51 research outputs found
High-Efficient Parallel CAVLC Encoders on Heterogeneous Multicore Architectures
This article presents two high-efficient parallel realizations of the context-based adaptive variable length coding (CAVLC) based on heterogeneous multicore processors. By optimizing the architecture of the CAVLC encoder, three kinds of dependences are eliminated or weaken, including the context-based data dependence, the memory accessing dependence and the control dependence. The CAVLC pipeline is divided into three stages: two scans, coding, and lag packing, and be implemented on two typical heterogeneous multicore architectures. One is a block-based SIMD parallel CAVLC encoder on multicore stream processor STORM. The other is a component-oriented SIMT parallel encoder on massively parallel architecture GPU. Both of them exploited rich data-level parallelism. Experiments results show that compared with the CPU version, more than 70 times of speedup can be obtained for STORM and over 50 times for GPU. The implementation of encoder on STORM can make a real-time processing for 1080p @30fps and GPU-based version can satisfy the requirements for 720p real-time encoding. The throughput of the presented CAVLC encoders is more than 10 times higher than that of published software encoders on DSP and multicore platforms
Recommended from our members
Argonne National Laboratory Reports
The Remote Working Level Monitor (RWLM) is an instrument used to remotely monitor the RN-daughter concentrations and the Working Level (WL). It is an ac powered, microprocessor based instrument which multiplexes two independent detector units to a single central processor unit (CPU). The CPU controls the actuation of the detector units and processes and outputs the data received from these remote detector units. The remote detector units are fully automated and require no manual operation once they are set up. They detect and separate the alpha emitters of RaA and RaC' as well as detecting the beta emitters of RaB and RaC. The resultant pulses from these detected radioisotopes are transmitted to the CPU for processing. The programmed microprocessor performs the mathematical manipulations necessary to output accurate Rn-daughter concentrations and the WL. A special subroutine within the program enables the RWLM to run and output a calibration procedure on command. The data resulting from this request can then be processed in a separate program on most computers capable of BASIC programming. The calibration program results in the derivation of coefficients and beta efficiencies which provides calibrated coefficients and beta efficiencies
Small computer system interface (SCSI) universal services for the turbonet parallel computer
TurboNet is a parallel computer with shared-memory and message-passing hybrid architecture. It employs two boards, with four digital signal processors (DSPs) each, and a host FORCE SPARC CPU-2CE board with a SCSI bus.
Software has been developed in this thesis to provide SCSI services to programs running on the DSPs. DSP programs can therefore fully control assigned SCSI devices at the SCSI command level. Transfer control modifiers ensure compatibility with most SCSI devices.
The software provides service for three SCSI access levels. The su SCSI universal device driver is built into the host computer\u27s kernel and is a gateway to the SCSI bus from user contexts. The hscsid SCSI request server daemon is an interrupt driven link between the DSP programs and the su driver. The Hydra SCSI utilities can be included in programs to make SCSI programming easier
Data analysis software for the autoradiographic enhancement process. Volumes 1, 2, and 3, and appendix
The computer software developed to set up a method for Wiener spectrum analysis of photographic films is presented. This method is used for the quantitative analysis of the autoradiographic enhancement process. The software requirements and design for the autoradiographic enhancement process are given along with the program listings and the users manual. A software description and program listings modification of the data analysis software are included
The industrial mineralogy of magnesite and huntite from eastern Iran
Vein and hydrothermal - sedimentary types of magnesite from eastern Iran probably originated from ascending hydrothermal solutions. The host rocks are part of an ophiolite unit. The cryptocrystalline magnesites are very pure although they have a variable CaO/SiOâ ratio. The magnesite is compact with a very fine and uniform texture.The mineralogy of samples of dead burned magnesites calcined at different temperatures and times are variable and can be predicted from phase equilibria studies. The textural relationships studied using scanning electron microscopy show that matrix is concentrated at periclase crystal boundaries particularly at the triple points. The Periclase crystals are larger at increased calcination temperatures and times. The amount of periclase - periclase grain contact reduces by increasing the amount of impurities. Electron microprobe results confirm that CaO and FeO in periclase increase steadily with the increase in the CaO/SiOâ ratio and FeO content of the bulk chemistry respectively.The mineral chemistry of forsterite, monticellite, merwinite, dicalcium silicate and tricalcium silicate in dead burned magnesite indicates some solid