Transfer of ut information from fpga through ethernet interfaceeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Distributed Video Coding (DVC) has become increasingly popular in recent times among the researchers in video coding due to its attractive and promising features. DVC primarily has a modified complexity balance between the encoder and decoder, in contrast to conventional video codecs. However, Most of the reported DVC schemes have a high time-delay in decoder which hinders its practical application in real-time systems. In this work, we focus on speed up the Side Information(SI) generation module in DVC, which is a major function in the DVC coding algorithm and one of the time-consuming factor at the decoder. By applied it through Compute Unified Device Architecture (CUDA) based on General-Purpose Graphics Processing Unit (GPGPU), the experimental results show that a considerable speedup can be obtained by using the proposed parallelized SI generation algorithm.
Developing TI RTOS Applications and BLE ProfilesSumit Sapra
The project aims to develop Bluetooth® Low Energy (BLE) profiles on the Texas Instruments SimpleLink™ CC2650 SensorTag (TI-SensorTag), a low-power IoT sensor device by Texas Instruments (TI), to transmit data wirelessly according to any specific application.
Transfer of ut information from fpga through ethernet interfaceeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Distributed Video Coding (DVC) has become increasingly popular in recent times among the researchers in video coding due to its attractive and promising features. DVC primarily has a modified complexity balance between the encoder and decoder, in contrast to conventional video codecs. However, Most of the reported DVC schemes have a high time-delay in decoder which hinders its practical application in real-time systems. In this work, we focus on speed up the Side Information(SI) generation module in DVC, which is a major function in the DVC coding algorithm and one of the time-consuming factor at the decoder. By applied it through Compute Unified Device Architecture (CUDA) based on General-Purpose Graphics Processing Unit (GPGPU), the experimental results show that a considerable speedup can be obtained by using the proposed parallelized SI generation algorithm.
Developing TI RTOS Applications and BLE ProfilesSumit Sapra
The project aims to develop Bluetooth® Low Energy (BLE) profiles on the Texas Instruments SimpleLink™ CC2650 SensorTag (TI-SensorTag), a low-power IoT sensor device by Texas Instruments (TI), to transmit data wirelessly according to any specific application.
Study on Adaptive PID Control Algorithm Based on RBF Neural NetworkRadita Apriana
Aim at the limitation of traditional PID controller has certain limitation, the traditionalPID control is
often difficult to obtain satisfactory control performance, and the RBF neural networkis difficult to meet the
requirement ofreal-time control system.To overcome it, an adaptive PID control strategy based on (RBF)
neural network isproposed in this paper. The resultsshow that the proposed controller is practical and
effective, because of the adaptability, strong robustness and satisfactory controlperformance.It is also
revealed from simulation results that the proposed control algorithm is valid for DC motor and also
provides the theoretical and experimental basis.
SNOW 3G is a synchronous, word-oriented stream cipher used by the 3GPP standards as a confidentiality and integrity algorithms. It is used as first set in long term evolution (LTE) and as a second set in universal mobile telecommunications system (UMTS) networks. The cipher uses 128-bit key and 128 bit IV to produce 32-bit ciphertext. The paper presents two techniques for performance enhancement. The first technique uses novel CLA architecture to minimize the propagation delay of the 2 modulo adders. The second technique uses novel architecture for S-box to minimize the chip area. The presented work uses VHDL language for coding. The same is implemented on the FPGA device Virtex xc5vfx100e manufactured by Xilinx. The presented architecture achieved a maximum frequency of 254.9 MHz and throughput of 7.2235 Gbps. 32
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Performance Measurement of Digital Modulation Schemes Using FPGAIJRES Journal
Nowadays, we hardly find any field which is not advancing rapidly, modern communication systems
are also advancing at a faster rate. So it is mandatory we must design the techniques to evaluate the performance
of such modern communication systems like Software Defined Radio (SDR), Cognitive Radio using
reconfigurable devices like FPGA. This paper presents the technique for the performance measurement of
digital modulation schemes since the digital modulation schemes are superior as compared to analogue
modulation schemes. The performance characteristics like bit error rate (BER), SNR, SNDR can be used to
evaluate the performance of digital modulation techniques. Bit error rate (BER) is the principle measure of
performance of a data transmission link. The system will be able to measure the performance of more than one
modulation scheme. This paper presents the results of BER for digital modulation schemes; Verilog HDL is
used to implement the proposed techniques.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Quality Optimization of Live Streaming Services over HTTP with Reinforcement ...Alpen-Adria-Universität
Recent years have seen tremendous growth in HTTP adaptive live video traffic over the Internet. In the presence of highly dynamic network conditions and diverse request patterns, existing yet simple hand-crafted heuristic approaches for serving client requests at the network edge might incur a large overhead and significant increase in time complexity. Therefore, these approaches might fail in delivering acceptable Quality of Experience (QoE) to end users. To bridge this gap, we propose ROPL, a learning-based client request management solution at the edge that leverages the power of the recent breakthroughs in deep reinforcement learning, to serve requests of concurrent users joining various HTTP-based live video channels. ROPL is able to react quickly to any changes in the environment, performing accurate decisions to serve clients requests, which results in achieving satisfactory user QoE. We validate the efficiency of ROPL through trace-driven simulations and a real-world setup. Experimental results from real-world scenarios confirm that ROPL outperforms existing heuristic-based approaches in terms of QoE, with a factor up to 3.7×.
