The 2010 International Conference on Computer Engineering & Systems最新文献

筛选
英文 中文
Multimedia system verification through a usage model and a black test box 多媒体系统通过使用模型和黑色测试箱进行验证
The 2010 International Conference on Computer Engineering & Systems Pub Date : 2010-12-23 DOI: 10.1109/ICCES.2010.5674849
D. Marijan, N. Teslic, T. Tekcan, V. Pekovic
{"title":"Multimedia system verification through a usage model and a black test box","authors":"D. Marijan, N. Teslic, T. Tekcan, V. Pekovic","doi":"10.1109/ICCES.2010.5674849","DOIUrl":"https://doi.org/10.1109/ICCES.2010.5674849","url":null,"abstract":"This paper presents an automated verification methodology aimed at detecting failures in multimedia systems based on a black box testing approach. Moreover, the verification is performed using a black test box as part of a test harness. The quality of a system is examined against functional failures using a model-based testing approach for generating test scenarios. System under test (specifically, the software of the system) is modeled to represent the most probable system usage. In this way, failures that occur most frequently during system exploitation are detected through the testing. Test case execution is fully automated and test oracle is based on image quality analysis. The proposed framework is primarily intended for detecting software-related failures, but will also detect the failures that result from system hardware defects.","PeriodicalId":124411,"journal":{"name":"The 2010 International Conference on Computer Engineering & Systems","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125442309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Delay based routing for real-time traffic in ad hoc networks 基于延迟的自组织网络实时流量路由
The 2010 International Conference on Computer Engineering & Systems Pub Date : 2010-12-23 DOI: 10.1109/ICCES.2010.5674901
D. Darshana, M. Chatterjee, K. Kwiat
{"title":"Delay based routing for real-time traffic in ad hoc networks","authors":"D. Darshana, M. Chatterjee, K. Kwiat","doi":"10.1109/ICCES.2010.5674901","DOIUrl":"https://doi.org/10.1109/ICCES.2010.5674901","url":null,"abstract":"In this paper, we propose a routing protocol in an ad hoc network that ensures timely delivery of real-time data packets. This is achieved by carefully accessing the resources available to a route before a session is admitted along that route. Each link in the route is checked for sufficient bandwidth not only for the new session to be admitted but also for the sessions that are already using that link. The new session is admitted only if its admission does not violate the delay bounds of any of the on-going sessions. This method of route selection coupled with per-hop link reservations allows us to provide bounds on the delay performance. Extensive simulation experiments are also conducted that demonstrate the performance of the proposed routing protocol in terms of throughput, session blocking probability, average path length and delay.","PeriodicalId":124411,"journal":{"name":"The 2010 International Conference on Computer Engineering & Systems","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115204497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance evaluation of a high throughput crypto coprocessor using VHDL 基于VHDL的高吞吐量加密协处理器性能评估
The 2010 International Conference on Computer Engineering & Systems Pub Date : 2010-12-23 DOI: 10.1109/ICCES.2010.5674859
M. Soliman, Ghada Y. Abozaid
{"title":"Performance evaluation of a high throughput crypto coprocessor using VHDL","authors":"M. Soliman, Ghada Y. Abozaid","doi":"10.1109/ICCES.2010.5674859","DOIUrl":"https://doi.org/10.1109/ICCES.2010.5674859","url":null,"abstract":"FastCrypto is a general-purpose processor extended with a crypto coprocessor for high throughput encrypting/decrypting data. This paper studies the trade-offs between our proposed FastCrypto performance and its design parameters, including the number of stages per round, the number of parallel AES pipelines, and the size of the queues. Besides, it shows the effect of memory latency on the FastCrypto performance. A throughput of 222 Giga bits per second (Gb/s) at 444 MHz can be achieved on four parallel AES pipelines. To reduce the power consumption, the frequency of the parallel AES pipelines is reduced to 100 MHz while the other components are running at 400 MHz. Our results show a FastCrypto performance of 61.725 bits per clock cycle (b/cc) when 128-bit single port L2 cache memory is used. However, increasing the memory bus width to 256-bit or using 128-bit dual port memory, improves the performance to 112.5 b/cc (45 Gb/s at 400 MHz), which presents 88% of the ideal performance (128 b/cc).","PeriodicalId":124411,"journal":{"name":"The 2010 International Conference on Computer Engineering & Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122624330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Back-to-back converters with doubly fed induction generators for wind energy scheme 风力发电方案双馈感应发电机背靠背变流器
The 2010 International Conference on Computer Engineering & Systems Pub Date : 2010-12-23 DOI: 10.1109/ICCES.2010.5674835
A. Sattar, M. Marei, A. Badr
