call drop rates, and provides a better QoS to access users. At the same time, it has also higher resource utilization.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132689263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved algorithm for detecting SYN flooding attacks based on network processor 基于网络处理器的SYN泛洪攻击检测改进算法
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551843
Yuli Fu, Yune Lai
This paper presents an improved algorithm for detecting the SYN flooding attacks. The algorithm is based on the characteristics of the network processor IXP2850's hardware and software framework. It improves the typical method that is based on checking the received SYN segments twice from the same source. The improved algorithm will label the segments first, and then verify them to determine whether an attack happens. By this algorithm, the false alarm rate will decrease and the valid defense measures will be done at the right moment.
提出了一种改进的SYN泛洪攻击检测算法。该算法基于网络处理器IXP2850的硬件和软件框架的特点。它改进了基于对来自同一源的收到的SYN段进行两次检查的典型方法。改进后的算法将首先标记这些段,然后验证它们以确定是否发生攻击。通过该算法,可以降低误报率,并在适当的时刻采取有效的防御措施。
{"title":"An improved algorithm for detecting SYN flooding attacks based on network processor","authors":"Yuli Fu, Yune Lai","doi":"10.1109/ICASID.2010.5551843","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551843","url":null,"abstract":"This paper presents an improved algorithm for detecting the SYN flooding attacks. The algorithm is based on the characteristics of the network processor IXP2850's hardware and software framework. It improves the typical method that is based on checking the received SYN segments twice from the same source. The improved algorithm will label the segments first, and then verify them to determine whether an attack happens. By this algorithm, the false alarm rate will decrease and the valid defense measures will be done at the right moment.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132821743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A full custom half-band filter used for sigma-delta ADC 一个全定制的半带滤波器,用于sigma-delta ADC
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551520
L. Li, Xingfa Huang, Zhou Yu
A low power full custom Half-Band FIR digtal Alter with fixed coefficients used for sigma-delta ADC is presented. The Half-Band FIR digtal filter uses three- stage cascaded strcture and has linear phase and lowpass characteristics. It achieves passband ripple of 0.003dB and stopband attenuation of 82dB, and dissipates only 15mW with a 3V supply based on a 0.35um CMOS process.
提出了一种低功耗全自定义半带固定系数FIR数字转换器,用于sigma-delta ADC。半带FIR数字滤波器采用三级级联结构,具有线性相位和低通特性。它实现了0.003dB的通带纹波和82dB的阻带衰减,并且在基于0.35um CMOS工艺的3V电源下仅耗散15mW。
{"title":"A full custom half-band filter used for sigma-delta ADC","authors":"L. Li, Xingfa Huang, Zhou Yu","doi":"10.1109/ICASID.2010.5551520","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551520","url":null,"abstract":"A low power full custom Half-Band FIR digtal Alter with fixed coefficients used for sigma-delta ADC is presented. The Half-Band FIR digtal filter uses three- stage cascaded strcture and has linear phase and lowpass characteristics. It achieves passband ripple of 0.003dB and stopband attenuation of 82dB, and dissipates only 15mW with a 3V supply based on a 0.35um CMOS process.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131774585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Initialization method for MPSoC MPSoC的初始化方法
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551834
Yousheng Zhao, Ning Hou, Duoli Zhang, Gaoming Du, Li Li, H. Pan
Unlike traditional SoC (System-on-chip) chip, multiprocessor chip that contains multiple independent processors, each processor owns different applications, so we need to make a reasonable multiprocessor chip initialization program. This paper proposes a design for the multiprocessor system initialization. The main contribution is as follows: Firstly, one method for the implementation of multiprocessor system initialization is designed. Once the system is power-up or reset each processor's configuration data will be put to destination place through certain data path. Secondly, it is also an important reference for other types of initialization design of NoC (Network-on-chip) system. The design was successfully implemented on FPGA for an MPSoC system.
