首页 > 最新文献

International Journal of Embedded and Real-Time Communication Systems (IJERTCS)最新文献

英文 中文
Static/Dynamic Analysis of Android Applications to Improve Energy-Efficiency Android应用的静态/动态分析,以提高能源效率
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-05-30 DOI: 10.1109/rtest56034.2022.9850164
Mohammad Jalili, Fathiyeh Faghih
Energy consumption of mobile applications has a great impact on the satisfaction of users. Many developers do not consider energy-efficient programming practices when coding an applications. Therefore, many applications can be improved in terms of energy usage by detecting and removing their energy defects. Most works towards this goal focus on static analysis of Android applications. In this paper, we propose a hybrid framework consisting of static and dynamic modules for finding energy defects. Our static module can effectively analyse an Android application considering its life-cycle and look for the energy anti-patterns. The results of static analysis are then transformed to executable GUI-based test cases. In the dynamic module, the generated test cases are run, and their results are evaluated using an automated oracle, which does not need the energy measurement. Using our framework, we have analyzed 29 applications, and found 9 applications with energy defects. Our dynamic module could effectively detect the false positives in the results of the static analysis module.
移动应用的能耗对用户的满意度影响很大。许多开发人员在编写应用程序时没有考虑节能编程实践。因此,许多应用可以通过检测和消除它们的能量缺陷来改进能源使用。实现这一目标的大部分工作都集中在Android应用程序的静态分析上。在本文中,我们提出了一个由静态和动态模块组成的混合框架来寻找能量缺陷。我们的静态模块可以有效地分析Android应用程序的生命周期,并寻找能量反模式。然后将静态分析的结果转换为可执行的基于gui的测试用例。在动态模块中,生成的测试用例被运行,它们的结果被使用一个自动化的oracle评估,它不需要能量测量。使用我们的框架,我们分析了29个应用程序,并发现9个应用程序存在能量缺陷。我们的动态模块可以有效地检测出静态分析模块结果中的误报。
{"title":"Static/Dynamic Analysis of Android Applications to Improve Energy-Efficiency","authors":"Mohammad Jalili, Fathiyeh Faghih","doi":"10.1109/rtest56034.2022.9850164","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9850164","url":null,"abstract":"Energy consumption of mobile applications has a great impact on the satisfaction of users. Many developers do not consider energy-efficient programming practices when coding an applications. Therefore, many applications can be improved in terms of energy usage by detecting and removing their energy defects. Most works towards this goal focus on static analysis of Android applications. In this paper, we propose a hybrid framework consisting of static and dynamic modules for finding energy defects. Our static module can effectively analyse an Android application considering its life-cycle and look for the energy anti-patterns. The results of static analysis are then transformed to executable GUI-based test cases. In the dynamic module, the generated test cases are run, and their results are evaluated using an automated oracle, which does not need the energy measurement. Using our framework, we have analyzed 29 applications, and found 9 applications with energy defects. Our dynamic module could effectively detect the false positives in the results of the static analysis module.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"16 1","pages":"1-8"},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73199960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Evaluation of Cyber-Physical Systems with Redundant Components 具有冗余组件的信息物理系统安全评估
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-05-30 DOI: 10.1109/rtest56034.2022.9850125
Hamed Sepehrzadeh
The emergence of CPSs leads to modernization of critical infrastructures and improving flexibility and efficiency from one point of view. However, from another point of view, this modernization has subjected them to cyber threats. This paper provides a modeling approach for evaluating the security of CPSs. The main idea behind the presented model is to study the attacker and the system behaviors in the penetration and attack phases with exploiting some defensive countermeasures such as redundant components and attack detection strategies. By using the proposed approach, we can investigate how redundancy factor of sensors, controllers and actuators and intrusion detection systems can improve the system security and delay the system security failure.
