{"title":"Dynamic Configurable Floating-Point FFT Pipelines and Hybrid-Mode CORDIC on FPGA","authors":"Jie Zhou, Yazhuo Dong, Y. Dou, Yuanwu Lei","doi":"10.1109/ICESS.2008.95","DOIUrl":"https://doi.org/10.1109/ICESS.2008.95","url":null,"abstract":"Floating-point fast Fourier transform (FFT) processor and coordinate rotation digital computer (CORDIC) element play important roles in communication and radar applications. But even with the rapid development of large-scale integrated circuit, it is usually impractical to implement these floating-point computations on FPGA, as they will consume a large amount of chip resources. In this paper, a compact SAR processor, composed of four 1D FFT-PEs (processing elements) and a CORDIC co-processor, is implemented on FPGA. In particular, a dynamic configurable pipeline is used in FFT-PE to reduce the area consumption through reusing floating-point units. And the 32-bit floating-point hybrid-mode CORDIC co-processor is implemented to generate compensation factors and compute transcendental functions in SAR image visualization phase. Experimental results show that our SAR processor performs well both in area and latency. It consumes about 40% of LUTs and DSPs, and about 48% of memory bits on a StratixII FPGA. Moreover, 32-bit floating-point hybrid-mode CORDIC co-processor only occupies about 2.6% LUTs and Registers of Virtex5 and achieves a clock frequency of 217 MHz. Regarding the latency, it takes 1232.6 ms to transform the SAR raw data of 4K*4K into a visible image of 256 grey levels and can meet the real-time requirement.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"259 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134192022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Object Tracking Using an Improved Kernel Method","authors":"Yuan Chen, Shengsheng Yu, Weiping Sun, Xiaoping Chen","doi":"10.1109/ICESS.2008.64","DOIUrl":"https://doi.org/10.1109/ICESS.2008.64","url":null,"abstract":"An improved object tracking scheme is presented based on the Kalman filter and mean-shift approach. And this scheme is robust to disturbance and occlusion of both the object and the scene. The object is selected by using FG/BG detection and represented by its center point and probability distribution. The mean-shift approach estimates the object position based on the result of the Kalman filter. A threshold of the Bhattacharyya coefficient is set to judge occlusion and when object being occluded the Kalman filter estimates the object position. Since the proposed scheme combines the space information with probability distribution, it is robust to disturbance and occlusion.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133776470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks","authors":"Hongjun Dai, Zhiping Jia, Xiaona Dong","doi":"10.1109/ICESS.2008.31","DOIUrl":"https://doi.org/10.1109/ICESS.2008.31","url":null,"abstract":"Wireless sensor networks are hard to be stable and vulnerable to various attacks, so it's a need to find the mechanisms to evaluate trustworthiness with trusted computing theories. In this paper, a novel entropy-based trust modeling and evaluation methods for WSNs are carried out to give the stability and security descriptions. With the experiments, it is proved that they can be used to detect the malicious nodes, to estimate the effect and the performance of WSN.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114516731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Aggregation with Multiple Spanning Trees in Wireless Sensor Networks","authors":"Chuliang Weng, Minglu Li, Xinda Lu","doi":"10.1109/ICESS.2008.79","DOIUrl":"https://doi.org/10.1109/ICESS.2008.79","url":null,"abstract":"In wireless sensor networks, the data aggregation is an essential paradigm for routing, through which the multiple data from different sensors can be aggregated into a single data at intermedial nodes enroute, in order to eliminate data redundancy and achieve the goal of saving energy. Some existed medium access protocols and algorithms can effectively prolong the lifetime of the sensor network by determining when each sensor should transmit its data, and when it should sleep. In this paper, we focus on applying multiple spanning trees to organize the data aggregation, which is different from these existed single spanning tree methods. At first, the problem of constructing multiple spanning trees is transformed into a linear programming problem of the data flow network. Based on the solved optimal rate between the two adjacent sensors, the two constructing algorithms of the spanning tree are presented. Experimental results indicate that the method of multiple spanning trees can be of benefit to energy saving for wireless sensor networks, and the corresponding appropriate constructing algorithm can prolong the lifetime of the sensor network.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127467592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Kawashima, Jianhua Ma, B. Apduhan, Runhe Huang, Chunming Rong
{"title":"A System Prototype with Multiple Robots for Finding u-Objects in a Smart Space","authors":"T. Kawashima, Jianhua Ma, B. Apduhan, Runhe Huang, Chunming Rong","doi":"10.1109/ICESS.2008.72","DOIUrl":"https://doi.org/10.1109/ICESS.2008.72","url":null,"abstract":"A smart space that can offer automatic services mainly relies on sensing devices to acquire contextual information, and on actuation devices to take responsive actions. Because such devices are usually fixed in some locations in the physical environment and canpsilat move by themselves, they can only sense information or act only in specific locations/directions. Different from these devices, are robots which can carry sensors and/or actuators, and are capable of moving from one location to another in a space. Because of their capability to move, robots can therefore be utilized to add flexible location-related service functions to smart spaces. To realize these new functions, robots must collaboratively work with a smart space manager and other devices/u-objects in the space. This paper presents the design and development of a system prototype with multiple robots with focus on how to manage the multiple robots and their collaborative work in finding RFID tagged u-objects in a smart room. Some experiments have been conducted and the result verifies and evaluates the aforementioned functionalities.