Pub Date : 2022-05-30DOI: 10.1109/rtest56034.2022.9850164
Mohammad Jalili, Fathiyeh Faghih
Energy consumption of mobile applications has a great impact on the satisfaction of users. Many developers do not consider energy-efficient programming practices when coding an applications. Therefore, many applications can be improved in terms of energy usage by detecting and removing their energy defects. Most works towards this goal focus on static analysis of Android applications. In this paper, we propose a hybrid framework consisting of static and dynamic modules for finding energy defects. Our static module can effectively analyse an Android application considering its life-cycle and look for the energy anti-patterns. The results of static analysis are then transformed to executable GUI-based test cases. In the dynamic module, the generated test cases are run, and their results are evaluated using an automated oracle, which does not need the energy measurement. Using our framework, we have analyzed 29 applications, and found 9 applications with energy defects. Our dynamic module could effectively detect the false positives in the results of the static analysis module.
{"title":"Static/Dynamic Analysis of Android Applications to Improve Energy-Efficiency","authors":"Mohammad Jalili, Fathiyeh Faghih","doi":"10.1109/rtest56034.2022.9850164","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9850164","url":null,"abstract":"Energy consumption of mobile applications has a great impact on the satisfaction of users. Many developers do not consider energy-efficient programming practices when coding an applications. Therefore, many applications can be improved in terms of energy usage by detecting and removing their energy defects. Most works towards this goal focus on static analysis of Android applications. In this paper, we propose a hybrid framework consisting of static and dynamic modules for finding energy defects. Our static module can effectively analyse an Android application considering its life-cycle and look for the energy anti-patterns. The results of static analysis are then transformed to executable GUI-based test cases. In the dynamic module, the generated test cases are run, and their results are evaluated using an automated oracle, which does not need the energy measurement. Using our framework, we have analyzed 29 applications, and found 9 applications with energy defects. Our dynamic module could effectively detect the false positives in the results of the static analysis module.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"16 1","pages":"1-8"},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73199960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-30DOI: 10.1109/rtest56034.2022.9850125
Hamed Sepehrzadeh
The emergence of CPSs leads to modernization of critical infrastructures and improving flexibility and efficiency from one point of view. However, from another point of view, this modernization has subjected them to cyber threats. This paper provides a modeling approach for evaluating the security of CPSs. The main idea behind the presented model is to study the attacker and the system behaviors in the penetration and attack phases with exploiting some defensive countermeasures such as redundant components and attack detection strategies. By using the proposed approach, we can investigate how redundancy factor of sensors, controllers and actuators and intrusion detection systems can improve the system security and delay the system security failure.
{"title":"Security Evaluation of Cyber-Physical Systems with Redundant Components","authors":"Hamed Sepehrzadeh","doi":"10.1109/rtest56034.2022.9850125","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9850125","url":null,"abstract":"The emergence of CPSs leads to modernization of critical infrastructures and improving flexibility and efficiency from one point of view. However, from another point of view, this modernization has subjected them to cyber threats. This paper provides a modeling approach for evaluating the security of CPSs. The main idea behind the presented model is to study the attacker and the system behaviors in the penetration and attack phases with exploiting some defensive countermeasures such as redundant components and attack detection strategies. By using the proposed approach, we can investigate how redundancy factor of sensors, controllers and actuators and intrusion detection systems can improve the system security and delay the system security failure.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"19 1","pages":"1-7"},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80087882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-30DOI: 10.1109/rtest56034.2022.9850004
{"title":"RTEST 2022 Authors List","authors":"","doi":"10.1109/rtest56034.2022.9850004","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9850004","url":null,"abstract":"","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"19 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85324664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-30DOI: 10.1109/rtest56034.2022.9850109
Farzam Tajdari, Hasan Ramezanian, Shadi Paydarfar, A. Lashgari, Shakib Maghrebi
To accomplish a successful transportation frame-work, we present a new approach to incorporate lane-changing and ramp-metering control, which includes the presence of partially connected and autonomous vehicles. The primary test tended to is coordinating the ramp-metering flow saturation boundaries in the optimal controller. Specifically, a level of vehicles is expected to get and carry out explicit control assignments (e.g., lane-changing control signals). Utilizing a Linear Quadratic Integral (LQI) controller and an anti-windup plan in view of a LTI model, another methodology is introduced for powerfully expanding the throughput at motorway bottlenecks. In terms of assessment, the methodology is implemented on the simulated model, uses a macroscopic traffic model which is a first-order flow model including multi-lane. The capacity drop peculiarity is additionally executed, that addresses the effect of the created method to deal with be demonstrated, same as the improvements in rush hour traffic effectiveness.
