In this era of IoT, due to the fast Advancements in sensor technology and the availability of low-cost hardware, the development of Wireless Multimedia Sensor Networks (WMSNs) has emerged. WMSNs are composed of resour...
详细信息
In this era of IoT, due to the fast Advancements in sensor technology and the availability of low-cost hardware, the development of Wireless Multimedia Sensor Networks (WMSNs) has emerged. WMSNs are composed of resource constrained wireless nodes through which both the scalar data and multimedia data (i.e., audio, still images, and video) can be sensed and acquired from the environment. However, the resource constrained nature of multimedia sensing devices has made the WMSNs to face several challenges. To tackle these challenges, different authors developed different methods. In this paper, we have surveyed all such kind of methods. Initially we study about the basic architecture of multimedia senor node followed by characteristics and applications of WMSNs. Following that, we did a comprehensive survey of various methodologies, which we divided into three categories. Under the segregation, we have considered different aspects and segregated as data Security, QoS Aware methods, and Energy Aware methods.
Several models of data base systems have distinguished levels of abstraction ranging from the high-level entity set model down to the low-level physical device level. This paper presents a model for describing data en...
详细信息
Several models of data base systems have distinguished levels of abstraction ranging from the high-level entity set model down to the low-level physical device level. This paper presents a model for describing data encodings, an intermediate level which focuses on the relationship among data items as demonstrated by contiguity or by pointer connections. Multiple data encodings for a file are shown and transformation functions that describe the translation between data encodings are discussed.
A considerable body of recent work exists on the problem of finding efficient data encodings, which are embeddings of logical data structures. These problems can frequently be formulated in graph-theoretic terms, in ...
详细信息
A considerable body of recent work exists on the problem of finding efficient data encodings, which are embeddings of logical data structures. These problems can frequently be formulated in graph-theoretic terms, in particular, as that of embedding a family of graphs called the guest graphs into another family called the host graphs, in which edges in a guest graph are supplanted by paths in a host graph. In this research, such a graph-theoretic problem is considered. The main result, Theorem A, gives a theoretical limit on the amount of data compression that can be accomplished by utilizing a certain kind of data structure. Moreover, the data compression achieved in the storage graph HG involves a penalty in the amount of time and space necessary to access information about the graph G. The difficulty of accessing information about the guest graph G stored in the host graph HG limits its practical usefulness. It is also noted that many of the relations actually stored in databases are sparse in that such a relation on a set V of cardinality n is made up only of O(n) edges.
In a multiprocessor with distributed storage the data structures have a significant impact on the communication complexity. In this paper we present a few algorithms for performing matrix transposition on a Boolean n-...
详细信息
In a multiprocessor with distributed storage the data structures have a significant impact on the communication complexity. In this paper we present a few algorithms for performing matrix transposition on a Boolean n-cube. One algorithm performs the transpose in a time proportional to the lower bound both with respect to communication start-ups and to element transfer times. We present algorithms for transposing a matrix embedded in the cube by a binary encoding, a binary-reflected Gray code encoding of rows and columns, or combinations of these two encodings. The transposition of a matrix when several matrix elements are identified to a node by consecutive or cyclic partitioning is also considered and lower bound algorithms given. Experimental data are provided for the Intel iPSC and the Connection Machine.
Transferring data between integrated circuits accounts for a growing proportion of system power in wearable and mobile systems. The dynamic component of power dissipated in this data transfer can be reduced by reducin...
详细信息
Transferring data between integrated circuits accounts for a growing proportion of system power in wearable and mobile systems. The dynamic component of power dissipated in this data transfer can be reduced by reducing signal transitions. Techniques for reducing signal transitions on communication links have traditionally been targeted at parallel buses and can therefore not be applied when the transfer interfaces are serial buses. In this article, we address the issue of the best-case effectiveness of techniques to reduce signal transitions on serial buses, if these techniques also allow some error in the numeric interpretation of transmitted data. For many embedded applications, exchanging numeric accuracy for power reduction is a worthwhile tradeoff. We present a study of the efficiency of these value-deviation-bounded approximate serial data encoders (VDBS data encoders) and proofs of their properties. The bounds and proofs we present yield new insights into the best possible tradeoffs between dynamic power reduction and approximation error that can be achieved in practice. The insights are important regardless of whether actual practical VDBS data encoders are implemented in software or in hardware.
Body gestures are the key point affect the elderly daily life (ADL). Seidel, D., et al. [1] An innovative designing method based on user's behavior experience is proposed in order to improve the experiencing and t...
