This article presents a survey of state-of-the-art hardware designs optimizing the tradeoffs between security, power, and costs in ultra-low-power systems like the Internet of Things. The authors analyze the connectio...
详细信息
This article presents a survey of state-of-the-art hardware designs optimizing the tradeoffs between security, power, and costs in ultra-low-power systems like the Internet of Things. The authors analyze the connections between hardware specs and system demands to bridge the gap between research conducted in different communities. They also identify open problems in designing future ultra-low-power and secure hardware.
Microscopes can now cover large spatial areas and capture stem cell behavior over time. However, without discovering statistically reliable quantitative stem cell quality measures, products cannot be released to marke...
详细信息
Microscopes can now cover large spatial areas and capture stem cell behavior over time. However, without discovering statistically reliable quantitative stem cell quality measures, products cannot be released to market. A Web-based measurement system overcomes desktop limitations by leveraging cloud and cluster computing for offline computations and by using Deep Zoom extensions for interactive viewing and measurement.
A new parallel normalized optimized approximate inverse algorithm, based on the concept of the "fish bone" computational approach satisfying an antidiagonal data dependency, for computing classes of explicit...
详细信息
A new parallel normalized optimized approximate inverse algorithm, based on the concept of the "fish bone" computational approach satisfying an antidiagonal data dependency, for computing classes of explicit approximate inverses, is introduced for symmetric multiprocessor systems. The parallel normalized explicit approximate inverses are used in conjunction with parallel normalized explicit preconditioned conjugate gradient square schemes, for the efficient solution of finite element sparse linear systems. The parallel design and implementation issues of the new proposed algorithms are discussed and the parallel performance is presented, using OpenMP. (c) 2007 Elsevier Inc. All rights reserved.
The coordinate rotation digital computer (CORDIC) is a rotation-based arithmetic computing algorithm which has found many important digital signal processing applications. In this paper, a detailed analysis of the qua...
详细信息
The coordinate rotation digital computer (CORDIC) is a rotation-based arithmetic computing algorithm which has found many important digital signal processing applications. In this paper, a detailed analysis of the quantization error encountered in the CORDIC algorithm is presented. Two types of quantization error are examined: One is an approximation error due to the quantized representation of rotation angles. The other is a rounding error due to the finite precision representation in both fixed point and floating point arithmetic. Tight error bounds for these two types of error are derived. The rounding error due to a scaling (normalization) operation in the CORDIC algorithm is also discussed. Lastly, an expression for overall quantization error is derived and several simulation examples are presented.
Divide-and-conquer is a natural way to cope with the complexity of automatic testbench generation. The key to developing an effective divide-and-conquer approach is to identify the partitioning boundaries where intera...
详细信息
Divide-and-conquer is a natural way to cope with the complexity of automatic testbench generation. The key to developing an effective divide-and-conquer approach is to identify the partitioning boundaries where interactions among divided components are minimized. The authors propose a novel design decomposition scheme and show how it can help improve the performance of constraint solving for test generation.
A tracking analysis of the adaptive filters equipped with the sign algorithm and operating in nonstationary environments is presented. Under the assumption that the nonstationary can be modeled using a random disturba...
详细信息
A tracking analysis of the adaptive filters equipped with the sign algorithm and operating in nonstationary environments is presented. Under the assumption that the nonstationary can be modeled using a random disturbance, it is shown that the long-term time average of the mean-absolute error is bounded, and that there exists an optimal choice of the convergence constant mu which minimizes this quality. Applying the commonly used independence assumption, and under the assumption that the nonstationarity is solely due to the time-varying behavior of the optimal coefficients, it is shown that the distributions of the successive coefficient misalignment vectors converge to a limiting distribution when the adaptive filter is used in the system identification mode. Finally, under the additional assumption that the signals involved are zero mean and Gaussian, a set of nonlinear difference equations is derived that characterizes the mean and mean-squared behavior of the filter coefficients and the mean-squared estimation error during adaptation and tracking. Results of several experiments that show very good correlation with the theoretical analyses are presented.< >
The authors present a survey and a comparative analysis of various algorithms introduced for the differential protection of three-phase transformers. After a brief review of the concept, the problems associated with t...
详细信息
The authors present a survey and a comparative analysis of various algorithms introduced for the differential protection of three-phase transformers. After a brief review of the concept, the problems associated with the differential protection of transformers, and the existing solutions as implemented with conventional (electromagnetic) relays, the algorithms introduced for digital relaying are outlined. Some of these algorithms are derived from conventional protection methods while others represent novel methods. They are analyzed in view of how well they address the two subproblems of differential protection per se and exciting-current detection. Finally, a simple ranking procedure is introduced. Two optimality performance indices, based on time and frequency, are defined and used as a basis for a comparison of the algorithm presented.< >
In this paper, we present a technique for designing the optimal (in the mean square error sense) separable 2-D filter for recovering a signal from a noise-corrupted signal when the joint statistics of the signal and n...
详细信息
In this paper, we present a technique for designing the optimal (in the mean square error sense) separable 2-D filter for recovering a signal from a noise-corrupted signal when the joint statistics of the signal and noise are known. A set of nonlinear equations in the design parameters is derived, and an iterative algorithm to solve them is presented, The algorithm is shown to be nondivergent in theory and rapidly convergent in practice. The results of applying the separable filter designalgorithm to several typical image recovery problems are given, In most cases, the performance of the resulting separable filter is similar to that of the optimal nonseparable filter with the same region of support.
The number of women in computing is significantly lower than the number of men, with African American women making up an even smaller segment of this population. A recent study reveals that African-American middle sch...
详细信息
The number of women in computing is significantly lower than the number of men, with African American women making up an even smaller segment of this population. A recent study reveals that African-American middle school girls generally have negative attitudes toward computer science, but that those feelings can change through intervention.
Coding techniques are progressively succeeding in finding a beneficial use throughout all the components of advanced multimedia streaming networks, including peer-to-peer (P2P) content distribution strategies. In fact...
详细信息
Coding techniques are progressively succeeding in finding a beneficial use throughout all the components of advanced multimedia streaming networks, including peer-to-peer (P2P) content distribution strategies. In fact, although P2P algorithms are regarded as an important technology that will be part of future commercial Internet protocol television (IPTV) platforms, it has been shown that their ability to efficiently distribute multimedia streams within strict time constraints, and their robustness to high churn rates, can still improve when putting to good use source and network coding algorithms. For this reason, in the past few years a wealth of research has been undertaken aiming at jointly optimizing both coding and streaming schemes. In this article, we analyze the progress made by the latest scientific research in the field of jointly using coding and P2P streaming strategies, and we offer a set of experimental results performed on a real planet-wide P2P streaming test-bed, using Digital Fountains (DFs). Surprisingly, our test-bed study reveals that utilizing DF techniques is not always beneficial to the distribution of streaming data using a P2P distribution strategy. In fact, our results show that only when the network scales beyond a certain size, it is possible to appreciate the advantages introduced by the use of DFs, showing that coding techniques should always be carefully deployed and their advantages well understood. For this reason, we believe this work can provide a useful aid in better appreciating the critical aspects of jointly utilizing multimedia streaming and DF coding techniques for IPTV.
暂无评论