International Journal of Engineering Trends and Technology (IJETT) Volume 18 Number2- Dec 2014

Size: px
Start display at page:

Download "International Journal of Engineering Trends and Technology (IJETT) Volume 18 Number2- Dec 2014"

Transcription

1 Compression and Decompression of FPGA Bit Stream Using Bitmask Technique K.Khuresh Gouse 1 N.Chitra 2 K.Maheshwari 3 1 PG Student (M.Tech), 2 Associate Professor, 3 Associate Professor, Dept. of ECE, Gates Institute of Technology, Gooty Abstract This Paper proposes an efficient decoding aware compression technique for compressing FPGA configuration bit streams to improve compression ratio of the bits and decrease decompression ratio. This is accomplished by efficiently choosing decoding aware data such as (length of the word, dictionary size and number and bitmask type) combined with run length coding of repetitive word pattern. The decompression ratio is reduced by reorganizing compressed bits to form length of fixed words. The experimental results illustrate that our approach improves compression ratio by 10-15% over existing bit stream compression techniques and decompression hardware is capable of running at 300MHZ. The decompression time to configure FPGA is decreased by 20-25% over decompression accelerator. Keywords Bit stream compression, Decompression hardware, Decode aware algorithm, FPGA. I. INTRODUCTION In an ancient mounted word book based mostly compression formula, the computer file with length N bits is split into n words of every length w bits. Lists of all distinctive words square measure then sorted in descendent order of their occurrences. of these words square measure then encoded victimization indices to words keep Field Programmable Gated Arrays (FPGA) store information on memories which are usually limited in capacity and bandwidth. As FPGA are commonly used in reconfigurable systems and application specific integrated circuits (ASIC),. The bit stream compression algorithms solve memory constraint issue by reducing the size of the bit streams and decompression accelerators increase the decoding speed by simple decoding logic. But there are very few algorithms that orders both efficient compression ratio and fast decompression. Figure 1 shows the typical low of compressed FPGA bit stream reconfiguration. Bit streams generated by vendor specific bit generation programs are compressed and stored on a persistent memory. The decompression hardware decoded and transfers the compressed bits from memory to configuration hardware which is then transferred to configurable logic blocks (CLB) memory. Figure 1 Traditional FPGA reconfiguration with compression Compression ratio is the metric commonly used to measure effectiveness of a compression technique, defined as (compressed size) Compression ratio( ) = (uncompressed size) We can classify the existing bit stream compression techniques into two categories: those having good compression ratio but unacceptable decompression overhead and complexity, and others which accelerate decompression but compromises compression ratio. The main idea of these algorithms is to store frequently occurring sequence of bits using a static or sliding dictionary or to use FPGA specific features (partial ISSN: Page 77

2 reconfiguration or read back to obtain repetitive patterns. One of the promising compression techniques is bitmask based code compression because of its good compression ratio and simple decompression logic. The direct application of this algorithm is not flexible in choosing word length or number, size and type of bitmasks or dictionary size. It is obvious that unlimited use of these will result in better matches but will result in multiple variable length encodings. However using them is not profitable as they will result in slower and complex decompression hardware. Hence it is a major challenge to develop an efficient compression technique which significantly reduces the bit stream size without sacrificing decompression performance. There are numerous compression algorithms that can be used to compress configuration bit streams. These techniques can be classified into two categories based on how the redundancies are exploited: format specific compression and generic bit stream compression. The compression techniques within the initial class exploit the native redundancies in an exceedingly single or multiple bit streams by reading back the organized information and storing the differences by activity exclusive-or (XOR) operation. These algorithms need FPGA to support partial reconfiguration and frame read back practicality. Pan et al. uses frame rearrangement within the absence of read back facility on FPGA. during this technique frames square measure reordered specified the similarity between ensuant frames organized is most. The distinction between consecutive frames (difference vector) is then encoded using either Huffman based mostly} run length encryption or LZSS based compression. Another technique projected in the same article organizes and read back the configured frames. The frames are organized such that compressed bit stream contains minimal number of difference vectors and maximal read back of configured frames thus reducing the compressed frames significantly. Such complex encoding schemes tend to produce excellent compression ratio. However, decompression is a major bottleneck and is not addressed by Pan et al. The generic bit stream compression technique uses complete bit stream to extract the redundancies insidelittle window (usually thirty two bytes) and encrypt the data. a plus of those techniques is that no special FPGA support is needed for decompression. Parameterized LZSS chooses economical parameters appropriate for bit stream compression and decompression. The compression focuses on the foremost repetition lengths within the matched strings to encrypt partial set of these lengths exploitation less range of bits and therefore the rest is encoded exploitation canonical illustration. The decompression hardware is fairly straightforward and is in a position to decrypt at acceptable speed. LZ77 algorithmic rule projected in a n exceedingly so works within the same manner by matching the redundant symbols in a little window. In sum, the compression technique in achieves vital compression however incurs forceful decompression overhead. On the opposite hand the approaches in second class try and maintain decompression overhead in a suitable vary however compromises on compression potency. Our technique tries to contemplate decompression bottleneck and overhead throughout the compression of bit streams. The compression parameters area unit chosen such that compressed bit streams area unit decrypt friendly whereas maintaining an honest compression quantitative relation II. DECODE AWARE BIT STREAM COMPRESSION On the compression aspect, FPGA configuration bit stream is analysed for choice of profitable wordbook entries and bitmask patterns. The compressed bit stream is then generated exploitation bitmask-based compression and run length secret writing (RLE). Next, our decode-aware placement algorithmic rule is used to put the compressed bitstream within the memory for efficient decompression. Throughout run-time, the compressed bitstream is transmitted from the memory to the decompression engine, and therefore the original configuration bit stream is made by decompression. Algorithm 1 outlines four important steps in our decode-aware compression framework (shown in Fig.3-1) bitmask selection; 2) dictionary selection; 3) RLE compression; and 4) decode-aware placement. The input bitstream is first divided into a sequence of symbols with length of w. Then bitmask patterns and dictionary entries used for bitmask-based compression are selected. Next, the symbol sequence is compressed using bitmask and RLE. We use the same algorithm in to perform the ISSN: Page 78

