The security problem of screen image leakage from a display unit has become serious with the rapid speed of signal transmission technology. This paper presents a novel investigation on the characteristics of the power...
详细信息
ISBN:
(纸本)9781509062966
The security problem of screen image leakage from a display unit has become serious with the rapid speed of signal transmission technology. This paper presents a novel investigation on the characteristics of the power line compromising channel. Moreover, a measurement system has been actually developed for the leakage signal analyzing and image reconstruction. In order to overcome the degradation of reconstructed motion images and enhance the reconstructed image quality, a multi-image blind deconvolution method was proposed and test experiments were carried out to verify the effectiveness of the multi-image blind deconvolution algorithm based on the conducted signal from the power line.
Currently, competency-based education corresponds to a model of professional training of a high relevance. The objective of this paper is to present the evolution of a training program of generic competencies at the U...
详细信息
ISBN:
(纸本)9781538634837
Currently, competency-based education corresponds to a model of professional training of a high relevance. The objective of this paper is to present the evolution of a training program of generic competencies at the University of Talca, based on the experience of the authors as professors of an engineering major. This evolution, after more than ten years of its inception, is expressed in three versions. Even though a maturing process and continuous improvement exist, this article concludes that there are still open spaces for significant advances intending to their consolidation.
In ultra-dense cellular networks, research works on enhancing cell edge performance receive considerable attention. Based on interlaced clustering, we propose a heuristic sparse beamforming strategy to improve the cel...
详细信息
ISBN:
(纸本)9781538620625
In ultra-dense cellular networks, research works on enhancing cell edge performance receive considerable attention. Based on interlaced clustering, we propose a heuristic sparse beamforming strategy to improve the cell edge throughput effectively in distributed antenna systems (DASs). In our scheme, each cluster pattern (CP) is divided into several adaptive cells, where all the remote antenna units (RAUs) are connected to a central processor via finite-capacity backhaul links. Relying on the adaptive cells, we then provide a low-complexity alternating optimization algorithm for the high-burden sparse beamforming design. Simulations based on practical cell parameters show that the proposed adaptive cell based sparse beamforming can achieve significant performance gain on edge user rate and further improved the sum rate.
Simulating systems with evolving relational structures on massively parallel computers require the computational work to be evenly distributed across the processing resources throughout the simulation. Adaptive, unstr...
详细信息
Data prefetching and cache replacement algorithms have been intensively studied in the design of highperformance microprocessors. Typically, the data prefetcher operates in the private caches and does not interact wi...
详细信息
ISBN:
(纸本)9781450344654
Data prefetching and cache replacement algorithms have been intensively studied in the design of highperformance microprocessors. Typically, the data prefetcher operates in the private caches and does not interact with the replacement policy in the shared Last-Level Cache (LLC). Similarly, most replacement policies do not consider demand and prefetch requests as different types of requests. In particular, program counter (PC)-based replacement policies cannot learn from prefetch requests since the data prefetcher does not generate a PC value. PC-based policies can also be negatively affected by compiler optimizations. In this paper, we propose a holistic cache management technique called Kill-the-PC (KPC) that overcomes the weaknesses of traditional prefetching and replacement policy algorithms. KPC cache management has three novel contributions. First, a prefetcher which approximates the future use distance of prefetch requests based on its prediction confidence. Second, a simple replacement policy provides similar or better performance than current state-of-the-art PC-based prediction using global hysteresis. Third, KPC integrates prefetching and replacement policy into a whole system which is greater than the sum of its parts. Information from the prefetcher is used to improve the performance of the replacement policy and vice-versa. Finally, KPC removes the need to propagate the PC through entire on-chip cache hierarchy while providing a holistic cache management approach with better performance than state-of-the-art PC-, and non-PC-based schemes. Our evaluation shows that KPC provides 8% better performance than the best combination of existing prefetcher and replacement policy for multi-core workloads.
An intelligent control system for a medical high-power semiconductor laser has been developed. The system combines 1470 nm high-power semiconductor laser and intelligent control technology. The control technique appli...
详细信息
An intelligent control system for a medical high-power semiconductor laser has been developed. The system combines 1470 nm high-power semiconductor laser and intelligent control technology. The control technique applies an ARM Cortex-M3 microprocessor STM32 F103 as the core, an FPGA to drive the digital constant current source module and the power feedback loop to realize constant power control. Furthermore, the display and storage of the output data, and the driver of the touch screen are realized by designing the main control module and human-computer interaction module with the microprocessor. Finally, the Micro-Controller Development Kit(MDK) platform is used for programming. The safety performance of the whole control system conforms to the national standard of medical electrical safety.
