The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Check node processing dominates the complexity of nonbinary LDPC decoding. Trellis based min-max algorithm[1] can reduce the computation complexity and generate the message from check node to variable node in parallel. In this paper, power representation is used to implement check node processor, adder structures over GF(q) using power representation in trellis based check node processing are proposed...
We propose a methodology for proactive maintenance of Uninterruptible Power Supply (UPS) devices based on online health-status monitoring and application of data analytics for prediction of UPS components' failures. The goals of the work are (i) improvement of reliability of UPS devices by ensuring prompt action prior to a failure of a component, and (ii) provision of more cost-effective maintenance...
The phenomenon of high availability (HA) is of vital importance in cloud architecture. This paper proposes an HA verification framework, called HAVerifier, for OpenStack, a popular open source cloud platform. Fault injection technology has been adopted to verify the system's reliability by determining its health status after injecting faults. The framework proposed in this paper verifies the availability...
Data-driven research is increasingly ubiquitous and data itself is a defining asset for researchers, particularly in the computational social sciences and humanities. Entire careers and research communities are built around valuable, proprietary or sensitive datasets. However, many existing computation resources fail to support secure and cost-effective storage of data while also enabling secure and...
A private machine-cloud architecture and the associated Self-reliant Control System (SCS) for industrial applications are presented in this paper. The machine-to-machine (M2M) IP-based local area network creates a backbone for the proposed architecture, in which the traditional analogue input and output (I/O) or field-bus subsystems of a traditional process control system are not required. The proposed...
This paper describes the ICFHR2016 Local Attribute Detection competition held at the 15th International Conference on Frontiers in Handwriting Recognition. This competition uses the ANDoc-Attrib-10K database, which consists of roughly 10,000 image snippets drawn from 30 collections from historical documents and records of various types, each labeled with seven attributes such as the presence of text,...
In this paper, we present a novel on-chip physical unclonable function (PUF) based on the cascode current mirrors. It exploits the process variation of a single transistor as the load of the current mirror to generate a reliable digital signature for the chip. By employing a cascode NMOS transistor in the current-mode PUF architecture, the proposed PUF greatly boosts the output impedance. As a result,...
In order to balance production and consumption on the power grid, efforts are mostly made on the production side. Demand response is a classical solution consisting in harnessing electricity consumption to allow the introduction of renewable energy sources and self-production in the energy mix. In this context, the main problem is to coordinate the network nodes, considered here as agents, in order...
Distributed control systems relying on IEC 61499 are a common engineering approach for various application domains ranging from industrial control to the management and control of modern buildings. In this paper we propose a generic fault-injection concept to support the verification of applications. A potential use-case therefore is, for example, to stress measures that aim to improve their reliability.
Traditional routing in the Internet is best-effort. Path differentiation including multipath routing is a promising technique to be used for meeting QoS requirements of media-intensive applications. Since different paths have different characteristics in terms of latency, availability and bandwidth, they offer flexibility in QoS and congestion control. Additionally protection techniques can be used...
The memory system is a fundamental performance and energy bottleneck in almost all computing systems. Recent system design, application, and technology trends that require more capacity, bandwidth, efficiency, and predictability out of the memory system make it an even more important system bottleneck [103, 110]. At the same time, DRAM technology is experiencing difficult technology scaling challenges...
Unmanned Aerial Vehicles (UAVs) are increasingly demanded in civil, military and research purposes. However, they also possess serious threats to the society because faults in UAVs can lead to physical damage or even loss of life. While increasing their intelligence, for example, adding vision-based sense-and-avoid capability, has a potential to reduce the safety threats, increased software complexity...
Configuration scrubbing is a technique used for repairing Single Event Upsets (SEUs) within the configuration memory of an FPGA. Scrubbing approaches have been developed using hardware external to the FPGA communicating through a configuration port and using hardware within the FPGA by communicating with an internal configuration port (ICAP). More recent FPGAs such as the Xilinx Zynq 7-Series SoCs...
Modern transport systems rely on an increasing number of sensors to control their operation including orientation, speed, arrival and departure times, fuel consumption, passenger count etc. These have become important parts of the echo system with their availability and performance playing a key role in daily commuting. However, they produce data in high volume and frequency that need to be processed...
Operating systems serve as executing platforms and resource manager and supervisors for the applications in running phase. With the development of more complex computer systems and applications, the required operating systems become complex too. But the proper management of such complex operating systems by human beings has shown to be impractical. Nowadays, self-managing concepts provide the basis...
To satisfy the stringent requirement of ocean monitoring in Marine Intelligent Transportation System, Marine Sensor Networks (MSNs) is envisioned as one of the most effective solutions. In this paper, we study the Heterogeneous and Double Paths MSNs (HDPM) architecture with Sensors (SNs) in view of the reliability of the networks. And we propose a generic integer linear programming (ILP) model to...
Silicon Physical Unclonable Functions (PUFs) have emerged as novel cryptographic primitives, with the ability to generate unique chip identifiers and cryptographic keys by exploiting intrinsic manufacturing process variations. The “Two Choose One” PUF (TCO-PUF) has recently been proposed. It is based on a differential architecture and exploits the non-linear relationship between current and voltage...
Reliability evaluation is a high costly process that is mainly carried out through fault injection or by means of analytical techniques. While the analytical techniques are fast but inaccurate, the fault injection is more accurate but extremely time consuming. This paper presents an hybrid approach combining analytical and fault injection techniques in order to evaluate the reliability of a computing...
In order to improve hardware utilization, a novel Protection & Control Architecture based on virtual devices in digital substation is proposed in this paper. An “all-in-one” monitoring and control device is developed to support new architecture. Based on a Cloud Computing platform, the protection and control functions are built as virtual devices. Based on virtual protection & control, the...
Multi-agent systems (MAS) have recently evolved as an important feature in the development of future smart grids, especially to provide the fast-responding self-healing ability to the grid. This paper presents a comparative analysis of centralized and decentralized MAS architecture for the problem of service restoration. Service restoration is formulated as a multi-objective optimization problem and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.