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...theijes
Under rich dissipating environment, Multiple Input Multiple Output (MIMO) scheme have better performance in term of reliability and increasing the throughput. Space Time Block Code (STBC) can reduce the Bit Error Rate (BER) with suitable data rate. In order to raise the amount of throughput more, high modulation order is used but it degrade the performance. To address this problem, a Convolutional Code (CC) can be support such system with various code rate to deal with different circumstances. This research is proposed a system with serial concatenation of STBC and CC with various modulation levels. Such system is tested with Rayleigh flat and selective fading channel by Matlab package R2015b with a list of modulation order and changing the code of each STBC and CC. The results show that such system can cover a range of Signal to Noise Ratio (SNR) from 0 to 21 dB of SNR for selective fading channel and -2 to 19 dBfor flat fading channel for a targeted BER of 10-4 with a various modulation index and code rate which lead to a flexible system to change the throughput depending on user conditions.
Vignesh V Menon and Hadi Amirpour gave a talk on ‘Video Complexity Analyzer for Streaming Applications’ at the Video Quality Experts Group (VQEG) meeting on December 14, 2021. Our research activities on video complexity analysis were presented in the talk.
Responsive design has landed in lots of places and is becoming business as usual. Time to reflect: are we doing the right things in the right ways? How do we gracefully move away from desktop-first designs? And how do you approach a responsive design with your complete team in your agile workflow? Let's take a look at the current status of responsive design and figure out how to incorporate a mobile-first workflow in your business.
Study on Adaptive PID Control Algorithm Based on RBF Neural NetworkRadita Apriana
Aim at the limitation of traditional PID controller has certain limitation, the traditionalPID control is
often difficult to obtain satisfactory control performance, and the RBF neural networkis difficult to meet the
requirement ofreal-time control system.To overcome it, an adaptive PID control strategy based on (RBF)
neural network isproposed in this paper. The resultsshow that the proposed controller is practical and
effective, because of the adaptability, strong robustness and satisfactory controlperformance.It is also
revealed from simulation results that the proposed control algorithm is valid for DC motor and also
provides the theoretical and experimental basis.
SNOW 3G is a synchronous, word-oriented stream cipher used by the 3GPP standards as a confidentiality and integrity algorithms. It is used as first set in long term evolution (LTE) and as a second set in universal mobile telecommunications system (UMTS) networks. The cipher uses 128-bit key and 128 bit IV to produce 32-bit ciphertext. The paper presents two techniques for performance enhancement. The first technique uses novel CLA architecture to minimize the propagation delay of the 2 modulo adders. The second technique uses novel architecture for S-box to minimize the chip area. The presented work uses VHDL language for coding. The same is implemented on the FPGA device Virtex xc5vfx100e manufactured by Xilinx. The presented architecture achieved a maximum frequency of 254.9 MHz and throughput of 7.2235 Gbps. 32
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Performance Measurement of Digital Modulation Schemes Using FPGAIJRES Journal
Nowadays, we hardly find any field which is not advancing rapidly, modern communication systems
are also advancing at a faster rate. So it is mandatory we must design the techniques to evaluate the performance
of such modern communication systems like Software Defined Radio (SDR), Cognitive Radio using
reconfigurable devices like FPGA. This paper presents the technique for the performance measurement of
digital modulation schemes since the digital modulation schemes are superior as compared to analogue
modulation schemes. The performance characteristics like bit error rate (BER), SNR, SNDR can be used to
evaluate the performance of digital modulation techniques. Bit error rate (BER) is the principle measure of
performance of a data transmission link. The system will be able to measure the performance of more than one
modulation scheme. This paper presents the results of BER for digital modulation schemes; Verilog HDL is
used to implement the proposed techniques.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Quality Optimization of Live Streaming Services over HTTP with Reinforcement ...Alpen-Adria-Universität
Recent years have seen tremendous growth in HTTP adaptive live video traffic over the Internet. In the presence of highly dynamic network conditions and diverse request patterns, existing yet simple hand-crafted heuristic approaches for serving client requests at the network edge might incur a large overhead and significant increase in time complexity. Therefore, these approaches might fail in delivering acceptable Quality of Experience (QoE) to end users. To bridge this gap, we propose ROPL, a learning-based client request management solution at the edge that leverages the power of the recent breakthroughs in deep reinforcement learning, to serve requests of concurrent users joining various HTTP-based live video channels. ROPL is able to react quickly to any changes in the environment, performing accurate decisions to serve clients requests, which results in achieving satisfactory user QoE. We validate the efficiency of ROPL through trace-driven simulations and a real-world setup. Experimental results from real-world scenarios confirm that ROPL outperforms existing heuristic-based approaches in terms of QoE, with a factor up to 3.7×.
