The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In view of the development of the computer network and the vehicle networking technology in the field of transportation, the traffic data which need to be processed in the practical application is explosive. ARM-Linux was proposed based on cloud computing hadoop platform real-time monitoring remote terminal in the big scheme of data analysis and calculation, Hadoop is facing big data computing, open...
Green building plays an important role in the development of the construction industry. The key issue of green building is how to operate itself. This paper presents a building management cloud platform for green buildings. Its goal is to realize building operation management by using the technologies of cloud computing and Internet of things. The cloud servers provide data storage, computing and...
This paper proposes the two-stage control structure which is composed of battery management unit and central management unit in order to improve the monitoring and management technology of integrated power supply in power system. The paper presents a battery management system (BMS) design scheme. We designed its hardware circuit and verified in the laboratory conditions. The results show that the...
Heterogeneous computing with hardware accelerators is a promising direction to overcome the power and performance walls in traditional computing systems. CPU-accelerator integrated architectures, such as CPU with ASIC or FPGA based accelerators, are able to provide customized processing according to application requirements and are thus particularly attractive to speed up computation-intensive applications...
Security is a major issue nowadays for the embedded systems community. Untrustworthy authorities may use a wide range of attacks in order to retrieve critical information. This paper introduces ARMHEx, a practical solution targeting DIFT (Dynamic Information Flow Tracking) on ARM-based SoCs (e.g. Xilinx Zynq). Current DIFT implementations suffer from two major drawbacks. First, recovering required...
The vehicle software has many errors potentially because of the increased complexity of the electrical / electronic system of the vehicle. And in accordance with the ISO26262 standard, functional safety requirements for vehicle electronic modules are increasing. Therefore, in this paper, we analyze the failure modes which are required in ISO26262 Part 5, 6. And we propose design guidelines to meet...
System monitoring is an established tool to measure the utilization and health of HPC systems. Usually system monitoring infrastructures make no connection to job information and do not utilize hardware performance monitoring (HPM) data. To increase the efficient use of HPC systems automatic and continuous performance monitoring of jobs is an essential component. It can help to identify pathological...
Scaling clusters is no longer the only struggle in moving towards exascale in HPC. While scaling components such as the network and file systems is a widely accepted need, monitoring, on the other hand, is often left behind in the procurement of these large systems. Monitoring is often quite an afterthought that is expected to be incorporated in existing infrastructure. While that often works for...
Internet-of-things (IoT) paradigm exploits the Distributed Measurement System (DMS) to execute measurements. Each node of the DMS has computational and communicative capabilities, and can be equipped by sensors and measurement instruments. Therefore, it can be assumed as Smart Object (SO). The availability of mobile SO (MSO) (cars, smartphones, drones) is taken into consideration in the research to...
Size and complexity of contemporary High Performance Computing (HPC) systems increases permanently. While the reliability of a single component and compute node is high, the huge amount of components comprising these systems results in the fact that defects happen regularly. This drives the need to manage failure situations. Common issues are component failures or node soft lock-ups that typically...
Mobile Broadband (MBB) Networks are evolving at a fast pace, with technology enhancements that promise drastic improvements in capacity, connectivity, coverage, i.e., better performance in general. But how to measure the actual performance of a MBB solution? In this paper, we present our experience in running the simplest of the performance test: "speedtest-like" measurements to estimate...
Knowledge of power consumption at a subsystem level can facilitate adaptive energy-saving techniques such as power gating, runtime task mapping and dynamic voltage and/or frequency scahng. While we have the ability to attribute power to an arbitrary hardware system's modules in real time, the selection of the particular signals to monitor for the purpose of power estimation within any given module...
Fine-grained runtime power management techniques could be promising solutions for power reduction. Therefore, it is essential to establish accurate power monitoring schemes to obtain dynamic power variation in a short period (i.e., tens or hundreds of clock cycles). In this paper, we leverage a decision-tree-based power modeling approach to establish finegrained hardware power monitoring on FPGA platforms...
The article presents the results of studies of the physical security system in the infrastructure facility of a region. The following results have been obtained: structural and functional decomposition of the physical security system for the regional infrastructure has been performed; engineering solutions for the implementation of the standard functions for the subsystems of the research object have...
Household energy consumption is largely inefficient. In recent years, development in residential energy-use optimisation has attracted a great deal of attention. Given that consumers comprise a significant part of total demand, there is an incentive to assist users to manage household demand. This paper provides an introduction to Home Energy Management (HEM). An overview of available Home Energy...
A highly reliable set up of Management and Orchestration (MANO) functionality is crucial for telecom operators in order to support demanding NFV-powered telecom services such as elastic emergency or security services, or other applications requiring fast, dynamic and reliable (re-) provisioning processes. NFV MANO functionality controls the entire life cycle of such services, from instantiation and...
The emergence of power efficiency as a primary constraint in processor and system designs poses new challenges concerning power and energy awareness for numerical libraries and scientific applications. Power consumption also plays a major role in the design of data centers in particular for peta- and exa-scale systems. Understanding and improving the energy efficiency of numerical simulation becomes...
Deployed test and health monitoring systems must actually manage two tasks: (1) the testing and monitoring the device under test, and (2) the testing and monitoring the test system itself. The ability to isolate and identify faults is crucial to deployed test and health monitoring systems. Understanding failure mechanisms provides invaluable insight regarding whether the device under test is, in fact,...
A novel approach of a test environment for embedded networking nodes has been conceptualized and implemented. Its basis is the use of virtual nodes in a PC environment, where each node executes the original embedded code. Different nodes run in parallel, connected via so-called virtual channels. The environment allows to modifying the behavior of the virtual channels as well as the overall topology...
We proposes the development of a cyber-secure, Internet of Things (IoT), supply chain risk management architecture. The proposed architecture is designed to reduce vulnerabilities of malicious supply chain risks by applying machine learning (ML), cryptographic hardware monitoring (CHM), and distributed system coordination (DSC) techniques to mitigate the consequences of unforeseen (including general...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.