与传统的SoC (System-on-chip)芯片不同,多处理器芯片包含多个独立的处理器,每个处理器拥有不同的应用,因此我们需要制定合理的多处理器芯片初始化程序。本文提出了一种多处理机系统初始化的设计方案。主要贡献如下:首先,设计了一种实现多处理器系统初始化的方法。一旦系统上电或复位,每个处理器的配置数据将通过一定的数据路径传送到目的地。其次,对其他类型的片上网络(Network-on-chip)系统初始化设计也具有重要的参考意义。该设计在MPSoC系统的FPGA上成功实现。
{"title":"Initialization method for MPSoC","authors":"Yousheng Zhao, Ning Hou, Duoli Zhang, Gaoming Du, Li Li, H. Pan","doi":"10.1109/ICASID.2010.5551834","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551834","url":null,"abstract":"Unlike traditional SoC (System-on-chip) chip, multiprocessor chip that contains multiple independent processors, each processor owns different applications, so we need to make a reasonable multiprocessor chip initialization program. This paper proposes a design for the multiprocessor system initialization. The main contribution is as follows: Firstly, one method for the implementation of multiprocessor system initialization is designed. Once the system is power-up or reset each processor's configuration data will be put to destination place through certain data path. Secondly, it is also an important reference for other types of initialization design of NoC (Network-on-chip) system. The design was successfully implemented on FPGA for an MPSoC system.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132743402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of Alamouti scheme with joint imperfect transmit antennas selection and power allocation over Rayleigh fading channels Rayleigh衰落信道下联合不完美发射天线选择与功率分配的Alamouti方案性能分析
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551349
Mingjie Zhuang, Qiang Chen, Zijie Lin, Guoxiang Peng
Paper takes the presence of the erroneous channel state information (CSI) into consideration. A three transmit antennas and one receive antenna Alamouti space-time scheme system {3,2; 1} with transmit antennas selection (TAS) is investigated. We assume that channel is an independent and flat Rayleigh fading channel and the system employs Binary Phase-Shift Keying (BPSK) modulation. Considering a solution over order statistic characteristic of the selective channel with CSI feedback error at the transmitter side, three kinds of possible TAS subsets (1,2), (1,3) and (2,3) for {3,2; 1} system are proposed. Combination of transmit power allocation technique and TAS technique, the three accurate analytical expressions of bit-error rate (BER) have been derived. The analysis results show that when the error is existed in CSI we ought to try to choose the subset consisting of largest ordinal number as transmit in a practical system. The numerical results also show that appropriate power allocation for transmit antennas selected can effectively enhance system bit error performance, when the factor k is large enough, such as k≥10, thus the BER performance of subset (1,3) is consistent with (2,3).
本文考虑了错误信道状态信息(CSI)的存在。一个三发射天线和一个接收天线Alamouti时空方案系统{3,2;1}与发射天线选择(TAS)的研究。假设信道为独立的平坦瑞利衰落信道,系统采用二相移键控(BPSK)调制。考虑在发射端存在CSI反馈误差的选择性信道的阶统计量特性的解,对于{3,2}有三种可能的TAS子集(1,2)、(1,3)和(2,3);1}系统。结合发射功率分配技术和TAS技术,导出了三种准确的误码率解析表达式。分析结果表明,当CSI存在误差时,在实际系统中应尽量选择序数最大的子集作为传输。数值结果还表明,选择适当的发射天线功率分配可以有效地提高系统误码性能,当因子k足够大时,如k≥10,则子集(1,3)的误码性能与(2,3)一致。
{"title":"Performance analysis of Alamouti scheme with joint imperfect transmit antennas selection and power allocation over Rayleigh fading channels","authors":"Mingjie Zhuang, Qiang Chen, Zijie Lin, Guoxiang Peng","doi":"10.1109/ICASID.2010.5551349","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551349","url":null,"abstract":"Paper takes the presence of the erroneous channel state information (CSI) into consideration. A three transmit antennas and one receive antenna Alamouti space-time scheme system {3,2; 1} with transmit antennas selection (TAS) is investigated. We assume that channel is an independent and flat Rayleigh fading channel and the system employs Binary Phase-Shift Keying (BPSK) modulation. Considering a solution over order statistic characteristic of the selective channel with CSI feedback error at the transmitter side, three kinds of possible TAS subsets (1,2), (1,3) and (2,3) for {3,2; 1} system are proposed. Combination of transmit power allocation technique and TAS technique, the three accurate analytical expressions of bit-error rate (BER) have been derived. The analysis results show that when the error is existed in CSI we ought to try to choose the subset consisting of largest ordinal number as transmit in a practical system. The numerical results also show that appropriate power allocation for transmit antennas selected can effectively enhance system bit error performance, when the factor k is large enough, such as k≥10, thus the BER performance of subset (1,3) is consistent with (2,3).","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131404545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Semantic web service matchmaking based on service behavior 基于服务行为的语义web服务匹配
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551505
Yang Zhang, Xiangtao Zhang, Fagui Liu
Service-Oriented Computing (SOC) is emerging as a new promising computing paradigm. Web service discovery is one of the key issues in SOC. Web service discovery usually provide UDDI as a standard registry which features only keyword-based matches that often give poor performance. Currently approaches for semantic service discovery are mostly limited to the matching of their inputs/outputs possibly enhanced with some ontological knowledge. Recent works have demonstrated that this approach is not sufficient to discover relevant services. In this paper, we argue that in many situations, the service discovery should be based on the specification of service behavior. The idea behind this is to develop matching techniques that operates on behavior models and allow delivery of partial matches. We give the relative definition of our formal model based on Petri nets and WF-nets and propose the transformation from the OWL-S process model into a formal model we defined. And then we define behavior equivalence notion based on our formal model and detail the semantic web service matchmaking algorithm based on that notion.