3 bitmask-based compression. Finally, placing the compressed bit stream into a decode friendly layout within the memory using placement algorithm. Algorithm 1: Decode Aware Bitstream Compression Input: Input bitstream Output: Compressed bitstream placed in memory Step 1:Divide input bitstream into symbol sequence SL. Step 2: Perform bitmask pattern selection. Step 3: Perform dictionary selection. Step 4: Compress symbol SL into code sequence CL using bitmask and RLE (Run-Length Encoding) Figure 2 Decode-aware bit stream compression framework. Since memory and communication bus are designed in multiple of bytes (8 bits), storing dictionaries or transmitting data other than multiple of byte size is not efficient. Thus, we restrict the symbol length to be multiples of eight in our current implementation. Since the dictionary for bit stream compression is smaller compared to the size of the bit stream itself, we use d=2i to fully utilize the bits for dictionary indexing, where is the number of indexing bits. 1.Bitmask Selection: Our bitmask-based compression is similar to [5], where three types of encoding formats are used. Fig. 3 shows the formats in these cases: no compression, compression using dictionary, and compression using bitmask. The selection of bitmask plays an important ro le in bitmask-based compression. Generally, there are two types of bitmask patterns. One is fixed bitmask, which can only be applied on fixed positions in a symbol. The other one is sliding bitmask, which can be applied at any position. For example, a 2-bit fixed bitmask ( 2f bitmask) is restricted to be used on even locations, but a 2-bit sliding bitmask ( 2s bitmask) can be used anywhere. Clearly, fixed bitmasks require less bits to encode its location, but they can only match bit changes at fixed positions. On the other hand, sliding bitmasks are more flexible, but consume more bits to encode. In other words, only a few number of bitmask patterns or their combinations are profitable for compression. Similar to [5], in our study of bit stream compression, we only use profitable bitmask patterns(1s,2s,2f,3s,3f,4s,4f). 2. Dictionary Selection: Algorithm 2 shows our dictionary selection algorithm. Compared to the dictionary selection approach proposed in [5] for instruction compression, we made an important optimization at Step 5). In the original algorithm [5], any node adjacent to the most profitable node is removed, if its profit is less than certain threshold. This mechanism is designed to reduce the dictionary size. However, if the threshold is not chosen properly, some high frequency symbols may be incorrectly removed. Since the dictionary size in bit stream compression is usually negligible compared with the size of the bit stream, it is not beneficial to reduce the dictionary size by scarifying the compression ratio. Figure 3 Decompression Mechanism ISSN: Page 79

4 Therefore, our algorithm used new heuristics in Step 5), which carefully removes edges instead of nodes. Experimental results in Section V-A show that our approach is more suitable for bit stream compression, because we ensure better dictionary coverage. Input bit steams Divide input bitstream into symbol sequence SL Perform bitmask pattern selection. Perform dictionary selection. Compress SL symbol into CL symbol using Bitmasking Perform decode aware placement of CL Compressed bitstream is placed in memory bitmasks for storing bitmask differences.koch et al. [4] benchmarks are compressed using 16 bit symbols, with 16 entry dictionary and a 2-bit sliding bitmask. Compression Efficiency: We first compare our improved bitmaskcompression technique with the original approach proposed in [5]. To avoid the bias caused by parameter selection, we use the same bitmask parameters for both of them. Three different compression techniques are compared for compression efficiency: 1) bitmaskbased compression (BMC) [5]; 2) BMC with our dictionary selection technique (pbmc); and 3) BMC with our dictionary selection technique and run length encoding (pbmc+rle). Fig. 4 shows the compression results on Pan et al. [1] and Koch et al. [4] benchmarks. The same results are found applicable to other families and vendors too. In our experiments, Pan et al. [1] benchmarks are compressed with 32 bit symbols, 512 entry dictionary entries and two sliding 2- and 3-bit Fig 5.RLE based Compression It can be seen that our dictionary selection algorithm outperform the original technique. The dictionary generated by our algorithm improves the compression ratio by 4% to 5%. Since in our approach we do not have to find the threshold value manually for each bit stream, our algorithm adaptively finds the most suitable dictionary entries for each bit stream. On the other hand, our method has the same performance. The experimental results also illustrate the improvement of compression ratio due to the run length encoding used in our technique. Decompression Efficiency: We measured the decompression efficiency using the time required to reconfigure a compressed bit stream, the resource usage and maximum operating frequency of ISSN: Page 80

5 the decompression engine. The reconfiguration time is calculated using the product of number of cycles required to decode the compressed bit stream and operating clock speed. We have synthesized decompression units for variable-length bitmask-based compression, difference vector-based compression (DV RLE RB), LZSS (8 bit symbols6), and our proposed approach on Xilinx Virtex II family XC2v40 device FG356 package using ISE i to measure the decompression efficiency. III. RESULTS AND CONCLUSION This thesis analysed 2 set of compression algorithms. a group of algorithms that reduces bit stream size with higher compression magnitude relation however doesn't contemplate the decompression overhead. Another set of compression techniques that square measure economical decompression however with unacceptable compression magnitude relation. This thesis planned AN economical rewrite aware compression technique that tries to balance between higher compression magnitude relation and least decompression overhead. The planned compression technique analyses the impact of parameters on decompression overhead and selects compression parameters that square measure rewrite friendly. This well combined with run length encryption of consecutive repetitive patterns improves the compression and decompression potency. This thesis planned a strategic arranging rule to reorganize variable length compressed bits to get mounted length compressed bit streams. The mounted encryption of the compressed words enabled the decompression engine to rewrite at FPGA's high operational frequency. a unique wordbook choice rule is devised that produces wordbook, covering most words exploitation least wordbook size and minimum variety of bitmasks. The planned technique to compress reconfiguration bitstream is found to enhance compression magnitude relation by around 10-15% and therefore the decompression engine capable of in operation at around 200MHZ. The reconfiguration time is reduced by around 15-20% compared to nearest decompression accelerator. Memory and communication bandwidth has been a major bottleneck in most of the system design. The operational speed of different components is diverging apart at an ever increasing pace. Decode aware compression promises to bridge this gap by reducing the data size and by accelerating the decompression process. This thesis explored only few problems in reconfigurable systems where decode aware compression can system performance. The proposed techniques in this paper can be further explored in the following directions: Bitmask compression technique allows better compression and faster decompression engine. Binary tries work on longest prefix and bit differences, drastically reducing the bits required to encode. An interesting approach is to combine these two techniques to compress very hard to compress audio and video data. Such a combination would provide faster decoding and better lossless data compression. The proposed technique can be explored to apply in compressing data sent over heterogeneous network elements. The decode aware decompression can bridge the gap between the different bandwidth at which the existing network elements work. Further studies can be conducted to eliminate the threshold parameter that is used to limit the exploration of word length. The input data pattern can be automatically analysed to choose the parameters for compression. This will potentially bring the compression ratio and decompression overhead closer to optimum efficiencies. The current application of optimal representation of n bit difference can be further explored on systems that store bit differences. The systems that require large number of bitmasks to encode the data will be benefited by the proposed optimal encoding scheme. Some of the systems which we identified are in the area of efficient database storage and differential data backup based systems Figure 4 Simulation result for Compression ISSN: Page 81

