首页 > 最新文献

International Journal of Parallel Emergent and Distributed Systems最新文献

英文 中文
Fault tolerant synchronisation of integer and fractional order 6D hyper-chaotic systems via two control signals 基于两个控制信号的整数阶和分数阶6D超混沌系统容错同步
IF 1.1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-10-25 DOI: 10.1080/17445760.2021.1991923
A. Sabaghian, S. Balochian
In this study, two 6D hyper-chaotic systems with integer and fractional orders in the presence of external disturbance and bounded parametric uncertainty with unknown bounds with two control signals are synchronised using an adaptive-sliding mode controller. In the definition of fractional order differentiation, Riemann-Louiville definition is used. To this end, the sliding surface and proper active feedback control law area determined and proper estimation laws are proposed for estimating unknown uncertainty bounds and the disturbance. The stability of the closed-loop control system is proved using the Lyapunov theorem. Simulation results in MATLAB demonstrate the desired efficiency of this method in the presence of disturbance and parametric uncertainty.
在本研究中,两个具有整数阶和分数阶的6D超混沌系统在存在外部扰动和具有未知边界的有界参数不确定性的情况下,使用自适应滑模控制器同步两个控制信号。在分数阶微分的定义中,使用了Riemann-Louville定义。为此,针对未知不确定性界和扰动的估计,提出了滑动面和适当的主动反馈控制律面积确定和适当的估计律。利用李亚普诺夫定理证明了闭环控制系统的稳定性。在MATLAB中的仿真结果证明了该方法在存在扰动和参数不确定性的情况下的预期效率。
{"title":"Fault tolerant synchronisation of integer and fractional order 6D hyper-chaotic systems via two control signals","authors":"A. Sabaghian, S. Balochian","doi":"10.1080/17445760.2021.1991923","DOIUrl":"https://doi.org/10.1080/17445760.2021.1991923","url":null,"abstract":"In this study, two 6D hyper-chaotic systems with integer and fractional orders in the presence of external disturbance and bounded parametric uncertainty with unknown bounds with two control signals are synchronised using an adaptive-sliding mode controller. In the definition of fractional order differentiation, Riemann-Louiville definition is used. To this end, the sliding surface and proper active feedback control law area determined and proper estimation laws are proposed for estimating unknown uncertainty bounds and the disturbance. The stability of the closed-loop control system is proved using the Lyapunov theorem. Simulation results in MATLAB demonstrate the desired efficiency of this method in the presence of disturbance and parametric uncertainty.","PeriodicalId":45411,"journal":{"name":"International Journal of Parallel Emergent and Distributed Systems","volume":"37 1","pages":"152 - 166"},"PeriodicalIF":1.1,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45546052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
What can we learn from universal Turing machines? 我们能从通用图灵机中学到什么?
IF 1.1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-10-16 DOI: 10.1080/17445760.2021.2001468
M. Margenstern
In the present paper, we construct what we call a pedagogical universal Turing machine. We try to understand which comparisons with biological phenomena can be deduced from its encoding and from its working.
在本文中,我们构造了一个我们称之为教学通用图灵机。我们试图理解从它的编码和工作中可以推断出哪些与生物现象的比较。
{"title":"What can we learn from universal Turing machines?","authors":"M. Margenstern","doi":"10.1080/17445760.2021.2001468","DOIUrl":"https://doi.org/10.1080/17445760.2021.2001468","url":null,"abstract":"In the present paper, we construct what we call a pedagogical universal Turing machine. We try to understand which comparisons with biological phenomena can be deduced from its encoding and from its working.","PeriodicalId":45411,"journal":{"name":"International Journal of Parallel Emergent and Distributed Systems","volume":"37 1","pages":"123 - 151"},"PeriodicalIF":1.1,"publicationDate":"2021-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46831642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of Task Scheduling Strategy based on Trustworthiness 基于可信度的任务调度策略研究
IF 1.1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-09-30 DOI: 10.5121/ijdps.2021.12501
Jun Qin, Yanyan Song, Ping Zong
MapReduce is a distributed computing model for cloud computing to process massive data. It simplifies the writing of distributed parallel programs. For the fault-tolerant technology in the MapReduce programming model, tasks may be allocated to nodes with low reliability. It causes the task to be reexecuted, wasting time and resources. This paper proposes a reliability task scheduling strategy with a failure recovery mechanism, evaluates the trustworthiness of resource nodes in the cloud environment and builds a trustworthiness model. By using the simulation platform CloudSim, the stability of the task scheduling algorithm and scheduling model are verified in this paper.
