Search results for "Embedded"

showing 10 items of 412 documents

Classifier Optimized for Resource-constrained Pervasive Systems and Energy-efficiency

2017

Computational intelligence is often used in smart environment applications in order to determine a user’scontext. Many computational intelligence algorithms are complex and resource-consuming which can beproblematic for implementation devices such as FPGA:s, ASIC:s and low-level microcontrollers. Thesetypes of devices are, however, highly useful in pervasive and mobile computing due to their small size,energy-efficiency and ability to provide fast real-time responses. In this paper, we propose a classi-fier, CORPSE, specifically targeted for implementation in FPGA:s, ASIC:s or low-level microcontrollers.CORPSE has a small memory footprint, is computationally inexpensive, and is suitable for…

Parallel computingMicrocontrollerEnergy-efficientGeneral Computer ScienceComputer scienceDistributed computingComputational intelligenceCellular AutomataClassifierlcsh:QA75.5-76.95EmbeddedAnnan elektroteknik och elektronikEnergy-savingFPGAOther Electrical Engineering Electronic Engineering Information Engineeringbusiness.industryComputer SciencesComputational MathematicsDatavetenskap (datalogi)Embedded systemPervasive systemsSmart environmentlcsh:Electronic computers. Computer sciencebusinessClassifier (UML)Efficient energy use
researchProduct

Embedded access points for trusted data and resources access in HPC systems

2010

Biometric authentication systems represent a valid alternative to the conventional username-password based approach for user authentication. However, authentication systems composed of a biometric reader, a smartcard reader, and a networked workstation which perform user authentication via software algorithms have been found to be vulnerable in two areas: firstly in their communication channels between readers and workstation (communication attacks) and secondly through their processing algorithms and/or matching results overriding (replay attacks, confidentiality and integrity threats related to the stored information of the networked workstation). In this paper, a full hardware access poi…

PasswordAuthenticationBiometricsbusiness.industryComputer scienceAccess controlInformation SystemFingerprint recognitionTrusted authenticationTheoretical Computer ScienceSoftwareHardware and ArchitectureEmbedded systemEmbedded biometric authentication systemSmart cardSecurity solutions for user authenticationbusinessReplay attackSoftwareInformation SystemsThe Journal of Supercomputing
researchProduct

An Embedded Biometric Sensor for Ubiquitous Authentication

2013

Communication networks and distributed technologies move people towards the era of ubiquitous computing. An ubiquitous environment needs many authentication sensors for users recognition, in order to provide a secure infrastructure for both user access to resources and services and information management. Today the security requirements must ensure secure and trusted user information to protect sensitive data resource access and they could be used for user traceability inside the platform. Conventional authentication systems, based on username and password, are in crisis since they are not able to guarantee a suitable security level for several applications. Biometric authentication systems…

PasswordInformation managementUser informationSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuthenticationEngineeringUbiquitous computingBiometricsTraceabilitybusiness.industry FPGA rapid prototypingBiometric identity managementFingerprintSelf-contained sensorUbiquitous authenticationIdentity managementEmbedded systembusinessEmbedded system
researchProduct

Designing Guarantee Options in Defined Contribution Pension Plans

2015

The shift from defined benefit (DB) to defined contribution (DC) is pervasive among pension funds, due to demographic changes and macroeconomic pressures. In DB all risks are borne by the provider, while in plain vanilla DC all risks are borne by the beneficiary. For DC to provide income security some kind of guarantee is required. A minimum guarantee clause can be modeled as a put option written on some underlying reference portfolio of assets and we develop a discrete model that optimally selects the reference portfolio to minimise the cost of a guarantee. While the relation DB-DC is typically viewed as a binary one, the model can be used to price a wide range of guarantees creating a con…

PensionActuarial scienceYardstickEconomicsAsset allocationPortfolioAsset (economics)Put optionEmbedded optionStochastic programmingSSRN Electronic Journal
researchProduct

EMBEDDED STRAIN GAUGES: EFFECT OF THE STRESS NORMAL TO THE GRID

2005

:  In general, a strain gauge embedded in a model is subjected to a stress normal to the grid, whereas a gauge on the external surface is free from such a stress. This paper concerns the effect of the stress normal to the grid on the output of the strain gauge; usually, the influence of such a stress has a negligible effect, however, in some cases a notable influence has been noted. Therefore, the output of the strain gauge is determined in function of the strains in the plane of the gauge, ɛl and ɛt, and of the stress, σn, normal to the grid. The analysis shows that the output of the strain gauge is influenced by the coupled effect of transverse sensitivity and pressure sensitivity of the …

