|
Gradual refinement for application-specific MPSoC design from Simulink model to RTL implementation
Kai HUANG, Xiao-lang YAN, Sang-il HAN, Soo-ik CHAE, Ahmed A. JERRAYA, Katalin POPOVICI, Xavier GUERIN, Lisane BRISOLARA, Luigi CARRO
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(2): 151-164.
https://doi.org/10.1631/jzus.A0820085
The application-specific multiprocessor system-on-chip (MPSoC) architecture is becoming an attractive solution to deal with increasingly complex embedded applications, which require both high performance and flexible programmability. As an effective method for MPSoC development, we present a gradual refinement flow starting from a high-level Simulink model to a synthesizable and executable hardware and software specification. The proposed methodology consists of five different abstract levels: Simulink combined algorithm and architecture model (CAAM), virtual architecture (VA), transactional accurate architecture (TA), virtual prototype (VP) and field-programmable gate array (FPGA) emulation. Experimental results of Motion-JPEG and H.264 show that the proposed gradual refinement flow can generate various MPSoC architectures from an original Simulink model, allowing processor, communication and tasks design space exploration.
|
|
Stochastic individual predicate/transition nets
Yao YUE, Chun-ming ZHANG, Hai-xin WANG, Guo-qiang BAI, Hong-yi CHEN
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(2): 165-171.
https://doi.org/10.1631/jzus.A0820268
We analyze the drawbacks of generally distributed time transition stochastic Petri nets (GDTT_SPN) in evaluating the performance of parallel systems, and propose a more general model, stochastic individual predicate/transition nets (SIPTN). SIPTN has higher modeling power and could provide more realistic models compared to GDTT_SPN, because in SIPTN the sojourn time distribution is determined not only by the transition, but also by the individuals. It is further proved that GDTT_SPN is a subset of SIPTN. As SIPTN introduces folding techniques from predicate/transition nets, SIPTN models have simpler and more intuitive graphic notations and accordingly higher usability, and thus are suitable for constructing simulation models for parallel systems.
|
|
Performance improvement of complementary feeders using static transfer switch system
Tahir MAHMOOD, Mohammad Ahmad CHOUDHRY
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(2): 189-200.
https://doi.org/10.1631/jzus.A0820127
The performance of complementary feeders, running in parallel, can be significantly improved by installing static transfer switches (STSs) at critical locations. We develop the STS control logic, which transfers the critical load from the preferred feeder to the alternate feeder when a voltage sag or a fault occurs on the preferred feeder. A forced commutation technique is proposed and implemented to turn off the preferred feeders’ thyristor, thus avoiding cross current to flow and minimizing the transfer time. Simulation results show that the forced commutation technique is more effective as compared to the recently proposed time delay technique for STS operation. Two different feeders, namely New Exchange, the preferred feeder, and Sector I-10/2, the alternate feeder of Islamabad Electric Supply COmpany (IESCO), Pakistan, have been selected for case studies. The software PSCAD/EMTDC professional package has been used for simulation.
|
|
Personal continuous route pattern mining
Qian YE, Ling CHEN, Gen-cai CHEN
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(2): 221-231.
https://doi.org/10.1631/jzus.A0820193
In the daily life, people often repeat regular routes in certain periods. In this paper, a mining system is developed to find the continuous route patterns of personal past trips. In order to count the diversity of personal moving status, the mining system employs the adaptive GPS data recording and five data filters to guarantee the clean trips data. The mining system uses a client/server architecture to protect personal privacy and to reduce the computational load. The server conducts the main mining procedure but with insufficient information to recover real personal routes. In order to improve the scalability of sequential pattern mining, a novel pattern mining algorithm, continuous route pattern mining (CRPM), is proposed. This algorithm can tolerate the different disturbances in real routes and extract the frequent patterns. Experimental results based on nine persons’ trips show that CRPM can extract more than two times longer route patterns than the traditional route pattern mining algorithms.
|
|
Patch-guided facial image inpainting by shape propagation
Yue-ting ZHUANG, Yu-shun WANG, Timothy K. SHIH, Nick C. TANG
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(2): 232-238.