{"title":"Flow metering and lane-changing optimal control with ramp-metering saturation","authors":"Farzam Tajdari, Hasan Ramezanian, Shadi Paydarfar, A. Lashgari, Shakib Maghrebi","doi":"10.1109/rtest56034.2022.9850109","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9850109","url":null,"abstract":"To accomplish a successful transportation frame-work, we present a new approach to incorporate lane-changing and ramp-metering control, which includes the presence of partially connected and autonomous vehicles. The primary test tended to is coordinating the ramp-metering flow saturation boundaries in the optimal controller. Specifically, a level of vehicles is expected to get and carry out explicit control assignments (e.g., lane-changing control signals). Utilizing a Linear Quadratic Integral (LQI) controller and an anti-windup plan in view of a LTI model, another methodology is introduced for powerfully expanding the throughput at motorway bottlenecks. In terms of assessment, the methodology is implemented on the simulated model, uses a macroscopic traffic model which is a first-order flow model including multi-lane. The capacity drop peculiarity is additionally executed, that addresses the effect of the created method to deal with be demonstrated, same as the improvements in rush hour traffic effectiveness.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"148 1","pages":"1-6"},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88868664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-30DOI: 10.1109/rtest56034.2022.9850141
Melika Dastranj, Mehran Alidoost Nia, M. Kargahi
Autonomous systems need to effectively react to runtime changes in the environment and the system itself. The capability to analyze both the environment and the system is theoretically feasible through the model-based approach. How-ever, the limitations like model size are serious obstacles to autonomous decision-making process. The incremental approximation is a technique to partition the model to tackle this issue. A partition must be updated/re-verified at a reasonable cost when some change occurs. The paper suggests a policy-based analysis technique to find the optimal partitioning criteria through a set of available policies with respect to our proposed metrics, namely Balancing and Variation. Using the incremental approximation scheme, the metrics evaluate each component quantitatively according to their size and frequency. The proposed method is augmented with a reinforcement learning approach so that the autonomous system can learn how to find the best partitioning policy at runtime. Since the most time-consuming parts of this approach are done at the design time, the proposed method is efficient and meets the runtime resource requirements of the autonomous systems. We analyze the correctness of the proposed system via a few theoretical investigations and experimental results applied to a case study on energy-harvesting self-adaptive systems. The outcome illustrates the correctness of the proposed system in terms of efficiency and accuracy.
{"title":"Deploying Reinforcement Learning for Efficient Runtime Decision-Making in Autonomous Systems","authors":"Melika Dastranj, Mehran Alidoost Nia, M. Kargahi","doi":"10.1109/rtest56034.2022.9850141","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9850141","url":null,"abstract":"Autonomous systems need to effectively react to runtime changes in the environment and the system itself. The capability to analyze both the environment and the system is theoretically feasible through the model-based approach. How-ever, the limitations like model size are serious obstacles to autonomous decision-making process. The incremental approximation is a technique to partition the model to tackle this issue. A partition must be updated/re-verified at a reasonable cost when some change occurs. The paper suggests a policy-based analysis technique to find the optimal partitioning criteria through a set of available policies with respect to our proposed metrics, namely Balancing and Variation. Using the incremental approximation scheme, the metrics evaluate each component quantitatively according to their size and frequency. The proposed method is augmented with a reinforcement learning approach so that the autonomous system can learn how to find the best partitioning policy at runtime. Since the most time-consuming parts of this approach are done at the design time, the proposed method is efficient and meets the runtime resource requirements of the autonomous systems. We analyze the correctness of the proposed system via a few theoretical investigations and experimental results applied to a case study on energy-harvesting self-adaptive systems. The outcome illustrates the correctness of the proposed system in terms of efficiency and accuracy.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"318 1","pages":"1-9"},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75980844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Large Hadron Collider (LHC) demands a huge amount of computing resources to deal with petabytes of data generated from High Energy Physics (HEP) experiments and user logs, which report user activity within the supporting Worldwide LHC Computing Grid (WLCG). An outburst of data and information is expected due to the scheduled LHC upgrade, viz., the workload of the WLCG should increase by 10 times in the near future. Autonomous system maintenance by means of log mining and machine learning algorithms is of utmost importance to keep the computing grid functional. The aim is to detect software faults, bugs, threats, and infrastructural problems. This paper describes a general-purpose solution to anomaly detection in computer grids using unstructured, textual, and unsupervised data. The solution consists in recognizing periods of anomalous activity based on content and information extracted from user log events. This study has particularly compared One-class SVM, Isolation Forest (IF), and Local Outlier Factor (LOF). IF provides the best fault detection accuracy, 69.5%.
