2008 International Conference on Embedded Software and Systems最新文献

筛选
英文 中文
Wavelet Neural Network Approach for Dynamic Power Management in Wireless Sensor Networks 无线传感器网络动态电源管理的小波神经网络方法
2008 International Conference on Embedded Software and Systems Pub Date : 2008-07-29 DOI: 10.1109/ICESS.2008.36
Yan Shen, Xunbo Li
{"title":"Wavelet Neural Network Approach for Dynamic Power Management in Wireless Sensor Networks","authors":"Yan Shen, Xunbo Li","doi":"10.1109/ICESS.2008.36","DOIUrl":"https://doi.org/10.1109/ICESS.2008.36","url":null,"abstract":"Energy is a limited resource in wireless sensor networks. The reduction of energy consumption is crucial to prolong the lifetime of wireless sensor networks. Dynamic power management (DPM), which is to reduce power dissipation by putting the sensor node into different states, should be carefully taken into account in wireless sensor networks. In this paper, a new method of DPM is proposed. In this method, the next eventpsilas time which is a non-stationary series is predicted as accurate as possible by wavelet neural networks. Nodes in deeper sleep states consume lower energy while asleep, but incur a longer delay and higher energy cost to awaken. So the nodes state is decided to move through the predictable time associated with the threshold time and residual power. The simulation results show that the energy consumption is significantly reduced and the whole lifetime of the wireless sensor networks is greatly prolonged with the proposed method.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121638187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
The Fuzzy Integrated Evaluation of Embedded System Security 嵌入式系统安全性的模糊综合评价
2008 International Conference on Embedded Software and Systems Pub Date : 2008-07-29 DOI: 10.1109/ICESS.2008.49
Shaolong Zhang, N. Zhou, Jiaxin Wu
{"title":"The Fuzzy Integrated Evaluation of Embedded System Security","authors":"Shaolong Zhang, N. Zhou, Jiaxin Wu","doi":"10.1109/ICESS.2008.49","DOIUrl":"https://doi.org/10.1109/ICESS.2008.49","url":null,"abstract":"Today, the embedded systems field is growing rapidly, ranging from low-end systems such as cellular phones, PDAs, smart cards to high-end systems such as gateways, firewalls, storage servers, and web server. Security of embedded system becomes a paramount issue in embedded system design. Compared to an embedded system's functionality and other design metric (e.g., area, performance, power), security is currently specified by system architects in a vague and imprecise manner. This paper proposes a fuzzy integrated security evaluation method based on man-computer combined data collection and fuzzy expert evaluation in Delphi method. The method could reduce the subjectivity of expert evaluation and alleviate the difficulty of data collection and makes possible a better combination of qualitative and quantitative evaluations. Firstly, the hierarchy structure model of embedded system security is constructed. Secondly, according to data collected and the evaluation comment of each expert, the subjection degree matrix is constructed. Finally, a new concept of ldquodegree of assurancerdquo is presented for the quantificational evaluation of embedded system security. In this paper a study of a wireless biometric authentication device is also shown. The case illustrates that the method can be easily used and its results conform to the actual situation.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114559564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Real-Time Reference-Free Video Quality Measurement for Multimedia Communication 面向多媒体通信的实时无参考视频质量测量
2008 International Conference on Embedded Software and Systems Pub Date : 2008-07-29 DOI: 10.1109/ICESS.2008.42
Xingang Liu, Kook-Yeol Yoo
{"title":"Real-Time Reference-Free Video Quality Measurement for Multimedia Communication","authors":"Xingang Liu, Kook-Yeol Yoo","doi":"10.1109/ICESS.2008.42","DOIUrl":"https://doi.org/10.1109/ICESS.2008.42","url":null,"abstract":"In this paper, we proposed a reference-free (RF) objective measurement algorithm for the digital video signals of multimedia communication. With the statistical analysis, we utilized the important feature vectors (FVs) which have high relationships with the subjective perceptual quality of digital video sequences. After considering the fundamentality and force of these FVs, we combined them with different weighted coefficients to build an ideal video quality measurement algorithm. With our simulation results, the proposed method exhibits its significant function for video quality measurement (VQM). It can give a high correlation with the subjective perceptual video quality score. And because of its low computational complexity, it can be used to the real-time multimedia communication systems.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132705685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy-aware Mapping for Tree-based NoC Architectures by Recursive Bipartitioning 基于递归双分区的树状NoC体系结构能量感知映射
2008 International Conference on Embedded Software and Systems Pub Date : 2008-07-29 DOI: 10.1109/ICESS.2008.50
Zhengwei Chang, Guang-ze Xiong, Nan Sang
