Abstract: This paper presents a new methodology to study power and energy consumption in mechatronic systems early in the development process. This new approach makes use of two modeling languages to represent and simulate embedded control software and electromechanical subsystems in the discrete event and continuous time domain respectively within a single co-model. This co-model enables an accurate representation of power and energy consumption and facilitates the analysis and development of both software and electro-mechanical subsystems in parallel. This makes the engineers aware of energy-wise implications of different design alternatives and enables early trade-off analysis from the beginning of the analysis and design activities.
Abstract: Avionics software is safe-critical embedded software
and its architecture is evolving from traditional federated architectures
to Integrated Modular Avionics (IMA) to improve resource usability.
ARINC 653 (Avionics Application Standard Software Interface) is a
software specification for space and time partitioning in Safety-critical
avionics Real-time operating systems. Arinc653 uses two-level
scheduling strategies, but current modeling tools only apply to simple
problems of Arinc653 two-level scheduling, which only contain time
property. In avionics industry, we are always manually allocating
tasks and calculating the timing table of a real-time system to ensure
it-s running as we design. In this paper we represent an automatically
generating strategy which applies to the two scheduling problems with
dependent constraints in Arinc653 partition run-time environment. It
provides the functionality of automatic generation from the task and partition models to scheduling policy through allocating the tasks to the partitions while following the constraints, and then we design a simulating mechanism to check whether our policy is schedulable or
not
Abstract: To understand the seismic behavior of the offshore
structures, the dynamic interaction of the water-structure-soil should
be assessed. In this regard the role of the water dynamic properties in
magnifying or reducing of the effects of earthquake induced motions
on offshore structures haven't been investigated in precise manner in
available literature. In this paper the sea water level fluctuations
effects on the seismic behavior of a sample of offshore structures has
been investigated by emphasizing on the water-structure interaction
phenomenon. For this purpose a two dimensional finite element
model of offshore structures as well as surrounded water has been
developed using ANSYS software. The effect of soil interaction with
embedded pile foundation has been imposed by using a series of
nonlinear springs in horizontal and vertical directions in soil-piles
contact points. In the model, the earthquake induced motions have
been applied on springs and consequently the motions propagated
upward to the structure and surrounded water. As a result of
numerical study, the horizontal deformations of the offshore deck as
well as internal force and buckling coefficient in structural elements
have been recorded and controlled with and without water presence.
In part of study a parametric study has been accomplished on sea
water level fluctuations and effect of this parameter has been studied
on the aforementioned numerical results.
Abstract: A robot simulator was developed to measure and
investigate the performance of a robot navigation system based on
the relative position of the robot with respect to random obstacles in
any two dimensional environment. The presented simulator focuses
on investigating the ability of a fuzzy-neural system for object
avoidance. A navigation algorithm is proposed and used to allow
random navigation of a robot among obstacles when the robot faces
an obstacle in the environment. The main features of this simulator
can be used for evaluating the performance of any system that can
provide the position of the robot with respect to obstacles in the
environment. This allows a robot developer to investigate and
analyze the performance of a robot without implementing the
physical robot.
Abstract: Image watermarking has become an important tool for
intellectual property protection and authentication. In this paper a
watermarking technique is suggested that incorporates two
watermarks in a host image for improved protection and robustness.
A watermark, in form of a PN sequence (will be called the secondary
watermark), is embedded in the wavelet domain of a primary
watermark before being embedded in the host image. The technique
has been tested using Lena image as a host and the camera man as
the primary watermark. The embedded PN sequence was detectable
through correlation among other five sequences where a PSNR of
44.1065 dB was measured. Furthermore, to test the robustness of the
technique, the watermarked image was exposed to four types of
attacks, namely compression, low pass filtering, salt and pepper noise
and luminance change. In all cases the secondary watermark was
easy to detect even when the primary one is severely distorted.
Abstract: In this work we introduce an efficient method to limit
the impact of the hiding process on the quality of the cover speech.
Vector quantization of the speech spectral information reduces drastically
the number of the secret speech parameters to be embedded
in the cover signal. Compared to scalar hiding, vector quantization
hiding technique provides a stego signal that is indistinguishable from
the cover speech. The objective and subjective performance measures
reveal that the current hiding technique attracts no suspicion about the
presence of the secret message in the stego speech, while being able
to recover an intelligible copy of the secret message at the receiver
side.
Abstract: One of the most growing areas in the embedded community is multimedia devices. Multimedia devices incorporate a number of complicated functions for their operation, like motion estimation. A multitude of different implementations have been proposed to reduce motion estimation complexity, such as spiral search. We have studied the implementations of spiral search and identified areas of improvement. We propose a modified spiral search algorithm, with lower computational complexity compared to the original spiral search. We have implemented our algorithm on an embedded ARM based architecture, with custom memory hierarchy. The resulting system yields energy consumption reduction up to 64% and performance increase up to 77%, with a small penalty of 2.3 dB, in average, of video quality compared with the original spiral search algorithm.