{"title":"Unsupervised Learning and Online Anomaly Detection","authors":"","doi":"10.4018/ijertcs.302112","DOIUrl":"https://doi.org/10.4018/ijertcs.302112","url":null,"abstract":"The Large Hadron Collider (LHC) demands a huge amount of computing resources to deal with petabytes of data generated from High Energy Physics (HEP) experiments and user logs, which report user activity within the supporting Worldwide LHC Computing Grid (WLCG). An outburst of data and information is expected due to the scheduled LHC upgrade, viz., the workload of the WLCG should increase by 10 times in the near future. Autonomous system maintenance by means of log mining and machine learning algorithms is of utmost importance to keep the computing grid functional. The aim is to detect software faults, bugs, threats, and infrastructural problems. This paper describes a general-purpose solution to anomaly detection in computer grids using unstructured, textual, and unsupervised data. The solution consists in recognizing periods of anomalous activity based on content and information extracted from user log events. This study has particularly compared One-class SVM, Isolation Forest (IF), and Local Outlier Factor (LOF). IF provides the best fault detection accuracy, 69.5%.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43465206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"28th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2022, Taipei, Taiwan, August 23-25, 2022","authors":"","doi":"10.1109/RTCSA55878.2022","DOIUrl":"https://doi.org/10.1109/RTCSA55878.2022","url":null,"abstract":"","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"69 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91396706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Because of SRAM sensitivity to radiation, SRAM-based FPGA systems deployed in harsh environments require error mitigation methods to reduce their overall downtime. This paper presents a fault-tolerant reconfigurable imaging system that relies on the DPR feature for correcting errors in the configuration memory and loading camera system IPs. The system reliability is evaluated by injecting faults in the FPGA configuration memory at runtime using the Xilinx SEM IP. The faults are injected internally using the Internal Configuration Access Port (ICAP), which is shared between the fault injection core and system parts. The results showed that 95% of the errors can by corrected automatically. This paper also proposes a fast-Built-in-Self-Test (BIST) mitigation technique to reduce the overall downtime in case of errors. This technique can reduce the recovery time by 80%. Moreover, Triple Modular Redundancy (TMR) is used to increase the overall reliability without significantly increasing the resource overhead.
