Software systems in domains like Smart Cities, the Internet of things or autonomous cars are coined by a high degree of distribution across several independent computing devices and the requirement to be able to adjus...
详细信息
ISBN:
(纸本)9781509065554
Software systems in domains like Smart Cities, the Internet of things or autonomous cars are coined by a high degree of distribution across several independent computing devices and the requirement to be able to adjust themselves to varying situations in their operational environment. Self adaptive software systems are a natural choice to implement such context-dependent software systems. A multitude of approaches already implement self-adaptive systems and some consider even distribution aspects. Yet, none of the existing solutions supports the coordination of adaptation operations spanning multiple independent nodes, which is necessary to ensure a consistent adaptation even in presence of network errors or node failures. In this paper, we tackle this challenge to execute adaptations in distributed self-adaptive software systems in a coordinated manner. We present a protocol that enables the self-adaptive software system to execute correlated adaptations on multiple nodes in a transactional manlier ensuring an atomic and consistent transition of the distributed system from its source to the desired target configuration. the protocol is validated to be free of deadlocks for any given adaptation at any point in time using a model-checking approach. the performance of our approach is investigated in experiments that emulate the protocol's execution on real devices for different sizes of distributed applications and adaptation scenarios.
the proceedings contain 82 papers. the special focus in this conference is on Ubiquitous computing and Ambient Intelligence. the topics include: Multi-layer security mechanism for networked embedded devices;smart citi...
ISBN:
(纸本)9783319675848
the proceedings contain 82 papers. the special focus in this conference is on Ubiquitous computing and Ambient Intelligence. the topics include: Multi-layer security mechanism for networked embedded devices;smart cities in latin america;combining fog architectures and distributed event-based systems for mobile sensor location certification;IOT service recommendation strategy based on attribute relevance;methodology for analyzing the travel time variability in public road transport;user-centered design of agriculture automation systems using internet of things paradigm;study of dynamic factors in indoor positioning for harsh environments;a secure, out-of-band, mechanism to manage internet of things devices;secure system communication to emergencies for victims management through identity based signcryption scheme;prosumerization approach to semantic ambient intelligence platforms;modeling the origin-destination matrix with incomplete information;decision-making intelligent system for passenger of urban transports;improving tourist experience through an IOT application based on fatbeacons;protecting industry 4.0 systems against the malicious effects of cyber-physical attacks;fuzzy-based approach of concept alignment;a location-based service to support collaboration and strategic control in a real estate broker;a proposal for a distributed computational framework in IoT context;data structures modelling for citizen tracking based applications in smart cities;system model for a continuous improvement of road mass transit;analysis of distance and similarity metrics in indoor positioning based on bluetooth low energy;usability and acceptance of a mobile and cloud-based platform for supporting diabetes self-management;classification of pathologies using a vision based feature extraction.
Social media platforms provide continuous access to user generated content that enables real-time monitoring of user behavior and of events. the geographical dimension of such user behavior and events has recently cau...
详细信息
Most Network-on-Chip routers dedicate a set of buffers to the input and/or output ports. this design decision leads to buffer underutilization especially when running applications with non-uniform traffic patterns. In...
详细信息
the proceedings contain 64 papers. the topics discussed include: partitioned multiprocessor scheduling of mixed-criticality parallel jobs;worst-case communication delay analysis for many-cores using a limited migrativ...
ISBN:
(纸本)9781479939534
the proceedings contain 64 papers. the topics discussed include: partitioned multiprocessor scheduling of mixed-criticality parallel jobs;worst-case communication delay analysis for many-cores using a limited migrative model;service guarantee exploration for mixed-criticality systems;direct handling of infeasible paths in the event dependency analysis;an evaluation of code generation of dataflow languages on manycore architectures;component-based analysis of hierarchical scheduling using linear hybrid automata;a context aware cache controller to bridge the gap between theory and practice in real-timesystems;network-harmonized scheduling for multi-application sensor networks;energy-efficient allocation of real-timeapplications onto heterogeneous processors;and non-volatile registers aware instruction selection for embeddedsystems.
the Beaglebone Black single-board computer is well-suited for real-timeembeddedapplications because its system-on-a-chip contains two "Programmable real-time Units" (PRUs): 200-MHz microcontrollers that ru...
详细信息
ISBN:
(纸本)9781509057184
the Beaglebone Black single-board computer is well-suited for real-timeembeddedapplications because its system-on-a-chip contains two "Programmable real-time Units" (PRUs): 200-MHz microcontrollers that run concurrently withthe main 1-GHz CPU that runs Linux. this paper introduces "Cyclops": a web-browser-based IDE that facilitates the development of embeddedapplications on the Beaglebone Black's PRU. Users write PRU code in a simple JavaScript-inspired language, which Cyclops converts to PRU assembly code and deploys to the PRU. Cyclops automatically configures the Beaglebone's pinmux controller to use common I/O peripherals like ADC and PWM. Additionally, Cyclops includes a PRU library and Linux kernel module for synchronizing the PRU withthe processor clock, enabling the PRU to time-stamp sensor measurements using the Linux processor time within sub-microsecond accuracy.