面向服务的计算(SOC)作为一种新的计算范式正在兴起。Web服务发现是SOC中的关键问题之一。Web服务发现通常将UDDI作为标准注册中心提供,该注册中心只提供基于关键字的匹配,通常性能较差。目前语义服务发现的方法大多局限于输入/输出的匹配,可能会通过一些本体论知识得到增强。最近的研究表明,这种方法不足以发现相关服务。在本文中,我们认为在许多情况下,服务发现应该基于服务行为的规范。这背后的想法是开发在行为模型上操作的匹配技术,并允许提供部分匹配。我们给出了基于Petri网和wf网的形式模型的相对定义,并提出了将OWL-S过程模型转换为我们定义的形式模型的方法。在此基础上定义了行为等价的概念,并详细介绍了基于该概念的语义web服务匹配算法。
{"title":"Semantic web service matchmaking based on service behavior","authors":"Yang Zhang, Xiangtao Zhang, Fagui Liu","doi":"10.1109/ICASID.2010.5551505","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551505","url":null,"abstract":"Service-Oriented Computing (SOC) is emerging as a new promising computing paradigm. Web service discovery is one of the key issues in SOC. Web service discovery usually provide UDDI as a standard registry which features only keyword-based matches that often give poor performance. Currently approaches for semantic service discovery are mostly limited to the matching of their inputs/outputs possibly enhanced with some ontological knowledge. Recent works have demonstrated that this approach is not sufficient to discover relevant services. In this paper, we argue that in many situations, the service discovery should be based on the specification of service behavior. The idea behind this is to develop matching techniques that operates on behavior models and allow delivery of partial matches. We give the relative definition of our formal model based on Petri nets and WF-nets and propose the transformation from the OWL-S process model into a formal model we defined. And then we define behavior equivalence notion based on our formal model and detail the semantic web service matchmaking algorithm based on that notion.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133576888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Homogeneous Markov source information entropy proof based on C-K equation 基于C-K方程的齐次马尔可夫源信息熵证明
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551511
Dexin Li
This article proposes a methodology on how to justify homogeneous Markov source information entropy based on Chapman-Kolmogorov equation. According to the ergodic theorem, a new proof methodology is proposed in this article, which is different from the basis on properties of information entropy.
本文提出了一种基于Chapman-Kolmogorov方程的齐次马尔可夫源信息熵证明方法。本文根据遍历定理,提出了一种不同于基于信息熵性质的新的证明方法。
{"title":"Homogeneous Markov source information entropy proof based on C-K equation","authors":"Dexin Li","doi":"10.1109/ICASID.2010.5551511","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551511","url":null,"abstract":"This article proposes a methodology on how to justify homogeneous Markov source information entropy based on Chapman-Kolmogorov equation. According to the ergodic theorem, a new proof methodology is proposed in this article, which is different from the basis on properties of information entropy.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114366443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FPGA prototype design of the computation nodes in a cluster based MPSoC 基于集群的MPSoC计算节点的FPGA原型设计
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551836
Xin Jin, Y. Song, Duoli Zhang
With the improved performance of SoC for real-time application, more and more processing cores have been integrated into one chip, which is called MPSoC. One of the key problems is how to design the MPSoC architecture to improve the overall performance. In this paper, a cluster-based MPSoC using hierarchical on-chip communication is proposed. In the top level, on-chip network is used as the communication backbone for various clusters. In the cluster level, processing cores and IPs communicate with each others via a hierarchical bus. This paper focuses on the design and verification problems of computation cluster, which consists of several RISC processors and storage components. Separate control path and data path are designed to meet the performance requirements. The proposed architecture is implemented into a FPGA prototype. And a video application is mapped on the prototype to verify the functionality. Experiments show that the proposed MPSoC can work at 90 MHz and successfully accomplish real-time fade-in-fade-out processing of 4 lane videos which are 320⋆240 and 24 frames per second.