从一个角度来看,cps的出现导致了关键基础设施的现代化,提高了灵活性和效率。然而,从另一个角度来看,这种现代化使他们受到网络威胁。本文提供了一种评估cps安全性的建模方法。该模型的主要思想是研究渗透和攻击阶段的攻击者和系统行为,并利用冗余组件和攻击检测策略等防御对策。利用所提出的方法,我们可以研究传感器、控制器和执行器的冗余系数以及入侵检测系统如何提高系统安全性并延迟系统安全故障。
{"title":"Security Evaluation of Cyber-Physical Systems with Redundant Components","authors":"Hamed Sepehrzadeh","doi":"10.1109/rtest56034.2022.9850125","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9850125","url":null,"abstract":"The emergence of CPSs leads to modernization of critical infrastructures and improving flexibility and efficiency from one point of view. However, from another point of view, this modernization has subjected them to cyber threats. This paper provides a modeling approach for evaluating the security of CPSs. The main idea behind the presented model is to study the attacker and the system behaviors in the penetration and attack phases with exploiting some defensive countermeasures such as redundant components and attack detection strategies. By using the proposed approach, we can investigate how redundancy factor of sensors, controllers and actuators and intrusion detection systems can improve the system security and delay the system security failure.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"19 1","pages":"1-7"},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80087882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RTEST 2022 Authors List RTEST 2022作者名单
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-05-30 DOI: 10.1109/rtest56034.2022.9850004
{"title":"RTEST 2022 Authors List","authors":"","doi":"10.1109/rtest56034.2022.9850004","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9850004","url":null,"abstract":"","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"19 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85324664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flow metering and lane-changing optimal control with ramp-metering saturation 匝道计量饱和的流量计量与变道最优控制
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-05-30 DOI: 10.1109/rtest56034.2022.9850109
Farzam Tajdari, Hasan Ramezanian, Shadi Paydarfar, A. Lashgari, Shakib Maghrebi
To accomplish a successful transportation frame-work, we present a new approach to incorporate lane-changing and ramp-metering control, which includes the presence of partially connected and autonomous vehicles. The primary test tended to is coordinating the ramp-metering flow saturation boundaries in the optimal controller. Specifically, a level of vehicles is expected to get and carry out explicit control assignments (e.g., lane-changing control signals). Utilizing a Linear Quadratic Integral (LQI) controller and an anti-windup plan in view of a LTI model, another methodology is introduced for powerfully expanding the throughput at motorway bottlenecks. In terms of assessment, the methodology is implemented on the simulated model, uses a macroscopic traffic model which is a first-order flow model including multi-lane. The capacity drop peculiarity is additionally executed, that addresses the effect of the created method to deal with be demonstrated, same as the improvements in rush hour traffic effectiveness.
为了实现一个成功的交通框架,我们提出了一种结合变道和匝道计量控制的新方法,其中包括部分连接和自动驾驶车辆的存在。最优控制器的主要测试趋向于协调坡道计量流饱和边界。具体来说,期望某一级别的车辆获得并执行明确的控制任务(例如,变道控制信号)。利用线性二次积分(LQI)控制器和针对LTI模型的防停机计划,介绍了另一种有效扩展高速公路瓶颈吞吐量的方法。在评价方面,将该方法应用于仿真模型,采用宏观交通模型,即一阶多车道流模型。此外,还执行了容量下降特性,以解决所创建的方法处理所演示的效果,与高峰时段交通效率的提高相同。
{"title":"Flow metering and lane-changing optimal control with ramp-metering saturation","authors":"Farzam Tajdari, Hasan Ramezanian, Shadi Paydarfar, A. Lashgari, Shakib Maghrebi","doi":"10.1109/rtest56034.2022.9850109","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9850109","url":null,"abstract":"To accomplish a successful transportation frame-work, we present a new approach to incorporate lane-changing and ramp-metering control, which includes the presence of partially connected and autonomous vehicles. The primary test tended to is coordinating the ramp-metering flow saturation boundaries in the optimal controller. Specifically, a level of vehicles is expected to get and carry out explicit control assignments (e.g., lane-changing control signals). Utilizing a Linear Quadratic Integral (LQI) controller and an anti-windup plan in view of a LTI model, another methodology is introduced for powerfully expanding the throughput at motorway bottlenecks. In terms of assessment, the methodology is implemented on the simulated model, uses a macroscopic traffic model which is a first-order flow model including multi-lane. The capacity drop peculiarity is additionally executed, that addresses the effect of the created method to deal with be demonstrated, same as the improvements in rush hour traffic effectiveness.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"148 1","pages":"1-6"},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88868664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deploying Reinforcement Learning for Efficient Runtime Decision-Making in Autonomous Systems 在自治系统中部署强化学习以实现高效的运行时决策