MapReduce是一种用于云计算处理海量数据的分布式计算模型。它简化了分布式并行程序的编写。对于MapReduce编程模型中的容错技术,可能会将任务分配给可靠性较低的节点。这会导致任务被重新执行,浪费时间和资源。提出了一种带故障恢复机制的可靠性任务调度策略,评估了云环境下资源节点的可信度,建立了可信度模型。利用仿真平台CloudSim,验证了任务调度算法和调度模型的稳定性。
{"title":"Study of Task Scheduling Strategy based on Trustworthiness","authors":"Jun Qin, Yanyan Song, Ping Zong","doi":"10.5121/ijdps.2021.12501","DOIUrl":"https://doi.org/10.5121/ijdps.2021.12501","url":null,"abstract":"MapReduce is a distributed computing model for cloud computing to process massive data. It simplifies the writing of distributed parallel programs. For the fault-tolerant technology in the MapReduce programming model, tasks may be allocated to nodes with low reliability. It causes the task to be reexecuted, wasting time and resources. This paper proposes a reliability task scheduling strategy with a failure recovery mechanism, evaluates the trustworthiness of resource nodes in the cloud environment and builds a trustworthiness model. By using the simulation platform CloudSim, the stability of the task scheduling algorithm and scheduling model are verified in this paper.","PeriodicalId":45411,"journal":{"name":"International Journal of Parallel Emergent and Distributed Systems","volume":"15 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80391807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust in the Adoption of Internet of Things for Smart Agriculture in Developing Countries 对发展中国家采用物联网实现智慧农业的信任
IF 1.1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-09-30 DOI: 10.5121/ijdps.2021.12502
Tsitsi Zengeya, P. Sambo, N. Mabika
Trust in online environments is based on beliefs in the trustworthiness of a trustee, which is composed of three distinct dimensions - integrity, ability, and benevolence. Zimbabwe has slowly adopted Internet of Things for smart agriculture as a way of improving on food security in the country, though there is hesitancy by most farmers citing trust issues as monitoring of crops, animals and farm equipment’s would be done online through connecting several devices and accessing data. Farmers are facing difficulties in trusting that the said technology has the ability to perform as expected in a specific situation or to complete a required task, i.e. if the technology will work consistently and reliably in monitoring the environment, nutrients, temperatures and equipment status. The integrity of the collected data as it will be used for decision making. There is a growing need to determine how trust in the technology influence the adoption of IoT for smart agriculture in Zimbabwe. The mixed methodology was used to gather data from 50 A2 model farmers randomly sampled in Zimbabwe. The findings revealed that McKnight etal. trust in technology model can be used to influence the adoption of IoT through trusting that the technology will be reliable and will operate as expected.Additional constructs such as security and distrust of technology can be used as reference for future research.