solution between some phases, although sometimes it is difficult to analyse single phases. The observations indicate that high quality dead burned magnesia bricks can be produced from Iranian natural magnesite with low CaO and SiOâ impurities and by maintaining the CaO/SiOâ ratio of around 2:1.The effects of time and temperature on the transformation of the Iranian natural magnesite into caustic calcined magnesia have been used to establish the optimum industrial properties for the chemical and allied industries. High quality magnesia can be produced by calcination at 600°C for 2 hours. A medium quality product can be made rapidly (within 30 min) between 800 - 1000°C, but at lower temperatures (600 - 800°C), the formation of medium quality magnesia is largely independent of time in the range of 2-8 hours.Many occurrences of huntite are present near to the magnesite deposits. Three different modes of occurrence are recognised: 1) in veins as a weathering products of magnesite, 2) As sporadic nodules near fault zones between ultrabasic rocks and 3) in low temperature and near surface environments as a result of alteration of Mg-rich solutions with pre-existing weathered carbonate fragments in alluvial sediments. The mineralogy, chemistry, microstructure and industrial properties of huntite suggest that it may make an excellent white filler in paint
The ProcessJ C++ Runtime System and Code Generator
ProcessJ is a modern Process-Oriented language that builds on previous work from other languages like occam and occam-pi. However, the only readily-available runtime system is built on top of the Java Virtual Machine (JVM). This is not a choice made intentionally, but simply out of a lack of other implementations -- until now. This thesis introduces the new C++-based runtime system for ProcessJ, coupled with a new C++ code generator for the ProcessJ compiler. This thesis later examines the implementation details of the runtime system, including the components that make it up. We also examine the ability to cooperatively schedule many processes within the runtime environment, inside a separate scheduling system built on top of traditional operating system threading, rather than simply mapping processes one-to-one with threads. We later exemplify some of the cooperatively-schedulable code generated by the compiler, giving a complete rundown of the constituents and their various design choices. Lastly, we show the results of several tests that demonstrate the performance benefits of a bespoke C++-based runtime system, and discuss the future work and optimizations of this system
Voice-signature-based Speaker Recognition
Magister Scientiae - MSc (Computer Science)Personal
identification
and
the
protection
of
data
are
important
issues
because
of
the
ubiquitousness
of
computing
and
these
have
thus
become
interesting
areas
of
research
in
the
field
of
computer
science.
Previously
people
have
used
a
variety
of
ways
to
identify
an
individual
and
protect
themselves,
their
property
and
their
information.
This
they
did
mostly
by
means
of
locks,
passwords,
smartcards
and
biometrics.
Verifying
individuals
by
using
their
physical
or
behavioural
features
is
more
secure
than
using
other
data
such
as
passwords
or
smartcards,
because
everyone
has
unique
features
which
distinguish
him
or
her
from
others.
Furthermore
the
biometrics
of
a
person
are
difficult
to
imitate
or
steal.
Biometric
technologies
represent
a
significant
component
of
a
comprehensive
digital
identity
solution
and
play
an
important
role
in
security.
The
technologies
that
support
identification
and
authentication
of
individuals
is
based
on
either
their
physiological
or
their
behavioural
characteristics.
Live-Ââdata,
in
this
instance
the
human
voice,
is
the
topic
of
this
research.
The
aim
is
to
recognize
a
personâs
voice
and
to
identify
the
user
by
verifying
that
his/her
voice
is
the
same
as
a
record
of
his
/
her
voice-Ââsignature
in
a
systems
database.
To
address
the
main
research
question:
âWhat
is
the
best
way
to
identify
a
person
by
his
/
her
voice
signature?â,
design
science
research,
was
employed.
This
methodology
is
used
to
develop
an
artefact
for
solving
a
problem.
Initially
a
pilot
study
was
conducted
using
visual
representation
of
voice
signatures,
to
check
if
it
is
possible
to
identify
speakers
without
using
feature
extraction
or
matching
methods.
Subsequently,
experiments
were
conducted
with
6300
data
sets
derived
from
Texas
Instruments
and
the
Massachusetts
Institute
of
Technology
audio
database.
Two
methods
of
feature
extraction
and
classification
were
consideredâmel
frequency
cepstrum
coefficient
and
linear
prediction
cepstral
coefficient
feature
extractionâand
for
classification,
the
Support
Vector
Machines
method
was
used.
The
three
methods
were
compared
in
terms
of
their
effectiveness
and
it
was
found
that
the
system
using
the
mel
frequency
cepstrum
coefficient,
for
feature
extraction,
gave
the
marginally
better
results
for
speaker
recognition
Voice signature based Speaker Recognition
Magister Scientiae - MSc (Computer Science)Personal identification and the protection of data are important issues because of the ubiquitousness of computing and these havethus become interesting areas of research in the field of computer science. Previously people have used a variety of ways to identify an individual and protect themselves, their property and their information
- âŠ