The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cyber-Physical Systems (CPS) are known to be highly complex systems which can be applied to a variety of different environments, covering both civil and military application domains. As CPS are typically complex systems, its design process requires strong guarantees that the specified functional and non-functional properties are satisfied on the designed application. Model-Driven Engineering (MDE)...
XDense is a novel wired 2D-mesh grid sensor network system for application scenarios that benefit from densely deployed sensing (e.g. thousands of sensors per square meter). It was conceived for closed-loop cyber-physical systems (CPS) that require real-time actuation, like active flow control (AFC) on aircraft wing surfaces. XDense communication and distributed processing capabilities are designed...
We consider a wireless information surveillance in UAV network, where a legitimate unmanned aerial vehicle (UAV) proactively eavesdrops communication between two suspicious UAVs. However, challenges arise due to lossy airborne channels and limited power of the UAV. In this paper, we study an emerging legitimate eavesdropping paradigm that the legitimate UAV improves the eavesdropping performance via...
With an advancement towards the paradigm of Internet of Things (IoT), in which every device will be interconnected and communicating with each other, the field of wireless sensor networks has helped to resolve an ever-growing demand in meeting deadlines and reducing power consumption. Among several standards that provide support for IoT, the recently published IEEE 802.15.4e protocol is specifically...
Deploying drones over the Cloud is an emerging research area motivated by the emergence of Cloud Robotics and the Internet-of-Drones (IoD) paradigms. This paper contributes to IoD and to the deployment of drones over the cloud. It presents, Dronemap Planner, an innovative service-oriented cloud based drone management system that provides access to drones through web services (SOAP and REST), schedule...
Network diversity multiple access or NDMA is the family of algorithms with the highest potential throughput in the literature of signal-processing-assisted random access. NDMA uses the concept of protocol-induced retransmissions to create an adaptive source of physical (PHY) layer diversity. This adaptive diversity is used to resolve packet collisions (via signal separation) without the explicit need...
This paper presents the design of an active flow control (AFC) system for commercial aircraft based on a dense wired/wireless sensor and actuator network. The goal is to track gradients of pressure across the surface of the fuselage of commercial aircraft. This collected information will be used to activate a set of actuators that will attempt to reduce the skin drag effect produced by the separation...
This paper presents the high-level architecture (HLA) of the research project DEWI (dependable embedded wireless infrastructure). The objective of this HLA is to serve as a reference for the development of industrial wireless sensor and actuator networks (WSANs) based on the concept of the DEWI Bubble. The DEWI Bubble is defined here as a high-level abstraction of an industrial WSAN with enhanced...
Wireless technology is expanding to areas previously reluctant to the use of this type of technology. In the aeronautics industry, wireless has recently gained preference for on-board systems that conventionally used only cables. Recent interference and reliability studies with state-of-the-art standards suggest the feasibility of a relatively new research area that has been called wireless avionics...
A task can be preempted by several jobs of higherpriority tasks during its response time. Assuming the worst-casememory demand for each of these jobs leads to pessimistic worst-case response time (WCRT) estimations. Indeed, there is a bigchance that a large portion of the instructions and data associatedwith the preempting task Tj are still available in the cache when Tj releases its next jobs. Accounting...
Heterogeneous multicore platforms are becoming an attractive choice to deploy mixed criticality systems demanding diverse computational requirements. One of the major challenges is to efficiently harness the computational power of these multicore platforms while deploying mixed criticality applications with timeliness properties. Energy efficiency is also one of the desired requirements in the design...
In this paper, we develop a framework for building context-aware applications in IoT. The IoT paradigm brings in various new issues such as macroprogramming, interoperability for heterogeneous devices and in-network processing. Solutions to these issues can enable IoT to support all available resources in an efficient manner and also enable ease of access for users. In addition, this can help in collecting...
This paper presents a demo of an extension developed to support an existing programming abstraction for IoT: mT-Res. mT-Res is an extension of the T-Res programming abstraction, which allows users to write applications using a web framework independent of resources. The paper describes an automated mechanism for allocate resources to such applications and adapt to changes in those resources.
Heterogeneous multicore platforms have become an attractive choice to deploy mixed criticality systems demanding diverse computational requirements. One of the major challenges is to efficiently harness the computational power of these multicore platforms while deploying mixed criticality applications. The problem is acerbated with an additional demand of energy efficiency. It is particularly relevant...
Timely delivery of critical traffic is a major challenge in industrial applications. The Wireless Dominance (WiDOM) medium access control protocol offers a very large number of priority levels to suit time sensitive application requirements. In particular, assuming that its overhead is properly modeled, WiDOM enables an accurate evaluation of the network response time in the wireless domain, through...
Schedulability analyses, while valuable in theoretical research, cannot be used in practice to reason about the timing behaviour of a real-time system without including the overheads induced by the implementation of the scheduling algorithm. In this paper, we provide an overhead-aware schedulability analysis based on demand bound functions for two hard real-time semi-partitioned scheduling algorithms,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.