software-defined architecture is a promising solution to keep performance and power scaling. However, development of the system requires a concurrent software and hardware development flow and experienced engineers fo...
详细信息
ISBN:
(纸本)9781728168616
software-defined architecture is a promising solution to keep performance and power scaling. However, development of the system requires a concurrent software and hardware development flow and experienced engineers for development. To reduce the design effort of the system, a high-level hardware profiling tool is proposed in this work. It converts a hardware design to a C++ cycle accurate model and then analyzes the model with a modern compiler infrastructure for performance and security concerns. The tool makes hardware profiling like a general program profiling by combining the C++ cycle accurate model and resource allocation represented by the compiler infrastructure. It supports both static and dynamic profiling, making it practical to address challenges in the development of software-defined architecture.
The existing low-latency anonymous communication networks represented by Tor and I2P networks are mainly composed of voluntary nodes all over the world, and these nodes use onion routing or garlic routing to implement...
详细信息
ISBN:
(纸本)9789811695766;9789811695759
The existing low-latency anonymous communication networks represented by Tor and I2P networks are mainly composed of voluntary nodes all over the world, and these nodes use onion routing or garlic routing to implement data hop-by-hop transmission. Due to the high autonomy and randomness of voluntary nodes, the reliability, credibility and availability of the entire anonymous network cannot meet specific QoS requirements. For this reason, based on the advantages of P2P network, this paper proposes an anonymous communication system based on software-defined architecture. The system uses file exchange instead of message exchange, realizes asynchronous communication, realizes the anonymity of transmission path, and introduces The control center performs unified programming on the message forwarding path, which has higher flexibility and reliability. The experimental results show that the entire process is encrypted and different messages cannot be correlated, which can achieve the effect of anti-tracing.
Internet of Things (loT) is a thriving trend that has invaded many aspects of real life. The merging of IoT with industrial information is forming a new emerging direction of Industrial Internet of Things (I(2)oT). I(...
详细信息
ISBN:
(纸本)9781538611913
Internet of Things (loT) is a thriving trend that has invaded many aspects of real life. The merging of IoT with industrial information is forming a new emerging direction of Industrial Internet of Things (I(2)oT). I(2)oT requires reliable methods for co-design of control and automation systems that can align their performance within deep and complex cyber layers of communication and computation. This paper investigates the utilization of hybrid control approach for modeling and analyzing distributed control of a quadruple-tank as a lab-scale benchmark process. The system is implemented via a software-defined architecture for I(2)oT using low-cost commercial IoT-enabled Intel Galileo Boards. The proposed I(2)oT softwarearchitecture utilizes *** and JavaScript for all different layers of the system with web sockets for handling real-time control packets. *** is considered reliable for event-driven scheme applications such as PDT due to its optimal performance and resource utilization.
In the practice of cloud manufacturing, there still exist some major challenges, including: 1) cloud based big data analytics and decision-making cannot meet the requirements of many latency-sensitive applications on ...
详细信息
In the practice of cloud manufacturing, there still exist some major challenges, including: 1) cloud based big data analytics and decision-making cannot meet the requirements of many latency-sensitive applications on shop floors;2) existing manufacturing systems lack enough reconfigurability, openness and evolvability to deal with shop-floor disturbances and market changes;and 3) big data from shop-floors and the Internet has not been effectively utilized to guide the optimization and upgrade of manufacturing systems. This paper proposes an open evolutionary architecture of the intelligent cloud manufacturing system with collaborative edge and cloud processing. Hierarchical gateways connecting and managing shop-floor things at the "edge" side are introduced to support latency-sensitive applications for real-time responses. Big data processed both at the gateways and in the cloud will be used to guide continuous improvement and evolution of edge-cloud systems for better performance. As software tools are becoming dominant as the "brain" of manufacturing control and decision-making, this paper also proposes a new mode - "AI-Mfg-Ops" (AI enabled Manufacturing Operations) with a supporting softwaredefined framework, which can promote fast operation and upgrading of cloud manufacturing systems with smart monitoring-analysis-planning-execution in a closed loop. This research can contribute to the rapid response and efficient operation of cloud manufacturing systems.
Underwater wireless power transfer (UWPT) is a critical infrastructure for supplying power to underwater devices, such as underwater sensors and autonomous underwater vehicles. Enabling a software-defined architecture...
详细信息
Underwater wireless power transfer (UWPT) is a critical infrastructure for supplying power to underwater devices, such as underwater sensors and autonomous underwater vehicles. Enabling a software-defined architecture for UWPT promises to build a flexible and programmable underwater energy network. Although it is crucial that UWPT be made more resilient to cyberattacks and energy stealing, this remains an open challenge. In this article, we propose a software-defined UWPT (SD-UWPT) system that is both cyber and energy secure. A moving target defense approach and an active synchronous detection method are developed to protect the SD-UWPT against scanning-based attacks and power bot attacks. To enable energy-secure UWPT, an impedance measurement based approach is further established to prevent energy stealing. Through comprehensive evaluations, we validate the benefits of SD-UWPT and demonstrate the effectiveness of the proposed cyber-energy secure strategies against various attacks.
暂无评论