Virtualization is an important technology in data center environment due to its useful features such as server consolidation, power saving, live migration and faster server provisioning. However, virtualization someti...
详细信息
A Flight Control System (FCS) of an autonomous Unmanned Aerial Vehicle (UAV) is highly time sensitive as it is required to efficiently integrate various sub-systems running at different speeds. Moreover, functional ac...
详细信息
ISBN:
(纸本)9781509008452
A Flight Control System (FCS) of an autonomous Unmanned Aerial Vehicle (UAV) is highly time sensitive as it is required to efficiently integrate various sub-systems running at different speeds. Moreover, functional accuracy has to be maintained while sharing the memory, computing and peripheral resources. A real-time implementation of a complete FCS in a tight closed loop on a TI (R) DSP microcontroller (Delfino (R) Dual-Core F28377D) without kernel support is described. the bare-metal embedded code developed for this application achieves the required timing constraints through efficient use of flexible memory organization, timer interrupts and CPU resource sharing. the developed system has been functionally verified to autonomously control the intended UAV in the desired manner through extensive real-time Hardware-In-Loop (HIL) simulations. the current archetype can run at 50 Hz with extensive data logging, communication, navigation and control algorithms engaging only one DSP core..
A scheduler is an algorithm that assigns at any time a set of processes to a set of processors. Processes usually interact with each other, which introduces dependencies amongst them. Typically, such dependencies indu...
详细信息
ISBN:
(数字)9783319395197
ISBN:
(纸本)9783319395197;9783319395180
A scheduler is an algorithm that assigns at any time a set of processes to a set of processors. Processes usually interact with each other, which introduces dependencies amongst them. Typically, such dependencies induce extra delays that the scheduler needs to avoid. Specific types of applications, like streaming applications, synthesize a scheduler from a formal model that is aware of these interactions. However, such interaction-specific information is not available for general types of applications. In this paper, we propose an interaction aware scheduling framework for generic concurrent applications. We formalize the amount of work performed by an application as constraints. We use these constraints to generate a graph, and view scheduler synthesis as solving a game on this graph that is played between the scheduler and the application. We illustrate that our framework is expressive enough to subsume an established scheduling framework for streaming programs.
Fault injection is an effective method for PHM and testability validation. However, withthe increasing complexity of structures and functions, and withthe promotion of integration levels for airborne prognostics and...
详细信息
ISBN:
(纸本)9781509027149
Fault injection is an effective method for PHM and testability validation. However, withthe increasing complexity of structures and functions, and withthe promotion of integration levels for airborne prognostics and health management (PHM) and integrated modular avionics (IMA) systems, fault injection is often difficult to use in conventional "plug," "probe," or "adaptor plate" methods. Fault injection based on software also presents a bottleneck for engineering applications in terms of controllability and operability. Seeking to solve the problem of applying software fault injection to testability validation, a fault injection technique based on the Joint Test Action Group (JTAG) interface is proposed in this study. the proposed technique is based on the demands of testability validation, takes into account the development trend in avionics of modularization and integration, and adopts aspects of the JTAG boundary-scan technique. through use of the boundary-scan technique and chip debugging functions, noncontacted hardware fault injection can be realized. Accurate and controllable fault injection of embedded chip pins/functions can then be achieved that satisfies the requirements of fault simulation and injection effect/time. the problems of fault injection implementations for equipment-oriented IMA architecture can thus be overcome, and a new direction for implementing testability validation of airborne PHM and integrated avionics equipment, thereby effectively promoting and ensuring the achievement of testability indices and PHM functions.
the proceedings contain 9 papers. the special focus in this conference is on ICT in Education and Industrial applications. the topics include: Web indicators of ICT use in the work of Ukrainian dissertation committees...
ISBN:
(纸本)9783319302454
the proceedings contain 9 papers. the special focus in this conference is on ICT in Education and Industrial applications. the topics include: Web indicators of ICT use in the work of Ukrainian dissertation committees and graduate schools as element of open science;models, methods and tools for effectiveness estimation of post object-oriented technologies in software maintenance;software quality standards and models evolution;the new method of building a safety model for quantitative risk assessment of complex technical systems for critical application;main steps in defining finitely supported mathematics;solving NP-complete problems in polynomial time by using a natural computing model;abstracting an operational semantics to finite automata;realisation of synchronous and asynchronous black boxes using machines and analysis of boundary states of multi-state system by direct partial logic derivatives.
We present an efficient open-source implementation of a novel video alignment algorithm, based on low dimensionality frame matching and the recently introduced ECC image registration algorithm. We write the algorithm ...