{"title":"Energy-aware Mapping for Tree-based NoC Architectures by Recursive Bipartitioning","authors":"Zhengwei Chang, Guang-ze Xiong, Nan Sang","doi":"10.1109/ICESS.2008.50","DOIUrl":"https://doi.org/10.1109/ICESS.2008.50","url":null,"abstract":"In this paper, we present an approach to map intellectual property (IP) cores onto tree based network-on-chip (NoC) architecture such that the total communication energy is minimized. We first formulate the problem of energy-aware mapping, and then propose a recursive bipartitioning algorithm to solve it. The proposed technique is an efficient divide-and-conquer approach, based on the Kernighan-Lin mincut bisection heuristic. Experimental results show that the recursive bipartitioning method is very fast and effective, so it is suited to both quick design space exploration and producing excellent results.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131173899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic Compilation Framework with DVS for Reducing Energy Consumption in Embedded Processors 基于分布式交换机的嵌入式处理器动态编译框架
2008 International Conference on Embedded Software and Systems Pub Date : 2008-07-29 DOI: 10.1109/ICESS.2008.47
Qingsong Shi, Tianzhou Chen, X. Liang, Jiangwei Huang
{"title":"Dynamic Compilation Framework with DVS for Reducing Energy Consumption in Embedded Processors","authors":"Qingsong Shi, Tianzhou Chen, X. Liang, Jiangwei Huang","doi":"10.1109/ICESS.2008.47","DOIUrl":"https://doi.org/10.1109/ICESS.2008.47","url":null,"abstract":"Dynamic voltage scaling (DVS) is an effective technique for reducing the energy consumption in embedded systems. There are several advantages using DVS technique into compiler framework. This paper present a framework for reducing energy consumption in embedded processors using the dynamic compiler collaborate with DVS technique. Two algorithms are implemented in this framework, and the framework is implemented using the Intel PIN systems and is deployed in a real hardware platform. Experimental results based on the software and hardware platform, show that significant energy saving are achieved while performance loss less than 5%.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116259307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A New Clustering Algorithm Based on the Optimum One-Hop Distance in Wireless Sensor Networks 基于最优一跳距离的无线传感器网络聚类算法
2008 International Conference on Embedded Software and Systems Pub Date : 2008-07-29 DOI: 10.1109/ICESS.2008.6
Min Xiang, Weiren Shi, Xiaohui Zhang, Zhiyong Luo, Xia Yang
{"title":"A New Clustering Algorithm Based on the Optimum One-Hop Distance in Wireless Sensor Networks","authors":"Min Xiang, Weiren Shi, Xiaohui Zhang, Zhiyong Luo, Xia Yang","doi":"10.1109/ICESS.2008.6","DOIUrl":"https://doi.org/10.1109/ICESS.2008.6","url":null,"abstract":"It is very important to maximize the lifetime of wireless sensor networks (WSN) operated on limited power. In order to improve the energy efficiency and prolong the network lifetime, a new clustering algorithm based on the optimum one-hop distance is presented. The relationship among the energy consumption, the device electronic energy and the one-hop transmission distance is analyzed, and then the inverse ratio of the energy consumption increment to the cube of the optimal one-hop distance is gained. So, the clustering algorithm based on the optimal one-hop distance is given to reduce energy consumption. All sensor nodes are divided into different static clusters based on the optimum one-hop distance, and the distance between the fore-and-aft adjacent cluster heads equals or approximates to the optimum one-hop distance, which reduces the energy consumption for inter-cluster communication. At the same time, cluster head acts continuously as local control center and will not be replaced by the candidate cluster head until it almost exhausts its energy supply, which can lessen energy consumption for establishing the new cluster head. Finally, the simulation results demonstrate that the algorithm achieves good effect to prolonging the system lifetime.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129729793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks 一种有效且可验证的无线传感器网络隐藏数据聚合方案
2008 International Conference on Embedded Software and Systems Pub Date : 2008-07-29 DOI: 10.1109/ICESS.2008.9
Hung-Min Sun, Yue-Hsun Lin, Ying-Chu Hsiao, Chien‐Ming Chen
{"title":"An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks","authors":"Hung-Min Sun, Yue-Hsun Lin, Ying-Chu Hsiao, Chien‐Ming Chen","doi":"10.1109/ICESS.2008.9","DOIUrl":"https://doi.org/10.1109/ICESS.2008.9","url":null,"abstract":"Data aggregation is one of the most important techniques in wireless sensor networks to save energy through reducing lots of transmission. However, plaintext aggregation is insecure since eavesdropping or modifying messages is possible. Due to this, concealed data aggregation schemes based on homomorphic encryption have been proposed. Ciphertexts can be operated algebraic computations without decryption in those schemes. Unfortunately, they only provide data confidentiality. While compromising secret in captured sensor nodes, an adversary can still create forged ciphertexts. In this paper, we combines Boneh et al.'s aggregate signature scheme and Mykletun et al.'s concealed data aggregation scheme to overcome the above problems. The proposed scheme aggregates not only ciphertexts but also signatures. Through verifying aggregated signature, data integrity of each plaintext can be guaranteed. Furthermore, the communication overhead for each cluster head is still constant. Each cluster head sends an aggregated signature and an aggregated ciphertext to the base station. For resource constrained environment, the proposed scheme is secure and efficient practically.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131000300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
