In response to a recognized need to facilitate computing technology transfer in biomedicine, the Biomedical computing technology Information Center (BCTIC) was established by the Division of Biomedical and Environment...
详细信息
With the increasingly prominent application of binocular disparity computing technology in mobile terminals, how to achieve efficient and high-precision binocular disparity computing in mobile terminals with limited c...
详细信息
The exploitation of quantum physics and of quantum states superposition and entanglement properties for computing applications has been studied since 1980s [1] [2] for their disrupting potential in the evolution of in...
详细信息
The exploitation of quantum physics and of quantum states superposition and entanglement properties for computing applications has been studied since 1980s [1] [2] for their disrupting potential in the evolution of information theory. Although quantum computing is still in its infancy, experiments have been carried out and proto-types have been developed, showing promising results for future commercial applications [3] [4] [5] [6]. Research in both theoretical and practical areas continues at a frantic pace, and many national governments, research institutions and military funding agencies support quantum computing research to develop quantum computers for both civilian and national security purposes, such as cryptanalysis, genetics, drugs and disease research, materials science and design and so on [2]. Thanks to its computing power, the usage of quantum computing capabilities in orbit would bring priceless benefits to space and enable novel methodologies and technologies to improve both on ground and in space applications. On-board cyber-security, satellite AI, advanced autonomous life support systems for human exploration are only few of the domains which could be dramatically boosted by the availability of this technology. The paper discusses an early study about an experimentation of a quantum computer in orbit as a first step for a future fully qualified flight-ready payload. It discusses the major benefits of a flight experimentation, focusing on the one hand on the objectives and the expected benefits that it will bring to the development of the space borne and on-ground technology, on the other hand on the open questions like the effect of microgravity on the architecture of this technology. It analyses the currently available implementation solutions of quantum computers on ground which are currently prototyped (e.g. IBM Q System One), and provides early results on the identified main technical aspects to be considered to improve the technology readiness l
Security has been a serious concern in more and more embedded systems. But restricted by the constrained resources in embedded system, security may damage the system real-time performance, we refer to this challenge a...
详细信息
ISBN:
(纸本)9781479974351
Security has been a serious concern in more and more embedded systems. But restricted by the constrained resources in embedded system, security may damage the system real-time performance, we refer to this challenge as the "security real-time gap". To bridge this gap, trusted computing technology can be a good candidate, however, researches focusing on real-time performance in embedded systems employing trusted computing is still blank. In this paper, we investigate the dynamic scheduling of hybrid tasks with trusted computing constraint, and present a hybrid tasks model to describe the tasks which need trusted computing resources and a strategy to manage the trusted requests. Furthermore, an advanced dynamic hybrid task schedule algorithm based on total bandwidth server (TBS) algorithm is presented in this paper, used for enhancing responsiveness performance of aperiodic tasks. In the evaluation by simulation, the proposed method reduced average response times of the aperiodic task by up to 30.4%.
Fast Growth of (ICT) Information and Communication technology results to Innovation of Cloud computing and is considered as a key driver for technological innovations, as an IT innovations, cloud computing had added a...
详细信息
Ensemble Kalman Filter (EnKF) uses a randomized ensemble of subsurface models for error and uncertainty estimation. However, the complexity of geological models and the requirement of a large number of simulation runs...
详细信息
Out of the many computing and software oriented models that are being adopted by Computer Networking, Fog computing has captured quite a wide audience in Research and Industry. There is a lot of confusion on its preci...
详细信息
ISBN:
(纸本)9781509018987
Out of the many computing and software oriented models that are being adopted by Computer Networking, Fog computing has captured quite a wide audience in Research and Industry. There is a lot of confusion on its precise definition, position, role and application. The Internet of Things (IOT), todays' digitized intelligent connectivity domain, demands real time response in many applications and services. This renders Fog computing a suitable platform for achieving goals of autonomy and efficiency. This paper is a justification of the concepts, interest, approaches, and practices of Fog computing. It describes the need for adopting this new model and investigate its prime features by elucidating the scenarios for implementing it, thereby outlining its significance in the IoT world.
UAV has been more and more applied in the military and civil domain. It needs to have the capability to perform some autonomous tasks to ensure its mission's success under the complex electromagnetic conditions. H...
详细信息
ISBN:
(纸本)9781467386616
UAV has been more and more applied in the military and civil domain. It needs to have the capability to perform some autonomous tasks to ensure its mission's success under the complex electromagnetic conditions. However most of existing researches are at the laboratory level and do the special case studies. Intelligence computing technology, as a basic and universal technology, should be focused on. After building the system framework, the common support technologies including perception, decision-making and human machine interface are discussed in detail. Then the platform conception and capability analysis is given as a feasible reference for the further technical breakthrough. Simulation experimental results demonstrate the effectiveness of the poposed framework and platform.
With the development of intelligent home appliance technology, real-time home appliance status information is now generated in large quantities. New technology is necessary in order to process the large amount of stat...
详细信息
As a classical security policy, DTE (Domain and Type Enforcement) is usually used to protect the integrity of information and implemented in many famous security operating systems. But there arc three main questions f...
详细信息
As a classical security policy, DTE (Domain and Type Enforcement) is usually used to protect the integrity of information and implemented in many famous security operating systems. But there arc three main questions for most systems that have implemented DTE security policy as follows: 1) security policy enforcing module is easy to be tampered and bypass before loaded;2) The content of security policy file is easily to be disclosed and modified;3) The system is prone to suffer from "changed-name" attack. Trusted computing provides novel ideas and methods to solve the question of information security. The paper presents an enhanced scheme of enforcing DTE security policy based on trusted computing technology, it is scalable and can deal with the questions mentioned above well. It analyses the whole design of scheme in details and implements a prototype system to demonstrate the feasibility. Experiment results show that it has accepted performance overhead.
暂无评论