A low energy sensor node processor is proposed for continuous healthcare monitoring application. The bio signal processing block is integrated into the processor to support the compression and the encryption. A quadra...
详细信息
A low energy sensor node processor is proposed for continuous healthcare monitoring application. The bio signal processing block is integrated into the processor to support the compression and the encryption. A quadratic level bio signal compression algorithm is proposed to reduce the transmission power consumption and the memory capacity. And the AES-128 data encryption datapath is integrated for user privacy and authentication. The CR is 8.4:1, the PRD is 0.897% and the compression rate is 6.4 Mbps. The encryption rate is 1.6 Mbps and the normalized performance is 0.4b/cycle/k-gates which is the highest value compared to the related works. The proposed processor consumes 0.56 nJ/bit at 1V supply voltage with 1MHz operating frequency in 0.25-mum CMOS process.
Java is widely used because its security and platform independence. Although Java's security model is designed for protecting users from untrusted sources, Java's security is not under fully control at the app...
详细信息
ISBN:
(纸本)9781424432004;9780769531854
Java is widely used because its security and platform independence. Although Java's security model is designed for protecting users from untrusted sources, Java's security is not under fully control at the application level. A large number of Java classes or Java class libraries have been used in network iquest application development, whose source is unknown and trust unassured. Analyzing the vulnerability of Java bytecode is helpful for assessing the security of untrusted Java components. The data-flow based methods suit to vulnerability analysis because their data propagation character. The paper is about using data-flow based methods to analyze the vulnerability of Java program in bytecode.
Producing software that is adaptable to the rapid environmental changes and the dynamic nature of the business life-cycle is extensively becoming a topical issue in the software evolution. In this context, change prop...
详细信息
Producing software that is adaptable to the rapid environmental changes and the dynamic nature of the business life-cycle is extensively becoming a topical issue in the software evolution. In this context, change propagation (CP) process is one of the critical parts in the software change management. Traditional strategies have projected more complex ways, resulting to substantial failures and risks. This paper presents an investigation and highlights on the desired criteria to provide better means to simplify the complicated CP tasks. The evaluation results may be used as a foundation in improving CP approaches that provide significant challenges in software evolution.
Much as software is very useful as a driving force of physical machine in assisting many aspects of human endeavor, it is also often accomplished with delicate aspect especially when correct specification and quality ...
详细信息
Much as software is very useful as a driving force of physical machine in assisting many aspects of human endeavor, it is also often accomplished with delicate aspect especially when correct specification and quality are not met. Ranging from less critical applications (such as payroll), to highly sophisticated application (such as health care system) as well as mission critical applications (such as space mission), failures in the functionality of these systems are often accompanied by disproportionate heavy losses to the respective users. In addition, industrial application is performance-intensive and cannot afford to fail. In this paper, our novel open onions ontology was presented which approaches software development from a layered point of view, the open source approach as an alternative methodology for industrial application development was proposed. Various issues involved in industrial applications were reviewed, the current industrial development methodologies were discussed and possibilities of adopting open source were explored.
In both industrial and research areas of electronic engineering,Sound Source Localization for robot control has always been an interesting subject to be further *** some dangerous situation,especially when a special d...
详细信息
In both industrial and research areas of electronic engineering,Sound Source Localization for robot control has always been an interesting subject to be further *** some dangerous situation,especially when a special driver is required to implement a particular task,the device should be able to combine robotics control technology with Sound Source Localization,and take actions according to the different response *** this research project,a multifunc-tional model driver,named "Mobile Island",has been designed and built up by integrating the Emulator 8051 micro-controller,Intel 8255 interfaces,some components and other necessary *** intelligent Mobile Island imple-mented by C language programs can operate under three control *** the sound control Mode 1,the model driver can detect and track a target by Sound Source Localization and then turn and move toward the *** the keypad control Mode 2,it can be controlled by a manual *** the free run Mode 3,Mobile Island can move and turn by *** finding an object in front,it will turn away before moving forward again,so that it can avoid crashing on the obstacle.
Nowadays P2P applications dominate many networks. However, despite of their diffusion, the analysis of tele- traffic generated by these applications in real-time environment remains an open issue. In this paper we loo...
详细信息
Nowadays P2P applications dominate many networks. However, despite of their diffusion, the analysis of tele- traffic generated by these applications in real-time environment remains an open issue. In this paper we look at analytical and simulation models, which can be used for quantifying volumes of P2P teletraffic at the network layer, to ease still existing difficulties associated with monitoring such teletraffic. We present an event-driven simulator, able to simulate P2P teletraffic both at the application and network layers in large overlay networks (we have successfully tested it in networks used by up to 500,000 peers). The simulation model was developed for studying the impact that P2P systems have on the network layer performance. We studied also the application layer dynamics by looking at time evolution of file-downloading processes and at the offered load generated in such networks. We report the results of several simulation scenarios, in which we focused on the consequences such teletraffic has on the Internet access link of an enterprise network.
In this paper, we propose a algorithm which can extract traffic information from the images automatically. The main purpose lies in utilizing existing traffic photography equipment, cooperating with this system to get...
详细信息
In this paper, we propose a algorithm which can extract traffic information from the images automatically. The main purpose lies in utilizing existing traffic photography equipment, cooperating with this system to get vehicle numbers and vehicle speed information. During the process of extracting traffic information, we utilize the traffic image sequence input from camera. By analyzing the pixels' difference between consecutive Image frames, we can get the moving object's characteristics and count the quantity of the passing vehicles.
A novel Lagrangian "individual-based" isotropic continuous time exponential type swarming model with a family of attraction/repulsion function is proposed in this article. The stability of aggregating behavi...
详细信息
We evolve a neural network controller for a boat that learns to maintain a given bearing and range with respect to a moving target in the Lagoon 3D game environment. Simulating realistic physics makes maneuvering boat...
详细信息
We evolve a neural network controller for a boat that learns to maintain a given bearing and range with respect to a moving target in the Lagoon 3D game environment. Simulating realistic physics makes maneuvering boats difficult and thus makes an evolutionary approach an attractive alternative to hand coded methods. We evolve the weights of simple recurrent neural networks trained with a fitness function designed to combine multiple fitness objectives based on speed, heading, and position to create a robust maintain station behavior. Results with an enforced subpopulation neural-evolution genetic algorithm indicate that we can consistently evolve robust maintain controllers for realistically simulated boats in Lagoon.
暂无评论