6 Input: Uncompressed Bitstream: Output: Compressed Bitstream: Figure 7 Technology Schematic Decompression REFERENCES Figure 5 Simulation result for Compression Input: Compressed Bitstream: Output: Uncompressed Bitstream: D. E. Knuth, J. H. M. Jr., and V. R. Pratt, Fast pattern matching in strings, SIAM J. Comput., vol. 6, no. 2, pp , June R. S. Boyer and J. S. Moore, A fast string matching algorithm, Commun. ACM, vol. 20, no. 10, pp , October J. H. Pan, T. Mitra, and W. F. Wong, Configuration bitstream compression for dynamically reconfigurable FPGAs, in Proc. Int. Conf. Comput.-Aided Des., 2004, pp L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred, Statistical approaches to ddos attack detection and response, in DISCEX, D. Koch, C. Beckhoff, and J. Teich, Bitstream decompression for high speed FPGA configuration from slow memories, in Proc. Int. Conf. Field-Program. Technol., 2007, pp L. Spitzner, Honeypots: Tracking Attackers. Addison-Wesley, C.Morrow BlackHole Route Server and Tracking Traffic on an IP Network SNORT: Open-Source Network IDS/IPS. 9. A. V. Aho and M. J. Corasick, Efficient string matching: an aid to bibliographic search, Commun. ACM, vol. 18, no. 6, pp , Figure 6 Technology Schematic for Compression ISSN: Page 82

7 Authors Profiles K.Khuresh Gouse is pursuing his Master degree M.Tech in VLSI &Embedded systems Design in Gates Institute of Technology, Gooty. N.Chitra, is working as Associate Professor in Gates Institute Of Technology, Gooty. Her areas of interest include Communication systems and VLSI. K. Maheswari, is working as Associate Professor in Gates Institute Of Technology, Gooty. Her areas of interest include Mobile Communication, wireless communication, Cryptography ISSN: Page 83

A Novel Decode-Aware Compression Technique for Improved Compression and Decompression

A Novel Decode-Aware Compression Technique for Improved Compression and Decompression A Novel Decode-Aware Compression Technique for Improved Compression and Decompression J. Suresh Babu, K. Tirumala Rao & P. Srinivas Department Of Electronics & Comm. Engineering, Nimra College of Engineering

More information

GOLOMB Compression Technique For FPGA Configuration

GOLOMB Compression Technique For FPGA Configuration GOLOMB Compression Technique For FPGA Configuration P.Hema Assistant Professor,EEE Jay Shriram Group Of Institutions ABSTRACT Bit stream compression is important in reconfigurable system design since it

More information

Reduction of Bitstream Transfer Time in FPGA

Reduction of Bitstream Transfer Time in FPGA IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 2, Ver. III (Mar - Apr. 2014), PP 82-86 Reduction of Bitstream Transfer Time in

More information

Compression of FPGA Bitstreams Using Improved RLE Algorithm

Compression of FPGA Bitstreams Using Improved RLE Algorithm International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013 1162 Compression of FPGA Bitstreams Using Improved RLE Algorithm P.Hemnath V.Prabhu Abstract - FPGA are configured

More information

COMPRESSION OF FPGA BIT STREAMS USING EFFECTIVE RUN LENGTH ENCODING TECHIQUES AND ITS PERFORMANCE ESTIMATION

COMPRESSION OF FPGA BIT STREAMS USING EFFECTIVE RUN LENGTH ENCODING TECHIQUES AND ITS PERFORMANCE ESTIMATION COMPRESSION OF FPGA BIT STREAMS USING EFFECTIVE RUN LENGTH ENCODING TECHIQUES AND ITS PERFORMANCE ESTIMATION S.Karthick 1, S.Dhivyapriya 2, T.V.P.Sundararajan 3 1 Assistant Professor,Bannari Amman Institute

More information

A Study on Algorithm for Compression and Decompression of Embedded Codes using Xilinx

A Study on Algorithm for Compression and Decompression of Embedded Codes using Xilinx A Study on Algorithm for Compression and Decompression of Embedded Codes using Xilinx M.Mohana Soundarya 1, Dr.S.Jayachitra 2 1 PG Scholar, Department of ECE, Vivekanandha College of Engineering for Women,

More information

An Efficient Code Compression Technique using Application-Aware Bitmask and Dictionary Selection Methods

An Efficient Code Compression Technique using Application-Aware Bitmask and Dictionary Selection Methods An Efficient Code Compression Technique using Application-Aware Bitmask and Selection Methods Seok-Won Seong sseong@cise.ufl.edu Prabhat Mishra prabhat@cise.ufl.edu Department of Computer and Information

More information

A Hybrid Code Compression Technique using Bitmask and Prefix Encoding with Enhanced Dictionary Selection

A Hybrid Code Compression Technique using Bitmask and Prefix Encoding with Enhanced Dictionary Selection A Hybrid Code Compression Technique using Bitmask and Prefix Encoding with Enhanced Dictionary Selection Syed Imtiaz Haider and Leyla Nazhandali Virginia Polytechnic Institute and State University 302

More information

Efficient Placement of Compressed Code for Parallel Decompression

Efficient Placement of Compressed Code for Parallel Decompression Efficient Placement of Compressed Code for Parallel Decompression Xiaoke Qin and Prabhat Mishra Department of Computer and Information Science and Engineering University of Florida, Gainesville FL 32611-6120,

More information

MEMORY is one of the key driving factors in embeddedsystem

MEMORY is one of the key driving factors in embeddedsystem IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 27, NO. 4, APRIL 2008 673 Bitmask-Based Code Compression for Embedded Systems Seok-Won Seong and Prabhat Mishra, Member,

More information

An Architecture of Embedded Decompressor with Reconfigurability for Test Compression

An Architecture of Embedded Decompressor with Reconfigurability for Test Compression IEICE TRANS. INF. & SYST., VOL.E91 D, NO.3 MARCH 2008 713 PAPER Special Section on Test and Verification of VLSIs An Architecture of Embedded Decompressor with Reconfigurability for Test Compression Hideyuki

More information

Profile-driven Selective Code Compression

Profile-driven Selective Code Compression Profile-driven Selective Code Compression Yuan Xie and Wayne Wolf Electrical Engineering Department Princeton University Princeton, NJ 08540, USA yuanxie,wolf@ee.princeton.edu Haris Lekatsas NEC USA 4

More information

Fast Floating Point Compression on the Cell BE Processor

Fast Floating Point Compression on the Cell BE Processor Fast Floating Point Compression on the Cell BE Processor Ajith Padyana, T.V. Siva Kumar, P.K.Baruah Sri Satya Sai University Prasanthi Nilayam - 515134 Andhra Pradhesh, India ajith.padyana@gmail.com, tvsivakumar@gmail.com,