SDTV Quality Assessment Using Energy Distribution of DCT Coefficients 基于DCT系数能量分布的SDTV质量评价
2008 International Conference on Embedded Software and Systems Pub Date : 2008-07-29 DOI: 10.1109/ICESS.2008.80
Young-Jung Choi, Ha-Joong Park, Xingang Liu, Kook-Yeol Yoo, Ho-Youl Jung
{"title":"SDTV Quality Assessment Using Energy Distribution of DCT Coefficients","authors":"Young-Jung Choi, Ha-Joong Park, Xingang Liu, Kook-Yeol Yoo, Ho-Youl Jung","doi":"10.1109/ICESS.2008.80","DOIUrl":"https://doi.org/10.1109/ICESS.2008.80","url":null,"abstract":"The VQM (Video Quality Measurement) scheme is a methodology that measures the difference of quality between the distorted video signal and the reference video signal. In this paper, we propose a novel video quality measurement method that extracts features in DCT (Discrete Cosine Transform) domain of H.263 SDTV. Main idea of the proposed method is to utilize the texture pattern and edge oriented information that is generated in DCT domain. For this purpose, the energy distribution of the reodered DCT coefficients is considered to obtain unique information of each video file. Then, we measure the difference of probability distribution of context information between original video and distorded one. The simulation results show that the proposed algorithm can represent correctly the video quality and give a high correlation with the video DMOS.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123561389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation of H.264 on TMS320DM642 H.264在TMS320DM642上的实现
2008 International Conference on Embedded Software and Systems Pub Date : 2008-07-29 DOI: 10.1109/ICESS.2008.56
Hui Liu, Ruchao Xu, Zhi Liu
{"title":"Implementation of H.264 on TMS320DM642","authors":"Hui Liu, Ruchao Xu, Zhi Liu","doi":"10.1109/ICESS.2008.56","DOIUrl":"https://doi.org/10.1109/ICESS.2008.56","url":null,"abstract":"H.264/AVC is the newest video standard to resolve the efficient transmission of video data. Compared to previous generations, it delivers better quality at lower bit rates. However, its computational complexity increases almost exponentially, which is still a problem and has motivated much research into H.264 real-time codec both in industry and academia. H.264 baseline real-time video decoder implementation based on TMS320DM642 and JM86 test code is described in this paper. Firstly, the structure of JM86 is rearranged into three parallel tasks using BIOS multithreading technology. Then, the data structure is redesigned to make full use of the DSP memory and to improve the addressing capability of array and pointer. Finally, lots of time-consuming functions of JM86 are rewritten with assembly language. The system highly speeded up the decoding while maintaining the quality as well. For video sequence of D1 format, the decoding speed reached 25 frames per-second and for CIF format, it reached 60 frames per-second.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132734995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design of Multiple-Tau Photon Correlation System Implemented by FPGA FPGA实现的多tau光子相关系统设计
2008 International Conference on Embedded Software and Systems Pub Date : 2008-07-29 DOI: 10.1109/ICESS.2008.7
W. Liu, Jin Shen, Xianming Sun
{"title":"Design of Multiple-Tau Photon Correlation System Implemented by FPGA","authors":"W. Liu, Jin Shen, Xianming Sun","doi":"10.1109/ICESS.2008.7","DOIUrl":"https://doi.org/10.1109/ICESS.2008.7","url":null,"abstract":"The photon correlation spectroscopy (PCS) experiment can measure the distribution of particle sizes by measuring dynamic fluctuations of intensity of scattered light. A way to analyse particle sizes from PCS is to calculate the auto-correlation function of the detected intensity. In order to get accurate result, we need a photon correlator with small sampling time and large-scale dynamic range. This paper presents not only a linear photon correlator but also a multiple-tau correlator implemented by high performance Xilinx field programmable gate array (FPGA). In the photon correlator, the works of counting, delaying, multiplying and accumulating are all completed in one FPGA chip. The Verilog-HDL is adopted in the design of FPGA modules. Experimental results indicate that this correlator can be applied in the analysing of ultra-fine particle sizing.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131850646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信