https://doi.org/10.1631/jzus.A0820138
Images with human faces comprise an essential part in the imaging realm. Occlusion or damage in facial portions will bring a remarkable discomfort and information loss. We propose an algorithm that can repair occluded or damaged facial images automatically, named ‘facial image inpainting’. Inpainting is a set of image processing methods to recover missing image portions. We extend the image inpainting methods by introducing facial domain knowledge. With the support of a face database, our approach propagates structural information, i.e., feature points and edge maps, from similar faces to the missing facial regions. Using the inferred structural information as guidance, an exemplar-based image inpainting algorithm is employed to copy patches in the same face from the source portion to the missing portion. This newly proposed concept of facial image inpainting outperforms the traditional inpainting methods by propagating the facial shapes from a face database, and avoids the problem of variations in imaging conditions from different images by inferring colors and textures from the same face image. Our system produces seamless faces that are hardly seen drawbacks.
|
|
Automatic segmentation of bladder in CT images
Feng SHI, Jie YANG, Yue-min ZHU
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(2): 239-246.
https://doi.org/10.1631/jzus.A0820157
Segmentation of the bladder in computerized tomography (CT) images is an important step in radiation therapy planning of prostate cancer. We present a new segmentation scheme to automatically delineate the bladder contour in CT images with three major steps. First, we use the mean shift algorithm to obtain a clustered image containing the rough contour of the bladder, which is then extracted in the second step by applying a region-growing algorithm with the initial seed point selected from a line-by-line scanning process. The third step is to refine the bladder contour more accurately using the rolling-ball algorithm. These steps are then extended to segment the bladder volume in a slice-by-slice manner. The obtained results were compared to manual segmentation by radiation oncologists. The average values of sensitivity, specificity, positive predictive value, negative predictive value, and Hausdorff distance are 86.5%, 96.3%, 90.5%, 96.5%, and 2.8 pixels, respectively. The results show that the bladder can be accurately segmented.
|
|
A multi-class large margin classifier
Liang TANG, Qi XUAN, Rong XIONG, Tie-jun WU, Jian CHU
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(2): 253-262.
https://doi.org/10.1631/jzus.A0820122
Currently there are two approaches for a multi-class support vector classifier (SVC). One is to construct and combine several binary classifiers while the other is to directly consider all classes of data in one optimization formulation. For a K-class problem (K>2), the first approach has to construct at least K classifiers, and the second approach has to solve a much larger optimization problem proportional to K by the algorithms developed so far. In this paper, following the second approach, we present a novel multi-class large margin classifier (MLMC). This new machine can solve K-class problems in one optimization formulation without increasing the size of the quadratic programming (QP) problem proportional to K. This property allows us to construct just one classifier with as few variables in the QP problem as possible to classify multi-class data, and we can gain the advantage of speed from it especially when K is large. Our experiments indicate that MLMC almost works as well as (sometimes better than) many other multi-class SVCs for some benchmark data classification problems, and obtains a reasonable performance in face recognition application on the AR face database.
|
|
A maximum power point tracker for photovoltaic energy systems based on fuzzy neural networks
Chun-hua LI, Xin-jian ZHU, Guang-yi CAO, Wan-qi HU, Sheng SUI, Ming-ruo HU
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(2): 263-270.
https://doi.org/10.1631/jzus.A0820128
To extract the maximum power from a photovoltaic (PV) energy system, the real-time maximum power point (MPP) of the PV array must be tracked closely. The non-linear and time-variant characteristics of the PV array and the non-linear and non-minimum phase characteristics of a boost converter make it difficult to track the MPP for traditional control strategies. We propose a fuzzy neural network controller (FNNC), which combines the reasoning capability of fuzzy logical systems and the learning capability of neural networks, to track the MPP. With a derived learning algorithm, the parameters of the FNNC are updated adaptively. A gradient estimator based on a radial basis function neural network is developed to provide the reference information to the FNNC. Simulation results show that the proposed control algorithm provides much better tracking performance compared with the fuzzy logic control algorithm.
|
|
A cross-layer approach to enable multipacket transmission in MIMO-SDMA based WLAN
Sheng-bo CHEN, Wei CHEN, Wei-lan HUANG, Li-jun ZHAI, Xu-ming LIU
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(2): 271-278.
