The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fault injection is an effective method for PHM and testability validation. However, with the increasing complexity of structures and functions, and with the promotion of integration levels for airborne prognostics and health management (PHM) and integrated modular avionics (IMA) systems, fault injection is often difficult to use in conventional “plug,” “probe,” or “adaptor plate” methods. Fault injection...
In this paper, a new hardware/software design and implementation of an Induction Machine (IM) drive control topology is presented. Power electronic applications such as three-phase inverter require highly accurate switching frequency. This design uses a System on Chip (SoC) approach and implemented on a Field Programmable Gate Array (FPGA). The on-chip processor is used for high level programing while...
As a maritime country that consist of 17.504 islands, data collection and central monitoring have been a pressing concern in Indonesia. An efficient data collection process can help the decision maker to collect the accurate data to be processed as a decision and policy in the future. With conservation mobile used by all of the forest ranger in Indonesia, not only the biodiversity and wildlife could...
Scan-path test, which is one of design-for-test techniques using a scan chain, can control and observe internal registers in an LSI chip. However, attackers can also use it to retrieve secret information from cipher circuits. Recently, scan-based attacks using a scan chain inside an LSI chip is reported which can restore secret information by analyzing the scan data during cryptographic processing...
The paper proposes an approach to instruction stream generation for verification of microprocessor designs. The approach is based on using formal specifications of the instruction set architecture as a source of knowledge about the design under verification. This knowledge is processed with generic engines implementing an extensible set of generation strategies to produce stimuli in the form of instruction...
The rapidly changing market of microcontrollers and affiliated compilers, as well as development board systems, introduces serious issues in code reusability when migrating to different software/hardware technologies. Subsequently, instructors encounter considerable difficulty in upgrading laboratory training, due to the demand of keeping pace with the latest technology. This paper presents strategies...
The first step of the K-nearest neighbor classification is to find the K-nearest neighbors of the query. A basic operation in calculating Jaccard distance is to count the number of ones in a binary vector - population count. This article focuses on finding the K-nearest neighbors in a high-dimensional Jaccard space. There are two main contributions. First, software methods for population count are...
The complexity and size of scientific and engineering challenges are continually increasing to the point where they are approaching exascale computing. One of the main challenges is to be able to run scientific software applications on these extremely large systems in an energy efficient manner, as power consumption will become one of the dominant cost factors that will govern the next generation...
Quantum computing promises new opportunities for solving hard computational problems, but harnessing this novelty requires breakthrough concepts in the design, operation, and application of computing systems. We define some of the challenges facing the development of quantum computing systems as well as software-based approaches that can be used to overcome these challenges. Following a brief overview...
HW/SW co-designed processors currently have a renewed interest due to their capability to boost performance without running into the power and complexity walls. By employing a software layer that performs dynamic binary translation and applies aggressive optimizations through exploiting the runtime application behavior, these hybrid architectures provide better performance/watt. However, a poorly...
We propose an approach for overapproximating the Worst-Case Execution Time (WCET) of embedded control software using formal methods. Model checking is iteratively applied to compute the WCET from the machine code of the software considering a platform and an environment model. We implemented the approach and present first experiments for a thermal controller application executed on a LEON3 processor...
To increase work efficiency of administration transaction, we have designed the Information-based management system of CHS. The system includes four subsidiary systems: The administration management handing system, evaluating system, searching system and statistics analytical system. The administration management handling system includes the application system of the CHS station(center), the examine...
Over the past few decades, the use of reconfigurable computing for aerospace applications has become increasingly common despite its sensitivity to ionizing radiation. Tools are needed to test and implement fault-mitigation mechanisms to increase the reliability of FPGAs in space. This paper introduces a tool called the JTAG Configuration Manager (JCM) that provides high-speed programmable access...
Some researchers have recently showed that shellcode, a small piece of executable machine code, could be transformed into text. Although such shellcode-embedding text itself may elude defensive measures, due to the existence of a decoding routine attached the shellcode, it could be detected by them. In this paper, we propose a novel approach to building shellcode-embedding Korean text without a decoder...
Privacy leak is becoming a serious problem for every computer user. It will be a threat to user accounts, passwords and private documents. Privacy leak detection has been an important research point in security research community. Current privacy leak techniques mainly focus on static analysis and dynamic taint tracking. Static analysis often produces too many false positives. Dynamic taint tracking...
Evolution and maintenance processes are important but time consuming and expensive. It is very important to make the processes effective and efficient. A software developer can use resource like user opinion data to get information, such as user request, bug report, and user experience. It represents user needs and can be used to help allocate the necessary effort of software evolution and maintenance...
The paper introduces the Italian Fiscal Software Certification scenario. Some concepts about certification are illustrated. The cash registers, as specific kind of Fiscal Meter, are described and their adopted certification process based on Italian legislation requirements is presented as well. Finally, the new related technological challenges are discussed.
Software defines the functionality of today's Cyber-Physical Systems (CPS). Many product innovations are based on software and thus the complexity of software, even when running on platforms equipped with small microprocessors, is increasing dramatically. This calls for adequate embedded software integration testing, even before the actual hardware platform is available. The application of virtual...
This document presents the contents and didactic methodology followed through the Digital Electronics course, imparted during the fifth semester of the Grado en Ingeniería Electrónica Industrial y Automática (Rama Industrial) at Universidad de Extremadura. Lab sessions reinforce all the theory contents of the course, providing the student with the experience of designing a microprocessor (with didactic...
Recently, to prevent cracking, the various protection methods have been proposed. One of the protection methods is the obfuscation method. Obfuscation method changes the program into hard to understand for hiding secret information in the program. On the other hand, de-obfuscation is an interesting research topic for protecting the software. Since, though vulnerable protection methods are dangerous,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.