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-05-30 DOI: 10.1109/rtest56034.2022.9850141
Melika Dastranj, Mehran Alidoost Nia, M. Kargahi
Autonomous systems need to effectively react to runtime changes in the environment and the system itself. The capability to analyze both the environment and the system is theoretically feasible through the model-based approach. How-ever, the limitations like model size are serious obstacles to autonomous decision-making process. The incremental approximation is a technique to partition the model to tackle this issue. A partition must be updated/re-verified at a reasonable cost when some change occurs. The paper suggests a policy-based analysis technique to find the optimal partitioning criteria through a set of available policies with respect to our proposed metrics, namely Balancing and Variation. Using the incremental approximation scheme, the metrics evaluate each component quantitatively according to their size and frequency. The proposed method is augmented with a reinforcement learning approach so that the autonomous system can learn how to find the best partitioning policy at runtime. Since the most time-consuming parts of this approach are done at the design time, the proposed method is efficient and meets the runtime resource requirements of the autonomous systems. We analyze the correctness of the proposed system via a few theoretical investigations and experimental results applied to a case study on energy-harvesting self-adaptive systems. The outcome illustrates the correctness of the proposed system in terms of efficiency and accuracy.
自治系统需要有效地响应环境和系统本身的运行时变化。通过基于模型的方法,分析环境和系统的能力在理论上是可行的。然而,模型大小等限制是自主决策过程的严重障碍。增量逼近是一种划分模型来解决这个问题的技术。当发生某些更改时,必须以合理的成本更新/重新验证分区。本文提出了一种基于策略的分析技术,通过一组关于我们提出的度量(即平衡和变化)的可用策略来找到最优划分标准。使用增量逼近方案,度量根据它们的大小和频率定量地评估每个组件。该方法通过强化学习方法得到增强,使自治系统能够学习如何在运行时找到最佳的分区策略。由于该方法中最耗时的部分是在设计时完成的,因此所提出的方法是有效的,并且满足自治系统的运行时资源需求。通过一些理论研究和应用于能量收集自适应系统的实验结果,分析了所提出系统的正确性。结果表明,所提出的系统在效率和准确性方面是正确的。
{"title":"Deploying Reinforcement Learning for Efficient Runtime Decision-Making in Autonomous Systems","authors":"Melika Dastranj, Mehran Alidoost Nia, M. Kargahi","doi":"10.1109/rtest56034.2022.9850141","DOIUrl":"https://doi.org/10.1109/rtest56034.2022.9850141","url":null,"abstract":"Autonomous systems need to effectively react to runtime changes in the environment and the system itself. The capability to analyze both the environment and the system is theoretically feasible through the model-based approach. How-ever, the limitations like model size are serious obstacles to autonomous decision-making process. The incremental approximation is a technique to partition the model to tackle this issue. A partition must be updated/re-verified at a reasonable cost when some change occurs. The paper suggests a policy-based analysis technique to find the optimal partitioning criteria through a set of available policies with respect to our proposed metrics, namely Balancing and Variation. Using the incremental approximation scheme, the metrics evaluate each component quantitatively according to their size and frequency. The proposed method is augmented with a reinforcement learning approach so that the autonomous system can learn how to find the best partitioning policy at runtime. Since the most time-consuming parts of this approach are done at the design time, the proposed method is efficient and meets the runtime resource requirements of the autonomous systems. We analyze the correctness of the proposed system via a few theoretical investigations and experimental results applied to a case study on energy-harvesting self-adaptive systems. The outcome illustrates the correctness of the proposed system in terms of efficiency and accuracy.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"318 1","pages":"1-9"},"PeriodicalIF":0.7,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75980844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsupervised Learning and Online Anomaly Detection 无监督学习与在线异常检测
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-01-01 DOI: 10.4018/ijertcs.302112
