Search results for "Embedded system"

showing 10 items of 291 documents

Multiplexing AER asynchronous channels over LVDS links with flow-control and clock-correction for scalable neuromorphic systems

2017

Paper presented at the 2017 IEEE International Symposium on Circuits and Systems (ISCAS), held in Baltimore, MD, USA, on 28-31 May 2017.

Flow control (data)Neuromorphic Systembusiness.industryComputer scienceVirtual Wiring020208 electrical & electronic engineeringScalable Neuromorphic SystemsScalable Neuromoriphic02 engineering and technologyAddress event representation (AER)Multiplexing020202 computer hardware & architectureHandshakingNeuromorphic engineeringTransmission (telecommunications)Asynchronous communicationEmbedded system0202 electrical engineering electronic engineering information engineeringbusinessField-programmable gate arrayAER (Address Event Representation)Computer hardwareNeuromorphic SystemsHardware_LOGICDESIGN
researchProduct

A platform for the development and the validation of HW IP components starting from reference software specifications

2008

Abstract Signal processing algorithms become more and more efficient as a result of the developments of new standards. It is particularly true in the field video compression. However, at each improvement in efficiency and functionality, the complexity of the algorithms is also increasing. Textual specifications, that in the past were the original form of specifications, have been substituted by reference software which became the starting point of any design flow leading to implementation. Therefore, designing an embedded application has become equivalent to port a generic software on a, possibly heterogeneous, embedded platform. Such operation is getting more and more difficult because of …

General Computer ScienceComputer sciencelcsh:TK7800-836002 engineering and technologycomputer.software_genre0202 electrical engineering electronic engineering information engineeringSoftware verification and validation[ INFO.INFO-ES ] Computer Science [cs]/Embedded SystemsSoftware design descriptionComputingMilieux_MISCELLANEOUSbusiness.industrylcsh:ElectronicsACMSoftware development020202 computer hardware & architectureSoftware frameworkComputer architectureControl and Systems EngineeringEmbedded systemSoftware constructionComponent-based software engineeringSoftware designAvionics software020201 artificial intelligence & image processing[INFO.INFO-ES]Computer Science [cs]/Embedded SystemsbusinesscomputerComputer Science(all)
researchProduct

Model-based specification and validation of the dual-mode adaptive MAC protocol

2018

Wireless sensor and actuator networks (WSANs) rely on MAC protocols to coordinate access to the wireless medium access and for managing the radio unit on each device. The dual-mode adaptive MAC (DMAMAC) protocol is a recently proposed protocol designed to reduce the energy consumption of the radio communication in WSANs. The DMAMAC protocol targets the industrial WSANs used for real-time process control. At its core, DMAMAC exploits the distinction between transient and steady of the controlled plant process to dynamically adapt the MAC superframe structure and thereby conserve energy. The switch between steady and transient mode of operation is a safety-critical part of the protocol. The c…

General Computer Sciencebusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnergy consumptionEmbedded systemFormal specificationKey (cryptography)WirelessTransient (computer programming)SuperframenesCbusinessProtocol (object-oriented programming)International Journal of Critical Computer-Based Systems
researchProduct

Autonomic Computing through Reuse of Variability Models at Runtime: The Case of Smart Homes

2009

Our research shows that autonomic behavior can be achieved by leveraging variability models at runtime. In this way, the modeling effort made at design time is not only useful for producing the system but also provides a richer semantic base for autonomic behavior during execution. The use of variability models at runtime brings new opportunities for autonomic capabilities by reutilizing the efforts invested at design time. Our proposed approach has two aspects: reuse of design knowledge to achieve AC and reuse of existing model-management technologies at runtime. We developed the Model-Based Reconfiguration Engine (MoRE) to implement model-management operations. Our research demonstrates t…

General Computer Sciencebusiness.industryHome automationComputer scienceEmbedded systemControl reconfigurationContext (language use)ReuseSoftware engineeringbusinessDesign knowledgeSemanticsAutonomic computingComputer
researchProduct

Improving user experience via motion sensors in an Ambient Intelligence scenario

2013

Ambient Intelligence (AmI) is a new paradigm in Artificial Intelligence that aims at exploiting the information about the environment state in order to adapt it to the user preferences. AmI systems are usually based on several cheap and unobtrusive sensing devices that allow for continuous monitoring in different scenarios. In this work we present a gesture recognition module for the management of an office environment using a motion sensor device, namely Microsoft Kinect, as the primary interface between the user and the AmI system. The proposed gesture recognition method is based on both RGB and depth information for detecting the hand of the user and a fuzzy rule for determining the stat…