详细信息
ISBN:
(纸本)9783319209074;9783319209067
Body gestures are the key point affect the elderly daily life (ADL). Seidel, D., et al. [1] An innovative designing method based on user's behavior experience is proposed in order to improve the experiencing and to mine innovative points of elderly product design. Complete interactive processes between users and products are captured through penetrating into users living scenes. A Laundry Behavior Coding (LBC) system is proposed special for the elderly in China. Ethnography methods, behavior observation, oral presentation and in-depth interviews are also deployed. 20 participants (10 young and 10 elderly) participated the study focused on drum washing machine. A special Behavior Interaction Model (BIM) is established by extracting the behavior coding gap, which is obtained by comparing the coded sets of both the old and the young. Implicit demands are discovered in order to realize innovative designing of laundry machine for the old and to enhance users' experiences.
In this paper, we introduce effective bus data encoding schemes for next-generation interfaces of DRAM with an analysis of their energy and lane efficiency characteristics. The Pulse-Amplitude-Modulation-4 (PAM-4) sig...
详细信息
ISBN:
(数字)9781665461863
ISBN:
(纸本)9781665461863
In this paper, we introduce effective bus data encoding schemes for next-generation interfaces of DRAM with an analysis of their energy and lane efficiency characteristics. The Pulse-Amplitude-Modulation-4 (PAM-4) signaling technique has recently been adopted to memory interfaces due to their increased per-pin data-rate requirements. However, as the power consumption profile of PAM-4 symbols differs from that of NRZ symbols, the conventional Dynamic Bus Inversion (DBI) encoding fails to achieve an expected reduction of termination power. Therefore, this paper proposes data encoding schemes applicable to the PAM-4 memory links and compares their performances in terms of the termination energy with experimental results. We evaluate the proposed approaches by applying data encoding to DRAM memory access traces obtained from executing benchmarks on ARM/x86 ISA-based processors, including caches, simulated on the gem5 architecture simulator. The experimental results show that our advanced encoding algorithms enable us to achieve doubled data rate with minimal power consumption overhead.
Information sharing over the public domain is one of critical challenge. In this paper, a two stage model is discussed to perform adaptive information encoding and dynamic steganography approach. At first level of pro...
详细信息
ISBN:
(纸本)9781479968961
Information sharing over the public domain is one of critical challenge. In this paper, a two stage model is discussed to perform adaptive information encoding and dynamic steganography approach. At first level of proposed model, the adaptive encoding approach is dictionary based approach that performs the cyclic shift to encode the textual or image information. At second level of proposed model, a dynamic frequency analysis approach is based on to identify the adaptive key areas over the image to hide the information. Once the adaptive pixels are identified, two-bit LSB is applied to perform the steganography. The paper is applied on sample imageset and the results show the effective information hiding with lesser MSE and higher PSNR values.
Content addressable memory is popular for data-centric applications due to its exceptional search parallelism capability. SRAM cells were initially used to implement CAM designs. Recent innovations proposed using comp...
详细信息
ISBN:
(纸本)9798400701252
Content addressable memory is popular for data-centric applications due to its exceptional search parallelism capability. SRAM cells were initially used to implement CAM designs. Recent innovations proposed using compact nonvolatile memories instead. FeFETs emerged as a multi-level NVM device with promising potential and 2T FeFET CAM designs were studied. In this paper, a new potential is discussed for increasing the density efficiency of FeFET CAM architectures by adapting higher-dimensional encoding using 3T and 4T CAM designs. We propose a scalable greedy search algorithm for maximizing encoding capabilities. We compare the density, latency, accuracy, and energy consumption of our designs to standard 2T architecture demonstrating a 4x and 8x decrease in fail probability with up to 16% and 26.5% increase in memory density ( bits/unit-area) in the 3T and 4T designs respectively.
Phantom Enhanced 911 (E911) calls are automatically generated 2 second calls, are a serious concern on cellular networks, and consume critical resources. As networks become increasingly complex, detecting and troubles...
详细信息
ISBN:
(纸本)9781450392778
Phantom Enhanced 911 (E911) calls are automatically generated 2 second calls, are a serious concern on cellular networks, and consume critical resources. As networks become increasingly complex, detecting and troubleshooting the causes of phantom E911 calls is becoming increasingly difficult. In this paper machine learning (ML) tools are used to analyze anonymized call detail record data collected by a major US telecom network service provider. The data is carefully pre-processed and encoded using an efficient encoding method. Classification algorithms K Nearest Neighbors (KNN) and Decision Trees (DTs) are then implemented to study correlations between device and network level features and a mobile device's ability to initiate phantom calls. Based on the results, this work also suggests certain policy changes for network operators that may decrease the high volume of phantom E911 calls or alleviate the pressure of phantom E911 calls on a cellular network.
暂无评论