Modern file systems employ journaling techniques to guarantee data consistency in case of unexpected system crashes or power failures. However, journaling file systems usually suffer from performance decrease due to t...
详细信息
ISBN:
(纸本)9781538622544
Modern file systems employ journaling techniques to guarantee data consistency in case of unexpected system crashes or power failures. However, journaling file systems usually suffer from performance decrease due to the extra journal writes. Moreover, the emerging non-volatile memory technologies (NVMs) have the potential capability to improve the performance of journaling file systems by being deployed as the journaling storage devices. However, traditional journaling techniques, which are designed for hard disks, fail to perform efficiently in NVMs. In order to address this problem, we propose an NVM-based journaling scheme, called NJS. The basic idea behind NJS is to reduce the journaling overhead of traditional file systems while fully exploiting the byte-accessibility characteristic, and alleviating the relatively slow write and endurance limitation of NVM. Our NJS consists of three major contributions: (i) In order to minimize the amount of journal writes, NJS only needs to write the metadata of file systems and over-write data to NVM as write-ahead logging, thus alleviating the relatively slow write and endurance limitation of NVM. (ii) We propose a novel journaling update scheme in which the journaling data blocks can be updated in the byte-granularity based on the difference of the old and new versions of journal blocks, thus fully exploiting the unique byte-accessibility characteristic of NVM. (iii) NJS includes a garbage collection mechanism that absorbs the redundant journal updates, and actively delays the checkpointing to the file system. Evaluation results show the efficiency and efficacy of NJS. For example, compared with original Ext4 with a ramdiskbased journaling device, the throughput improvement of Ext4 with our NJS is up to 137.1%.
Regression based facial landmark detection methods usually learns a series of regression functions to update the landmark positions from an initial estimation. Most of existing approaches focus on learning effective m...
详细信息
ISBN:
(纸本)9781538604571
Regression based facial landmark detection methods usually learns a series of regression functions to update the landmark positions from an initial estimation. Most of existing approaches focus on learning effective mapping functions with robust image features to improve performance. The approach to dealing with the initialization issue, however, receives relatively fewer attentions. In this paper, we present a deep regression architecture with two-stage re-initialization to explicitly deal with the initialization problem. At the global stage, given an image with a rough face detection result, the full face region is firstly re-initialized by a supervised spatial transformer network to a canonical shape state and then trained to regress a coarse landmark estimation. At the local stage, different face parts are further separately re-initialized to their own canonical shape states, followed by another regression subnetwork to get the final estimation. Our proposed deep architecture is trained from end to end and obtains promising results using different kinds of unstable initialization. It also achieves superior performances over many competing algorithms.
Modern highperformance processors are equipped with very wide SIMD instruction set. SVE (Scalable Vector Extension) is an ARM (R) SIMD technology that supports vector lengths from 128 bits to 2048 bits. One of its pr...
详细信息
ISBN:
(纸本)9781538623268
Modern highperformance processors are equipped with very wide SIMD instruction set. SVE (Scalable Vector Extension) is an ARM (R) SIMD technology that supports vector lengths from 128 bits to 2048 bits. One of its promising features is to offer "vector-length agnostic" programming to allow the same SVE code to run on hardware of any vector length without any modification of the code. This feature would be useful to explore the best vector length with appropriate hardware resources in the space of various combinations of hardware parameters in order to make more efficient use of hardware resources, since we can use the same vectorized SIMD code. In this paper, we report the performance of application kernels using ARM SVE with multiple vector lengths while keeping the hardware resource the same. We have confirmed that when the performance of the program is limited by a bottleneck of a long chain of arithmetic operations or instruction issues, the performance can be improved by increasing the vector length. However, it was necessary to prepare a sufficient number of physical registers for performance improvement, and when the number of physical registers was too small, it was found that with such a program, the performance might be reduced. When the performance is limited by memory access bandwidth to cache and memory, the vector length does not affect the performance significantly.
We propose an approximation model of the original 0 minimization model arising from various sparse signal recovery problems. The objective function of the proposed model uses the Moreau envelope of the 0 norm to promo...
详细信息
暂无评论