HCIAmbient IntelligenceEmbedded SystemsSensor Network
researchProduct

Communication Interface Generation For HW/SW Architecture In The STARSoC Environment

2006

Mapping the application functionality to software and hardware requires automated methods to specify, generate and optimize the hardware, software, and the interface architectures between them. In this paper, we present a methodology flow to hardware-software communication synthesis for system-on-a-chip (SoC) design through STARSoC (Synthesis Tool for Adaptive and Reconfigurable System-on-a-Chip) tool for rapid prototyping. Our concept consists of a set of hardware and software processes, described in C-code, communicates through the streams channels. This methodology consists in analyzing dependences of data between processes and synthesis a custom architecture to interface it. Firstly, we…

Hardware architectureResource-oriented architectureComputer sciencebusiness.industryInterface (computing)Software prototypingcomputer.software_genreSoftware frameworkComputer architectureEmbedded systemComponent-based software engineeringReference architecturebusinesscomputerFPGA prototype2006 IEEE International Conference on Reconfigurable Computing and FPGA's (ReConFig 2006)
researchProduct

An Analysis of Flash Page Reuse With WOM Codes

2018

Flash memory is prevalent in modern servers and devices. Coupled with the scaling down of flash technology, the popularity of flash memory motivates the search for methods to increase flash reliability and lifetime. Erasures are the dominant cause of flash cell wear, but reducing them is challenging because flash is a write-once medium— memory cells must be erased prior to writing. An approach that has recently received considerable attention relies on write-once memory (WOM) codes, designed to accommodate additional writes on write-once media. However, the techniques proposed for reusing flash pages with WOM codes are limited in their scope. Many focus on the coding theory alone, whereas o…

Hardware_MEMORYSTRUCTURESComputer sciencebusiness.industry020206 networking & telecommunications02 engineering and technologyCoding theoryEnergy consumptionReuseFlash memory020202 computer hardware & architectureFlash (photography)Hardware and ArchitectureServerEmbedded system0202 electrical engineering electronic engineering information engineeringbusinessFlash file systemGarbage collectionACM Transactions on Storage
researchProduct

Parallel macro pipelining on the intel SCC many-core computer

2013

In this paper we present how Intel's Single-Chip-Cloud processor behaves for parallel macro pipeline applications. Subsets of the SCC's available cores can be arranged as a pipeline where each core processes one stage of the overall workload. Each of the independent cores processes a small part of a larger task and feeds the following core with new data after it finishes its work. Our case-study is a parallel rendering system which renders successive images and applies different filters on them. On normal graphics adapters this is usually done in multiple cycles, we do this in a single pipeline pass. We show that we can achieve a significant speedup by using multiple parallel pipelines on t…

Hardware_MEMORYSTRUCTURESSpeedupParallel renderingbusiness.industryComputer sciencePipeline (computing)020207 software engineering02 engineering and technologyParallel computingGraphics pipelineSingle-chip Cloud ComputerMemory bankParallel processing (DSP implementation)Embedded system0202 electrical engineering electronic engineering information engineeringMacrobusiness
researchProduct

An integrated identity verification system for mobile terminals

2005

PurposeTo report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and user‐friendliness.Design/methodology/approachThe reported research corresponds to the building process in the design science research paradigm. The requirements to an identity verification system are defined and used in the selection of architecture components. Furthermore, various issues affecting the suitability of component distribution between a terminal and a remote server are considered.FindingsIn order to meet the stated requirements, in the proposed architecture static and dynamic identity verification is combine…

High-level verificationFunctional verificationComputer sciencebusiness.industryRuntime verificationLibrary and Information SciencesManagement Science and Operations ResearchManagement Information SystemsIntelligent verificationEmbedded systemSystems architectureIdentity (object-oriented programming)VerificationBusiness and International ManagementbusinessSoftware verificationInformation Management & Computer Security
researchProduct

Fault Detection, Isolation, andTolerant Control of Vehicles using Soft Computing Methods

2014

Human-Computer InteractionSoft computingControl and OptimizationControl and Systems EngineeringComputer sciencebusiness.industryEmbedded systemIsolation (database systems)Electrical and Electronic EngineeringbusinessFault detection and isolationComputer Science ApplicationsIET Control Theory & Applications
researchProduct