The Large Hadron Collider (LHC) demands a huge amount of computing resources to deal with petabytes of data generated from High Energy Physics (HEP) experiments and user logs, which report user activity within the supporting Worldwide LHC Computing Grid (WLCG). An outburst of data and information is expected due to the scheduled LHC upgrade, viz., the workload of the WLCG should increase by 10 times in the near future. Autonomous system maintenance by means of log mining and machine learning algorithms is of utmost importance to keep the computing grid functional. The aim is to detect software faults, bugs, threats, and infrastructural problems. This paper describes a general-purpose solution to anomaly detection in computer grids using unstructured, textual, and unsupervised data. The solution consists in recognizing periods of anomalous activity based on content and information extracted from user log events. This study has particularly compared One-class SVM, Isolation Forest (IF), and Local Outlier Factor (LOF). IF provides the best fault detection accuracy, 69.5%.
大型强子对撞机(LHC)需要大量的计算资源来处理从高能物理(HEP)实验和用户日志中产生的pb级数据,这些数据报告了支持全球LHC计算网格(WLCG)的用户活动。由于即将进行的大型强子对撞机升级,预计将产生大量的数据和信息,即在不久的将来,WLCG的工作量将增加10倍。基于日志挖掘和机器学习算法的自主系统维护对于保持计算网格的功能至关重要。其目的是检测软件故障、缺陷、威胁和基础设施问题。本文描述了使用非结构化、文本和无监督数据的计算机网格异常检测的通用解决方案。该解决方案包括基于从用户日志事件中提取的内容和信息来识别异常活动的周期。本研究特别比较了一类支持向量机、隔离森林(IF)和局部离群因子(LOF)。中频提供了最好的故障检测精度,69.5%。
{"title":"Unsupervised Learning and Online Anomaly Detection","authors":"","doi":"10.4018/ijertcs.302112","DOIUrl":"https://doi.org/10.4018/ijertcs.302112","url":null,"abstract":"The Large Hadron Collider (LHC) demands a huge amount of computing resources to deal with petabytes of data generated from High Energy Physics (HEP) experiments and user logs, which report user activity within the supporting Worldwide LHC Computing Grid (WLCG). An outburst of data and information is expected due to the scheduled LHC upgrade, viz., the workload of the WLCG should increase by 10 times in the near future. Autonomous system maintenance by means of log mining and machine learning algorithms is of utmost importance to keep the computing grid functional. The aim is to detect software faults, bugs, threats, and infrastructural problems. This paper describes a general-purpose solution to anomaly detection in computer grids using unstructured, textual, and unsupervised data. The solution consists in recognizing periods of anomalous activity based on content and information extracted from user log events. This study has particularly compared One-class SVM, Isolation Forest (IF), and Local Outlier Factor (LOF). IF provides the best fault detection accuracy, 69.5%.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43465206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
28th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2022, Taipei, Taiwan, August 23-25, 2022 第28届IEEE嵌入式与实时计算系统与应用国际会议,RTCSA 2022,台北,2022年8月23-25日
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-01-01 DOI: 10.1109/RTCSA55878.2022
{"title":"28th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2022, Taipei, Taiwan, August 23-25, 2022","authors":"","doi":"10.1109/RTCSA55878.2022","DOIUrl":"https://doi.org/10.1109/RTCSA55878.2022","url":null,"abstract":"","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":"69 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91396706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of a Reliable Reconfigurable Imaging System 一种可靠的可重构成像系统的设计与实现
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-01-01 DOI: 10.4018/ijertcs.302108
Because of SRAM sensitivity to radiation, SRAM-based FPGA systems deployed in harsh environments require error mitigation methods to reduce their overall downtime. This paper presents a fault-tolerant reconfigurable imaging system that relies on the DPR feature for correcting errors in the configuration memory and loading camera system IPs. The system reliability is evaluated by injecting faults in the FPGA configuration memory at runtime using the Xilinx SEM IP. The faults are injected internally using the Internal Configuration Access Port (ICAP), which is shared between the fault injection core and system parts. The results showed that 95% of the errors can by corrected automatically. This paper also proposes a fast-Built-in-Self-Test (BIST) mitigation technique to reduce the overall downtime in case of errors. This technique can reduce the recovery time by 80%. Moreover, Triple Modular Redundancy (TMR) is used to increase the overall reliability without significantly increasing the resource overhead.