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...theijes
Under rich dissipating environment, Multiple Input Multiple Output (MIMO) scheme have better performance in term of reliability and increasing the throughput. Space Time Block Code (STBC) can reduce the Bit Error Rate (BER) with suitable data rate. In order to raise the amount of throughput more, high modulation order is used but it degrade the performance. To address this problem, a Convolutional Code (CC) can be support such system with various code rate to deal with different circumstances. This research is proposed a system with serial concatenation of STBC and CC with various modulation levels. Such system is tested with Rayleigh flat and selective fading channel by Matlab package R2015b with a list of modulation order and changing the code of each STBC and CC. The results show that such system can cover a range of Signal to Noise Ratio (SNR) from 0 to 21 dB of SNR for selective fading channel and -2 to 19 dBfor flat fading channel for a targeted BER of 10-4 with a various modulation index and code rate which lead to a flexible system to change the throughput depending on user conditions.
Vignesh V Menon and Hadi Amirpour gave a talk on ‘Video Complexity Analyzer for Streaming Applications’ at the Video Quality Experts Group (VQEG) meeting on December 14, 2021. Our research activities on video complexity analysis were presented in the talk.
Responsive design has landed in lots of places and is becoming business as usual. Time to reflect: are we doing the right things in the right ways? How do we gracefully move away from desktop-first designs? And how do you approach a responsive design with your complete team in your agile workflow? Let's take a look at the current status of responsive design and figure out how to incorporate a mobile-first workflow in your business.
9-11 settembre 2016 | Quale umano per il terzo millennio?AskesisSrl
Premessa:
Il momento storico che stiamo vivendo è ricco di opportunità notevoli.
Pur in mezzo a tanti problemi e incertezze, pensiamo che sia doveroso riflettere e agire per ridare speranza, nuova linfa e creare rete tra tutte le persone di buona volontà che intendono impegnarsi per vivere in pienezza la propria esistenza.
Interverranno Vito Mancuso e Giorgio Bonaccorso
Multiplex and De-multiplex of Generated Multi Optical Soliton By MRRs Using F...University of Malaya (UM)
A microring resonators (MRRs) system conecting to an ad/drop system is presented
to create ultra-short multi soliton pulses which can be used for optical communication. The
ad/drop system can be used to generate a high capacity of ultra-short soliton pulses. A bright
soliton pulse propagates inside the system, where chaotic noise can be generated. The
obtained multi solution have ful width at half maximum (FWHM) of 16 ps, 20 pm, 140 ps,
40 pm and fre spectrum range, FSR of 50 ps, 0.57 nm, 3.6 ns and 1.45 nm respectively.
Here, the single temporal soliton pulse having FWHM of 75 fs, 84 fs could be generated. The
ultra-short multi soliton pulses with wavelengths range from λ=150 to λ=1560 can be
multiplexed, transmited along an optical fiber optics with a length of 50 km and finaly be
de-multiplexed and detected by the users at he end of the optical transmision link.
This was a workshop done for the DBS Hotspot Accelerator program. The intent is to provide guardrails for new accelerator mentors who may have never mentored start-up teams and want to learn from all my many mistakes.