More information

A 64 Bit Pipeline Based Decimal Adder Using a New High Speed BCD Adder

A 64 Bit Pipeline Based Decimal Adder Using a New High Speed BCD Adder A 64 Bit Pipeline Based Decimal Adder Using a New High Speed BCD Adder Rahul Jain 1, Khushboo Singh 2, Ghanshyam Jangid 3 1 Assistant Professor GIT College Jaipur, Rajasthan, India 2 M.Tech Student, Suresh

More information

Reducing Code Size with Run-time Decompression

Reducing Code Size with Run-time Decompression Reducing Code Size with Run-time Decompression Charles Lefurgy, Eva Piccininni, and Trevor Mudge Advanced Computer Architecture Laboratory Electrical Engineering and Computer Science Dept. The University

More information

MEMORY is one of the most constrained resources in an

MEMORY is one of the most constrained resources in an 1224 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 28, NO. 8, AUGUST 2009 A Universal Placement Technique of Compressed Instructions for Efficient Parallel Decompression

More information

ENHANCED PARKWAY STUDY: PHASE 2 CONTINUOUS FLOW INTERSECTIONS. Final Report

ENHANCED PARKWAY STUDY: PHASE 2 CONTINUOUS FLOW INTERSECTIONS. Final Report Preparedby: ENHANCED PARKWAY STUDY: PHASE 2 CONTINUOUS FLOW INTERSECTIONS Final Report Prepared for Maricopa County Department of Transportation Prepared by TABLE OF CONTENTS Page EXECUTIVE SUMMARY ES-1

More information

Arithmetic Coding Modification to Compress SMS

Arithmetic Coding Modification to Compress SMS G8-5 2011 International Conference on Electrical Engineering and Informatics 17-19 July 2011, Bandung, Indonesia Arithmetic Coding Modification to Compress SMS Ario Yudo Husodo #1, Rinaldi Munir *2 #*

More information

The Incremental Evolution of Gaits for Hexapod Robots

The Incremental Evolution of Gaits for Hexapod Robots The Incremental Evolution of Gaits for Hexapod Robots Abstract Gait control programs for hexapod robots are learned by incremental evolution. The first increment is used to learn the activations required

More information

SUPPLEMENT MATERIALS

SUPPLEMENT MATERIALS SUPPLEMENT MATERIALS This document provides the implementation details of LW-FQZip 2 and the detailed experimental results of the comparison studies. 1. Implementation details of LW-FQZip 2 LW-FQZip 2

More information

Fast Software-managed Code Decompression

Fast Software-managed Code Decompression Fast Software-managed Code Decompression Charles Lefurgy and Trevor Mudge Advanced Computer Architecture Laboratory Electrical Engineering and Computer Science Dept. The University of Michigan, Ann Arbor

More information

Matrix-based software test data decompression for systems-on-a-chip

Matrix-based software test data decompression for systems-on-a-chip Journal of Systems Architecture 50 (2004) 247 256 www.elsevier.com/locate/sysarc Matrix-based software test data decompression for systems-on-a-chip Kedarnath Balakrishnan, Nur A. Touba * Computer Engineering

More information

An Architecture for Combined Test Data Compression and Abort-on-Fail Test

An Architecture for Combined Test Data Compression and Abort-on-Fail Test An Architecture for Combined Test Data Compression and Abort-on-Fail Test Erik Larsson and Jon Persson Embedded Systems Laboratory Department of Computer and Information Science Linköpings Universitet,

More information

Recycling Bits in LZ77-Based Compression

Recycling Bits in LZ77-Based Compression SETIT 2005 3 rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 27-31, 2005 TUNISIA Recycling Bits in LZ77-Based Compression Danny Dubé * and

More information

Decompression Method For Massive Compressed Files In Mobile Rich Media Applications

Decompression Method For Massive Compressed Files In Mobile Rich Media Applications 2010 10th IEEE International Conference on Computer and Information Technology (CIT 2010) Decompression Method For Massive Compressed Files In Mobile Rich Media Applications Houchen Li, Zhijie Qiu, Lei

More information

A Novel Gear-shifting Strategy Used on Smart Bicycles

A Novel Gear-shifting Strategy Used on Smart Bicycles 2012 International Conference on Industrial and Intelligent Information (ICIII 2012) IPCSIT vol.31 (2012) (2012) IACSIT Press, Singapore A Novel Gear-shifting Strategy Used on Smart Bicycles Tsung-Yin

More information

Application of Dijkstra s Algorithm in the Evacuation System Utilizing Exit Signs

Application of Dijkstra s Algorithm in the Evacuation System Utilizing Exit Signs Application of Dijkstra s Algorithm in the Evacuation System Utilizing Exit Signs Jehyun Cho a, Ghang Lee a, Jongsung Won a and Eunseo Ryu a a Dept. of Architectural Engineering, University of Yonsei,

More information

LOCOMOTION CONTROL CYCLES ADAPTED FOR DISABILITIES IN HEXAPOD ROBOTS

LOCOMOTION CONTROL CYCLES ADAPTED FOR DISABILITIES IN HEXAPOD ROBOTS LOCOMOTION CONTROL CYCLES ADAPTED FOR DISABILITIES IN HEXAPOD ROBOTS GARY B. PARKER and INGO CYLIAX Department of Computer Science, Indiana University, Bloomington, IN 47405 gaparker@cs.indiana.edu, cyliax@cs.indiana.edu

More information

EVOLVING HEXAPOD GAITS USING A CYCLIC GENETIC ALGORITHM

EVOLVING HEXAPOD GAITS USING A CYCLIC GENETIC ALGORITHM Evolving Hexapod Gaits Using a Cyclic Genetic Algorithm Page 1 of 7 EVOLVING HEXAPOD GAITS USING A CYCLIC GENETIC ALGORITHM GARY B. PARKER, DAVID W. BRAUN, AND INGO CYLIAX Department of Computer Science

More information

Electromagnetic Attacks on Ring Oscillator-Based True Random Number Generator

Electromagnetic Attacks on Ring Oscillator-Based True Random Number Generator Introduction Attacks on TRNG Our active attack EM analysis Electromagnetic Attacks on Ring Oscillator-Based True Random Number Generator Pierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer François

More information

The Future of Hydraulic Control in Water-Systems

The Future of Hydraulic Control in Water-Systems The Future of Hydraulic Control in Water-Systems A. Heimann Manager of R&D and of Technical Support & Applications Engineering departments at Dorot Automatic Control Valves Dorot Control Valves, Kibbutz

More information

UNDERSTANDING A DIVE COMPUTER. by S. Angelini, Ph.D. Mares S.p.A.