由于SRAM对辐射的敏感性,部署在恶劣环境中的基于SRAM的FPGA系统需要错误缓解方法来减少其整体停机时间。本文提出了一种基于DPR特性的容错可重构成像系统,用于纠错配置存储器和加载摄像机系统ip。通过在运行时使用Xilinx SEM IP在FPGA配置内存中注入故障来评估系统可靠性。故障注入通过ICAP (Internal Configuration Access Port)内部注入,ICAP由故障注入核心和系统部件共享。结果表明,95%的误差可以自动校正。本文还提出了一种快速内置自测(BIST)缓解技术,以减少发生错误时的总体停机时间。该技术可减少80%的恢复时间。此外,采用三模冗余(Triple Modular Redundancy, TMR),在不显著增加资源开销的情况下,提高了系统的整体可靠性。
{"title":"Design and Implementation of a Reliable Reconfigurable Imaging System","authors":"","doi":"10.4018/ijertcs.302108","DOIUrl":"https://doi.org/10.4018/ijertcs.302108","url":null,"abstract":"Because of SRAM sensitivity to radiation, SRAM-based FPGA systems deployed in harsh environments require error mitigation methods to reduce their overall downtime. This paper presents a fault-tolerant reconfigurable imaging system that relies on the DPR feature for correcting errors in the configuration memory and loading camera system IPs. The system reliability is evaluated by injecting faults in the FPGA configuration memory at runtime using the Xilinx SEM IP. The faults are injected internally using the Internal Configuration Access Port (ICAP), which is shared between the fault injection core and system parts. The results showed that 95% of the errors can by corrected automatically. This paper also proposes a fast-Built-in-Self-Test (BIST) mitigation technique to reduce the overall downtime in case of errors. This technique can reduce the recovery time by 80%. Moreover, Triple Modular Redundancy (TMR) is used to increase the overall reliability without significantly increasing the resource overhead.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44559659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Security Approach based on AES algorithm for LST retrieval using satellite imagery in Radiation-Tolerant FPGAs 基于AES算法的耐辐射fpga卫星图像LST检索改进安全方法
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-01-01 DOI: 10.4018/ijertcs.302107
Transmission of sensitive data in space missions and particularly in satellite remote sensing to the ground station is exposed to multiple threats impacting the confidentiality of data, access unauthorized to the satellite system, in addition, the space environment causes several threats that can affect the hardware of satellites. This paper describes an improved approach to implement a secure Land Surface Temperature-Split Windows (LST-SW) algorithm based on the Advanced Encryption Standard using the Reconfigurable Dynamic Method for application on-board earth observation satellites implemented on radiation-tolerant Virtex-4QV FPGA. The experimental results showed that the proposed hardware secure implementation of the LST-SW algorithm using Xilinx Virtex-4QV FPGA achieves higher throughput of 907.644 Mbps sufficient for satellite remote sensing mission. Moreover, the suggested implementation consumes 4089 Slices and 4 BRAMs. Finally, the authors use security measurement analyses to verify the safety and performance of the proposed encryption LST-SW module.
