Tasks in hard real-time systems are required to meet preset deadlines, even in the presence of transient faults and hence the analysis of worst-case finish time (WCFT) must consider the extra time incurred by re-exe...
详细信息
Tasks in hard real-time systems are required to meet preset deadlines, even in the presence of transient faults and hence the analysis of worst-case finish time (WCFT) must consider the extra time incurred by re-executing tasks that were faulty. Existing solutions can only estimate WCFT and usually result in significant under- or over-estimation. In this work, we conclude that a sufficient and necessary condition of a task set experiencing its WCFT is that its critical task incurs all expected transient faults. A method is presented to identify the critical task and WCFT in O(IVI + IEI) where IVI and IEI are the number of tasks and dependencies between tasks, respectively. This method finds its application in testing the feasibility of directed acyclic graph (DAG) based task sets scheduled in a wide variety of fault-prone multi-processor systems, where the processors could be either homogeneous or heterogeneous, DVS-capable or DVS-incapable, etc. The common practices, which require the same time complexity as the proposed critical-task method, could either underestimate the worst case by up to 25%, or overestimate by 13%. Based on the proposed critical-task method, a simulated-annealing scheduling algorithm is developed to find the energy efficient fault-tolerant schedule for a given DAG task set. Experimental results show that the proposed critical-task method wins over a common practice by up to 40% in terms of energy saving.
Due to the increasing number of photos taken by mobile phone, how to improve the efficiency of re-finding personal photos becomes an important research issue. Based on the survey of the current methods to re-find expe...
详细信息
In order to improve fault forecasting model accuracy of back propagation neural network (BPNN), an improved prediction method of optimized BPNN based on Multilevel Genetic Algorithm (MGA) was proposed. We design new c...
详细信息
Passive sensor networks can achieve accurate detection of target under complex environment. In order to adapt to different communication demands of sensor networks in different environments, this paper designed and im...
详细信息
The asymptotic signal bandwidth of various kinds of large-scale asynchronous Time Hopping Impulse Radio Ultra-Wide Band (TH-IR UWB) communication networks such that multiple access interference can be negligible with ...
详细信息
Mining penetration testing semantic knowledge hidden in vast amounts of raw penetration testing data is of vital importance for automated penetration *** rule mining,a data mining technique,has been studied and explor...
详细信息
Mining penetration testing semantic knowledge hidden in vast amounts of raw penetration testing data is of vital importance for automated penetration *** rule mining,a data mining technique,has been studied and explored for a long ***,few studies have focused on knowledge discovery in the penetration testing *** experimental result reveals that the long-tail distribution of penetration testing data nullifies the effectiveness of associative rule mining algorithms that are based on frequent *** address this problem,a Bayesian inference based penetration semantic knowledge mining algorithm is ***,a directed bipartite graph model,a kind of Bayesian network,is constructed to formalize penetration testing ***,we adopt the maximum likelihood estimate method to optimize the model parameters and decompose a large Bayesian network into smaller networks based on conditional independence of variables for improved solution ***,irrelevant variable elimination is adopted to extract penetration semantic knowledge from the conditional probability distribution of the *** experimental results show that the proposed method can discover penetration semantic knowledge from raw penetration testing data effectively and efficiently.
Compared to self-assembly of block copolymers in bulk, self-assembly of block copolymers under confinement, especially three-dimensional (3D) confinement, can lead to various unexpected microphase-segregated structure...
详细信息
The energy preserving average vector field (AVF) method is applied to the coupled Schr6dinger-KdV equations. Two energy preserving schemes are constructed by using Fourier pseudospectral method in space direction di...
详细信息
The energy preserving average vector field (AVF) method is applied to the coupled Schr6dinger-KdV equations. Two energy preserving schemes are constructed by using Fourier pseudospectral method in space direction discretization. In order to accelerate our simulation, the split-step technique is used. The numerical experiments show that the non-splitting scheme and splitting scheme are both effective, and have excellent long time numerical behavior. The comparisons show that the splitting scheme is faster than the non-splitting scheme, but it is not as good as the non-splitting scheme in preserving the invariants.
As demand for communication increases in terms of rate, reliability and security, 6G networks will provide more extreme communication experiences and richer communication services. It is therefore crucial that 6G enab...
详细信息
ISBN:
(纸本)9798400717444
As demand for communication increases in terms of rate, reliability and security, 6G networks will provide more extreme communication experiences and richer communication services. It is therefore crucial that 6G enabling technologies are developed in order to meet the performance requirements of 6G networks. This study firstly analyses the core elements and development of the 6G ecosystem, and secondly reviews the ecological interactions of 6G and its enabling technologies. Notably, this study, based on the resource orchestration theory, has explored the three-phase evolution and value co-creation of the ecological interactions of 6G and its enabling technologies and provides a summary of the challenges for future development. The study is expected to provide theoretical support for the future system planning and evolutionary development of 6G ecology and its enabling technology ecology.
A new clustering classification approach based on fuzzy closeness relationship (FCR) is studied in this paper. As we know, fuzzy clustering classification is one of important and valid methods to knowledge discovery. ...
详细信息
暂无评论