Wireless Sensor Network (WSN) and related technologies are widely used to build decision support systems to solve many real-world problems especially in agricultural environment. Using the basic principles of WSN and ...
详细信息
ISBN:
(纸本)9781509065264
Wireless Sensor Network (WSN) and related technologies are widely used to build decision support systems to solve many real-world problems especially in agricultural environment. Using the basic principles of WSN and Mobile computing technology, a Smart System for Shiitake Mushroom (SSSM) cultivation in a greenhouse environment was developed near Mount Kinabalu in Sabah, Malaysia. the wireless temperature, humidity and CO2 sensors are used to collect data in this application. the system monitors sensor data in a feedback cycle where the control devices are activated based on pre-defined threshold values. Implementation of SSSM will optimize the usage of human resources and also maximized the yield of the mushroom.
the proceedings contain 65 papers. the topics discussed include: performance and implementation of a FPGA-based cross polar interference canceller;ISMS planning based on ISO/IEC 27001:2013 using analytical hierarchy p...
ISBN:
(纸本)9781538635469
the proceedings contain 65 papers. the topics discussed include: performance and implementation of a FPGA-based cross polar interference canceller;ISMS planning based on ISO/IEC 27001:2013 using analytical hierarchy process at gap analysis phase (case study : XYZ Institute);comparison of A∗ and dynamic Pathfinding algorithm with dynamic Pathfinding algorithm for NPC on car racing game;secure VANET protocol using hierarchical pseudonyms with blind signature;traveling salesman problem using multi-element genetic algorithm;VP-LAB : a virtual way to stay connected with programming laboratory;alert, monitoring and tracking for electronic device prototype;satellite deployment strategy for an archipelagic state: the case of Indonesia;quantitative study of thresholding for device-to-device communication in 5G networks;statistical test on lightweight block cipher-based PRNG;transformation of time Petri net into PROMELA;design and implementation of government cloud computing requirements: TOGAF;architectural design of token based authentication of MQTT protocol in constrained IOT device;formal modeling for consistency checking of signal transition graph;and wideband monofilar helical antenna for wireless communication in remote area.
A software locking mechanism commonly protects shared resources for multithreaded applications. this mechanism can, especially in chip-multiprocessor systems, result in a large synchronization overhead. For real-time ...
详细信息
A software locking mechanism commonly protects shared resources for multithreaded applications. this mechanism can, especially in chip-multiprocessor systems, result in a large synchronization overhead. For real-timesystems in particular, this overhead increases the worst-case execution time and may void a task set's schedulability. this paper presents 2 hardware locking mechanisms to reduce the worst-case time required to acquire and release synchronization locks. these solutions are implemented for the chip-multiprocessor version of the Java Optimized Processor. the 2 hardware locking mechanisms are compared with a software locking solution as well as the original locking system of the processor. the hardware cost and performance are evaluated for all presented locking mechanisms. the performance of the better-performing hardware locks is comparable withthat of the original single global lock when contending for the same lock. When several noncontending locks are used, the hardware locks enable true concurrency for critical sections. Benchmarks show that using the hardware locks yields performance ranging from no worse than the original locks to more than twice their best performance. this improvement can allow a larger number of real-time tasks to be reliably scheduled on a multiprocessor real-time platform. Copyright (C) 2016 John Wiley & Sons, Ltd.
the advanced driver assistance system (ADAS) has been actively researched to enable adaptive cruise control and collision avoidance, however, conventional ADAS is not capable of more advanced functions due to the abse...
详细信息
ISBN:
(纸本)9783319683454;9783319683447
the advanced driver assistance system (ADAS) has been actively researched to enable adaptive cruise control and collision avoidance, however, conventional ADAS is not capable of more advanced functions due to the absence of intelligent decision making algorithms such as behavior analysis. Moreover, most algorithms in automotive applications are accelerated by GPUs where its power consumption exceeds the power requirement for practical usage. In this paper, we present a deep risk prediction algorithm, which predicts risky objects prior to collision by behavior prediction. Also, a real-timeembedded system with high energy efficiency is proposed to provide practical application of our algorithm to the intelligent ADAS, consuming only similar to 1 Win average. For validation, we build the risky urban scene stereo (RUSS) database including 50 stereo video sequences captured under various risky road situations. the system is tested with various databases including the RUSS, and it can maximally achieve 30 frames/s throughput with 720p stereo images with 98.1% of risk prediction accuracy.
暂无评论