UNDERSTANDING A DIVE COMPUTER. by S. Angelini, Ph.D. Mares S.p.A. UNDERSTANDING A DIVE COMPUTER by S. Angelini, Ph.D. Mares S.p.A. Dive Computer UNDERSTANDING A DIVE COMPUTER The decompression algorithm in a dive computer is an attempt to replicate the effects of a dive

More information

Application of Bayesian Networks to Shopping Assistance

Application of Bayesian Networks to Shopping Assistance Application of Bayesian Networks to Shopping Assistance Yang Xiang, Chenwen Ye, and Deborah Ann Stacey University of Guelph, CANADA Abstract. We develop an on-line shopping assistant that can help a e-shopper

More information

Instruction Cache Compression for Embedded Systems by Yujia Jin and Rong Chen

Instruction Cache Compression for Embedded Systems by Yujia Jin and Rong Chen Instruction Cache Compression for Embedded Systems by Yujia Jin and Rong Chen Abstract Code compression could lead to less overall system die area and therefore less cost. This is significant in the embedded

More information

Blocking time reduction for level crossings using the genetic algorithm

Blocking time reduction for level crossings using the genetic algorithm Computers in Railways X 299 Blocking time reduction for level crossings using the genetic algorithm Y. Noguchi 1, H. Mochizuki 1, S. Takahashi 1, H. Nakamura 1, S. Kaneko 1 & M. Sakai 2 1 Nihon University,

More information

Ingersoll Rand. X-Series System Automation

Ingersoll Rand. X-Series System Automation Ingersoll Rand -Series System Automation Energy Savings on Demand! Ingersoll Rand As much as 20% to 60% of the energy used to operate compressed air systems is wasted. This is primarily due to operating

More information

Chapter 5 5. INTERSECTIONS 5.1. INTRODUCTION

Chapter 5 5. INTERSECTIONS 5.1. INTRODUCTION Chapter 5 5. INTERSECTIONS 5.1. INTRODUCTION Intersections are the physical component of the roadways where two highways intersect. They are the most complex element of roadways, since it requires more

More information

Wind Tunnel Instrumentation System

Wind Tunnel Instrumentation System Wind Tunnel Instrumentation System Karthigeyan S 1, Jai bhavani K S 2, Jenifer Z 3 P.G Student, Dept. of, Valliammai Engineering College, Chennai, India 1 Assistant Professor, Dept. of, Valliammai Engineering

More information

Data Extraction from Damage Compressed File for Computer Forensic Purposes

Data Extraction from Damage Compressed File for Computer Forensic Purposes Data Extraction from Damage Compressed File for Computer Forensic Purposes Bora Park, Antonio Savoldi, Paolo Gubian, Jungheum Park, Seok Hee Lee and Sangjin Lee 1 Center for Information Security Technologies,

More information

Autodesk Moldflow Communicator Process settings

Autodesk Moldflow Communicator Process settings Autodesk Moldflow Communicator 212 Process settings Revision 1, 3 March 211. Contents Chapter 1 Process settings....................................... 1 Profiles.................................................

More information

Naval Postgraduate School, Operational Oceanography and Meteorology. Since inputs from UDAS are continuously used in projects at the Naval

Naval Postgraduate School, Operational Oceanography and Meteorology. Since inputs from UDAS are continuously used in projects at the Naval How Accurate are UDAS True Winds? Charles L Williams, LT USN September 5, 2006 Naval Postgraduate School, Operational Oceanography and Meteorology Abstract Since inputs from UDAS are continuously used

More information

Aryeh Rappaport Avinoam Meir. Schedule automation

Aryeh Rappaport Avinoam Meir. Schedule automation Aryeh Rappaport Avinoam Meir Schedule automation Introduction In this project we tried to automate scheduling. Which is to help a student to pick the time he takes the courses so they want collide with

More information

Code Compression for Low Power Embedded System Design

Code Compression for Low Power Embedded System Design Code Compression for Low Power Embedded System Design Haris Lekatsas Jörg Henkel Wayne Wolf Princeton University NEC USA Princeton University We propose instruction code compression as an efficient method

More information

Queue analysis for the toll station of the Öresund fixed link. Pontus Matstoms *

Queue analysis for the toll station of the Öresund fixed link. Pontus Matstoms * Queue analysis for the toll station of the Öresund fixed link Pontus Matstoms * Abstract A new simulation model for queue and capacity analysis of a toll station is presented. The model and its software

More information

Global Journal of Engineering Science and Research Management

Global Journal of Engineering Science and Research Management SIMULATION AND OPTIMZING TRAFFIC FLOW AT SIGNALIZED INTERSECTION USING MATLAB Dr Mohammed B. Abduljabbar*, Dr Amal Ali, Ruaa Hameed * Assist Prof., Civil Engineering Department, Al-Mustansiriayah University,

More information

Design and Simulation of a Pipelined Decompression Architecture for Embedded Systems

Design and Simulation of a Pipelined Decompression Architecture for Embedded Systems Design and Simulation of a Pipelined Decompression Architecture for Embedded Systems Haris Lekatsas Jörg Henkel Wayne Wolf NEC USA NEC USA Princeton University Abstract In the past, systems utilizing code

More information

Computing s Energy Problem:

Computing s Energy Problem: Computing s Energy Problem: (and what we can do about it) Mark Horowitz Stanford University horowitz@ee.stanford.edu 1 of 46 Everything Has A Computer Inside 2of 46 The Reason is Simple: Moore s Law Made

More information

Online Companion to Using Simulation to Help Manage the Pace of Play in Golf

Online Companion to Using Simulation to Help Manage the Pace of Play in Golf Online Companion to Using Simulation to Help Manage the Pace of Play in Golf MoonSoo Choi Industrial Engineering and Operations Research, Columbia University, New York, NY, USA {moonsoo.choi@columbia.edu}

More information

A COMPARATIVE STUDY OF MIX FLOW PUMP IMPELLER CFD ANALYSIS AND EXPERIMENTAL DATA OF SUBMERSIBLE PUMP

A COMPARATIVE STUDY OF MIX FLOW PUMP IMPELLER CFD ANALYSIS AND EXPERIMENTAL DATA OF SUBMERSIBLE PUMP IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN 2321-8843 Vol. 1, Issue 3, Aug 2013, 57-64 Impact Journals A COMPARATIVE STUDY OF MIX FLOW PUMP IMPELLER CFD ANALYSIS

More information

EMBEDDED computing systems are space and cost sensitive.