Nowadays, digital watermarking has many
applications such as broadcast monitoring, owner identification,
proof of ownership, transaction tracking. Embedding a hidden
stream of bits in a file is called Digital Watermarking. This paper
introduces a LSB information hiding algorithm which can lift the
wavelet transform image. LSB based Steganography embeds the
hiding text message in least significant bit of the pixels. The
proposed method has good invisibility, robustness for a lot of
hidden attacks. As we think about the capacity lead us to think
about improved approach which can be achieved through
hardware implementation system by using Field Programmable
Gate Array (FPGA). In this paper hardware implementation of
digital watermarking system is proposed. MATLAB is used to
convert images into pixel-format files and to observe simulation
results. To implement this paper XPS & VB are needed. In XPS,
first select hardware & software components then by adding
source and header files & converting into bit streams and
download into FPGA, to obtain Stego image.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdfSaiReddy794166
The International Journal of Engineering and Science and Research is online journal in English published. The aim is to publish peer review and research articles without delay in the developing in engineering and science Research.The International Journal of Engineering and Science and Research is online journal in English published. The aim is to publish peer review and research articles without delay in the developing in engineering and science Research.
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...ijiert bestjournal
The necessity for copyright protection,ownership v erification,and other issues for digital data are getting more and more value these days. For the rap id revolution in digital multimedia and the ease of creating similar and unauthorized data,the digital data can be copied or manipulated or distributed. So it is necessary to watermark the media content for tamper proofing or quality assessment or copy control. In this paper we propose a JPEG2000 compre ssion. The compression standard is chosen such that it provides higher compression ratio and the c ompressed byte stream are randomized by the encryption algorithm. In our paper watermarking was done in the compressed � encrypted domain. We use different watermarking techniques for this. Att empting to watermark such a randomized bit stream can cause a dramatic degradation of the media quali ty. Thus it is necessary to choose an encryption scheme that is both secure and will allow watermark ing in a predictable manner in the compressed encrypted domain. The projected method is a robust watermarking algorithm to watermark JPEG2000 compressed and encrypted images (grayscale) of size 512�512. The encryption algorithm in this paper uses stream cipher. While the estimated technique e mbeds watermark in the compressed-encrypted domain,and the extraction of watermark can be done in the encrypted domain. The proposed algorithm also conserves the confidentiality of data as the e mbedding process can be done on encrypted data.
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...IJECEIAES
This paper introduces a dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol to enhance the services of the real-time applications such as increases the security level and reduces latency. The proposed algorithm was divided into two processes: dynamic key generation process using 128-bit hash value to dynamically alter the initial secret keys, and encryption and decryption process using Lorenz system. In the proposed algorithm, the performance evaluation is carried out through efficient simulations and implementations and statistical analysis. In addition, the average time delay in the proposed algorithm and some of the existing algorithms such as AES is compared. The obtained results concluded that, the proposed dynamic speech encryption algorithm is effectually secured against various cryptanalysis attacks and has useful cryptographic properties such as confusion and diffusion for better voice communication in the voice applications field in the Internet.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
A smart front end real-time detection and tracking
1. A Smart Front-end Real-Time Detection and Tracking
1
Lih-Guong Jang (張立光),
2
JHIH-GUO, PENG (彭智國)
Identification and Security Technology Center,
Industrial Technology Research Institute, Taiwan, ROC
1
E-mail: lihguong@itri.org.tw
2
E-mail: jhihguonpeng@itri.org.tw
Abstract— When a security event occurs, most of conventional
surveillance systems cannot meet the real-time security
analysis requirement; they usually record huge video data on
backend system and spend a lot of manpower to search for the
event pictures. In this paper we present and share the
experience on the TI DM6467 front-end embedded video
surveillance implementation for the real-time security
detection and identification. Based on TI DM6467, we develop
an intelligent surveillance front-end embedded devices called
"S-Box" which performs video analytics, signal sensing, data
fusion and WEB streaming.
Keywords- Embedded surveillance system, dynamic textures,
target tracking, spatial-temporal, background
I. INTRODUCTION
Video surveillance systems can be configured in
centralized or distributed architecture, or some combination
thereof. The design of the appropriate architecture for each
particular situation should balance the needs for (1) central
control and override capability, (2) robust, failure-resistant
operation, (3) autonomous, degraded modes of operation, (4)
peak versus average throughput, (5) expansion requirements,
(6) resistance to compromise, etc.