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131331312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing a New Real-Time Kernel with a Hybrid Scheduler","authors":"Qiang Huang, Xiaofeng Liang, Weihua Xu","doi":"10.1109/ICESS.2008.41","DOIUrl":"https://doi.org/10.1109/ICESS.2008.41","url":null,"abstract":"Traditional embedded systems employ a time-triggered scheduler or an event-triggered scheduler, however, the truth is that time-triggered scheduling architecture is more dependable but lack of responsiveness to external events and event-triggered scheduling architecture is responsive. In order to get those advantages at the same time, a real-time kernel with a hybrid scheduler, named SinewOS, is developed. In SinewOS time-triggered scheduling and event-triggered scheduling are employed and in order to make this kernel more predictable and high efficient, then cooperative and preemptive scheduling approaches are adopted. The features and the implementation of SinewOS are described in detail. This new kernel has been successfully implemented on LPC2129. And to evaluate the performance of an embedded system employing SinewOS, a testing case is carried out with a simulation, which is a hardware-in-the-loop simulator and based on an adaptive cruise control system (ACCS) platform.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129282344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Proxy Blind Signature Scheme Based on DLP","authors":"Xuan Yang, Zhaoping Yu","doi":"10.1109/ICESS.2008.25","DOIUrl":"https://doi.org/10.1109/ICESS.2008.25","url":null,"abstract":"Proxy blind signature, which combines the properties of both proxy signature and blind signature, is useful in many applications. In this paper, we present a new proxy blind signature scheme based on discrete logarithm problem, which satisfies the secure properties of both the blind signature scheme and the proxy signature scheme. As compared with existing typical schemes, our scheme is more efficient.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125461203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhenghua Shu, Shengqian Wang, Chengzhi Deng, Guodon Liu, Lin Zhang
{"title":"Watermarking Algorithm based on Contourlet Transform and Human Visual Model","authors":"Zhenghua Shu, Shengqian Wang, Chengzhi Deng, Guodon Liu, Lin Zhang","doi":"10.1109/ICESS.2008.52","DOIUrl":"https://doi.org/10.1109/ICESS.2008.52","url":null,"abstract":"The translation-invariant circular symmetric contourlet transform (TICSCT) is a multiscale, multi direction and shift-invariant over complete transform. The paper proposes a blind watermarking algorithm in the TICSCT domain. A simple but effective human visual model in TICSCT domain is described. By modelling watermarking as a communication process. The experimentations show that this domain has higher capacity than the wavelet (include complex wavelet and real wavelet) and spatial domains. Watermarking algorithm based on TICSCT improves the robustness of watermark at Gaussian white noise attack. Hence that TICSCT provide a potentially good domain for watermarking.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126433307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signal Processing and Accelerometer-based Design for Portable Small Displacement Measurement Device","authors":"R. Liu, Ming Liu, Xiaokun Sun, Yawen Wei","doi":"10.1109/ICESS.2008.65","DOIUrl":"https://doi.org/10.1109/ICESS.2008.65","url":null,"abstract":"A portable accelerometer-based device which used to detect small displacement is designed, and a novel method of acceleration signal processing for small displacement measurement is provided. The system consists of a low-cost tri-axial accelerometer, a microprocessor, and a wireless data transfer module. Accelerometer is sensitive to noise so that it is essential to design a Butterworth low-pass infinite impulse response digital filter for denoising. After signal processing, small displacement calculation method is used to obtain movement detection and estimation. Our experiments show that the method of signal processing for the accelerometer embedded in portable devices is effective, and the portable accelerometer-based device can be used to get small displacement of measured object.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122220741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shuang Zhao, W. Lu, Chao Lu, Xiaofang Zhou, Dian Zhou, G. Sobelman
{"title":"An Efficient Multi-protocol RFID Interrogator Baseband Processor based on a Reconfigurable Architecture","authors":"Shuang Zhao, W. Lu, Chao Lu, Xiaofang Zhou, Dian Zhou, G. Sobelman","doi":"10.1109/ICESS.2008.61","DOIUrl":"https://doi.org/10.1109/ICESS.2008.61","url":null,"abstract":"With the continued development of RFID technology, a large number of RFID tags are being deployed having different protocols. Hence, a multiprotocol interrogator which can support all of these alternatives has become a design requirement for many systems. While multifunction capability may be implemented using a high performance DSP, CPU or FPGA, those solutions have a large area cost, so an innovative architecture is needed. Starting from an analysis of the algorithms in RFID systems, we propose a reconfigurable architecture for baseband processing to realize the various protocols in the ISO18000 standard. The structure has been specifically designed to support all of the functions needed, so that it performs very efficiently with low area cost. This design has been post-layout simulated with a clock frequency of up to 83 MHz, and the core area is 4 mm2 in a UMC 0.18 mum CMOS process. Compared with other existing processors, the proposed architecture is much more efficient for this application area.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114097202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}