The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Facility Location Problems have always been studied with the assumption that the environment in the network is static and does not change over time. In practice, however, the environment is usually dynamic and we must consider the facility location in a global view. In this paper, we impose the following additional constraints on input facilities: the total number of facilities to be placed is not...
Embedded systems (ESs) have been widely used in various application domains. It is very important to design ESs that guarantee functional correctness of the system under strict timing constraints. Such systems are known as the real-time embedded systems (RTESs). More recently, RTESs started to be utilized in safety and reliability critical areas, which made the overlooked security issues, especially...
In this paper, we target on energy-efficient design of soft real-time and reliable applications on uniprocessor embedded systems. We consider soft real-time tasks with stochastic execution times with given distribution. Instead of guaranteeing hard real-time constraint, the application may be finished after their deadlines with a certain probability. We utilize Dynamic Voltage and Frequency Scaling...
Nano-structuring materials can change their properties extraordinarily, but so can defects caused by manufacturing. We study the effect of capacitive defects on terahertz transmission in golden nanomeshes, and find their influence crucial.
This paper presents an approach to the synthesis of secure real-time applications mapped on distributed embedded systems, which focuses on preventing fault injection attacks. We utilize symmetric cryptographic service to protect confidentiality, and deploy fault detection within confidential algorithm to resist fault injection attacks. Several fault detection schemes are identified, and their fault...
We present a simple but powerful reinterpretation of kernelized locality-sensitive hashing (KLSH), a general and popular method developed in the vision community for performing approximate nearest-neighbor searches in an arbitrary reproducing kernel Hilbert space (RKHS). Our new perspective is based on viewing the steps of the KLSH algorithm in an appropriately projected space, and has several key...
Based on SiGe-OI (Silicon Germanium on Insulator) material, SiGe-OI electro-optic modulator is established, and PIN electrical modulation structure has been researched. The carrier injection concentration of electro-optical modulator with structure parameters, including the doping concentration of active region, the width of active region, the width between active region and waveguide, Ge content...
Embedded systems (ESs) have been a prominent solution for enhancing system performance and reliability in recent years. ESs that are required to ensure functional correctness under timing constraints are referred to as real-time embedded systems (RTESs). With the emerging trend of utilizing RTESs in safety and reliability critical areas, security of RTESs, especially confidentiality of the communication,...
Owing to the industry characteristics of civil servants which have special requirements on spirit of service and devotion, exploring the status quo and relationship of its workplace spirituality and organizational citizenship behavior makes a big difference to improve the capability and efficiency of government services. Through the survey of 468 civil servants in Beijing, the study found that the...
In this work, we address the emerging scheduling problem existed in the design of secure and energy-efficient realtime embedded systems. The objective is to minimize the energy consumption subject to security and schedulability constraints. Due to the complexity of the problem, we propose a dynamic programming based approximation approach to find the near-optimal solutions with respect to predefined...
Skeletal muscle is vulnerable to ischemia injury after direct trauma or indirect causes. Magnetic resonance diffusion tensor imaging (DTI) has been demonstrated to be a powerful tool to investigate muscle structures. However, most previous DTI studies that investigated ischemia muscle were performed on mature species, results of which may not apply on other age populations, such as young groups. In...
In this paper, we approach the design of energy-and security-critical distributed real-time embedded systems from the early mapping and scheduling phases. Modern Distributed Embedded Systems (DESs) are common to be connected to external networks, which is beneficial for various purposes, but also opens up the gate for potential security attacks. However, security protections in DESs result in significant...
In this paper, we are interested in resource allocation for energy constrained and security-critical embedded systems. Tasks in such systems need to be successfully executed under certain energy budget and be robust against serious security threatens. Different to former energy minimal scheduling problem, we introduce a new optimization problem for a set of tasks with energy constraint and multiple...
Assembly variation is one significant factor that affects quality of assembly product. By allocating proper tolerances, the requirement of assembly variation can be satisfied. However, due to the coupling of tolerances, compatibility of model file, it is still difficult to conduct collaborative and trans-platform tolerance design. In this article, tolerance design condition and variation skeleton...
In this paper we consider distributed real-time embedded systems in which confidentiality of the internal communication is critical. We present an approach to efficiently implement cryptographic algorithms by using hardware/software co-design techniques. The objective is to find the minimal hardware overhead and corresponding process mapping for encryption and decryption tasks of the system, so that...
In this paper we consider distributed embedded systems in which privacy or confidentiality of the internal communication is critical, and present an approach to optimizing cryptographic algorithms under strict timing constraints. We have developed a technique to search for the best system-affordable cryptographic protection for the messages transmitted over the internal communication bus. Towards...
Life Cycle Impact Assessment (LCIA) method becomes an important systematic evaluation method of the environmental impacts and guildes green design of product in the design stage. Simapro, a software for LCIA, is applied to study and analysis the environmental impact of the typical mechanical assemblies, according to the basic principles and implementation steps of LCIA. Then redesign or modifing the...
Computer numerical control (CNC) equipment industry is one of the key industries in China. Through the industrial design to enhance the competitiveness of CNC equipment is lagged, resulted in low value-added of products, and impede their international competitiveness. In order to find the gap with foreign products, the situation of using industrial design in CNC equipment is analyzed and compared...
Executable UML allows precisely describing the software system at a higher level of abstraction. It bridges the semantics gap between the UML design models and the implementation. The executable models can be translated to a less abstract programming language completely or executed in a virtual machine directly. Existing executable UMLs lack a formal and standardized Action Semantics Language (ASL)...
Unified Modeling Language (UML) is widely used for software modeling. UML is not defined precisely enough for unambiguous model execution. Therefore, the first and most important requirement for model execution is precisely modeling the actions. An action takes a set of inputs and converts them into a set of outputs, where either or both sets may be empty. It is the fundamental unit of behavior specification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.