Thông tin tài liệu
DATA ACQUISITION
APPLICATIONS
Edited by Zdravko Karakehayov
DATA ACQUISITION
APPLICATIONS
Edited by Zdravko Karakehayov
Data Acquisition Applications
http://dx.doi.org/10.5772/2596
Edited by Zdravko Karakehayov
Contributors
Sohaib Majzoub, Hassan Diab, Wang Rui, Wang Tingfeng, Sun Tao, Chen Fei, Guo Jin,
Troy C. Richards, Carlos Ricardo Soccol, Michele Rigon Spier,
Luciana Porto de Souza Vandenberghe, Adriane Bianchi Pedroni Medeiros,
Luiz Alberto Junior Letti, Wilerson Sturm, Paul Osaretin Otasowie, Chen Fan,
José R. García Oya, Andrew Kwan, Fernando Muñoz Chavero, Fadhel M. Ghannouchi,
Mohamed Helaoui, Fernando Márquez Lasso, Enrique López-Morillo, Antonio Torralba Silgado,
Bogdan Marius Ciurea, Salah Sharieh, Franya Franek, Alexander Ferworn, Andrew Lang,
Vijay Parthasarathy, Ameet Jain, V. González, D. Barrientos, J. M. Blasco, F. Carrió,
X. Egea, E. Sanchis, Paulo R. Aguiar, Cesar H.R. Martins, Marcelo Marchi, Eduardo C. Bianchi,
Feng Chen, Xiaofeng Zhao and Hong Ye
Published by InTech
Janeza Trdine 9, 51000 Rijeka, Croatia
Copyright © 2012 InTech
All chapters are Open Access distributed under the Creative Commons Attribution 3.0 license,
which allows users to download, copy and build upon published articles even for commercial
purposes, as long as the author and publisher are properly credited, which ensures maximum
dissemination and a wider impact of our publications. After this work has been published by
InTech, authors have the right to republish it, in whole or part, in any publication of which they
are the author, and to make other personal use of the work. Any republication, referencing or
personal use of the work must explicitly identify the original source.
Notice
Statements and opinions expressed in the chapters are these of the individual contributors and
not necessarily those of the editors or publisher. No responsibility is accepted for the accuracy
of information contained in the published chapters. The publisher assumes no responsibility for
any damage or injury to persons or property arising out of the use of any materials,
instructions, methods or ideas contained in the book.
Publishing Process Manager Tanja Skorupan
Typesetting InTech Prepress, Novi Sad
Cover InTech Design Team
First published August, 2012
Printed in Croatia
A free online edition of this book is available at www.intechopen.com
Additional hard copies can be obtained from orders@intechopen.com
Data Acquisition Applications, Edited by Zdravko Karakehayov
p. cm.
ISBN 978-953-51-0713-2
Contents
Preface IX
Section 1 Industrial Applications 1
Chapter 1 Reconfigurable Systems for
Cryptography and Multimedia Applications 3
Sohaib Majzoub and Hassan Diab
Chapter 2 High Accuracy Calibration
Technology of UV Standard Detector 29
Wang Rui, Wang Tingfeng, Sun Tao, Chen Fei and Guo Jin
Chapter 3 Dynamic Testing of Data Acquisition Channels
Using the Multiple Coherence Function 51
Troy C. Richards
Chapter 4 Data Acquisition Systems in Bioprocesses 79
Carlos Ricardo Soccol, Michele Rigon Spier, Luciana Porto
de Souza Vandenberghe, Adriane Bianchi Pedroni Medeiros,
Luiz Alberto Junior Letti and Wilerson Sturm
Chapter 5 Microwave Antenna Performance Metrics 107
Paul Osaretin Otasowie
Chapter 6 The Data Acquisition in Smart Substation of China 123
Chen Fan
Chapter 7 Subsampling Receivers with Applications
to Software Defined Radio Systems 167
José R. García Oya, Andrew Kwan,Fernando Muñoz Chavero,
Fadhel M. Ghannouchi, Mohamed Helaoui, Fernando Márquez
Lasso, Enrique López-Morillo and Antonio Torralba Silgado
Section 2 Medical Applications 195
Chapter 8 Data Acquisition in Pulmonary Ventilation 197
Bogdan Marius Ciurea
VI Contents
Chapter 9 Mobile Functional Optical Brain Spectroscopy over Wireless
Mobile Networks Using Near-Infrared Light Sensors 233
Salah Sharieh, Franya Franek and Alexander Ferworn
Chapter 10 Calibration of EM Sensors for Spatial
Tracking of 3D Ultrasound Probes 253
Andrew Lang, Vijay Parthasarathy and Ameet Jain
Section 3 Scientific Experiments 269
Chapter 11 Data Acquisition in Particle Physics Experiments 271
V. González, D. Barrientos, J. M. Blasco, F. Carrió,
X. Egea and E. Sanchis
Chapter 12 Digital Signal Processing for Acoustic Emission 297
Paulo R. Aguiar, Cesar H.R. Martins, Marcelo Marchi
and Eduardo C. Bianchi
Chapter 13 Making Use of the Landsat 7 SLC-off ETM+ Image
Through Different Recovering Approaches 317
Feng Chen, Xiaofeng Zhao and Hong Ye
Preface
Today, the data acquisition technology has found its way into virtually every segment
of electronics. A digital signal processing (DSP) system accepts analog signals as input,
converts those analog signals to numbers, performs computations using the numbers
and eventually converts the results of the computations back into analog signals. Once
converted to numbers, signals are unconditionally stable. Error detection and
correction methods can be applied to store, transmit and reproduce numbers with no
corruption. Signals stored digitally are really just large arrays of numbers. As such,
they are immune to the physical limitations of analog signals. Furthermore, DSP can
allow large bandwidth signals to be sent over narrow bandwidth channels. Finally,
communications security can be significantly improved through DSP. Since numbers
are traveling instead of signals, encryption and decryption can be easily done.