https://doi.org/10.1631/jzus.A0820362
We propose a medium access control (MAC) protocol for uplink transmissions in wireless local area networks (WLANs), where both stations and access points (APs) are equipped with multiple antennas. The protocol solves some common problems in utilizing multiple input multiple output (MIMO) under the 802.11 protocol, e.g., how to deploy preamble (training sequence) used for channel estimation and how to enable simultaneous data transmissions, and facilitates two simultaneous uplink data transmissions via a cross-layer approach. Furthermore, we develop a 3D discrete-time Markov model to analyze the performance of the proposed WLAN scheme. The analytical results are verified by simulation, and numerical results show that the system throughput can be significantly improved by our proposed scheme as compared with conventional schemes.
|
|
WAPN: a distributed wormhole attack detection approach for wireless sensor networks
Fan-rui KONG, Chun-wen LI, Qing-qing DING, Guang-zhao CUI, Bing-yi CUI
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(2): 279-289.
https://doi.org/10.1631/jzus.A0820178
As the applications of wireless sensor networks (WSNs) diversify, providing secure communication is emerging as a critical requirement. In this paper, we investigate the detection of wormhole attack, a serious security issue for WSNs. Wormhole attack is difficult to detect and prevent, as it can work without compromising sensor nodes or breaching the encryption key. We present a wormhole attack detection approach based on the probability distribution of the neighboring-node-number, WAPN, which helps the sensor nodes to judge distributively whether a wormhole attack is taking place and whether they are in the influencing area of the attack. WAPN can be easily implemented in resource-constrained WSNs without any additional requirements, such as node localization, tight synchronization, or directional antennas. WAPN uses the neighboring-node-number as the judging criterion, since a wormhole usually results in a significant increase of the neighboring-node-number due to the extra attacking link. Firstly, we model the distribution of the neighboring-node-number in the form of a Bernoulli distribution. Then the model is simplified to meet the sensor nodes’ constraints in computing and memory capacity. Finally, we propose a simple method to obtain the threshold number, which is used to detect the existence of a wormhole. Simulation results show that WAPN is effective under the conditions of different network topologies and wormhole parameters.
|
|
Self-certified multi-proxy signature schemes with message recovery
Tzong-sun WU, Chien-lung HSU, Han-yu LIN
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(2): 290-300.
https://doi.org/10.1631/jzus.A0820202
Multi-proxy signature schemes allow the original signer to delegate his/her signing power to n proxy signers such that all proxy signers must corporately generate a valid proxy signature on behalf of the original signer. We first propose a multi-proxy signature scheme based on discrete logarithms and then adapt it to the elliptic curve cryptosystem. With the integration of self-certified public-key systems and the message recovery signature schemes, our proposed schemes have the following advantages: (1) They do not require the signing message to be transmitted, since the verifier can recover it from the signature; (2) The authentication of the public keys, verification of the signature, and recovery of the message can be simultaneously carried out in a single logical step; (3) No certificate is needed for validating the public keys. Further, the elliptic curve variant with short key lengths especially suits the cryptographic applications with limited computing power and storage space, e.g., smart cards. As compared with the previous work that was implemented with the certificate-based public-key systems, the proposed schemes give better performance in terms of communication bandwidth and computation efforts.
|
|
High-performance hardware architecture of elliptic curve cryptography processor over GF(2163)
Yong-ping DAN, Xue-cheng ZOU, Zheng-lin LIU, Yu HAN, Li-hua YI
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(2): 301-310.
https://doi.org/10.1631/jzus.A0820024
We propose a novel high-performance hardware architecture of processor for elliptic curve scalar multiplication based on the Lopez-Dahab algorithm over GF(2163) in polynomial basis representation. The processor can do all the operations using an efficient modular arithmetic logic unit, which includes an addition unit, a square and a carefully designed multiplication unit. In the proposed architecture, multiplication, addition, and square can be performed in parallel by the decomposition of computation. The point addition and point doubling iteration operations can be performed in six multiplications by optimization and solution of data dependency. The implementation results based on Xilinx VirtexII XC2V6000 FPGA show that the proposed design can do random elliptic curve scalar multiplication GF(2163) in 34.11 μs, occupying 2821 registers and 13 376 LUTs.
|
19 articles
|