EMBEDDED computing systems are space and cost sensitive. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 14, NO. 5, MAY 2006 525 Code Compression for Embedded VLIW Processors Using Variable-to-Fixed Coding Yuan Xie, Member, IEEE, Wayne

More information

#19 MONITORING AND PREDICTING PEDESTRIAN BEHAVIOR USING TRAFFIC CAMERAS

#19 MONITORING AND PREDICTING PEDESTRIAN BEHAVIOR USING TRAFFIC CAMERAS #19 MONITORING AND PREDICTING PEDESTRIAN BEHAVIOR USING TRAFFIC CAMERAS Final Research Report Luis E. Navarro-Serment, Ph.D. The Robotics Institute Carnegie Mellon University November 25, 2018. Disclaimer

More information

EMBEDDED systems have become more and more important

EMBEDDED systems have become more and more important 1160 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 15, NO. 10, OCTOBER 2007 Code Compression for VLIW Embedded Systems Using a Self-Generating Table Chang Hong Lin, Student Member,

More information

ROSE-HULMAN INSTITUTE OF TECHNOLOGY Department of Mechanical Engineering. Mini-project 3 Tennis ball launcher

ROSE-HULMAN INSTITUTE OF TECHNOLOGY Department of Mechanical Engineering. Mini-project 3 Tennis ball launcher Mini-project 3 Tennis ball launcher Mini-Project 3 requires you to use MATLAB to model the trajectory of a tennis ball being shot from a tennis ball launcher to a player. The tennis ball trajectory model

More information

CS 221 PROJECT FINAL

CS 221 PROJECT FINAL CS 221 PROJECT FINAL STUART SY AND YUSHI HOMMA 1. INTRODUCTION OF TASK ESPN fantasy baseball is a common pastime for many Americans, which, coincidentally, defines a problem whose solution could potentially

More information

i) Linear programming

i) Linear programming Problem statement Sailco Corporation must determine how many sailboats should be produced during each of the next four quarters (one quarter = three months). The demand during each of the next four quarters

More information

Improving the Bus Network through Traffic Signalling. Henry Axon Transport for London

Improving the Bus Network through Traffic Signalling. Henry Axon Transport for London Improving the Bus Network through Traffic Signalling Henry Axon Transport for London Improving the Bus Network through Traffic Signalling Introduction Transport for London (TfL) operates the most frequent

More information

Road Data Input System using Digital Map in Roadtraffic

Road Data Input System using Digital Map in Roadtraffic Data Input System using Digital Map in traffic Simulation Namekawa,M 1., N.Aoyagi 2, Y.Ueda 2 and A.Satoh 2 1 College of Management and Economics, Kaetsu University, Tokyo, JAPAN 2 Faculty of Engineering,

More information

AUTONOMOUS AND AUTOMATIC ACCIDENT RECOVERY SYSTEM USING GPS AND HAM RADIO

AUTONOMOUS AND AUTOMATIC ACCIDENT RECOVERY SYSTEM USING GPS AND HAM RADIO AUTONOMOUS AND AUTOMATIC ACCIDENT RECOVERY SYSTEM USING GPS AND HAM RADIO 1 Sidhartha Velpula, student, ECE Department, KL University, India, velpulasidhartha@gmail.com 2 Vivek Obilineni, student, ECE

More information

EEC 686/785 Modeling & Performance Evaluation of Computer Systems. Lecture 6. Wenbing Zhao. Department of Electrical and Computer Engineering

EEC 686/785 Modeling & Performance Evaluation of Computer Systems. Lecture 6. Wenbing Zhao. Department of Electrical and Computer Engineering EEC 686/785 Modeling & Performance Evaluation of Computer Systems Lecture 6 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org Outline 2 Review of lecture 5 The

More information

2600T Series Pressure Transmitters Plugged Impulse Line Detection Diagnostic. Pressure Measurement Engineered solutions for all applications

2600T Series Pressure Transmitters Plugged Impulse Line Detection Diagnostic. Pressure Measurement Engineered solutions for all applications Application Description AG/266PILD-EN Rev. C 2600T Series Pressure Transmitters Plugged Impulse Line Detection Diagnostic Pressure Measurement Engineered solutions for all applications Increase plant productivity

More information

THe rip currents are very fast moving narrow channels,

THe rip currents are very fast moving narrow channels, 1 Rip Current Detection using Optical Flow Shweta Philip sphilip@ucsc.edu Abstract Rip currents are narrow currents of fast moving water that are strongest near the beach. These type of currents are dangerous

More information

VALVE CRITICALITY MODELING

VALVE CRITICALITY MODELING Casey, R., Boulos, P., Orr, C., and Bros, C. (2008). Valve Criticality Modeling. Eighth Annual ASCE Water Distribution Systems Analysis Symposium, Cincinnati, Ohio, August 27-30, 2006: pp. 1-8. VALVE CRITICALITY

More information

Chapter 5: Methods and Philosophy of Statistical Process Control

Chapter 5: Methods and Philosophy of Statistical Process Control Chapter 5: Methods and Philosophy of Statistical Process Control Learning Outcomes After careful study of this chapter You should be able to: Understand chance and assignable causes of variation, Explain

More information

AN APPROACH FOR ASSESSMENT OF WEAVING LENGTH FOR MID-BLOCK TRAFFIC OPERATIONS

AN APPROACH FOR ASSESSMENT OF WEAVING LENGTH FOR MID-BLOCK TRAFFIC OPERATIONS International Journal for Traffic and Transport Engineering, 215, 5(4): 442-45 UDC: 625.739 DOI: http://dx.doi.org/1.778/ijtte.215.5(4).8 AN APPROACH FOR ASSESSMENT OF WEAVING LENGTH FOR MID-BLOCK TRAFFIC

More information

Outline. Terminology. EEC 686/785 Modeling & Performance Evaluation of Computer Systems. Lecture 6. Steps in Capacity Planning and Management

Outline. Terminology. EEC 686/785 Modeling & Performance Evaluation of Computer Systems. Lecture 6. Steps in Capacity Planning and Management EEC 686/785 Modeling & Performance Evaluation of Computer Systems Lecture 6 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org Outline Review of lecture 5 The

More information

RUGBY is a dynamic, evasive, and highly possessionoriented

RUGBY is a dynamic, evasive, and highly possessionoriented VISUALIZING RUGBY GAME STYLES USING SOMS 1 Visualizing Rugby Game Styles Using Self-Organizing Maps Peter Lamb, Hayden Croft Abstract Rugby coaches and analysts often use notational data describing match

More information

Penalty Corners in Field Hockey: A guide to success. Peter Laird* & Polly Sutherland**

Penalty Corners in Field Hockey: A guide to success. Peter Laird* & Polly Sutherland** Penalty Corners in Field Hockey: A guide to success Peter Laird* & Polly Sutherland** *4 Seton Place, Edinburgh, EH9 2JT **39/5 West Bryson Road, Edinburgh, EH11 1BQ. Abstract The purpose of this study

