51 research outputs found

    High-Efficient Parallel CAVLC Encoders on Heterogeneous Multicore Architectures

    Get PDF
    This article presents two high-efficient parallel realizations of the context-based adaptive variable length coding (CAVLC) based on heterogeneous multicore processors. By optimizing the architecture of the CAVLC encoder, three kinds of dependences are eliminated or weaken, including the context-based data dependence, the memory accessing dependence and the control dependence. The CAVLC pipeline is divided into three stages: two scans, coding, and lag packing, and be implemented on two typical heterogeneous multicore architectures. One is a block-based SIMD parallel CAVLC encoder on multicore stream processor STORM. The other is a component-oriented SIMT parallel encoder on massively parallel architecture GPU. Both of them exploited rich data-level parallelism. Experiments results show that compared with the CPU version, more than 70 times of speedup can be obtained for STORM and over 50 times for GPU. The implementation of encoder on STORM can make a real-time processing for 1080p @30fps and GPU-based version can satisfy the requirements for 720p real-time encoding. The throughput of the presented CAVLC encoders is more than 10 times higher than that of published software encoders on DSP and multicore platforms

    Small computer system interface (SCSI) universal services for the turbonet parallel computer

    Get PDF
    TurboNet is a parallel computer with shared-memory and message-passing hybrid architecture. It employs two boards, with four digital signal processors (DSPs) each, and a host FORCE SPARC CPU-2CE board with a SCSI bus. Software has been developed in this thesis to provide SCSI services to programs running on the DSPs. DSP programs can therefore fully control assigned SCSI devices at the SCSI command level. Transfer control modifiers ensure compatibility with most SCSI devices. The software provides service for three SCSI access levels. The su SCSI universal device driver is built into the host computer\u27s kernel and is a gateway to the SCSI bus from user contexts. The hscsid SCSI request server daemon is an interrupt driven link between the DSP programs and the su driver. The Hydra SCSI utilities can be included in programs to make SCSI programming easier

    Data analysis software for the autoradiographic enhancement process. Volumes 1, 2, and 3, and appendix

    Get PDF
    The computer software developed to set up a method for Wiener spectrum analysis of photographic films is presented. This method is used for the quantitative analysis of the autoradiographic enhancement process. The software requirements and design for the autoradiographic enhancement process are given along with the program listings and the users manual. A software description and program listings modification of the data analysis software are included

    The industrial mineralogy of magnesite and huntite from eastern Iran

    Get PDF
    Vein and hydrothermal - sedimentary types of magnesite from eastern Iran probably originated from ascending hydrothermal solutions. The host rocks are part of an ophiolite unit. The cryptocrystalline magnesites are very pure although they have a variable CaO/SiO₂ ratio. The magnesite is compact with a very fine and uniform texture.The mineralogy of samples of dead burned magnesites calcined at different temperatures and times are variable and can be predicted from phase equilibria studies. The textural relationships studied using scanning electron microscopy show that matrix is concentrated at periclase crystal boundaries particularly at the triple points. The Periclase crystals are larger at increased calcination temperatures and times. The amount of periclase - periclase grain contact reduces by increasing the amount of impurities. Electron microprobe results confirm that CaO and FeO in periclase increase steadily with the increase in the CaO/SiO₂ ratio and FeO content of the bulk chemistry respectively.The mineral chemistry of forsterite, monticellite, merwinite, dicalcium silicate and tricalcium silicate in dead burned magnesite indicates some solid solution between some phases, although sometimes it is difficult to analyse single phases. The observations indicate that high quality dead burned magnesia bricks can be produced from Iranian natural magnesite with low CaO and SiO₂ impurities and by maintaining the CaO/SiO₂ ratio of around 2:1.The effects of time and temperature on the transformation of the Iranian natural magnesite into caustic calcined magnesia have been used to establish the optimum industrial properties for the chemical and allied industries. High quality magnesia can be produced by calcination at 600°C for 2 hours. A medium quality product can be made rapidly (within 30 min) between 800 - 1000°C, but at lower temperatures (600 - 800°C), the formation of medium quality magnesia is largely independent of time in the range of 2-8 hours.Many occurrences of huntite are present near to the magnesite deposits. Three different modes of occurrence are recognised: 1) in veins as a weathering products of magnesite, 2) As sporadic nodules near fault zones between ultrabasic rocks and 3) in low temperature and near surface environments as a result of alteration of Mg-rich solutions with pre-existing weathered carbonate fragments in alluvial sediments. The mineralogy, chemistry, microstructure and industrial properties of huntite suggest that it may make an excellent white filler in paint

    The ProcessJ C++ Runtime System and Code Generator

    Full text link
    ProcessJ is a modern Process-Oriented language that builds on previous work from other languages like occam and occam-pi. However, the only readily-available runtime system is built on top of the Java Virtual Machine (JVM). This is not a choice made intentionally, but simply out of a lack of other implementations -- until now. This thesis introduces the new C++-based runtime system for ProcessJ, coupled with a new C++ code generator for the ProcessJ compiler. This thesis later examines the implementation details of the runtime system, including the components that make it up. We also examine the ability to cooperatively schedule many processes within the runtime environment, inside a separate scheduling system built on top of traditional operating system threading, rather than simply mapping processes one-to-one with threads. We later exemplify some of the cooperatively-schedulable code generated by the compiler, giving a complete rundown of the constituents and their various design choices. Lastly, we show the results of several tests that demonstrate the performance benefits of a bespoke C++-based runtime system, and discuss the future work and optimizations of this system

    Voice-signature-based Speaker Recognition

    Get PDF
    Magister Scientiae - MSc (Computer Science)Personal identification and the protection of data are important issues because of the ubiquitousness of computing and these have thus become interesting areas of research in the field of computer science. Previously people have used a variety of ways to identify an individual and protect themselves, their property and their information. This they did mostly by means of locks, passwords, smartcards and biometrics. Verifying individuals by using their physical or behavioural features is more secure than using other data such as passwords or smartcards, because everyone has unique features which distinguish him or her from others. Furthermore the biometrics of a person are difficult to imitate or steal. Biometric technologies represent a significant component of a comprehensive digital identity solution and play an important role in security. The technologies that support identification and authentication of individuals is based on either their physiological or their behavioural characteristics. Live-­‐data, in this instance the human voice, is the topic of this research. The aim is to recognize a person’s voice and to identify the user by verifying that his/her voice is the same as a record of his / her voice-­‐signature in a systems database. To address the main research question: “What is the best way to identify a person by his / her voice signature?”, design science research, was employed. This methodology is used to develop an artefact for solving a problem. Initially a pilot study was conducted using visual representation of voice signatures, to check if it is possible to identify speakers without using feature extraction or matching methods. Subsequently, experiments were conducted with 6300 data sets derived from Texas Instruments and the Massachusetts Institute of Technology audio database. Two methods of feature extraction and classification were considered—mel frequency cepstrum coefficient and linear prediction cepstral coefficient feature extraction—and for classification, the Support Vector Machines method was used. The three methods were compared in terms of their effectiveness and it was found that the system using the mel frequency cepstrum coefficient, for feature extraction, gave the marginally better results for speaker recognition

    Voice signature based Speaker Recognition

    Get PDF
    Magister Scientiae - MSc (Computer Science)Personal identification and the protection of data are important issues because of the ubiquitousness of computing and these havethus become interesting areas of research in the field of computer science. Previously people have used a variety of ways to identify an individual and protect themselves, their property and their information
    • 

    corecore