This paper presents a smart front-end solution for a
configurable embedded intelligence of a real-time video
analysis, signal sensing, data fusion, and monitoring
implementation which is called “S-Box”. In S-Box, novel
data fusion algorithm is proposed to fuse the various kinds
of sensor data including visual sensor, RFID and other types
of sensors. Here, we integrate the information from sensor-
based and vision-based surveillance systems [1] and
perform the data fusion process to construct the “security
metadata” for real time security analytics. Furthermore,
multiple S-Boxes can form a surveillance network in which
a coordination scheme for the networked S-Boxes is used to
track the designated target over a large open space. All the
above-mentioned technologies will be implemented on a
new embedded system which provides high computation
power and module integration capability.
A. S-Box Hardware Design Features
S-Box is designed as a distributed embedded computing
in (1) multi-thread processing for embedded intelligence, (2)
multi-modal data fusion for multi-sensor platform, and (3)
system optimization for embedded multi-media signal
processing.
S-Box consists of the TI DM6467 multi-core processing
unit and the peripheral as showed Figure 1. The peripheral
include (1) the communication unit embodies Power over
Ethernet, and Small Form-factor Pluggable, and (2) the
sensing unit embodies two video input ports, one video
output port, an audio input port, an audio output port, two
discrete input port, two discrete output ports, and a relay out
port.
Figure 1. The prototype of the S-BOX.
According to a first aspect of the Intelligent Video
Analysis (IVA) function, two video signal input with D1
resolution at 30 frames per second per channel to the
processing unit, for real-time video analysis and compression.
The video analysis results from TI DM6467 DSP core
will send to TI DM6467 ARM core [4][5] for the condition
judgment, the final results metadata will be through the
XML protocol then sent to remote backend system. In
addition, the video analysis results will be compressed into
H.264 or MJPEG format by TI DM6467 embedded video
compression engine. The compressed video streaming will
be through the RTSP or RTP/RTCP protocol to transmit to
the remote backend system or Network Video Server.
According to a second aspect of the external data fusion
function, the S-Box peripheral receive sensing signals of
external sensing apparatuses such as cameras, audio or a
discrete signal. The disparate range of sensing signals and
video analysis results will be data fusion by the novel sensor-
centric data fusion model.
S-Box can compressed audio signals into AAC or G711
digital audio format. Then by using RTSP or RTP/RTCP
protocol to transmitted to the remote backend system or
Network Video Server. S-Box also can receive remote
broadcast audio signal and output to an external speaker
device. Four discrete signal input to provide systems for
2. video recognition analytic parameters. In addition, after the
data fusion results through the decision support in spatial-
temporal situational awareness process, the peripheral
controller based on output result via the Relay ON/OFF to
control the remote alarm device.
B. S-Box IVA Software Design Features
S-Box IVA is based on TI DM6467 to developed an
object detection and tracking and other video analysis
algorithms of the front-end video processing system (Figure
2). The WEB interface can provide users to configure the S-
Box parameter IVA analysis and Streaming parameters. The
WEB interface features are:
1) Do not need to transmit the original video material to
the backend systems for video analysis. The video analysis
will be processed at front-end device to achieve a timely
manner and reduce the effect of network bandwidth
requirements.
2) Onsite video encode and stream videos to backend
Playback provide users with real-time information.
3) Users can control S-Box IVA analysis result by
setting IVA parameters (Y, Cr, Cb, LBP, background updata)
and based on user’s network state to adjusts streaming
parameters (unicast/mutilcast, stream port, stream type) on
WEB interface.
Figure 2. S-Box WEB streaming architecture.
The S-Box IVA program was developed by the TI
DM6467 development tools (VISA APIs, DMAI and SDK
APIs) [2][3][4][5]. The software architecture diagram shown
in Figure 3.
The IVA program includes eight threads: main thread but
eventually turned into control thread, capture thread, IVA
thread, video thread, writer thread, audio decode thread,
stream thread and PTZ thread. In addition to main (control)
thread and stream thread other than the priority of the
remaining threads are set to SCHED_FIFO. Order of priority
as follows: capture thread is the highest priority, video thread
is the second priority, IVA thread and audio thread is the
third priority, writer thread and PTZ thread are the fourth
priority, and control thread is the fifth priority.
Initialization and cleanup of these threads is based on TI
DMAI Rendezvous module to be synchronized. This module
use POSIX conditions to synchronize the implementation of
the thread. After initialization of every thread is completed,
every thread will send signals to the Rendezvous object and
wait. When all threads are completed initialization, all
threads will also unlock and start their own main loop. The
cleanup process is also using the same mechanism.
Figure 3. S-Box software architecture diagram.
S-Box streaming server was developed by "LIVE555"[6],
it supports open standards such as RTP/RTCP, RTSP, SIP
for streaming. The S-Box streaming server included four
parts: "BasicUsageEnvironment" and "UsageEnvironment"
are used when the event occurs, to process event's dispatch.