More information

Traffic Parameter Methods for Surrogate Safety Comparative Study of Three Non-Intrusive Sensor Technologies

Traffic Parameter Methods for Surrogate Safety Comparative Study of Three Non-Intrusive Sensor Technologies Traffic Parameter Methods for Surrogate Safety Comparative Study of Three Non-Intrusive Sensor Technologies CARSP 2015 Collision Prediction and Prevention Approaches Joshua Stipancic 2/32 Acknowledgements

More information

New IBIS Techniques for Modeling Complex IO Cadence Webinar March 23, 2005 Donald Telian

New IBIS Techniques for Modeling Complex IO Cadence Webinar March 23, 2005 Donald Telian New IBIS Techniques for Modeling Complex IO Cadence Webinar March 23, 2005 Donald Telian 1 CADENCE DESIGN SYSTEMS, INC. About the Presenter Donald Telian 20+ years in high-speed PCB and SI Engineer at

More information

EXAMINING THE EFFECT OF HEAVY VEHICLES DURING CONGESTION USING PASSENGER CAR EQUIVALENTS

EXAMINING THE EFFECT OF HEAVY VEHICLES DURING CONGESTION USING PASSENGER CAR EQUIVALENTS EXAMINING THE EFFECT OF HEAVY VEHICLES DURING CONGESTION USING PASSENGER CAR EQUIVALENTS Ahmed Al-Kaisy 1 and Younghan Jung 2 1 Department of Civil Engineering, Montana State University PO Box 173900,

More information

VLSI Design 12. Design Styles

VLSI Design 12. Design Styles 1 9 8 5 1 9 8 7 1 9 9 1 1 9 9 3 1 9 9 9 2 0 0 1 2 0 0 5 2 0 0 7 2 0 0 9 Pr odu ctiv it y (T r an s./ St a f -M o nt h ) VLSI Design Last module: Floorplanning Sequential circuit design Clock skew This

More information

Single- or Two-Stage Compression

Single- or Two-Stage Compression The following article was published in ASHRAE Journal, August 2008. Copyright 2008 American Society of Heating, Refrigerating and Air- Conditioning Engineers, Inc. It is presented for educational purposes

More information

Fail Operational Controls for an Independent Metering Valve

Fail Operational Controls for an Independent Metering Valve Group 14 - System Intergration and Safety Paper 14-3 465 Fail Operational Controls for an Independent Metering Valve Michael Rannow Eaton Corporation, 7945 Wallace Rd., Eden Prairie, MN, 55347, email:

More information

Compact Binaries with Code Compression in a Software Dynamic Translator

Compact Binaries with Code Compression in a Software Dynamic Translator Compact Binaries with Code Compression in a Software Dynamic Translator Stacey Shogan and Bruce R. Childers Department of Computer Science, University of Pittsburgh Pittsburgh, PA 15260 USA {sasst118,

More information

5.1 Introduction. Learning Objectives

5.1 Introduction. Learning Objectives Learning Objectives 5.1 Introduction Statistical Process Control (SPC): SPC is a powerful collection of problem-solving tools useful in achieving process stability and improving capability through the

More information

82C288 BUS CONTROLLER FOR PROCESSORS (82C C C288-8)

82C288 BUS CONTROLLER FOR PROCESSORS (82C C C288-8) BUS CONTROLLER FOR 80286 PROCESSORS (82C288-12 82C288-10 82C288-8) Y Provides Commands and Controls for Local and System Bus Y Wide Flexibility in System Configurations Y High Speed CHMOS III Technology

More information

The Implementation and Evaluation of Dynamic Code Decompression Using DISE

The Implementation and Evaluation of Dynamic Code Decompression Using DISE The Implementation and Evaluation of Dynamic Code Decompression Using DISE MARC L. CORLISS, E. CHRISTOPHER LEWIS, and AMIR ROTH University of Pennsylvania Code compression coupled with dynamic decompression

More information

Honest Mirror: Quantitative Assessment of Player Performances in an ODI Cricket Match

Honest Mirror: Quantitative Assessment of Player Performances in an ODI Cricket Match Honest Mirror: Quantitative Assessment of Player Performances in an ODI Cricket Match Madan Gopal Jhawar 1 and Vikram Pudi 2 1 Microsoft, India majhawar@microsoft.com 2 IIIT Hyderabad, India vikram@iiit.ac.in

More information

IDeA Competition Report. Electronic Swimming Coach (ESC) for. Athletes who are Visually Impaired

IDeA Competition Report. Electronic Swimming Coach (ESC) for. Athletes who are Visually Impaired IDeA Competition Report Electronic Swimming Coach (ESC) for Athletes who are Visually Impaired Project Carried Out Under: The Department of Systems and Computer Engineering Carleton University Supervisor

More information

WHEN WILL YOUR MULTI-TERABYTE IMAGERY STOP REQUIRING YOU TO BUY MORE DATA STORAGE?

WHEN WILL YOUR MULTI-TERABYTE IMAGERY STOP REQUIRING YOU TO BUY MORE DATA STORAGE? PRODUCT BROCHURE WHEN WILL YOUR MULTI-TERABYTE IMAGERY STOP REQUIRING YOU TO BUY MORE DATA STORAGE? WHEN YOU START COMPRESSING IT TO HEXAGON GEOSPATIAL S ECW FORMAT 2 WHEN WILL YOUR MULTI-TERABYTE IMAGERY

More information

Time Pressure Dispensing

Time Pressure Dispensing Time Pressure Dispensing by Doug Dixon, GDM Product Manager What is time pressure dispensing? Time pressure is a method of dispensing liquid materials (surface mount adhesives and gasketing materials)

More information

UNIVERSITY OF WATERLOO

UNIVERSITY OF WATERLOO UNIVERSITY OF WATERLOO Department of Chemical Engineering ChE 524 Process Control Laboratory Instruction Manual January, 2001 Revised: May, 2009 1 Experiment # 2 - Double Pipe Heat Exchanger Experimental

More information

Using MATLAB with CANoe

Using MATLAB with CANoe Version 2.0 2017-03-09 Application Note AN-IND-1-007 Author Restrictions Abstract Vector Informatik GmbH Public Document This application note describes the usage of MATLAB /Simulink combined with CANoe.

