274 research outputs found
Recommended from our members
Developing Java Programs on Android Mobile Phones Using Speech Recognition
Nowadays Android operating system based mobile phones and tablets are widely used and had millions of users around the world. The popularity of this operating system is due to its multi-tasking, ease of access and diverse device options. “Java Programming Speech Recognition Application” is an Android application used for handicapped individuals who are not able or have difficultation to type on a keyboard. This application allows the user to write a compute program (in Java Language) by dictating the words and without using a keyboard. The user needs to speak out the commands and symbols required for his/her program. The program has been designed to pick up the Java constant keywords (such as ‘boolean’, ‘break’, ‘if’ and ‘else’), similar to the word received by the speech recognizer system in the application. The “Java Programming Speech Recognition Application” contains external plug-ins such as programming editor and a speech recognizer to record and write the program. These plug-ins come in the form of libraries and pre-coded folders which have to be attached to the main program by the developer
Network control for a multi-user transputer-based system.
A dissertation submitted to the Faculty of Engineering, University of the
Witwatersrand, Johannesburg, in fulfilment of the requirements for the degree of
Master of Science in EngineeringThe MC2/64 system is a configureable multi-user transputer- based system which was
designed using a modular approach. The MC2/64 consists of MC2 Clusters which are
connected using a modified Clos network. The MC2 Clusters were designed and
realised as completely configurable modules using and extending an algorithm based on
Eulerian cycles through a requested graph. This dissertation discusses the configuration
algorithm and the extensions made to the algorithm for the MC2 Clusters.
The total MC2/64 system is not completely configurable as a MC2 Cluster releases only
a limited number of links for inter-cluster connections. This dissertation analyses the
configurability of MC2/64, but also presents algorithms which enhance the usability of
the system from the user's point of view.
The design and the implementation of the network control software are also submitted
as topics in this dissertation. The network control software must allow multiple users to
use the system, but without them influencing each other's transputer domains.
This dissertation therefore seeks to give an overview of network control problems and
the solutions implemented in current MC2/64 systems. The results of the research
done for this dissertation will hopefully aid in the design of future MC2 systems which
will provide South Africa with much needed, low cost, high performance computing
power.Andrew Chakane 201
Dynamic Partial Reconfiguration for Dependable Systems
Moore’s law has served as goal and motivation for consumer electronics manufacturers in the last decades. The results in terms of processing power increase in the consumer electronics devices have been mainly achieved due to cost reduction and technology shrinking. However, reducing physical geometries mainly affects the electronic devices’ dependability, making them more sensitive to soft-errors like Single Event Transient (SET) of Single Event Upset (SEU) and hard (permanent) faults, e.g. due to aging effects.
Accordingly, safety critical systems often rely on the adoption of old technology nodes, even if they introduce longer design time w.r.t. consumer electronics. In fact, functional safety requirements are increasingly pushing industry in developing innovative methodologies to design high-dependable systems with the required diagnostic coverage. On the other hand commercial off-the-shelf (COTS) devices adoption began to be considered for safety-related systems due to real-time requirements, the need for the implementation of computationally hungry algorithms and lower design costs. In this field FPGA market share is constantly increased, thanks to their flexibility and low non-recurrent engineering costs, making them suitable for a set of safety critical applications with low production volumes.
The works presented in this thesis tries to face new dependability issues in modern reconfigurable systems, exploiting their special features to take proper counteractions with low impacton performances, namely Dynamic Partial Reconfiguration
High-level graphical abstraction in digital design
We base our approach to the design of complex logic ICs on four premises: Design of a chip's abstract architecture—its major components, their tasks, and their intercommunication—should precede definition of its functionality. Graphics is ideal for representing abstract architectures; text is better for functionality. The designer should not have to translate graphical information into text. Graphical and textual design capture can be integrated with synthesis. © 1996, OPA (Overseas Publishers Association) Amsterdam B.V
Development of a comprehensive software engineering environment
The generation of a set of tools for software lifecycle is a recurring theme in the software engineering literature. The development of such tools and their integration into a software development environment is a difficult task because of the magnitude (number of variables) and the complexity (combinatorics) of the software lifecycle process. An initial development of a global approach was initiated in 1982 as the Software Development Workbench (SDW). Continuing efforts focus on tool development, tool integration, human interfacing, data dictionaries, and testing algorithms. Current efforts are emphasizing natural language interfaces, expert system software development associates and distributed environments with Ada as the target language. The current implementation of the SDW is on a VAX-11/780. Other software development tools are being networked through engineering workstations
PDF Text Searching System
This project is to develop a text searching system that assist users to develop a simple
PDFtext-searching system, whichis capable of searching and processing the information
in text files on user PC and in local networks. The main purpose of developing this
project is to assist users in finding PDF documents and files within their local drives,
where the appropriate documents can be found by entering the desired search terms
(keywords) in the PDF Text Searching System. There are two objectives that have been
set for this project. The first objective is to perform a study and have a better
understanding on the software that will be used in order to develop PDF text-searching
system, and the second objective is to develop a PDF text-searching system, which is
capable of searching and processing the information in text files on userPC and in local
networks. For the methodology, Rapid Application Development (RAD) approach has
beenemployed. The methodology has been chosenbecause it is effective and suitable for
short duration project. It was designed for developer and user to join together and work
intensively toward their goal. By using the RAD methodology, the project is able to be
completed within the time allocated. In the results and discussion part, it covers all the
outcome that obtains from the project completion, which is based on the surveys
conducted and questionnaires. In this chapter, the findings that were gain will determine
whether the proposed system is acceptable and meet with the user's needs. In order to
provide better services, some suggestion being carried out for future enhancement. This
can improve the current system to be more efficient and effective
FPGA based Embedded System to control an electric vehicle and the driver assistance systems
This Master Thesis involves the development of an embedded system based on FPGA
for controlling an electric vehicle based on a Kart platform and its electronic driving
aids. It consists of two distinct stages in the process of hardware-software co-design,
hardware development, which includes all the elements of the periphery of the processor
and communication elements, all developed in VHDL. An important part of the hardware
development also include the development of electronic driving aids, which include traction
control and torque vectoring differential gear, in hardware coprocessors, also writen in
VHDL. The other part of the co-design is the development of the control software, which
is going to be executed by the embedded system’s processor. This Master Thesis will be
used in a range of new electric vehicles that will be built in a near future and also gives
the base for future thesis in the fields of automotive, electronics and computing
Development of Sophisticated Unmanned Software Systems and Applications to UAV Formation
Ph.DDOCTOR OF PHILOSOPH
Proceedings of the Workshop on web applications and secure hardware (WASH 2013).
Web browsers are becoming the platform of choice for applications that need to work across a wide range of different devices, including mobile phones, tablets, PCs, TVs and in-car systems. However, for web applications which require a higher level of assurance, such as online banking, mobile payment, and media distribution (DRM), there are significant security and privacy challenges. A potential solution to some of these problems can be found in the use of secure hardware – such as TPMs, ARM TrustZone, virtualisation and secure elements – but these are rarely accessible to web applications or used by web browsers. The First Workshop on Web Applications and Secure Hardware (WASH'13) focused on how secure hardware could be used to enhance web applications and web browsers to provide functionality such as credential storage, attestation and secure execution. This included challenges in compatibility (supporting the same security features despite different user hardware) as well as multi-device scenarios where a device with hardware mechanisms can help provide assurance for systems without. Also of interest were proposals to enhance existing security mechanisms and protocols, security models where the browser is not trusted by the web application, and enhancements to the browser itself
- …