"Groupsock" processes network socket, mainly used when
using the multi-cast stream. "liveMedia" contains basic
medium, and can manage MPEG4, AAC and H.264.
Figure 4. RTSP communication flow char
As shown in Figure 4 we implement the RTSP
communication process on the RTSP Server. If the RTSP
Server accepts the Client connection, it will according to the
RTSP standard to accepts "PLAY" command, which will
began to capture compressed video address and Frame Size
from Encoded Buffer through inter-process-communication,
and using Unicast protocol transmission data.
II. FRONT-END SURVEILLANCE SYSTEM
This section describes the key technology of the S-Box
IVA algorithm development, including the Background
Modeling, Foreground Detection and texture.
3. A. Spatial-Temporal Probability Model
In general, target detection can’t be accurate under the
lighting variation environment or clustering background.
Particularly, the lighting reflection and back-lighted
problems can deteriorate the target detection seriously. In
this section, we propose a spatial-temporal probability
background model to segment the foreground and
background on a lighting variant or clustering background.
Furthermore, to detect the foreground efficiently and
robustly, multi-resolution image processing and model-
based background updating are applied.
The intensity variation for each pixel on temporal domain
is modeled by the SDG models. However, when the targets
are detected on a non-stationary or clustering scene, the
pixel distribution of background may change. The statistical
information of the texture distribution may improve
background changing problem. Mixture of spatial and
temporal statistical models are then proposed to remove the
influencing of the non-stationary and clustering background.
The intensity variation of a pixel is shown in Figure 5-(a)
and texture statistics of a pixel around the neighboring
pixels is shown in Figure 5-(b). Finally, the spatial-temporal
probability model is defined as:
| | |x x s s s x t t t xp I B w p I B w p I B , (1)
where It and Is are the intensity value measured among the
temporal axis and the spatial neighboring pixels respectively,
and Bx is the pixel distribution of background. The values of
the weighting factors, ws and wt, should sum up to one.
Figure 5. (a) Temporal variation of a background pixel. (b) Spatial
variation of a background pixel among the neighboring pixels.
Then, the likelihood ratio using the spatial-temporal
probability model is defined as:
| xp I B
L
, (2)
where λ is constant. If p(I|Bx) ≥ λ/L, then the pixel belongs
to the background otherwise it belongs to the foreground.
In addition, because it is difficult to detect objects when
the intensity distribution is close to the background model,
the fusion of likelihood ratios of three color components
(RGB or YCrCb) are proposed to overcome this problem. In
general, there are two fusion rules to detect the foreground
about linear combination and voting rules as:
By comparing several fusion rules, we apply the voting
rule to cope with the illumination variation problem. If a
pixel is classified as background with more than two
components’ background models, then this pixel is
classified as background, otherwise, it is classified as
foreground. Figure 6 illustrates the foreground detection
using the voting rule. It is obvious that the foreground
detection using voting rule outperform the one using linear
combination rule. Hence, we apply the voting rule to detect
the objects on the outdoor crowd scene to cope with the
illumination variation problem.
Figure 6. Object detection using spatial-temporal probability model.
Linear combination rule:
If wy pY(uy|Bx)+wcr pCr(uCr|Bx)+wcb pCb(uCb |Bx) > T
pixel u is classified as background,
otherwise,
pixel u is classified as foreground,
where, wy , wcr , wcb are weighting factors and sum of
the weighting factors is equal to one.
Voting rule:
Given pY(uy|Bx), pCr(uCr|Bx), pCb(uCb |Bx ),
If a pixel is classified as background with more
than two components’ background models,
{ pY(uy|Bx) < λ/L and pCr(uCr|Bx)< λ/L } or
{ pCr(uCr|Bx) < λ/L and pCb(uCb |Bx ) < λ/L } or
{ pY(uy|Bx) < λ/L and pCb(uCb |Bx ) < λ/L }
Pixel u is classified as background,
otherwise,
Pixel u is classified as foreground.
