Academia.eduAcademia.edu

Software Implementation

3,141 papers
113 followers
AI Powered
Software implementation is the process of deploying and integrating software applications within an organization, encompassing planning, installation, configuration, testing, and user training to ensure the software functions effectively and meets organizational needs.
This paper presents a methodology for a unified cosimulation and co-synthesis of hardware-software systems. This approach addresses the modeling of communication between the hardware and software modules at different abstraction levels... more
A highly modular framework for developing parallel H.264/AVC video encoders in multi-core systems is presented. Such framework implements an efficient hardware/software codesign methodology, which enables replacing the software... more
Finite fields are widely used in constructing error-correcting codes and cryptographic algorithms. In practice, error-correcting codes use small finite fields to achieve high-throughput encoding and decoding. Conversely, cryptographic... more
Slosh-Free Positioning of Containers with Liquids and Flexible Conveyor Belt This paper describes a method for slosh-free moving of containers with a liquid at which the conveyor belt is flexible. It shows, by means of experimental... more
by Brian Nielsen and 
1 more
In this paper we show how to automatically generate test sequences that are aimed at testing the interconnections of embedded and communicating systems. Our proposal is based on the connectivity fault model proposed by , where faults may... more
We describe two classes of software systems that release tabular summaries of an underlying database. Table servers respond to user queries for (marginal) sub-tables of the "full" table summarizing the entire database, and are... more
A single-chip video codec with embedded display controller for videotelephony applications is described. It encodes and decodes simultaneously up to 30 CIF pictures per second according to video-conferencing recommendations H261, H263... more
Techniques based on impulsive sources are used since the beginning of the Underwater Acoustic science, to evaluate the distance of objects and to plot the profile of the sea bottom. In this paper the authors investigate the behavior of... more
As Reconfigurable Computing (RC) systems become more common place among application scientists and developers, a mechanism for porting existing work to other platforms is increasingly desirable. The constantly changing technologies and... more
We develop a new filter which combines spatially adaptive noise filtering in the wavelet domain and temporal filtering in the signal domain. For spatial filtering, we propose a new wavelet shrinkage method, which estimates how probable it... more
A new methodology,for interactive design of turbomachinery blades ispresented. Software implementation,of the methods,provides a user interface that is intuitive to aero-designers while ,operating with stan- dardized geometric forms. The... more
In this paper the hardware design and VLSI implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented in in which a software implementation was proposed. The byte-wise CRC algorithm is... more
Cloud computing enables a transparent access to information technology (IT) services such that the users do not need to know the location and characteristics of the relevant resources. While IT resource virtualization and service... more
Many different methods have been developed for the measurement of angular speed. Each successive method has attempted to improve measurement performance using a different strategy to process encoder signals based on two basic principles:... more
In this work, we present a survey of efficient techniques for software implementation of finite field arithmetic especially suitable for cryptographic applications. We discuss different algorithms for three types of finite fields and... more
Current trends of power quality monitoring LabVIEW or general programming languages such as C++. instruments are based on digital signal processors Examples of DSP based PQ monitoring instruments which (DSP), which are used to record... more
With the recent evolution in the VoIP market, where more and more devices and services are being pushed on a very promising market, assuring their security becomes crucial. Among the most dangerous threats to VoIP, failures and bugs in... more
Monitoring and diagnosis of electrical equipment, in particular power transformers, has attracted considerable attention for many years. It is of great importance for the utilities to find the incipient faults in these transformers as... more
UA-Chess is a fully-functional chess game that can be played through a standard Web browser. Its distinctive characteristic is that it is designed to be Universally Accessible, i.e., it can be concurrently played by people with different... more
The design of future Earth imaging systems, the optimization of fundamental instrument parameters, and the development and evaluation of data pre-processing and scientific-exploitation algorithms require an accurate end-to-end simulation... more
The Network Common Data Form (netCDF) is one of the primary methods of self-documenting data storage and access in the international geosciences research and education community and beyond. NetCDF was designed for use in a networked... more
The Hough transform (HT) is a popular tool for line detection due to its robustness to noise and missing data. However, the computational cost associated to its voting scheme has prevented software implementations to achieve real-time... more