Abstract: A simple but effective digital watermarking scheme
utilizing a context adaptive variable length coding (CAVLC) method
is presented for wireless communication system. In the proposed
approach, the watermark bits are embedded in the final non-zero
quantized coefficient of each DCT block, thereby yielding a potential
reduction in the length of the coded block. As a result, the
watermarking scheme not only provides the means to check the
authenticity and integrity of the video stream, but also improves the
compression ratio and therefore reduces both the transmission time
and the storage space requirements of the coded video sequence. The
results confirm that the proposed scheme enables the detection of
malicious tampering attacks and reduces the size of the coded H.264
file. Therefore, the current study is feasible to apply in the video
applications of wireless communication such as 3G system
Abstract: Developers need to evaluate software's performance to make software efficient. This paper suggests a performance evaluation system for embedded software. The suggested system consists of code analyzer, testing agents, data analyzer, and report viewer. The code analyzer inserts additional code dependent on target system into source code and compiles the source code. The testing agents execute performance test. The data analyzer translates raw-level results data to class-level APIs for reporting viewer. The report viewer offers users graphical report views by using the APIs. We hope that the suggested tool will be useful for embedded-related software development,because developers can easily and intuitively analyze software's performance and resource utilization.
Abstract: In this paper, a set of experimental data has been used to assess the influence of abrasive water jet (AWJ) process parameters in cutting 6063-T6 aluminum alloy. The process variables considered here include nozzle diameter, jet traverse rate, jet pressure and abrasive flow rate. The effects of these input parameters are studied on depth of cut (h); one of most important characteristics of AWJ. The Taguchi method and regression modeling are used in order to establish the relationships between input and output parameters. The adequacy of the model is evaluated using analysis of variance (ANOVA) technique. In the next stage, the proposed model is embedded into a Simulated Annealing (SA) algorithm to optimize the AWJ process parameters. The objective is to determine a suitable set of process parameters that can produce a desired depth of cut, considering the ranges of the process parameters. Computational results prove the effectiveness of the proposed model and optimization procedure.
Abstract: China apparel industry, which is deeply embedded in
the global production network (GPN), faces the dual pressures of
social upgrading and economic upgrading. Based on the survey in
Ningbo apparel cluster, the paper shows the state of corporate social
responsibility (CSR) in China apparel industry is better than before.
And the investigation indicates that the firms who practice CSR
actively perform better both socially and economically than those who
inactively. The research demonstrates that CSR can be an initial
capital rather than cost, and “doing well by doing good" is also existed
in labor intensive industry.
Abstract: Recent years have witnessed the rapid development of
the Internet and telecommunication techniques. Information security
is becoming more and more important. Applications such as covert
communication, copyright protection, etc, stimulate the research of
information hiding techniques. Traditionally, encryption is used to
realize the communication security. However, important information
is not protected once decoded. Steganography is the art and science
of communicating in a way which hides the existence of the communication.
Important information is firstly hidden in a host data, such
as digital image, video or audio, etc, and then transmitted secretly
to the receiver.In this paper a data hiding model with high security
features combining both cryptography using finite state sequential
machine and image based steganography technique for communicating
information more securely between two locations is proposed.
The authors incorporated the idea of secret key for authentication
at both ends in order to achieve high level of security. Before the
embedding operation the secret information has been encrypted with
the help of finite-state sequential machine and segmented in different
parts. The cover image is also segmented in different objects through
normalized cut.Each part of the encoded secret information has been
embedded with the help of a novel image steganographic method
(PMM) on different cuts of the cover image to form different stego
objects. Finally stego image is formed by combining different stego
objects and transmit to the receiver side. At the receiving end different
opposite processes should run to get the back the original secret
message.
Abstract: In this paper the problems associated with immunity
of embedded systems used in Motor-Drive systems are investigated
and appropriate solutions are presented. Integration of VSD motor
systems (Integral Motor) while partially reducing some of these
effects, adds to immunity problem of their embedded systems. Fail
safe operation of an Integral Motor in arduous industrial
environments is considered. In this paper an integral motor with a
unique design is proposed to overcome critical issues such as heat,
vibration and electromagnetic interference which are damaging to
sensitive electronics without requirement of any additional cooling
system. Advantages of the proposed Integral motor are compactness
of combo motor and drive system with no external cabling/wiring.
This motor provides a perfect shielding for least amount of radiated
emission. It has an inbuilt filter for EMC compliance and has been
designed to provide lower EMC noise for immunity of the internal
electronics as well as the other neighbouring systems.
