Purpose: A preliminary study on the magnetic resonance (MRI) characteristics of (vegetable) tissue NTIRE is an emerging minimally invasive surgery technique for tissue ablation in which, microsecond, high electrical f...
详细信息
A real-time cognitive radio network testbed is being built. This is the first paper to capture the overall picture of this project. Project scope and philosophy, design architecture, hardware platform, and key algorit...
详细信息
Theory of coherent demodulation based on method of square counterchange is introduced in this article. Square phase-locked loop(PLL) is proposed to achieve coherent carrier from 2DPSK signal. The 180° phase's...
详细信息
Artificial Immune Systems (AISs) are composed of techniques inspired by immunology. The clonal selection principle ensures the organism adaptation to fight invading antigens by an immune response activated by the bind...
详细信息
We research the multimedia information hiding (MIH) which is a technology to overlay digital information on multimedia contents such as picture, sound, document, etc. As application to disaster management of MIH, we h...
详细信息
We research the multimedia information hiding (MIH) which is a technology to overlay digital information on multimedia contents such as picture, sound, document, etc. As application to disaster management of MIH, we have developed a new technology called "PAIH" (Public Address Information Hiding) which is a technology to overlay information such as position or destination on siren sound of urgent vehicles. Siren sound is allowed to degrade of sound quality, but PAIH is required to decode correct information from siren sound with pitch shift (Doppler effect) or under noisy environment.
In this paper, a hardware implementation of the AES128 encryption algorithm is proposed. A unique feature of the proposed pipelined design is that the round keys, which are consumed during different iterations of encr...
详细信息
ISBN:
(纸本)9781617381102
In this paper, a hardware implementation of the AES128 encryption algorithm is proposed. A unique feature of the proposed pipelined design is that the round keys, which are consumed during different iterations of encryption, are generated in parallel with the encryption process. This lowers the delay associated with each round of encryption and reduces the overall encryption delay of a plaintext block. This leads to an increase in the message encryption throughput. The proposed pipelined design was modeled and validated in SystemVerilog hardware description language. The pipelined design was synthesized using the Synopsys Design Compiler tool and LSI-10K technology library. The synthesized gate-level netlist can operate at 40MHz frequency. To get an estimate of the speed gain by the hardware implementation, a virtual system was created using the Virtutech® Simics™ [7] software to emulate the execution of a "C" program that implements the AES128 encryption in software. The utilized Simics virtual system is based on Intel's x86 architecture with the 440BX chipset and has a 2GHz Pentium4 processor. The results indicate that the hardware implementation proposed in this paper is at least 60 times faster than the software implementation.
It is conceivable that over the next decade, all students will have access to some form of internet-based device while attending classes. The work presented in this paper investigated how web-based metacognition tools...
详细信息
ISBN:
(纸本)9789881821072
It is conceivable that over the next decade, all students will have access to some form of internet-based device while attending classes. The work presented in this paper investigated how web-based metacognition tools influence student capacity to self-assess their understanding (learning), student regulation of their learning (confidence level), class dynamics (reaction) and instructor methods. Student self-assessment associated with specific lecture slides were collected and compared with content-specific questions later in the examination. A set of online questions were used to evaluate student understanding on specific materials presented in the slides. Students were also asked to self-assess their confidence level in their answers. A web-based metacognition tool "LectureTools" was used to collect student responses. Correlation of correct answers with the self-assessment is presented to reflect on what the student thought they understood versus the outcome of their exam scores. The study evaluates how students may regulate their own learning and improve their ability to self-assess their understanding more critically. The ultimate goal is to empower students to become a better learner by self-assessment and evaluation of their own knowledge.
The paper employed some independently developed sensors based on the Octopus X platform to build a Zigbee-based Sensor Networks. Also, we implemented a Location-aware living environment by deploying the developed Zige...
详细信息
作者:
Holger SchmidtFaculty of Engineering
Department of Computer Science and Applied Cognitive Science Workgroup Software Engineering University of Duisburg-Essen Duisburg Germany
We present a threat and risk-driven methodology to security requirements engineering. Our approach has a strong focus on gathering, modeling, and analyzing the environment in which a secure ICT-system to be built is l...
详细信息
ISBN:
(纸本)9781424458790
We present a threat and risk-driven methodology to security requirements engineering. Our approach has a strong focus on gathering, modeling, and analyzing the environment in which a secure ICT-system to be built is located. The knowledge about the environment comprises threat and risk models. This security-relevant knowledge is used to assess the adequacy of security mechanisms, which are selected to establish security requirements.
Local feature based approaches have gotten great success in object detection and recognition in recent years. In this paper, a novel local based feature, Structured Local Edge Pattern Moment (SLEPm), is proposed for p...
详细信息
Local feature based approaches have gotten great success in object detection and recognition in recent years. In this paper, a novel local based feature, Structured Local Edge Pattern Moment (SLEPm), is proposed for pedestrian detection in the sliding window framework. SLEPm encodes not only the statistical information but also the structure and spatial information of object for pedestrian detection. Linear Support Vector Machine (SVM) is used as a binary classifier to determine whether a sub-window contains pedestrian. Experimental results in INRIA pedestrian database show that performance of SLEPm is better than that of Histogram of Oriented Gradient (HOG).
暂无评论