More information

Early Skip Decision based on Merge Index of SKIP for HEVC Encoding

Early Skip Decision based on Merge Index of SKIP for HEVC Encoding , pp.287-292 http://dx.doi.org/10.14257/astl.2016.139.60 Early Skip Decision based on Merge Index of SKIP for HEVC Encoding Jinwoo Jeong, Sungjei Kim, and Yong-Hwan Kim, Intelligent Image Processing Research

More information

Satoshi Yoshida and Takuya Kida Graduate School of Information Science and Technology, Hokkaido University

Satoshi Yoshida and Takuya Kida Graduate School of Information Science and Technology, Hokkaido University Satoshi Yoshida and Takuya Kida Graduate School of Information Science and Technology, Hokkaido University ompressed Pattern Matching ompressed Data Search Directly 0000 000000 Program Searching on ompressed

More information

Analysis of the Radar Doppler Signature of a Moving Human

Analysis of the Radar Doppler Signature of a Moving Human Analysis of the Radar Doppler Signature of a Moving Human Traian Dogaru Calvin Le Getachew Kirose U.S. Army Research Laboratory RF Signal Processing and Modeling Branch Outline Use Doppler radar to detect

More information

An Assessment of FlowRound for Signalised Roundabout Design.

An Assessment of FlowRound for Signalised Roundabout Design. An Assessment of FlowRound for Signalised Roundabout Design. 1.0 Introduction This critique is based upon recent use by White Young Green signal engineering staff. The comments made do not cover all of

More information

A study on the relation between safety analysis process and system engineering process of train control system

A study on the relation between safety analysis process and system engineering process of train control system A study on the relation between safety analysis process and system engineering process of train control system Abstract - In this paper, the relationship between system engineering lifecycle and safety

More information

ASSESSING THE RELIABILITY OF FAIL-SAFE STRUCTURES INTRODUCTION

ASSESSING THE RELIABILITY OF FAIL-SAFE STRUCTURES INTRODUCTION ASSESSING THE RELIABILITY OF FAIL-SAFE STRUCTURES Abraham Brot * Abstract: A computer simulation method is described, that can be used to assess the reliability of a dual-path fail-safe design. The method

More information

5th Symposium on Integrating CFD and Experiments in Aerodynamics (Integration 2012) th Symposium on Integrating CFD and Experiments in Aerodynam

5th Symposium on Integrating CFD and Experiments in Aerodynamics (Integration 2012) th Symposium on Integrating CFD and Experiments in Aerodynam 5th Symposium on Integrating CFD and Experiments in Aerodynamics (Integration 202) 36 Multi-objective Optimization of Airfoil of Mars Exploration Aircraft using Evolutionary Algorithm Gaku Sasaki Tomoaki

More information

Post-Placement Functional Decomposition for FPGAs

Post-Placement Functional Decomposition for FPGAs Post-Placement Functional Decomposition for FPGAs Valavan Manohararajah, Deshanand P. Singh, Stephen D. Brown and Zvonko G. Vranesic Altera Toronto Technology Center 151 Bloor Street West, Suite 200 Toronto,

More information

The system design must obey these constraints. The system is to have the minimum cost (capital plus operating) while meeting the constraints.

The system design must obey these constraints. The system is to have the minimum cost (capital plus operating) while meeting the constraints. Computer Algorithms in Systems Engineering Spring 2010 Problem Set 6: Building ventilation design (dynamic programming) Due: 12 noon, Wednesday, April 21, 2010 Problem statement Buildings require exhaust

More information

COMPARING PLUG & SEAT REGULATORS & CONTROL VALVES. Lamar Jones. Equipment Controls Company 4555 South Berkeley Lake Road Norcross, GA 30071

COMPARING PLUG & SEAT REGULATORS & CONTROL VALVES. Lamar Jones. Equipment Controls Company 4555 South Berkeley Lake Road Norcross, GA 30071 COMPARING PLUG & SEAT REGULATORS & CONTROL VALVES Lamar Jones Equipment Controls Company 4555 South Berkeley Lake Road Norcross, GA 30071 INTRODUCTION The purpose of this paper will be to compare a plug

More information

Design-for-Testability for Path Delay Faults in Large Combinational Circuits Using Test-Points

Design-for-Testability for Path Delay Faults in Large Combinational Circuits Using Test-Points Design-for-Testability for Path Delay Faults in Large Combinational Circuits Using Test-Points Irith Pomeranz and Sudhakar M. Reddy + Electrical and Computer Engineering Department University of Iowa Iowa

More information

Introduction to Pattern Recognition

Introduction to Pattern Recognition Introduction to Pattern Recognition Jason Corso SUNY at Buffalo 12 January 2009 J. Corso (SUNY at Buffalo) Introduction to Pattern Recognition 12 January 2009 1 / 28 Pattern Recognition By Example Example:

More information

Evaluation of a High Performance Code Compression Method

Evaluation of a High Performance Code Compression Method Evaluation of a High Performance Code Compression Method Charles Lefurgy, Eva Piccininni, and Trevor Mudge EECS Department, University of Michigan 1301 Beal Ave., Ann Arbor, MI 48109-2122 {lefurgy,epiccini,tnm}@eecs.umich.edu

More information

An Impeller Blade Analysis of Centrifugal Gas Compressor Using CFD

An Impeller Blade Analysis of Centrifugal Gas Compressor Using CFD An Impeller Blade Analysis of Centrifugal Gas Compressor Using CFD Vivek V. Kulkarni Department of Mechanical Engineering KLS Gogte Institute of Technology, Belagavi, Karnataka Dr. Anil T.R. Department

More information

For IEC use only. Technical Committee TC3: Information structures, documentation and graphical symbols

For IEC use only. Technical Committee TC3: Information structures, documentation and graphical symbols For IEC use only 3/686/INF 2003-08 INTERNATIONAL ELECTROTECHNICAL COMMISSION Technical Committee TC3: Information structures, documentation and graphical symbols Labels to be used in database standards

More information

HIGH RESOLUTION DEPTH IMAGE RECOVERY ALGORITHM USING GRAYSCALE IMAGE.

HIGH RESOLUTION DEPTH IMAGE RECOVERY ALGORITHM USING GRAYSCALE IMAGE. HIGH RESOLUTION DEPTH IMAGE RECOVERY ALGORITHM USING GRAYSCALE IMAGE Kazunori Uruma 1, Katsumi Konishi 2, Tomohiro Takahashi 1 and Toshihiro Furukawa 1 1 Graduate School of Engineering, Tokyo University

More information

RICK FAUSEL, BUSINESS DEVELOPMENT ENGINEER TURBOMACHINERY CONTROL SYSTEM DESIGN OBJECTIVES

RICK FAUSEL, BUSINESS DEVELOPMENT ENGINEER TURBOMACHINERY CONTROL SYSTEM DESIGN OBJECTIVES RICK FAUL, BUSINESS DEVELOPMENT ENGINEER TURBOMACHINERY CONTROL SYSTEM DESIGN OBJECTIVES The primary design objective for any turbomachinery control system should be to maintain or maximize machine and

More information