Abstract: Digital watermarking is one of the techniques for
copyright protection. In this paper, a normalization-based robust
image watermarking scheme which encompasses singular value
decomposition (SVD) and discrete cosine transform (DCT)
techniques is proposed. For the proposed scheme, the host image is
first normalized to a standard form and divided into non-overlapping
image blocks. SVD is applied to each block. By concatenating the
first singular values (SV) of adjacent blocks of the normalized image,
a SV block is obtained. DCT is then carried out on the SV blocks to
produce SVD-DCT blocks. A watermark bit is embedded in the highfrequency
band of a SVD-DCT block by imposing a particular
relationship between two pseudo-randomly selected DCT
coefficients. An adaptive frequency mask is used to adjust local
watermark embedding strength. Watermark extraction involves
mainly the inverse process. The watermark extracting method is blind
and efficient. Experimental results show that the quality degradation
of watermarked image caused by the embedded watermark is visually
transparent. Results also show that the proposed scheme is robust
against various image processing operations and geometric attacks.
Abstract: This paper discusses the causal explanation capability
of QRIOM, a tool aimed at supporting learning of organic chemistry
reactions. The development of the tool is based on the hybrid use of
Qualitative Reasoning (QR) technique and Qualitative Process
Theory (QPT) ontology. Our simulation combines symbolic,
qualitative description of relations with quantity analysis to generate
causal graphs. The pedagogy embedded in the simulator is to both
simulate and explain organic reactions. Qualitative reasoning through
a causal chain will be presented to explain the overall changes made
on the substrate; from initial substrate until the production of final
outputs. Several uses of the QPT modeling constructs in supporting
behavioral and causal explanation during run-time will also be
demonstrated. Explaining organic reactions through causal graph
trace can help improve the reasoning ability of learners in that their
conceptual understanding of the subject is nurtured.
Abstract: As embedded and portable systems were emerged power consumption of circuits had been major challenge. On the other hand latency as determines frequency of circuits is also vital task. Therefore, trade off between both of them will be desirable. Modulo 2n+1 adders are important part of the residue number system (RNS) based arithmetic units with the interesting moduli set (2n-1,2n, 2n+1). In this manuscript we have introduced novel binary representation to the design of modulo 2n+1 adder. VLSI realization of proposed architecture under 180 nm full static CMOS technology reveals its superiority in terms of area, power consumption and power-delay product (PDP) against several peer existing structures.
Abstract: In this paper, a robust watermarking algorithm using
the wavelet transform and edge detection is presented. The efficiency
of an image watermarking technique depends on the preservation of
visually significant information. This is attained by embedding the
watermark transparently with the maximum possible strength. The
watermark embedding process is carried over the subband
coefficients that lie on edges, where distortions are less noticeable,
with a subband level dependent strength. Also, the watermark is
embedded to selected coefficients around edges, using a different
scale factor for watermark strength, that are captured by a
morphological dilation operation. The experimental evaluation of the
proposed method shows very good results in terms of robustness and
transparency to various attacks such as median filtering, Gaussian
noise, JPEG compression and geometrical transformations.
Abstract: Economic Load Dispatch (ELD) is a method of determining
the most efficient, low-cost and reliable operation of a power
system by dispatching available electricity generation resources to
supply load on the system. The primary objective of economic
dispatch is to minimize total cost of generation while honoring
operational constraints of available generation resources. In this paper
an intelligent water drop (IWD) algorithm has been proposed to
solve ELD problem with an objective of minimizing the total cost of
generation. Intelligent water drop algorithm is a swarm-based natureinspired
optimization algorithm, which has been inspired from natural
rivers. A natural river often finds good paths among lots of possible
paths in its ways from source to destination and finally find almost
optimal path to their destination. These ideas are embedded into
the proposed algorithm for solving economic load dispatch problem.
The main advantage of the proposed technique is easy is implement
and capable of finding feasible near global optimal solution with
less computational effort. In order to illustrate the effectiveness of
the proposed method, it has been tested on 6-unit and 20-unit test
systems with incremental fuel cost functions taking into account the
valve point-point loading effects. Numerical results shows that the
proposed method has good convergence property and better in quality
of solution than other algorithms reported in recent literature.
Abstract: As far as the latest technological improvements are concerned, digital systems more become popular than the past. Despite this growing demand to the digital systems, content copy and attack against the digital cinema contents becomes a serious problem. To solve the above security problem, we propose “traceable watermarking using Hash functions for digital cinema system. Digital Cinema is a great application for traceable watermarking since it uses watermarking technology during content play as well as content transmission. The watermark is embedded into the randomly selected movie frames using CRC-32 techniques. CRC-32 is a Hash function. Using it, the embedding position is distributed by Hash Function so that any party cannot break off the watermarking or will not be able to change. Finally, our experimental results show that proposed DWT watermarking method using CRC-32 is much better than the convenient watermarking techniques in terms of robustness, image quality and its simple but unbreakable algorithm.
Abstract: The effect of variable chemical reaction on heat and mass transfer characteristics over unsteady stretching surface embedded in a porus medium is studied. The governing time dependent boundary layer equations are transformed into ordinary differential equations containing chemical reaction parameter, unsteadiness parameter, Prandtl number and Schmidt number. These equations have been transformed into a system of first order differential equations. MATHEMATICA has been used to solve this system after obtaining the missed initial conditions. The velocity gradient, temperature, and concentration profiles are computed and discussed in details for various values of the different parameters.