4. Endif
,clear
,foregroundFalse
else
,update
,foregroundTrue
,If
,count
foregroundIf
)R(O
O
)R(O
O
N))|ON(R(F
)|OR(F
)R(O
c
c
c
c
thc
LBP
c
c
LBP
c
c
B. Foreground Verification using Texture Modeling
Many environmental dynamic textures such as leaves, fire,
smoke, and sea waves may reduce the accuracy of target
detection. Here, the dynamic texture will be modeled by
using the modified local binary pattern (LBP)[11] and then
the target can be detected without the influence of dynamic
textures in the crowd scene. Here, a local texture pattern T
[11] centering the pixel gc and having P neighboring pixels
is defined as:
))(),...,(),(( 110 cPcc ggsggsggstT
, (2)
where
thresholdx
thresholdx
xs
||,0
||,1
)( . (3)
Figure 7 shows the threshold value of single image
texture variation in the pixel-wise LBP texture model, the
greater the threshold value the more difficult to detect the
image texture differences, and easy to misrecognition the
neighboring pixels as same texture.
Figure 7. Threshold example.
Then, we transform the modified LBP in (2) to an integer
value with the formula in Eq. (4).
1
0
2)(
P
P
cpPR ggsLBP . (4)
1) Foreground Detection using the Modified LBP
Here, we apply the modified LBP to perform the dynamic
texture background modeling and remove the false
foreground detection. In the LBP-based foreground
detection, two threshold values are required to estimate the
bit difference between the captured scene and LBP-based
background model. The LBP-based foreground detection
rule is defined as:
thifbackground
thifforeground
P tframe
_,
_,
)()1(
. (5)
The bit difference is calculated as:
8
0
)()1(
)(
p
tframe
p
tframe
p LBPXORLBP (6)
where, p is the index of the pixel on the circular chain.
Figure 8 shows the _th bit compare value is response the
neighboring image texture difference sensitivity. Large _th
bit compare value is more difficult to detect the neighboring
image texture difference, and more easy to determine the
same position of neighboring images as similar texture.
Figure 8. _th example.
2) Foreground Variation
In this study, both the pixel-wise temporal probability
model and LBP texture model are constructed to detect the
foreground, but how to integrate both background models to
reduce the false detection is a very important issue. Based
on the careful observation of foreground detections, the
foreground detection rule is then designed as:
where, R(Oc) denotes the region of a detected object
using the pixel-wise temporal probability model on the
current frame c, R(FcLBP|Oc) denotes the region of the
foreground detected by pixel-wise LBP texture model on the
current frame c around the region of Oc. In order to correct
the false detection, we propose the update/clear method as
follow:
c
c
Clearif,
Updateif,)O|R(F)(
)(OR'
foreground
foreground
LBP
cc
Null
OR ,(7)
Figure 9 shows the Nth threshold value of neighboring
image texture difference in total pixels. Large Nth threshold
value will need for more substantial differences in the
number of texture pixels to determined is a foreground
object.
Figure 9. Nth Threshold example.
5. III. EXPERIMENTAL RESULTS
This implementation performs on D1 resolution,
maximum 10 object detection with trajectory and 10 fps
detection rate at one Tripzone alert function while
simultaneously, S-Box output 20 fps H.264 video with OSD
message to the backend server. Consequently, S-Box has
implemented a set of IVA parameters (Figure 10) and we can
adjust these parameters to meet the environmental conditions.
The following shows the steps and results of S-Box real-time
surveillance under sun-day condition.
Adjust the "Y Threshold" value to 500 to reduce the
brightness sensitivity, then the brightness variation will
not be misjudged as foreground caused by the clutter
background.
Adjust the CR and CB Threshold value to 300 to
reduce red and blue reaction sensitivity, then the
reddish and bluish background will not be misjudged as
foreground.
Adjust the "LBP Threshold" value to 20 to reduce the
texture difference sensitivity, then the texture variation
in the single image pixel will be regarded as the same
texture.
Adjust the "LBP Label Threshold" value to 40 to
reduce the sensitivity of total texture pixels from the
neighboring images, then amount of texture pixels with
substantial differences will be determined as
foreground object.
Setup the depth of the scene and divide into three
regions of the image border by "Upper Bound" value to
40 and "Middle Bound" value to 80.
Setup the top region of the far-field scene by "Top
Label Size" value to 20 for small size object; the
middle region by "Middle Label Size" value to 40 and
the lower region of the close-field scene by "Bottom
Label Size" value to 120 for large size object.
Figure 10. IVA Threshold Parameters.
In Fig. 11-(a), it shows an outdoor scene. Fig. 11-(b)
represents the foreground with the pixel-wise temporal
probability model, and the dynamic texture detection model
is described in Fig. 11-(c). By using the dynamic detection
model, the targets will be separated into the truly foreground
target and the constant texture object. If the object with too
many constant textures, we will define the target as the noise,
and it then will be removed, i.e. in Fig. 11-(d). Finally, we
can improve the accuracy on the detected target.
