We provide an experience report of the deployment and maintenance of urban computing infrastructure called UBI-hotspot. It is effectively a large interactive public display embedded with other computing resources such...
详细信息
Cloud computing enables organizations to realize the commercial benefits while facing the new security issues. In this paper, we presents a security model for called the Trusted Private Virtual Datacenter (TVPDc) that...
详细信息
ISBN:
(纸本)9780769548524;9781467330930
Cloud computing enables organizations to realize the commercial benefits while facing the new security issues. In this paper, we presents a security model for called the Trusted Private Virtual Datacenter (TVPDc) that offering centralized security management of the computing and storage resources distributed in different locations and physical machines within an IaaS cloud. the TVPDc model can satisfy the need of the organizations for privacy protection and data integrity guarantees and enhances the system management capabilities in virtualized environments.
Nowadays, withthe development of high-performance computing, heterogeneous computing system has become a trend. this paper designs an CPU+FPGA heterogeneous accelerated processing system that uses embedded ARM and FP...
详细信息
ISBN:
(纸本)9781665413992
Nowadays, withthe development of high-performance computing, heterogeneous computing system has become a trend. this paper designs an CPU+FPGA heterogeneous accelerated processing system that uses embedded ARM and FPGA to communicate via PCIe bus. the system mainly uses the Jetson TX2 ARM development board, the development board and FPGA board are connected via PCIe, and High-Level Synthesis (HLS) method is used to transplant the implemented algorithms needed in the project to the FPGA. the focus of this article is: how to use XDMA IP core to connect FPGA and ARM processor through PCIe bus, and how to use HLS to generate IP core. the article completed the architecture design, analyzed the working mechanism of the XDMA kernel module in the Linux system, and analyzed the system bandwidth and delay.
In 1997, we published a high performance scalable bit-rate-oriented wavelet image codec, Significance Linked Connected Component Analysis (SLCCA). In term of coding efficiency, SLCCA outperforms EZW, SPHIT and JPEG200...
详细信息
ISBN:
(纸本)0780379659
In 1997, we published a high performance scalable bit-rate-oriented wavelet image codec, Significance Linked Connected Component Analysis (SLCCA). In term of coding efficiency, SLCCA outperforms EZW, SPHIT and JPEG2000, which are each an embedded image codec. SLCCA is optimized for any given bit rate. Although scalable, its coded bit stream is not fully embedded. In the paper, we provide an embedded SLCCA, which improves our previous work[1] on embedded SLCCA. Like[1], we define a base layer and an enhancement layer for an image. the base layer encoded by SLCCA provides an acceptable image quality while achieving high coding efficiency and scalability. the enhancement layer provides more elaborate bit-rate adaptive granular picture quality enhancement for embedded image coding. the Peak Signal to Noise Ratio (PSNR) of the new embedded SLCCA (called ESLCCA) consistently outperforms JPEG2000 that can be as high as 0.5 dB.
embedded systems must be high quality systems and the development of embedded systems involves modeling boththe external and internal behaviors of the systems. Cleanroom software engineering (CRSE) life cycle methodo...
详细信息
ISBN:
(纸本)9781424449965
embedded systems must be high quality systems and the development of embedded systems involves modeling boththe external and internal behaviors of the systems. Cleanroom software engineering (CRSE) life cycle methodology concentrates on the quality issues by considering different formal verification and validation methods introduced at different stages of development. CRSE uses box structures that employ formal methods to achieve high quality software systems in specific. In CRSE, the external behavioral modeling is achieved through design of Black Box Structures. CRSE can be used for the development of embedded systems as CRSE methodology is also based on both External and internal behavior modeling. Many methods were proposed in the literature for designing the Black box structures that are based on intuition or experience of the designers. therefore CRSE suffers from lack of Formal Frameworks to derive Box structures meant for modeling the External Behavior. In this paper, a formal architectural framework related to external behavior modeling based on end-to-end processing of the embedded systems represented by thin threads and composite threads is presented that helps in representing the stimulus-response requirements of the embedded systems to be built as Black box structures. the external behavioral model of a pilot project (Temperature Monitoring and Controlling of Nuclear Reactor system) is presented using the formal framework proposed in this paper.
Design a general embedded web management model based on the Simple Network Management Protocol (SNMP), this model integrates the Java technique with abundant GUI interface to monitor and represent the device, it can m...
详细信息
ISBN:
(纸本)9789806560840
Design a general embedded web management model based on the Simple Network Management Protocol (SNMP), this model integrates the Java technique with abundant GUI interface to monitor and represent the device, it can makes the manager remotely monitor the device anytime and anywhere;and then design the architecture of each component respectively. Finally, the real-time performance has been test to prove the rationality, practicability and reliability of the model. the test shows that this model can be used to monitor remote device seamlessly, automatically and transparently.
As the mobile multi-media applications emerge withthe mobile handsets, the embedded network software needs a new paradigm to cope withthe conflicting demands from the constraint embedded software and the Internet mu...
详细信息
ISBN:
(纸本)0769522165
As the mobile multi-media applications emerge withthe mobile handsets, the embedded network software needs a new paradigm to cope withthe conflicting demands from the constraint embedded software and the Internet multimedia applications. the author describes the issues in comparisons withthe traditional software engineering. the application demands for the extensible and modular software engineering are outlined. then, the author proposes a modular and monolithic software design approach withthe embedded network software architecture that is aligned to the proposed framework. the author presents two aspects of the monolithic and extensible software implementations in the embedded Internet applications. Finally, the author describes the three challenges in the mobile multimedia applications from the view point of the proposed design paradigm.
the goal of pervasive computing, which combines current network technologies with wireless computing, voice recognition, Internet capability and artificial intelligence, is to create an environment where the connectiv...
详细信息
ISBN:
(纸本)0975339338
the goal of pervasive computing, which combines current network technologies with wireless computing, voice recognition, Internet capability and artificial intelligence, is to create an environment where the connectivity of devices is embedded in such a way that the connectivity is unassuming and always available. Wireless communication has brought us to a new era of Mobile and Pervasive computing.
Adaptability for distributed object-oriented enterprise frameworks in multimedia technology is a critical mission for system evolution. Today, building adaptive services is a complex task due to lack of adequate frame...
详细信息
Email service proves to be a convenient and powerful communication tool. As internet continues to grow, the type of information available to user has shifted from text only to multimedia enriched. embedded text in mul...
详细信息
ISBN:
(纸本)9781479925711
Email service proves to be a convenient and powerful communication tool. As internet continues to grow, the type of information available to user has shifted from text only to multimedia enriched. embedded text in multimedia content is one of the prevalent means for delivering messages to content viewers. Withthe increasing importance of emails and the incursions of internet marketers, spam has become a major problem and has given rise to unwanted mails. Spammers are continuously adopting new techniques to evade detection. Image spam is one such technique where in embedded text within images carries the main information of the spam message instead of text based spam. Currently, image spam is evaluated to be roughly 50% of all spam traffic and is still on the rise, thus a serious research issue. Filtering mails is one of the popular approaches used to block spam mails. this work proposes new model ReP-ETD (Repetitive Pre-processing technique for embedded Text Detection) for efficiently and accurately detecting spam in email images. the performance of the proposed ReP-ETD model has been evaluated across the identified parameters and compared with other existing models. the simulation results demonstrate the effectiveness of the proposed model.
暂无评论