{"title":"Back-to-back converters with doubly fed induction generators for wind energy scheme","authors":"A. Sattar, M. Marei, A. Badr","doi":"10.1109/ICCES.2010.5674835","DOIUrl":"https://doi.org/10.1109/ICCES.2010.5674835","url":null,"abstract":"The paper describes the design of a Doubly Fed Induction Generator (DFIG) connected to the grid through back-to-back converters in the rotor circuit. A vector control oriented with the stator voltage is applied for the grid side converter that is responsible for maintaining the DC link voltage constant regardless of the power flow between the rotor and the grid. A field orientation control with the d-axis aligned with the stator flux is applied for the rotor side converter that is responsible to extract the maximum power from the wind using Maximum Power Point Tracking (MPPT) technique; this is done by decoupling the active and reactive power flow between the stator and the grid. The system is studied under the different wind conditions.","PeriodicalId":124411,"journal":{"name":"The 2010 International Conference on Computer Engineering & Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124249066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
DCT implementation and performance evaluation on a scalable matrix processor 基于可扩展矩阵处理器的DCT实现及性能评价
The 2010 International Conference on Computer Engineering & Systems Pub Date : 2010-12-23 DOI: 10.1109/ICCES.2010.5674882
M. Soliman, A. F. Al-Junaid
{"title":"DCT implementation and performance evaluation on a scalable matrix processor","authors":"M. Soliman, A. F. Al-Junaid","doi":"10.1109/ICCES.2010.5674882","DOIUrl":"https://doi.org/10.1109/ICCES.2010.5674882","url":null,"abstract":"Discrete cosine transform (DCT) is one of the major operations in various image/video compression standards. This paper implements DCT and its inverse (IDCT) on our proposed Mat-Core processor using scalar/vector/matrix instruction sets. Mat-Core extends a general-purpose scalar processor with a matrix unit for processing vector/matrix data. The extended matrix unit is decoupled into two components to hide memory latency: address generation and data computation, which communicate through data queues. The data computation unit is organized in parallel lanes, which can execute scalar-vector, vector-vector, scalar-matrix, vector-matrix, and matrix-matrix instructions. To show the scalability of Mat-Core architecture, the performance of DCT and IDCT are evaluated on Mat-Core with different number of parallel lanes (one, four, and eight lanes). A cycle accurate model of Mat-Core processor is implemented using SystemC (system level modeling language). Our results show performances of 1.5, 5, 6.4 and 14.4 FLOPs/cycle on Mat-Core with single lane and 8-element vector registers, four lanes and 4×4 matrix registers, four lanes and 8×4 matrix registers, and eight lanes and 8×8 matrix registers, respectively. The maximum performance of the Mat-Core processor on DCT and IDCT represents 90% of the ideal value. Moreover, increasing the number of parallel lanes from one to four and then to eight results in speeding up the execution of DCT and IDCT by factors of 4.2 and 9.5, respectively, which indicates the scalability of Mat-Core architecture.","PeriodicalId":124411,"journal":{"name":"The 2010 International Conference on Computer Engineering & Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116490863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of binary voting algorithms for use in fault-tolerant and secure computing 二进制投票算法在容错和安全计算中的应用分析
The 2010 International Conference on Computer Engineering & Systems Pub Date : 2010-12-23 DOI: 10.1109/ICCES.2010.5674867
K. Kwiat, Alan D. Taylor, W. Zwicker, Daniel Hill, Sean Wetzonis, Shangping Ren
{"title":"Analysis of binary voting algorithms for use in fault-tolerant and secure computing","authors":"K. Kwiat, Alan D. Taylor, W. Zwicker, Daniel Hill, Sean Wetzonis, Shangping Ren","doi":"10.1109/ICCES.2010.5674867","DOIUrl":"https://doi.org/10.1109/ICCES.2010.5674867","url":null,"abstract":"We examine three binary voting algorithms used with computer replication for fault tolerance and separately observe the resultant reliability and security. We offer insights to answer the question: Can a voting algorithm provide a system with both security and reliability? We show that while random dictator (i.e., randomly choosing one of the replicas) provides good security and majority rule yields good fault tolerance neither is effective in both. We present the random troika (a subset of 3 replicas) as an effective combination of fault-tolerant and secure computing.","PeriodicalId":124411,"journal":{"name":"The 2010 International Conference on Computer Engineering & Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126442920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Active fault-tolerant control system 主动容错控制系统
The 2010 International Conference on Computer Engineering & Systems Pub Date : 2010-12-23 DOI: 10.1109/ICCES.2010.5674868
Essam Nabil, Abdel-Azem Sobaih, B. Abou-Zalam
{"title":"Active fault-tolerant control system","authors":"Essam Nabil, Abdel-Azem Sobaih, B. Abou-Zalam","doi":"10.1109/ICCES.2010.5674868","DOIUrl":"https://doi.org/10.1109/ICCES.2010.5674868","url":null,"abstract":"In this paper a viable active fault-tolerant control system is provided to accommodate partial actuator and/or sensor faults with graceful degradation of the process performance, a model-based fault detection and isolation (FDI) technique developed with deeper insight into the process behavior by using a set of constrained Kaiman filters, and then estimating the effectiveness factor for the faulty actuator and/or sensor in the presence of system disturbances and random noise. Reconfigurable controller design is developed by combining both singular value decomposition (SVD) principle and eigenstructure assignment technique. The effectiveness of the proposed scheme has justified by Simulation result on the steering subsystem of the Naval Postgraduate School (NPS) UUV with simulated actuator (rudder) failures.","PeriodicalId":124411,"journal":{"name":"The 2010 International Conference on Computer Engineering & Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130436448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Perception of color in 3D Virtual World architectural computer aided design: Impact of color design in student satisfaction 三维虚拟世界建筑计算机辅助设计中的色彩感知:色彩设计对学生满意度的影响
