In a multiprocessor with distributed storage the data structures have a significant impact on the communication complexity. In this paper we present a few algorithms for performing matrix transposition on a Boolean n-...
详细信息
In a multiprocessor with distributed storage the data structures have a significant impact on the communication complexity. In this paper we present a few algorithms for performing matrix transposition on a Boolean n-cube. One algorithm performs the transpose in a time proportional to the lower bound both with respect to communication start-ups and to element transfer times. We present algorithms for transposing a matrix embedded in the cube by a binary encoding, a binary-reflected Gray code encoding of rows and columns, or combinations of these two encodings. The transposition of a matrix when several matrix elements are identified to a node by consecutive or cyclic partitioning is also considered and lower bound algorithms given. Experimental data are provided for the Intel iPSC and the Connection Machine.
Transferring data between integrated circuits accounts for a growing proportion of system power in wearable and mobile systems. The dynamic component of power dissipated in this data transfer can be reduced by reducin...
详细信息
Transferring data between integrated circuits accounts for a growing proportion of system power in wearable and mobile systems. The dynamic component of power dissipated in this data transfer can be reduced by reducing signal transitions. Techniques for reducing signal transitions on communication links have traditionally been targeted at parallel buses and can therefore not be applied when the transfer interfaces are serial buses. In this article, we address the issue of the best-case effectiveness of techniques to reduce signal transitions on serial buses, if these techniques also allow some error in the numeric interpretation of transmitted data. For many embedded applications, exchanging numeric accuracy for power reduction is a worthwhile tradeoff. We present a study of the efficiency of these value-deviation-bounded approximate serial data encoders (VDBS data encoders) and proofs of their properties. The bounds and proofs we present yield new insights into the best possible tradeoffs between dynamic power reduction and approximation error that can be achieved in practice. The insights are important regardless of whether actual practical VDBS data encoders are implemented in software or in hardware.
Body gestures are the key point affect the elderly daily life (ADL). Seidel, D., et al. [1] An innovative designing method based on user's behavior experience is proposed in order to improve the experiencing and t...
详细信息
ISBN:
(纸本)9783319209074;9783319209067
Body gestures are the key point affect the elderly daily life (ADL). Seidel, D., et al. [1] An innovative designing method based on user's behavior experience is proposed in order to improve the experiencing and to mine innovative points of elderly product design. Complete interactive processes between users and products are captured through penetrating into users living scenes. A Laundry Behavior Coding (LBC) system is proposed special for the elderly in China. Ethnography methods, behavior observation, oral presentation and in-depth interviews are also deployed. 20 participants (10 young and 10 elderly) participated the study focused on drum washing machine. A special Behavior Interaction Model (BIM) is established by extracting the behavior coding gap, which is obtained by comparing the coded sets of both the old and the young. Implicit demands are discovered in order to realize innovative designing of laundry machine for the old and to enhance users' experiences.
Information sharing over the public domain is one of critical challenge. In this paper, a two stage model is discussed to perform adaptive information encoding and dynamic steganography approach. At first level of pro...
详细信息
ISBN:
(纸本)9781479968961
Information sharing over the public domain is one of critical challenge. In this paper, a two stage model is discussed to perform adaptive information encoding and dynamic steganography approach. At first level of proposed model, the adaptive encoding approach is dictionary based approach that performs the cyclic shift to encode the textual or image information. At second level of proposed model, a dynamic frequency analysis approach is based on to identify the adaptive key areas over the image to hide the information. Once the adaptive pixels are identified, two-bit LSB is applied to perform the steganography. The paper is applied on sample imageset and the results show the effective information hiding with lesser MSE and higher PSNR values.
A 2-bit Chip less RFID tag is developed using a modified quad coupled resonator. The feedline is specially modified for exciting a rectangular complimentary split ring resonator between 5 to 7 GHz. The tag consists of...
详细信息
ISBN:
(纸本)9798350317275
A 2-bit Chip less RFID tag is developed using a modified quad coupled resonator. The feedline is specially modified for exciting a rectangular complimentary split ring resonator between 5 to 7 GHz. The tag consists of two CSRR resonating at 5.78 GHz and 6.43 GHz where each resonator encodes bits of information with a dedicated frequency allocation for data encoding. The improved prototype provides an improvement of 800 MHz compared to a conventional circular split ring resonator. This is mainly because of an enhanced coupled due to the specially modified quad feed line exciting the rectangular resonator in the ground plane. The RFID tag is designed in CST MWS and a detailed analysis is carried out for the developed prototype.
Quantum computers promise polynomial or exponential speed-up in solving certain problems compared to classical computers. However, in practical use, there are currently a number of fundamental technical challenges. On...
详细信息
ISBN:
(纸本)9789819709885;9789819709892
Quantum computers promise polynomial or exponential speed-up in solving certain problems compared to classical computers. However, in practical use, there are currently a number of fundamental technical challenges. One of them concerns the loading of data into quantum computers, since they cannot access common databases. In this vision paper, we develop a hybrid data management architecture in which databases can serve as data sources for quantum algorithms. To test the architecture, we perform experiments in which we assign data points stored in a database to clusters. For cluster assignment, a quantum algorithm processes this data by determining the distances between data points and cluster centroids.
Content addressable memory is popular for data-centric applications due to its exceptional search parallelism capability. SRAM cells were initially used to implement CAM designs. Recent innovations proposed using comp...
详细信息
ISBN:
(纸本)9798400701252
Content addressable memory is popular for data-centric applications due to its exceptional search parallelism capability. SRAM cells were initially used to implement CAM designs. Recent innovations proposed using compact nonvolatile memories instead. FeFETs emerged as a multi-level NVM device with promising potential and 2T FeFET CAM designs were studied. In this paper, a new potential is discussed for increasing the density efficiency of FeFET CAM architectures by adapting higher-dimensional encoding using 3T and 4T CAM designs. We propose a scalable greedy search algorithm for maximizing encoding capabilities. We compare the density, latency, accuracy, and energy consumption of our designs to standard 2T architecture demonstrating a 4x and 8x decrease in fail probability with up to 16% and 26.5% increase in memory density ( bits/unit-area) in the 3T and 4T designs respectively.
data barcoding is used in the automated control systems as way of reliable storing and quick inputting textual data into computer system. There are several types of barcodes. Matrix barcodes are discussed in the artic...
详细信息
ISBN:
(纸本)9665532782
data barcoding is used in the automated control systems as way of reliable storing and quick inputting textual data into computer system. There are several types of barcodes. Matrix barcodes are discussed in the article. Means of barcoded data transforming, storing and inputting are analyzed. General scheme of matrix barcodes processing is given.
Big data involve composite, undefined volume and unspecified rate of datasets [1]. The index array lags behind the conventional approaches to maintain the data velocity by allowing subjective expansion on the boundary...
详细信息
ISBN:
(纸本)9783319699004;9783319698991
Big data involve composite, undefined volume and unspecified rate of datasets [1]. The index array lags behind the conventional approaches to maintain the data velocity by allowing subjective expansion on the boundary of array dimension. The major concern of large volume applications like "Big data" is to perceive data volume and high velocity for further operations. In this paper we offer a scalable encoding scheme that replaces data block allocation with segment allocation and reorganizes the n dimensions of array into 2 dimensions only. Hence it requires 2 indices for data encoding and offers low indexing cost.
暂无评论