This paper ''conceptualizes the fit'' of enterprise resource planning systems in manufacturing firms by conducting a study to identify how well organizational strategies and integrating mechanisms fit managementÕs expectations of the... more
Un sistema de base de datos federada es una capa de abstracción de software que permite gestionar, como si se tratara de una única fuente, a una colección de sistemas de bases de datos componentes. La investigación encarada en este... more
by Tom Mens and 
1 more
Model transformation is a fundamental technology in the MDA. Therefore, model transformations should be treated as first class entities, that is, models. One could use the metamodel of SDM, a graph based object transformation language, as... more
This paper describes four-wheeled robotic chassis of the robot Bender II utilizing Ackermann steering and independent rear drive units. Hardware and software implementation details as well as practical experiences of this approach... more
The Back-Propagation (BP) algorithm for building an Artificial Neural Network (ANN) has been increasingly popular since its advent in the late 80's. The regular structure and broad field of application of the BP algorithm have drawn... more
Parameterization of circuits is increasingly in demand. It opens the door both for investigating the right parameters for different application domains and reuse of components with the specific parameters in building new custom hardware.... more
An important problem in probabilistic description is to understand who are the key players, which activities associated with enterprise system implementations are important, and when their effect is most prevalent across the IT... more
Performance evaluation of the Advanced Encryption Standard candidates has led to intensive study of both hardware and software implementations. However, although plentiful papers present various implementation results, it seems that... more
Monitoring and diagnosis of electrical equipment, in particular power transformers, has attracted considerable attention for many years. It is of great importance for the utilities to find the incipient faults in these transformers as... more
The present study explored the various aspects of development of IR especially timeline involved right from planning, pilot testing, to system implementation of IR, exploratory activities conducted before implementation of IR and its... more
The quality of simulation results can be significantly affected by errors in the published model (typing, inconsistencies, gaps or conceptual errors) and/or in the underlying numerical model description. Seven of the most commonly used... more
The need of security to protect the data through networks has become of vital importance and critical for many sensor network applications. There are several security schemes implemented using hardware or software trying to solve the... more
The inherent parallelism of Artificial Neural Networks (ANNs) introduces several difficulties for its software implementation because of the sequential nature of von Neumann architectures. In contrast, hardware implementations offer the... more
The business value of Enterprise Systems (ES), and in general large software implementations, has been extensively debated in both the popular press and in the academic literature for over three decades. Organizations have invested... more
When considering the use of rapid prototyping (RP), there are many questions a designer might ask. One such question is ªwhat build orientation should be used to minimise the adverse effects of surface roughness?º At present, this... more
In wide range of applications for empirical data analysis, the assumption that data is collected from a single homogeneous population is often unrealistic. In particular, the identification of different groups of consumers and their... more
Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based concurrent error detection (CED) architectures can be used to... more
This work describes the third VXt project - an auxiliary tool in teaching Computer Architecture and Operating Systems classes. This project is being developed at FURB - University of Blumenau. It is a software implementation of a 8086... more
Many different methods have been developed for the measurement of angular speed. Each successive method has attempted to improve measurement performance using a different strategy to process encoder signals based on two basic principles:... more
Various multimedia communication systems based on 3D-Audio algorithms have been proposed by researchers from the acoustic data processing domain. However, all systems reported in the literature follow a PC-based approach that introduces... more
The use of computer networks to transmit medical information is faced to data security problems. Hence it is necessary to make these data unreadable and indecipherable during their transfer. The encryption and decryption of medical images... more
The on-line monitoring and detection of defects in laser welding is a basic manufacturing requirement in several applicative contexts, as vehicle assembly in automotive production. This work presents the FPGA implementation of... more
The physical layer of most wireless protocols is traditionally implemented in custom hardware to satisfy the heavy computational requirements while keeping power consumption to a minimum. These implementations are time consuming to design... more
Embedded systems are widely used in many sophisticated applications. To speed the time-to-market cycle, the hardware and software co-design has become one of the main methodologies in modern embedded systems. The most important challenge... more