PhysicsPlane (geometry)ConstantanHigh Energy Physics::LatticeMechanical EngineeringMechanicsFunction (mathematics)Gauge (firearms)embedded strain gauges experimental mechanics pressure effect transverse sensitivityStress (mechanics)High Energy Physics::TheoryTransverse planeClassical mechanicsMechanics of MaterialsSensitivity (control systems)Strain gauge
researchProduct

Local reinforcement effect of embedded strain gauges

2010

The reinforcement effect of strain gauges installed on low Young's modulus materials has received attention by many researchers with respect to both strain gauges installed on the surface [1,2] and embedded inside the material [3,4]. In the case of strain gauges installed on the surface, the evaluation of the local reinforcement effect gives [5] the following correction coefficient C, i.e. the ratio between the actual strain (without the strain gauge) and the strain ' measured by the strain gauge: * ' 1 sg s E C E (1) being * sg g , sg sg sg sg sg sg t L L E E L t t (2) where Esg is the Young’s modulus of the strain gauge, * Esg is a characteristic of the strain gauge which gives the strain…

PhysicsSettore ING-IND/14 - Progettazione Meccanica E Costruzione Di MacchineStrain (chemistry)PhysicsQC1-999technology industry and agricultureModulusMechanical engineeringEMBEDDED STRAIN GAUGE LOCAL REINFORCEMENT EFFECTSComposite materialReinforcementStrain gaugeEPJ Web of Conferences
researchProduct

Real-time low level feature extraction for on-board robot vision systems

2006

Robot vision systems notoriously require large computing capabilities, rarely available on physical devices. Robots have limited embedded hardware, and almost all sensory computation is delegated to remote machines. Emerging gigascale integration technologies offer the opportunity to explore alternative computing architectures that can deliver a significant boost to on-board computing when implemented in embedded, reconfigurable devices. This paper explores the mapping of low level feature extraction on one such architecture, the Georgia Tech SIMD Pixel Processor (SIMPil). The Fast Boundary Web Extraction (fBWE) algorithm is adapted and mapped on SIMPil as a fixed-point, data parallel imple…

PixelComputer sciencebusiness.industryComputationvision systems real-timeFeature extractionNull (SQL)Computer architectureEmbedded systemRobotSIMDArchitectureUnconventional computingbusiness
researchProduct

Real-time Sub-pixel Cross Bar Position Metrology

2002

Many measurement application fields need to calculate cross bar intersection locations of horizontal and vertical bars. The system we developed and that we present in this paper is an embedded system that measures cross bar positions with sub-pixel accuracy on 1024×1024 pixel images delivered by a camera at a 50 MHz data rate in real time. This is done using an algorithm that looks for intersection areas and then locally calculates two lines representing horizontal and vertical bars. The two line intersection is considered to be the bar intersection. To achieve real time, we developed a hybrid architecture in which low level processes are implemented into FPGAs and others into DSPs. As a re…

PixelHorizontal and verticalComputer sciencebusiness.industryBar (music)MetrologyIntersectionLine–line intersectionPosition (vector)Embedded systemSignal ProcessingComputer visionComputer Vision and Pattern RecognitionArtificial intelligenceElectrical and Electronic EngineeringbusinessField-programmable gate arrayReal-Time Imaging
researchProduct

Embedded students? Can libraries benefit from students having work placements in the library in planning library instruction?

2019

This article discusses how students can be more integrated in developing library instruction and what advantages that can provide for librarians planning their teaching. The students seem to have a different starting point as to how important the librarians’ knowledge of the subject at hand is and whether or not library instruction should be an integrated part of the course.

Point (typography)Computer scienceComputerApplications_COMPUTERSINOTHERSYSTEMSembedded studentsSubject (documents)VDP::Social science: 200::Library and information science: 320::Knowledge retrieval and organization: 323Library and Information SciencesLibrary instructionteachingBibliography. Library science. Information resourcessubject specific skillsWork (electrical)library instructionintegrated teachinggeneric skillsComputingMilieux_COMPUTERSANDEDUCATIONMathematics educationZ
researchProduct

Latvia: 20 Years Stability … or Stagnation?

2021

Fraught with the legacy of a former Soviet Republic, Latvia has had to (re-)establish democracy, market economy and a nation state simultaneously. Today, Latvia is a consolidated democracy, backed by a vibrant civic sphere. Yet its political parties and parliament still lack capacity and societal embeddedness. Short-lived government coalitions have failed to facilitate more investment in competitive economic sectors, higher education and research. Key policy challenges include economic development, mitigating a dramatic demographic crunch and managing complicated relations with Russia.

PoliticsGovernmentEmbeddednessParliamentPolitical sciencePolitical economymedia_common.quotation_subjectEconomic sectorEuropean integrationNation stateDemocracymedia_common
researchProduct