The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Renewable energy resources are becoming popular with mass adoption in residential and commercial applications because of gradual cost reduction along with continuous technical advancements. Photovoltaic (PV) energy is one of the biggest players of renewable energy installations although soft costs remain as a major barrier for higher penetration of PV systems. To significantly lower the soft costs...
This paper presents four different architectures for the hardware acceleration of axis-parallel, oblique and non-linear decision tree ensemble classifier systems. Hardware architectures for the implementation of a number of ensemble combination rules are also presented. The proposed architectures are optimized for size, making them particularly interesting for embedded applications where the size...
The rapid proliferation of three-dimensional (3D) data acquisition techniques based either on image-based approaches or on range-based approaches is changing the way cultural heritage is recorded. Independently of the technique selected, low-cost structure-from-motion (SfM) photogrammetric computer vision, stereo-plotting, surveying either with measuring tape, total station or global navigation satellite...
ISA-level fault injection, i.e. the injection of bit-flip faults in Instruction Set Architecture (ISA) registers and main memory words, is widely used for studying the impact of transient and intermittent hardware faults in computer systems. This paper compares two techniques for ISA-level fault injection: inject-on-read, and inject-on-write. The first technique injects bit-flips in a data-item (the...
This paper presents one solution for home automation software. Besides basic home automation functionalities like controlling and monitoring smart home devices, aim of this software is unified access and presentation of these devices to the user in an intuitive way based on concept of services. This concept also provides uniform cross component interaction inside the software.
Physical attacks, such as fault attacks, pose a decisive threat for the security of devices in the Internet of Things. An important class of countermeasures for fault attacks is fault tolerant software that is applicable for systems based on COTS hardware. In order to evaluate software countermeasures against fault attacks, fault injection is needed. However, established fault injection approaches...
With the explosion of advanced power control knobs such as dynamic voltage frequency scaling, mastering energy constraints in embedded systems is becoming challenging for software developers. Several power estimation techniques have been proposed over the past years, from electrical level to more abstract models such as SystemC/TLM. They offer various tradeoffs between performance and accuracy, but...
Local area network is separated into some groups to ensure the security in company, university, and so on. This is generally implemented by using the function of a networking device. However, it is not easy for this method to change the network layout. In addition, there is a problem with compatibility of the device. This paper proposes a network system which has functions to group clients and to...
Current I/O devices communicate based on the PCIe protocol, and by default, all the traffic passes through the CPU-memory complex. However, this approach causes bottleneck in system throughput, which increases latency and power as the CPU processes device specific protocols to move data between I/O devices. This paper examines the cost of this centralized I/O approach and proposes a new method to...
Hardware errors are becoming more prominent with reducing feature sizes, however tolerating them exclusively in hardware is expensive. Researchers have explored software-based techniques for building error resilient applications for hardware faults. However, software based error resilience techniques need configurable and accurate fault injection techniques to evaluate their effectiveness. In this...
Use cases are widely used to express what software systems are supposed to provide in terms of an interaction between the users and the system. Without a particular effort to preserve them, use cases dissolve in source code turning the task of locating their implementation into a major problem of change request realization. While aspect-oriented programming offers one solution to retaining use cases,...
SOAP2 is a high precision, high performance and high efficiency alignment tool which is developed by the Beijing Genomics Institute. SOAP2 has become one of the mainstream biological sequence alignment software. However, SOAP2 is developed for X86 architecture, so we port and optimize SOAP2 to Loongson platform. Firstly, we make SOAP2 to be able to run on Loongson machine correctly. Second, its speed,...
Spatial and temporal localities used in keeping references in cache is limited by the behavior of applications. Many applications that lack these localities, and have high frequency of use of accesses results in a degradation of system performance under the conventional cache design. The proposed method, tracks most frequently used references by dynamically monitoring the accesses to main memory and...
Mining static code attributes for predicting software vulnerabilities has received some attention recently. There are a number of approaches for detecting vulnerabilities from source code, but commercial off the shelf components are, in general, distributed in binary form. Before using such third-party components it is imperative to check for presence of vulnerabilities. We investigate the use of...
Hypervision is being widely implemented in an effort to control costs and to simplify management through consolidation of servers. It has been recently unraveled that well over a third of virtualization vulnerabilities reside in the hyper-visor, mostly due to hypervisor escape. The exploitation of these vulnerabilities allows an attacker, among other things, to access and/or modify data of other Virtual...
This paper aims to help to differentiate security related crashes from benign vulnerabilities, using static taint-analysis. To achieve this goal, we propose a tool named Crash Filter, which determines if a crash can be made to be exploitable or not, by analyzing ARM binary codes. We envision that the proposed analysis would help to timely fix security-critical bugs.
In safety-critical environments it is no longer sufficient to rely on legacy methodologies. Correctness should be built in all the way through the process. This paper presents a toolchain which allows theorem prover output to be interfaced to fault-tolerant FPGA circuitry. We show a shallow embedding of a lambda calculus executing on a Xilinx platform with the assistance of a choice of fault-tolerance...
Heavy ion single-event effect (SEE) measurements on Xilinx Zynq-7000 are reported. Heavy ion susceptibility to Single-Event latchup (SEL), single event upsets (SEUs) of BRAM, configuration bits of FPGA and on chip memory (OCM) of the processor were investigated.
Conventional oscilloscope software is developed in a “top-to-down” design mode, namely, the overall software architecture is designed firstly. In such a mode, the software modules are divided from the operation and display level, not corresponding to hardware modules. Therefore, the software cannot be implanted together with hardware modules during implantation. In this Paper, the author puts forward...
This paper presents a development process of an application to nursing homes, in order to support the nursing team, in particular electronic register medication delivery. For this is established the design of the process of functional prototype following the steps of software development. The project ends with a testing phase that according to the results obtained by satisfaction surveys, the use...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.