The 2010 International Conference on Computer Engineering & Systems Pub Date : 2010-12-23 DOI: 10.1109/ICCES.2010.5674855
N. Saleeb, Georgios A. Dafoulas
{"title":"Perception of color in 3D Virtual World architectural computer aided design: Impact of color design in student satisfaction","authors":"N. Saleeb, Georgios A. Dafoulas","doi":"10.1109/ICCES.2010.5674855","DOIUrl":"https://doi.org/10.1109/ICCES.2010.5674855","url":null,"abstract":"Interior color design of educational spaces in traditional classrooms has been previously evidenced by research to have an impact on students' enjoyment and achievement from their learning sessions. However scarce research has been dedicated to investigate a comparable effect for interior colors of digitally designed 3D e-learning spaces in 3D Virtual Worlds (utilized as 3D Virtual Learning Environments) on students' satisfaction from their e-learning experiences. This study investigates students' contentment from being immersed in 3D e-learning spaces with a diverse range of colors by ranking the various color hues according to student satisfaction. Hence, this paper aims to shed light and issue recommendations on most and least preferred colors by learners to be used for architectural computer-aided color design of educational spaces in 3D virtual worlds and learning environments in an attempt to initialize guidelines for architectural design of digital educational facilities inside these 3D virtual web applications.","PeriodicalId":124411,"journal":{"name":"The 2010 International Conference on Computer Engineering & Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132804033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Studying the effect of down sampling and spatial interpolation on fractal image compression 研究了下采样和空间插值对分形图像压缩的影响
The 2010 International Conference on Computer Engineering & Systems Pub Date : 2010-12-23 DOI: 10.1109/ICCES.2010.5674885
Ibrahim Ismail, A. Hamdy, Redda Frig
{"title":"Studying the effect of down sampling and spatial interpolation on fractal image compression","authors":"Ibrahim Ismail, A. Hamdy, Redda Frig","doi":"10.1109/ICCES.2010.5674885","DOIUrl":"https://doi.org/10.1109/ICCES.2010.5674885","url":null,"abstract":"This paper presents a study of the effect of resizing the image by using different interpolation methods on fractal image compression. This study is made to reduce the search time of matching between range block and domain block. The main drawback of fractal image compression is that it involves more computational time due to global search. In order to reduce the computational time with acceptable quality of decoded image, the proposed system is composed of four steps. These steps are: down sampling the pixels of an image, fractal image compression, fractal image decompression, and up sampling the pixels to the original size of the image using the same interpolation type that is used in the down sampling process. This paper shows the effect on compression ratio, peak signal to noise ratio, and encoding time. Experimental results show that the encoding time can be decreased and compression ratio becomes higher with acceptable effect on the resolution or PSNR.","PeriodicalId":124411,"journal":{"name":"The 2010 International Conference on Computer Engineering & Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127851970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Accelerated access to visual data in multimedia applications 多媒体应用程序中可视化数据的加速访问
The 2010 International Conference on Computer Engineering & Systems Pub Date : 2010-12-23 DOI: 10.1109/ICCES.2010.5674848
Shereen Afifi, A. Wahba, Abd-Elmoneim Wahdan
{"title":"Accelerated access to visual data in multimedia applications","authors":"Shereen Afifi, A. Wahba, Abd-Elmoneim Wahdan","doi":"10.1109/ICCES.2010.5674848","DOIUrl":"https://doi.org/10.1109/ICCES.2010.5674848","url":null,"abstract":"To meet the MPEG requirements for high data throughput essential for the recent multimedia applications, new data memory organizations are required. In this paper, a scalable memory organization is proposed to accelerate access to randomly rectangular blocks of visual data to be processed as fast as possible. In the proposed design, we load the video frame pixels stored in traditionally linearly addressable memory as a scan-line manner into a two-dimensional accessible memory, which is organized from a × b memory modules in order to access the entire pixels of the block simultaneously, in parallel. So it is more efficient for multiple blocks access to use the 2D data storage than using the traditionally linearly addressable memory. A module assignment function and an address assignment function are proposed to access any aligned or non-aligned block from the memory modules. The proposed design is implemented and mapped onto an FPGA as a case study. Synthesis results indicate that a scalable, cost-effective design is implemented. High performance is achieved, as at reasonably small hardware costs, considerable speedups of up to 20 thousand times can be expected for the hardware implementation versus the software implementation of the proposed memory organization.","PeriodicalId":124411,"journal":{"name":"The 2010 International Conference on Computer Engineering & Systems","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116423617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信