Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych
Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych
Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
tasks: T 0 , T 4 , T 5 , T 6 and T 7 with a triple speed (as compared<br />
to the standard universal processor). The system structure<br />
and schedule are shown in Fig. 5 (variant c) and Table 2 (variant<br />
c), respectively. Please notice, that in such variant the<br />
specialized resource is assigned no function in the time period<br />
2-3, 6 and 9, and the universal processor completes processing<br />
of usable tasks in 9 time units, while ASIC processor<br />
completes performing its function in 8 time units. Accordingly,<br />
the required deadline was reached in 9 units.<br />
The cost of the other structure shall be estimated as follows.<br />
If we assume that each usable task performed by a universal<br />
processor needs one memory unit dedicated to such<br />
task, and task assigned to ASIC processor do not need dedicated<br />
memory units the system cost is:<br />
C S = m • C P + n u • C M + p • C ASIC (2)<br />
where: m - the number of identical parallel processors, n u - the<br />
number of tasks assigned to universal processors, p - the number<br />
of specialized ASIC processors devoted for processing remaining<br />
n - n u tasks. For the requirements: “1.”, “2.”, “3.”, “4.”: m =<br />
4, n u = 10, p = 0. For the requirements: “1.” + “2.” + “3.” + “4.”, in<br />
the first variant, m = 5, n u = 10, p = 0. In the second variant, where<br />
one ASIC processor is applied, m = 3, n u = 6 and p = 1.<br />
The paper describes concurrent allocation of resources<br />
and of tasks in complex frameworks. Moreover, this paper<br />
presents simple, practical example of synthesis and management<br />
of system with fault tolerance. The strategy of self testing<br />
based at multiprocessors structure and application of<br />
two-processors tasks.<br />
This work was supported by the Polish Ministry of Science and<br />
High Education as a 2007-2010 research project.<br />
References<br />
[1] Blazewicz J., Ecker K., Plateau B., Trystram D.: Handbook on<br />
parallel and distributed processing. Springer-Verlag, Heidelberg<br />
(2000).<br />
[2] Nabrzyski J., Schopf J., Weglarz J.: Grid Resource Management:<br />
State of the Art and Future Trend. Kluwer Academic Publishers,<br />
Boston (2003).<br />
[3] Coffman E. G., Jr.: Computer and Job-shop scheduling theory.<br />
John Wiley&Sons, Inc. New York (1976).<br />
[4] Blazewicz J., Drabowski M., Weglarz J.: Scheduling multiprocessor<br />
tasks to minimize schedule length. IEEE Trans. Computers<br />
C-35, No.5, pp. 389-393 (1986).<br />
[5] Blazewicz J., Ecker K., Pesch E., G. Schmidt, Węglarz J.: Handbook<br />
on scheduling. Springer-Verlag, Heidelberg (2007).<br />
[6] Dick R. P., Jha N. K., MOGAC: A Multiobjective Genetic Algorithm<br />
for Hardware-Software Cosynthesis of Hierarchical Heterogeneous<br />
Distributed Embedded Systems. in: IEEE<br />
Transactions on Computer-Aided Design of Integrated Circuits<br />
and Systems, vol. 17, no 10, pp. 920 - 935 (1998).<br />
[7] Golub M., Kasapovic S.: Scheduling multiprocessor with genetic<br />
algorithms. Proceedings of the IASTED Applied Informatics Conference,<br />
Innsbruck (2002).<br />
[8] Hyunok Oh., Soonhoi Ha.: Hardware-software cosynthesis of<br />
multi-mode multi-task embedded systems with real-time constraints.<br />
Proceedings of the IEEE/ACM Conference on Hardware<br />
Software Codesign, Estes Park, Colorado, (2002).<br />
[9] Yhang Z., Dick R., Chakrabarty: Energy-aware deterministic fault<br />
tolerance in distributed real-time embedded systems. 41st Proc.<br />
Design Automation Conf., Anaheim, California, (2004).<br />
The security level of particular blind<br />
steganographic systems<br />
(Zabezpieczenie określonego poziomu niewidoczności<br />
w systemach steganograficznych)<br />
prof. dr hab. inż. JERZY KOROSTIL, mgr inż. ŁUKASZ NOZDRZYKOWSKI<br />
Faculty of Computer Science, West Pomeranian University of Technology, Szczecin<br />
Steganographic hidden messages in digital graphic image should<br />
not lead to visible distortions in the resulting image [1,2]. There<br />
are many methods of reducing the occurrence of distortion. One<br />
of these methods is presented in the article [3], where by using of<br />
specified threshold values it rejects blocks which statistical metrics<br />
reveal the existence of a single structure. Hidden messages<br />
in such block would result in the occurrence of visible distortions.<br />
This article proposes the utilization of human visual perception<br />
and its limits that the message is hidden below the<br />
threshold of human vision. It enables the examination of proposed<br />
steganographic methods to ensure a proper level of<br />
concealment of hidden message.<br />
Determining the size of distortions<br />
caused by steganographic hiding<br />
messages<br />
Steganographic hiding messages in digital images can cause<br />
significant distortion of the resulting image, what disqualifies<br />
the method or the picture in which the data are hidden. Particularly<br />
important are the distortions visible by the human<br />
eye. It can take different measures to determine the changes<br />
which arise as a result of steganographic algorithm, and what<br />
does not always reflect the actual level of distortion visible to<br />
human being.<br />
ELEKTRONIKA 11/<strong>2009</strong> 41