The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We introduce ParaDrop, a specific edge computing platform that provides computing and storage resources at the "extreme" edge of the network allowing third-party developers to flexibly create new types of services. This extreme edge of the network is the WiFi Access Point (AP) or the wireless gateway through which all end-device traffic (personal devices, sensors, etc.) passes through. ParaDrop's...
For decades buffer overflows have been one of the most prevalent and dangerous software vulnerabilities. Although many techniques have been proposed to address the problem, they mostly introduce a very high overhead while others assume the availability of a separate system to pinpoint attacks or provide detailed traces for defense generation, which is very slow in itself and requires considerable...
Hardware/Software (HW/SW) partitioning and scheduling are essential to the embedded systems. In this paper, a hybrid algorithm derived from Tabu Search and Simulated Annealing is proposed for solving the HW/SW partitioning problem. The virtual hardware resource is set to implement the customized Tabu Search. Earliest-Deadline-First strategy is introduced to describe the reconfiguration of FPGA. Moreover,...
Dynamic Tracking performance is an important technical index for system appraisal. In view of the reality such as the shooting range target detection system facing small target, long distance, complicated background etc, It designs a dynamic tracking precision evaluating system, which detects tracking accuracy and stability degree by means of calculation the target's relative motion and coordinate...
At present, Embedded Linux has become research focus in embedded system field. In this paper, we focus on the analysis of Linux kernel, on the basis of analysis, we research and explore the key technologies of embedded Linux such as Linux porting methods on ARM, improvement of Linux real-time performance, development technology of Linux device drivers and so on. Through the research on the key technologies,...
Operating system security (OS) is the basis for trust computing. As the kernel rootkits become popular and lots of kernel vulnerabilities are exposed, the OS kernel suffers a large number of attacks. It is difficult to protect the kernel by its own module because the kernel rootkits has the same ability to cripple the security module within the same kernel space. Recently, with the virtualization...
Embedded systems, because of their application-specific characteristic, are one of the most widely used domains for reconfigurable systems. Aiming at the energy-saving problem, this paper presents a dynamic scheduling architecture. The contribution of this paper is twofold: First, this paper presents an Energy-efficient Architecture for Embedded Software (EAES), which uses a processor with dynamic...
The emulation and functional validation are essential to assessment of the correctness and performance of networks-on-chip architecture. A flexible hardware/software networks-on-chip open platform (NoCOP) emulation framework is designed and implemented for exploring the on-chip interconnection networks architecture. An instruction set simulator and universal serial bus communicator control and configure...
Along with the rapid development of computer technologies, teaching contents and experimental environment of the traditional course ldquoInterface and Communicationrdquo have being enormously changing. How to establish the experimental teaching system under Windowspsila protected mode is always the emphasis and difficulty for teaching reform of the course ldquoInterface and Communicationrdquo. The...
This paper describes an intelligent circuit breaker software and hardware design, real-time multi-task alarm system will be introduced into circuit breaker monitoring and control, to the timely opening and timely alarm. According to the different impact parameters, the different alarm information was given, increasing the protection and alerts function of the circuit.
Based on combining well-known Kent map and Logistic map, in this paper, we proposed a new method to generate chaotic frequency hopping (FH) sequences to enhance the properties of secrecy and security in traditional FH systems. Through simulations, the properties of our new sequences including initial sensitivity, balance and Hamming correlation were examined. Simulations and practical realization...
As a classical security policy, DTE (domain and type enforcement) is usually used to protect the integrity of information and implemented in many famous security operating systems. But there are three main questions for most systems that have implemented DTE security policy as follows: 1) security policy enforcing module is easy to be tampered and bypass before loaded; 2) The content of security policy...
Fails in aerospace missions, caused by broken communication and unexpected situation, have generated a pressing need for intelligent adaptation, repairing and upgrading capabilities in on-board maintenance (OBM) applications. In this paper, we present a fault-tolerant on-board evolutionary platform for aerospace applications which utilizes FPGA technology. To avoid complex evolution process of circuit...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.