While traditionally the goal of data acquisition was to sense the environment, modern
computing systems add another axis along which data acquisition is organized. Those
systems are capable of measuring internal variables such as on-chip temperature or
energy in the battery. Thus the environment to machine data flow frequently works in
parallel with machine to machine data flow.
Data acquisition systems have numerous applications. This book has a total of 13
chapters and is divided into three sections: Industrial applications, Medical applications
and Scientific experiments. The chapters are written by experts from around the world.
The targeted audience for this book includes professionals who are designers or
researchers in the field of data acquisition systems. Faculty members and graduate
students could also benefit from the book.
Many people have contributed to this book; first and foremost the authors who have
contributed 13 chapters. These colleagues deserve our appreciation for taking the time
out of their busy schedules to contribute to this book. I also owe a big word of thanks
to the publishing process manager of this book, Tanja Skorupan. Tanja put in a great
deal of effort organizing the interaction with the authors and the production team.
Zdravko Karakehayov
Department of Computer Systems, Technical University of Sofia,
Bulgaria
Section 1
Industrial Applications
[...]... instructions and registers Thus, GPP is used to compute diverse range of 4 Data Acquisition Applications applications Application-Specific Integrated Circuits (ASIC), on the other hand, are used to implement a single fixed function Therefore, ASICs have no flexibility and they can only execute a very limited type of the targeted applications known beforehand (Singh et al., 1998), (Kozyrakis, 1998), (Möller... of loading data into the lookup table is then the same as the Frame Buffer This global lookup table could be placed between the Frame Buffer and the RC Array The data coming from the Frame Buffer to RC Array is multiplexed to the address bus of this lookup table and the needed data are passed to the RCs from this table The distribution of the data on the RCs follows the same Frame-BufferData-Distribution... (Singh et al., 1998) Figure 1 MorphoSys Block Diagram and RC Logic Digaram 6 Data Acquisition Applications Figure 2 RC Array Communication Buses 4 Cryptographic algorithms mapping onto MorphoSys Cryptography has grown to be a fundamental element to handle authenticity, integrity, confidentiality and non-reputability of private data flows through public networks With the increasing demand for high performance... platform is much more flexible than the ASIC or FPGA A wide range of applications can be implemented on MorphoSys, taking advantage of the fact that MorphoSys is a low power consumption platform (Majzoub & Diab, 2006) Saying all this, still the MorphoSys can and should be improved in order to compete with other platforms 14 Data Acquisition Applications 4.2 Twofish encryption algorithm In this section,... Frame-Buffer -Data- Distribution scheme, which means same Row/Column would have the same data or completely unshared data are sent to every one Whether the lookup table is place on or off the RC, the drawback of this method is that it increases the RC size greatly, and thus, the area of the whole chip, which make the system hard to scale Moreover, it puts a heavy load on the buses in loading the data to the... to map such applications on the hardware under examination Therefore, the mapping of the targeted applications for such hardware evaluation must be carried out manually This handmapping process can provide valuable information to prospective compilers that eventually Reconfigurable Systems for Cryptography and Multimedia Applications 5 will emerge out of the implementation of wide range of applications. .. instructions are very easy to implement and can greatly help the performance Since most of the cryptographic applications, as well as multimedia type of applications requires iterative and repetitive operations on different data 7 Conclusion In this chapter we implemented a number of multimedia applications, namely Rijndael, Twofish, image filtering and computer graphics algorithms This implementation... hardware, namely MorphoSys, considering certain key applications targeted for such hardware (Hauck, 1998) MorphoSys is a reconfigurable architecture designed for multimedia applications, digital signal and image processing, cryptographic algorithms, and networking protocols (Singh et al., 1998) In this chapter, we discuss application mapping, identify potential limitations and key improvements and compare... calculation of the vectors Mo and Me are straightforward We just have to separate the odd bytes from the even ones Afterwards the expanded key words should be derived from Me and Mo and stored in 16 Data Acquisition Applications the memory to be used later The key computations are performed offline and then stored in main memory to be used later in the encryption The key scheduling operation is shown in Fig... compared to other architectures (128 key) Overall Cycles 7098 13815 16315 25650 22790 100200 Overall Cycles 5681 11015 14415 22350 17690 67000 Overall Cycles 4361 8115 8515 17350 12790 56500 18 Data Acquisition Applications Architecture MorphoSys Pentium Pro Pentium II UltraSPARC PowerPC 750 68040 Encrypt 1 0.13 0.13 0.32 0.25 1.5 Key (128) 1 3.8 4 8.14 6 26 Overall 1 1.86 1.95 3.97 2.93 13 Table 5 Speedup . DATA ACQUISITION
APPLICATIONS
Edited by Zdravko Karakehayov
DATA ACQUISITION
APPLICATIONS
Edited by Zdravko Karakehayov
Data Acquisition. environment to machine data flow frequently works in
parallel with machine to machine data flow.
Data acquisition systems have numerous applications. This
Ngày đăng: 07/03/2014, 21:20
Xem thêm: Data Acquisition Applications pot, Data Acquisition Applications pot