24.11.2014 Views

Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych

Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych

Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

tasks: T 0 , T 4 , T 5 , T 6 and T 7 with a triple speed (as compared<br />

to the standard universal processor). The system structure<br />

and schedule are shown in Fig. 5 (variant c) and Table 2 (variant<br />

c), respectively. Please notice, that in such variant the<br />

specialized resource is assigned no function in the time period<br />

2-3, 6 and 9, and the universal processor completes processing<br />

of usable tasks in 9 time units, while ASIC processor<br />

completes performing its function in 8 time units. Accordingly,<br />

the required deadline was reached in 9 units.<br />

The cost of the other structure shall be estimated as follows.<br />

If we assume that each usable task performed by a universal<br />

processor needs one memory unit dedicated to such<br />

task, and task assigned to ASIC processor do not need dedicated<br />

memory units the system cost is:<br />

C S = m • C P + n u • C M + p • C ASIC (2)<br />

where: m - the number of identical parallel processors, n u - the<br />

number of tasks assigned to universal processors, p - the number<br />

of specialized ASIC processors devoted for processing remaining<br />

n - n u tasks. For the requirements: “1.”, “2.”, “3.”, “4.”: m =<br />

4, n u = 10, p = 0. For the requirements: “1.” + “2.” + “3.” + “4.”, in<br />

the first variant, m = 5, n u = 10, p = 0. In the second variant, where<br />

one ASIC processor is applied, m = 3, n u = 6 and p = 1.<br />

The paper describes concurrent allocation of resources<br />

and of tasks in complex frameworks. Moreover, this paper<br />

presents simple, practical example of synthesis and management<br />

of system with fault tolerance. The strategy of self testing<br />

based at multiprocessors structure and application of<br />

two-processors tasks.<br />

This work was supported by the Polish Ministry of Science and<br />

High Education as a 2007-2010 research project.<br />

References<br />

[1] Blazewicz J., Ecker K., Plateau B., Trystram D.: Handbook on<br />

parallel and distributed processing. Springer-Verlag, Heidelberg<br />

(2000).<br />

[2] Nabrzyski J., Schopf J., Weglarz J.: Grid Resource Management:<br />

State of the Art and Future Trend. Kluwer Academic Publishers,<br />

Boston (2003).<br />

[3] Coffman E. G., Jr.: Computer and Job-shop scheduling theory.<br />

John Wiley&Sons, Inc. New York (1976).<br />

[4] Blazewicz J., Drabowski M., Weglarz J.: Scheduling multiprocessor<br />

tasks to minimize schedule length. IEEE Trans. Computers<br />

C-35, No.5, pp. 389-393 (1986).<br />

[5] Blazewicz J., Ecker K., Pesch E., G. Schmidt, Węglarz J.: Handbook<br />

on scheduling. Springer-Verlag, Heidelberg (2007).<br />

[6] Dick R. P., Jha N. K., MOGAC: A Multiobjective Genetic Algorithm<br />

for Hardware-Software Cosynthesis of Hierarchical Heterogeneous<br />

Distributed Embedded Systems. in: IEEE<br />

Transactions on Computer-Aided Design of Integrated Circuits<br />

and Systems, vol. 17, no 10, pp. 920 - 935 (1998).<br />

[7] Golub M., Kasapovic S.: Scheduling multiprocessor with genetic<br />

algorithms. Proceedings of the IASTED Applied Informatics Conference,<br />

Innsbruck (2002).<br />

[8] Hyunok Oh., Soonhoi Ha.: Hardware-software cosynthesis of<br />

multi-mode multi-task embedded systems with real-time constraints.<br />

Proceedings of the IEEE/ACM Conference on Hardware<br />

Software Codesign, Estes Park, Colorado, (2002).<br />

[9] Yhang Z., Dick R., Chakrabarty: Energy-aware deterministic fault<br />

tolerance in distributed real-time embedded systems. 41st Proc.<br />

Design Automation Conf., Anaheim, California, (2004).<br />

The security level of particular blind<br />

steganographic systems<br />

(Zabezpieczenie określonego poziomu niewidoczności<br />

w systemach steganograficznych)<br />

prof. dr hab. inż. JERZY KOROSTIL, mgr inż. ŁUKASZ NOZDRZYKOWSKI<br />

Faculty of Computer Science, West Pomeranian University of Technology, Szczecin<br />

Steganographic hidden messages in digital graphic image should<br />

not lead to visible distortions in the resulting image [1,2]. There<br />

are many methods of reducing the occurrence of distortion. One<br />

of these methods is presented in the article [3], where by using of<br />

specified threshold values it rejects blocks which statistical metrics<br />

reveal the existence of a single structure. Hidden messages<br />

in such block would result in the occurrence of visible distortions.<br />

This article proposes the utilization of human visual perception<br />

and its limits that the message is hidden below the<br />

threshold of human vision. It enables the examination of proposed<br />

steganographic methods to ensure a proper level of<br />

concealment of hidden message.<br />

Determining the size of distortions<br />

caused by steganographic hiding<br />

messages<br />

Steganographic hiding messages in digital images can cause<br />

significant distortion of the resulting image, what disqualifies<br />

the method or the picture in which the data are hidden. Particularly<br />

important are the distortions visible by the human<br />

eye. It can take different measures to determine the changes<br />

which arise as a result of steganographic algorithm, and what<br />

does not always reflect the actual level of distortion visible to<br />

human being.<br />

ELEKTRONIKA 11/<strong>2009</strong> 41

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!