空间任务特别是卫星遥感中的敏感数据向地面站的传输面临着影响数据保密性、卫星系统未经授权访问的多重威胁,此外,空间环境还造成了一些可能影响卫星硬件的威胁。本文介绍了一种基于高级加密标准的陆地表面温度分割窗(LST-SW)安全算法的改进方法,该算法采用可重构动态方法在耐辐射Virtex-4QV FPGA上实现,应用于对地观测卫星。实验结果表明,基于Xilinx Virtex-4QV FPGA的LST-SW算法硬件安全实现实现了907.644 Mbps的高吞吐量,足以满足卫星遥感任务。此外,建议的实现消耗4089个slice和4个bram。最后,作者使用安全测量分析来验证所提出的加密LST-SW模块的安全性和性能。
{"title":"Improved Security Approach based on AES algorithm for LST retrieval using satellite imagery in Radiation-Tolerant FPGAs","authors":"","doi":"10.4018/ijertcs.302107","DOIUrl":"https://doi.org/10.4018/ijertcs.302107","url":null,"abstract":"Transmission of sensitive data in space missions and particularly in satellite remote sensing to the ground station is exposed to multiple threats impacting the confidentiality of data, access unauthorized to the satellite system, in addition, the space environment causes several threats that can affect the hardware of satellites. This paper describes an improved approach to implement a secure Land Surface Temperature-Split Windows (LST-SW) algorithm based on the Advanced Encryption Standard using the Reconfigurable Dynamic Method for application on-board earth observation satellites implemented on radiation-tolerant Virtex-4QV FPGA. The experimental results showed that the proposed hardware secure implementation of the LST-SW algorithm using Xilinx Virtex-4QV FPGA achieves higher throughput of 907.644 Mbps sufficient for satellite remote sensing mission. Moreover, the suggested implementation consumes 4089 Slices and 4 BRAMs. Finally, the authors use security measurement analyses to verify the safety and performance of the proposed encryption LST-SW module.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47145667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Digital Twin Model of the Smart City Communication Infrastructure 智慧城市通信基础设施的数字孪生模型
IF 0.7 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-01-01 DOI: 10.4018/ijertcs.304803
S. Kislyakov
Digital transformation in Industry 4.0 today is associated with the transition to cyber-physical systems through the use of digital twin technologies, the industrial Internet, Big Data, Artificial Intelligence, Machine Learning, etc. In this work, an attempt of strict theory developing was made that would allow to determine, “what Digital Twin is” and to determine the place of the Digital Twin among other models. As a result, a cyber-physical Cross-Domain Model of Communication Service Provider and the model of the Digital Twin for the digital service provider was suggested. The models aim to meet new problems in communications management.
当今工业4.0的数字化转型与通过使用数字孪生技术、工业互联网、大数据、人工智能、机器学习等向网络物理系统的过渡有关。在这项工作中,进行了严格理论发展的尝试,以确定“数字孪生是什么”,并确定数字孪生在其他模型中的位置。为此,提出了通信服务提供商的网络物理跨域模型和数字服务提供商的数字孪生模型。这些模型旨在解决通信管理中的新问题。
{"title":"A Digital Twin Model of the Smart City Communication Infrastructure","authors":"S. Kislyakov","doi":"10.4018/ijertcs.304803","DOIUrl":"https://doi.org/10.4018/ijertcs.304803","url":null,"abstract":"Digital transformation in Industry 4.0 today is associated with the transition to cyber-physical systems through the use of digital twin technologies, the industrial Internet, Big Data, Artificial Intelligence, Machine Learning, etc. In this work, an attempt of strict theory developing was made that would allow to determine, “what Digital Twin is” and to determine the place of the Digital Twin among other models. As a result, a cyber-physical Cross-Domain Model of Communication Service Provider and the model of the Digital Twin for the digital service provider was suggested. The models aim to meet new problems in communications management.","PeriodicalId":38446,"journal":{"name":"International Journal of Embedded and Real-Time Communication Systems (IJERTCS)","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45325404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Embedded and Real-Time Communication Systems (IJERTCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1