由于SRAM对辐射的敏感性,部署在恶劣环境中的基于SRAM的FPGA系统需要错误缓解方法来减少其整体停机时间。本文提出了一种基于DPR特性的容错可重构成像系统,用于纠错配置存储器和加载摄像机系统ip。通过在运行时使用Xilinx SEM IP在FPGA配置内存中注入故障来评估系统可靠性。故障注入通过ICAP (Internal Configuration Access Port)内部注入,ICAP由故障注入核心和系统部件共享。结果表明,95%的误差可以自动校正。本文还提出了一种快速内置自测(BIST)缓解技术,以减少发生错误时的总体停机时间。该技术可减少80%的恢复时间。此外,采用三模冗余(Triple Modular Redundancy, TMR),在不显著增加资源开销的情况下,提高了系统的整体可靠性。
{"title":"Design and Implementation of a Reliable Reconfigurable Imaging System","authors":"","doi":"10.4018/ijertcs.302108","DOIUrl":"https://doi.org/10.4018/ijertcs.302108","url":null,"abstract":"Because of SRAM sensitivity to radiation, SRAM-based FPGA systems deployed in harsh environments require error mitigation methods to reduce their overall downtime. This paper presents a fault-tolerant reconfigurable imaging system that relies on the DPR feature for correcting errors in the configuration memory and loading camera system IPs. The system reliability is evaluated by injecting faults in the FPGA configuration memory at runtime using the Xilinx SEM IP. The faults are injected internally using the Internal Configuration Access Port (ICAP), which is shared between the fault injection core and system parts. The results showed that 95% of the errors can by corrected automatically. This paper also proposes a fast-Built-in-Self-Test (BIST) mitigation technique to reduce the overall downtime in case of errors. This technique can reduce the recovery time by 80%. Moreover, Triple Modular Redundancy (TMR) is used to increase the overall reliability without significantly increasing the resource overhead.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44559659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Transmission of sensitive data in space missions and particularly in satellite remote sensing to the ground station is exposed to multiple threats impacting the confidentiality of data, access unauthorized to the satellite system, in addition, the space environment causes several threats that can affect the hardware of satellites. This paper describes an improved approach to implement a secure Land Surface Temperature-Split Windows (LST-SW) algorithm based on the Advanced Encryption Standard using the Reconfigurable Dynamic Method for application on-board earth observation satellites implemented on radiation-tolerant Virtex-4QV FPGA. The experimental results showed that the proposed hardware secure implementation of the LST-SW algorithm using Xilinx Virtex-4QV FPGA achieves higher throughput of 907.644 Mbps sufficient for satellite remote sensing mission. Moreover, the suggested implementation consumes 4089 Slices and 4 BRAMs. Finally, the authors use security measurement analyses to verify the safety and performance of the proposed encryption LST-SW module.
{"title":"Improved Security Approach based on AES algorithm for LST retrieval using satellite imagery in Radiation-Tolerant FPGAs","authors":"","doi":"10.4018/ijertcs.302107","DOIUrl":"https://doi.org/10.4018/ijertcs.302107","url":null,"abstract":"Transmission of sensitive data in space missions and particularly in satellite remote sensing to the ground station is exposed to multiple threats impacting the confidentiality of data, access unauthorized to the satellite system, in addition, the space environment causes several threats that can affect the hardware of satellites. This paper describes an improved approach to implement a secure Land Surface Temperature-Split Windows (LST-SW) algorithm based on the Advanced Encryption Standard using the Reconfigurable Dynamic Method for application on-board earth observation satellites implemented on radiation-tolerant Virtex-4QV FPGA. The experimental results showed that the proposed hardware secure implementation of the LST-SW algorithm using Xilinx Virtex-4QV FPGA achieves higher throughput of 907.644 Mbps sufficient for satellite remote sensing mission. Moreover, the suggested implementation consumes 4089 Slices and 4 BRAMs. Finally, the authors use security measurement analyses to verify the safety and performance of the proposed encryption LST-SW module.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47145667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Digital transformation in Industry 4.0 today is associated with the transition to cyber-physical systems through the use of digital twin technologies, the industrial Internet, Big Data, Artificial Intelligence, Machine Learning, etc. In this work, an attempt of strict theory developing was made that would allow to determine, “what Digital Twin is” and to determine the place of the Digital Twin among other models. As a result, a cyber-physical Cross-Domain Model of Communication Service Provider and the model of the Digital Twin for the digital service provider was suggested. The models aim to meet new problems in communications management.
{"title":"A Digital Twin Model of the Smart City Communication Infrastructure","authors":"S. Kislyakov","doi":"10.4018/ijertcs.304803","DOIUrl":"https://doi.org/10.4018/ijertcs.304803","url":null,"abstract":"Digital transformation in Industry 4.0 today is associated with the transition to cyber-physical systems through the use of digital twin technologies, the industrial Internet, Big Data, Artificial Intelligence, Machine Learning, etc. In this work, an attempt of strict theory developing was made that would allow to determine, “what Digital Twin is” and to determine the place of the Digital Twin among other models. As a result, a cyber-physical Cross-Domain Model of Communication Service Provider and the model of the Digital Twin for the digital service provider was suggested. The models aim to meet new problems in communications management.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45325404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}