By Topic

Computer Engineering & Systems, 2009. ICCES 2009. International Conference on

Date 14-16 Dec. 2009

Filter Results

Displaying Results 1 - 25 of 142
  • Final program

    Publication Year: 2009, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (279 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (339 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • Greetings from the Chairs

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (40 KB) | HTML iconHTML
    Freely Available from IEEE
  • ICCES'09 Committees

    Publication Year: 2009, Page(s):iv - v
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):vi - xiv
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Teaching microelectronic design by using student active methods in the era of elearning

    Publication Year: 2009, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Quantum network security

    Publication Year: 2009, Page(s): xvi
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (53 KB)

    This talk gives a brief overview of how to use basic concepts of quantum mechanics to achieve unconditional network security. Quantum key distribution (QKD) is used for this purpose to enhance Vernam ciphers. A protocol used for QKD is the Bennett-Brassard (BB84) protocol, which uses 4 nonorthogonal quantum states. Ideally, it uses single photon generators and a quantum channel assisted by a class... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research in 9 weeks, can it be done?

    Publication Year: 2009, Page(s): xvii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (55 KB)

    Summary form only given. This talk is based on the presenter's experience directing two outreach research projects funded by the US National Science Foundation with the aim of increasing the interest of students in K-16 in science and engineering education and research in the United States. Both programs are interdisciplinary in nature building on the experience of faculty from Electrical, Mechani... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • eLearning: Perspectives and directions

    Publication Year: 2009, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (30 KB) | HTML iconHTML
    Freely Available from IEEE
  • Session ES: Embedded systems & hardware/software co-design

    Publication Year: 2009, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • An abstraction-aware compiler for VHDL models

    Publication Year: 2009, Page(s):3 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    Safety-critical hard real time systems as the flight control computer in avionics or airbag control software in the automotive industry need to be validated for their correct behavior. Besides the functional correctness, timely task completion is essential, i.e. the worst-case execution time (WCET) of each task in the system has to be determined. Saarland University and AbsInt GmbH have successful... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low area FPGA and ASIC implementations of the hash function “Blue Midnight Wish-256”

    Publication Year: 2009, Page(s):10 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    Hash functions are widely used in information security and cryptography. They are used in countless applications such as message authentication codes (MAC), Digital Signatures (DS) and mobile trusted modules (MTM). Serious attacks have been reported against cryptographic hash algorithms, including SHA-1. Because the SHA-1 and SHA-2 families share a similar design, the National Institute of Standar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An encoding scheme to reduce power consumption in Networks-on-Chip

    Publication Year: 2009, Page(s):15 - 20
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (495 KB) | HTML iconHTML

    In this paper we present a novel data encoding scheme to reduce the power dissipation and the energy consumption of the communication system in a network-on-chip (NoC) based system-on-chip (SoC). As technology shrinks an ever more significant fraction of the overall system power/energy budget is due to the on-chip interconnect. It is therefore essential the definition of new methodologies and tech... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a self-reconfigurable embedded processor architecture

    Publication Year: 2009, Page(s):21 - 26
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Embedded processors with fixed architecture have disadvantages: they are neither reusable nor are they flexible enough to match the specific needs of different application domains. The main technique employed to accelerate instruction execution in such processors is to add fixed hardware units, which may be useless for some applications yet insufficient for others. This additional hardware may aff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Code transformations and SIMD impact on embedded software energy/power consumption

    Publication Year: 2009, Page(s):27 - 32
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    The increasing demand for portable computing has elevated power consumption to be one of the most critical embedded systems design parameters. In this paper, we present a qualitative study wherein we examine the impact of code transformations on the energy and power consumption. Three main categories of code transformations are investigated, namely data, loop and procedural oriented transformation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient search area loading technique for block-based motion estimation and its FPGA implementation using flexible triangle search algorithm

    Publication Year: 2009, Page(s):33 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (118 KB) | HTML iconHTML

    An efficient technique for loading search area in block-based motion estimation is proposed. The main advantage of the proposed technique is to reduce number of search area loading cycles by taking advantage of the vertical and horizontal overlap between adjacent search areas and thus improve the overall performance of the motion search and frame encoding. The proposed technique was implemented in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session IP1: image & video processing I

    Publication Year: 2009, Page(s):37 - 38
    Request permission for commercial reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • A comparison study between spiral and traditional fractal image compression

    Publication Year: 2009, Page(s):39 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    In this paper, we study the affect of using the spiral architecture instead of the square block decomposition and in fractal compression. Comparisons with other systems like the conventional square and the simplified fractal compression systems are presented. A comparison with standard JPEG system is also introduced. We applied these types of fractal compression on a video sequence. We found that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of infrared face recognition using PCA and ZM

    Publication Year: 2009, Page(s):45 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    Infrared (IR) Face recognition has become an area of growing interest since it can operate in dim light and total darkness. This paper introduces a comparative study between the infrared face recognition systems using the principle component analysis (PCA) and the Zernike moments (ZM) techniques. The performance is evaluated according to the recognition rate, time consumption, and immunity to both... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object tracking in deformed patterns

    Publication Year: 2009, Page(s):51 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (515 KB) | HTML iconHTML

    The geometrical modeling and tracking of visual targets is a key subject in several advanced technologies. The precision of the visual tracking is still an open area for research due to the presence of several serious problems. This paper presents a successful technique to benefit from the camera as a real ranging sensor by which the serious errors due to deformations will be eliminated. The visua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid algorithm for fingerprint enhancement

    Publication Year: 2009, Page(s):57 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (663 KB) | HTML iconHTML

    Quality enhancement of fingerprint images is important for a good performance of Automatic Fingerprint Identification System (AFIS). In this paper, a hybrid fingerprint enhancement algorithm is presented. This algorithm is based on morphological enhancement in the additive wavelet transform domain and Wave Atom denoising. The performance of the proposed algorithm has been evaluated on a set of ima... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image fusion based on principal component analysis and high-pass filter

    Publication Year: 2009, Page(s):63 - 70
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    Several commercial earth observation satellites carry dual-resolution sensors, which provide high spatial resolution panchromatic image and low spatial resolution multi-spectral image. Image fusion techniques are therefore useful for integrating a high spectral resolution image with a high spatial resolution image, to produce a fused image with high spectral and spatial resolutions. Some image fus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.