随着SoC的实时应用性能的提高,越来越多的处理核心被集成到一个芯片上,这种芯片被称为MPSoC。其中一个关键问题是如何设计MPSoC架构以提高整体性能。本文提出了一种基于集群的多级片上通信MPSoC。在顶层,片上网络被用作各种集群的通信骨干。在集群级别,处理内核和ip通过分层总线相互通信。本文重点研究了由多个RISC处理器和存储组件组成的计算集群的设计和验证问题。独立的控制路径和数据路径设计,以满足性能要求。提出的架构在FPGA原型中实现。并将视频应用程序映射到原型上以验证其功能。实验表明,所提出的MPSoC可以工作在90 MHz的频率下,成功地完成了320 - 240帧/秒、24帧/秒的4通道视频的实时淡出处理。
{"title":"FPGA prototype design of the computation nodes in a cluster based MPSoC","authors":"Xin Jin, Y. Song, Duoli Zhang","doi":"10.1109/ICASID.2010.5551836","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551836","url":null,"abstract":"With the improved performance of SoC for real-time application, more and more processing cores have been integrated into one chip, which is called MPSoC. One of the key problems is how to design the MPSoC architecture to improve the overall performance. In this paper, a cluster-based MPSoC using hierarchical on-chip communication is proposed. In the top level, on-chip network is used as the communication backbone for various clusters. In the cluster level, processing cores and IPs communicate with each others via a hierarchical bus. This paper focuses on the design and verification problems of computation cluster, which consists of several RISC processors and storage components. Separate control path and data path are designed to meet the performance requirements. The proposed architecture is implemented into a FPGA prototype. And a video application is mapped on the prototype to verify the functionality. Experiments show that the proposed MPSoC can work at 90 MHz and successfully accomplish real-time fade-in-fade-out processing of 4 lane videos which are 320⋆240 and 24 frames per second.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115406398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Implementation of data compression algorithm based on SILAB 基于SILAB的数据压缩算法实现
Pub Date : 2010-07-18 DOI: 10.1109/ICASID.2010.5551508
Lei Wang, Xiaoyao Xie
In this paper through analyzing the characteristics of the history data in bridge safety monitoring system, we explain the importance and features of process data compression. The theory of SDT and improved SDT have been introduced in this paper, analyzing the performances of the algorithm and simulation used by SILAB have been given in this paper. By comparing the performance of the two algorithms, we could possibly use the improved SDT to compress the recorded data of the bridge safety monitoring system.
本文通过分析桥梁安全监测系统中历史数据的特点,说明过程数据压缩的重要性和特点。本文介绍了SDT和改进SDT的原理,分析了算法的性能,并在SILAB上进行了仿真。通过比较两种算法的性能,我们可以利用改进的SDT算法对桥梁安全监测系统的记录数据进行压缩。
{"title":"Implementation of data compression algorithm based on SILAB","authors":"Lei Wang, Xiaoyao Xie","doi":"10.1109/ICASID.2010.5551508","DOIUrl":"https://doi.org/10.1109/ICASID.2010.5551508","url":null,"abstract":"In this paper through analyzing the characteristics of the history data in bridge safety monitoring system, we explain the importance and features of process data compression. The theory of SDT and improved SDT have been introduced in this paper, analyzing the performances of the algorithm and simulation used by SILAB have been given in this paper. By comparing the performance of the two algorithms, we could possibly use the improved SDT to compress the recorded data of the bridge safety monitoring system.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124903348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2010 International Conference on Anti-Counterfeiting, Security and Identification
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1