详细信息
ISBN:
(纸本)9781467381970
We present an efficient open-source implementation of a novel video alignment algorithm, based on low dimensionality frame matching and the recently introduced ECC image registration algorithm. We write the algorithm in the Python language, which facilitates prototyping, using the OpenCV library, and then in C++. We test our application on realistic video benchmarks and obtain a good alignment quality. Compared to an initial sequential implementation, we speedup the application by: i) algorithmic optimization, ii) improving data locality, iii) executing parts of the application on parallel hardware. We achieve a sequential performance of at most 10.47x real-time performance when processing a query video of resolution 240x320, with 30 fps. When offloading parts of the computation on NVIDIA GPUs, we obtain a factor of at most 12.39x speedup when compared to the sequential version run on CPU, when using High-Definition resolution. these results pave the way for further optimization in order to run the application on energy-efficient embedded CPU and GPU processors.
this paper presents the high-level architecture (HLA) of the research project DEWI (dependable embedded wireless infrastructure). the objective of this HLA is to serve as a reference for the development of industrial ...
详细信息
ISBN:
(纸本)9781509026418
this paper presents the high-level architecture (HLA) of the research project DEWI (dependable embedded wireless infrastructure). the objective of this HLA is to serve as a reference for the development of industrial wireless sensor and actuator networks (WSANs) based on the concept of the DEWI Bubble. the DEWI Bubble is defined here as a highlevel abstraction of an industrial WSAN with enhanced inter operability (via standardized interfaces), technology reusability, and cross -domain development. this paper details the design criteria used to define the HLA and the organization of the infrastructure internal and external to the DEWI Bubble. the description includes the different perspectives, models or views of the architecture: the entity model, the layered model, and the functional view model (including an overview of interfaces). the HLA constitutes an extension of the ISO/IEC SNRA (sensor network reference architecture) towards the support of industrial applications. To improve interoperability with existing approaches the DEWI HLA also reuses some features from other standardized technologies and architectures. the HLA will allow networks with different industrial sensor technologies to exchange information between them or with external clients via standard interfaces, thus providing a consolidated access to sensor information of different domains. this is an important aspect for smart city applications, Big Data and internet-of-things (IoT).
the proceedings contain 10 papers. the special focus in this conference is on Rewriting Logic and Its applications. the topics include: Labelled graph rewriting meets social networks;use of logical models for proving ...
ISBN:
(纸本)9783319448015
the proceedings contain 10 papers. the special focus in this conference is on Rewriting Logic and Its applications. the topics include: Labelled graph rewriting meets social networks;use of logical models for proving operational termination in general logics;a maude framework for cache coherent multicore architectures;synchronized tree languages for reachability in non-right-linear term rewrite systems;formal specification and verification of a selective defense for TDoS attacks;egalitarian state-transition systems;towards generic monitors for object-oriented real-time maude specifications;proving reachability-logic formulas incrementally;maximally parallel contextual string rewriting and metalevel algorithms for variant satisfiability.
With increasing need on underwater applications, the research on underwater acoustic networks (UANs) becomes more and more important. In addition to proposals for many protocols at each layer, the underwater network a...
详细信息
the proceedings contain 32 papers. the special focus in this conference is on Global Security, Safety, and Sustainability. the topics include: Forensic analysis of secure ephemeral messaging applications on android pl...
ISBN:
(纸本)9783319510637
the proceedings contain 32 papers. the special focus in this conference is on Global Security, Safety, and Sustainability. the topics include: Forensic analysis of secure ephemeral messaging applications on android platforms;aspects of voice communications fraud;scalable frameworks for application security and data protection;balancing targeted delivery of content and personal freedom in the digital on-line video marketing landscape;towards an enterprise architecture framework for community policing;a scalable malware classification based on integrated static and dynamic features;source camera identification using non-decimated wavelet transform;phishing-deception data model for online detection and human protection;cyber attacks analysis using decision tree technique for improving cyber situational awareness;disaster management system as an element of risk management for natural disaster systems using the pestle framework;a critical review of technology acceptance models and the decision to invest in information security;application of a digraph for behavioural eye tracking biometrics;the future of enterprise security with regards to mobile technology and applications;performance analysis for traffics in mobile ad hoc network;global triumph or exploitation of security and privacy concerns in e-learning systems;efficient energy and processes time algorithm for offloading using cloud computing;a novel anonymity quantification and preservation model for Undernet relay networks and facial recognition cane for the visually impaired.
暂无评论