Figure 11. Moving target and constant texture target detection on an
outdoor scene. (a) Outdoor scene. (b) The objects are detected by using
pixel-wise temporal probability model. (c) The dynamic texture detection
model. (d) The extracted objects after the texture noise removing process.
According to the above outdoor scene test, S-Box shows
different performances in different time sectors during
summer. That is, detection rate from 12:00 to 15:00 is 60%
because of the strong sunlight. But, the detection rate can be
increased to 95% from 15:00 to 18:00 due to the decrease of
sunlight. But this experimental result is based on the same
parameters. Therefore, The next stage of S-Box
implementation shall be add on a automatic environmental
variation detect function to increase the surveillance
performance, making S-Box to be resistant to weather and
environment impact.
IV. CONCLUSION
In this paper, we implement the IVA and WEB streaming
on the TI DM6467 platform as a smart box (S-Box).
Through the WEB streaming technique, users can setup a
trip wire or trip zone from the remote site. Based on the
condition, S-Box can do the object detection and tracking.
After video analysis, S-Box can output metadata with H.264
or MJPEG video stream data to the backend server. In
addition, S-Box will notice the users by activating the DI or
DO interface to trigger alarm sound or other device.
Under S-Box surveillance system, it performs as a
distributed solution and help to solve the conventional
surveillance problems, such as: cable vandalization or server
loss connection. S-Box provides the front-end stand along
operation, and the experimental results show the proposed
embedded system can perform five function (trip zone, trip
wire, object detection, object labeling and object trajectory)
with the rate above 10 fps.
ACKNOWLEDGMENT
We would like to thank Professor Cheng-Chang Lien for
his generous support and successful cooperation.
(a)
(b)
(c)
(d)
6. REFERENCES
[1] R. Aguilar-Ponce, A. Kumar, J. L. Tecpanecatl-Xihuitl and M.
Bayoumi, “A network of sensor-based framework for automated
visual surveillance”. Journal of Network and Computer Applications,
2007, pp. 1244–1271.
[2] LSP 2.00 DaVinci Linux VPIF Capture Video Driver (SPRUG99.pdf)
[3] LSP 2.00 DaVinci Linux Video VDCE Driver (SPRUGA3.pdf)
[4] Configuring Codec Engine in Arm apps with creatFromServer (wiki)
[5] Changing the DVEVM memory map (wiki)
[6] http://www.live555.com/liveMedia/doxygen/html/classes.html
(Live555)
[7] A. Elgammal, D. Harwood and L. Davis, “Non-parametric model for
background subtraction,” in Proceedings of the 6th European
Conference on Computer Vision, 2000, pp. 751-767.
[8] R. Jain, W. Martin and J. Aggarwal, “Segmentation through the
detection of changes due to motion,” Compute Graph Image Process
11, 1979, pp. 13–34.
[9] Y. Ren, C. S. Chua and Y. K. Ho, “Motion detection with
nonstationary background,” Machine Vision and Application, Vol. 13,
No. 5-6, Mar. 2003, pp. 332–343.
[10] C. C. Lien and S. C. Hsu, “The target tracking using the spatial-
temporal probability model,” IEEE International Conference on
Nonlinear Signal and Image Processing, NSIP 2005, May 2005, pp.
34-39.
[11] M. Xu, J. Orwell, L. Lowey and D. Thirde, “Architecture and
algorithms for tracking football players with multiple cameras” Image
and Signal Processing, IEE Proceedings, Vol. 152, Issue 2, April
2005, pp. 232-241.
[12] K. Nummiaro, E. K. Meier and L. J. V. Gool, “An adaptive color-
based particle filter” Image Vision Computing, Vol. 21, Issue. 1, 2002,
pp. 99-110.
[13] W. Hu, M. Hu, X. Zhou, Tieniu Tan, “Principal axis-based
correspondence between multiple cameras for people tracking” IEEE
Transactions on Pattern Analysis and Machine Intelligence, Vol. 28,
No. 4, April 2006, pp. 663-671.
[14] E. Alpaydin, Introduction to Machine Learning. MIT Press,
Cambridge 2004.
[15] T. Ojala, M. Pietika¨inen, and T. Ma¨enpa¨a¨, “Multiresolution Gray
Scale and Rotation Invariant Texture Analysis with Local Binary
Patterns,” IEEE Trans. Pattern Analysis and Machine Intelligence,
vol. 24, no. 7, pp. 971-987, July 2002.