网络环境中的信任是基于对受托人可信度的信任,它由三个不同的维度组成——诚信、能力和仁慈。津巴布韦缓慢地将物联网应用于智能农业,作为改善该国粮食安全的一种方式,尽管大多数农民犹豫不决,理由是信任问题,因为对作物、动物和农场设备的监控将通过连接多台设备和访问数据来在线完成。农民很难相信上述技术有能力在特定情况下按预期执行或完成所需的任务,即该技术是否能够持续可靠地监测环境、营养、温度和设备状态。收集的数据的完整性,因为它将用于决策。越来越需要确定对技术的信任如何影响津巴布韦智能农业采用物联网。采用混合方法从津巴布韦随机抽样的50名A2模范农民中收集数据。研究结果显示,麦克奈特etal。技术信任模型可以通过信任技术将是可靠的并将按预期运行来影响物联网的采用。诸如安全性和技术不信任等附加结构可以作为未来研究的参考。
{"title":"Trust in the Adoption of Internet of Things for Smart Agriculture in Developing Countries","authors":"Tsitsi Zengeya, P. Sambo, N. Mabika","doi":"10.5121/ijdps.2021.12502","DOIUrl":"https://doi.org/10.5121/ijdps.2021.12502","url":null,"abstract":"Trust in online environments is based on beliefs in the trustworthiness of a trustee, which is composed of three distinct dimensions - integrity, ability, and benevolence. Zimbabwe has slowly adopted Internet of Things for smart agriculture as a way of improving on food security in the country, though there is hesitancy by most farmers citing trust issues as monitoring of crops, animals and farm equipment’s would be done online through connecting several devices and accessing data. Farmers are facing difficulties in trusting that the said technology has the ability to perform as expected in a specific situation or to complete a required task, i.e. if the technology will work consistently and reliably in monitoring the environment, nutrients, temperatures and equipment status. The integrity of the collected data as it will be used for decision making. There is a growing need to determine how trust in the technology influence the adoption of IoT for smart agriculture in Zimbabwe. The mixed methodology was used to gather data from 50 A2 model farmers randomly sampled in Zimbabwe. The findings revealed that McKnight etal. trust in technology model can be used to influence the adoption of IoT through trusting that the technology will be reliable and will operate as expected.Additional constructs such as security and distrust of technology can be used as reference for future research.","PeriodicalId":45411,"journal":{"name":"International Journal of Parallel Emergent and Distributed Systems","volume":"100 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83338825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Preface for special issue Petri/Sleptsov net based technology of programming for parallel, emergent and distributed systems 基于Petri/Sleeptsov网络的并行、紧急和分布式系统编程技术特刊前言
IF 1.1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-09-07 DOI: 10.1080/17445760.2021.1970158
D. Zaitsev, D. Probert
Schemata for concurrent processes sharing some resources first appeared for manufacture processes in works of family research duet Frank and Lillian Gilbreth in 1921. Flow chart standard, developed in 1947 by Herman Goldstine and John von Neumann, did not contain blocks for parallel processing of information. Program schemata, including concurrent programs, was developed in Novosibirsk, Russia, during 1950–1960 that includes program schemes of Yanov, Martiniuk, Ershov, and Lavrov for formal proof of (concurrent) program correctness andmaximising their efficiency. Place-transition nets, which were introduced in doctoral dissertation of Carl Petri in 1962 represent, in essence, a unification of the mentioned approaches having only two types of nodes in a directed bipartite graph; a crucial amendment of Carl Petri was the introduction of a dynamical process on the graphwith tokens situated inside places which were produced and consumed as a result of transitions firing. An attractionof Petri netswas apossibility of applying formal techniquesof analysis developed in 1970–1980by Hack, Molloy, TadaoMurata and others. Nets were widely applied for modelling concurrent programs, manufacturing and transportation systems etc. Concurrent programming languages appeared which were loading elements of Petri net graph by constructs of convectional programming languages. According to the Carl Petri firing rule, a single transition fires at a step chosen in nondeterminiatic way among the set of firable transitions. It was a brilliant abstraction to study behaviour of concurrent systems with regard to ALL permitted possibilities that was especially useful for verification of communication protocols. Concurrent (parallel) programming gains speed-up at the expense of doing a few actions simultaneously that becomes the basic motivation of introducing in 1990 the Anjey Salvitsky firing rule published in works of Hans-Dieter Burkhard. It was also called the maximal firing strategy and transformed the net into a Turing-complete system. In 1976, Tilak Agerwala proved Turing-completeness of inhibitor Petri nets which contain a special inhibitor arc to check whether a place marking is zero. After constructing a series of universal Petri nets in an explicit form by Dmitry Zaitsev in 2010–2020, including minimal ones containing about forty vertices, it became clear that a Petri net runs exponentially slower than a Turing machine because of incremental way of computing arithmetic functions (similar to recursive functions of Kleene and Minsky counter automata). Anatoly Sleptsov, an outstanding Ukrainian scientist in computer science, a PhD supervisor of Dmitry Zaitsev during 1988–1991, hinted to Dmitry Zaitsev an idea of firing a transition in a few instances at the same time. The corresponding theoryof timedPetri netswithmultichannel transitions, including state equation and algebraic equivalent transformations, was developed in Dmitry Zaitsev doctoral dissertation and applied
共享资源的并行过程图式最早出现在1921年Frank和Lillian Gilbreth的研究中。流程图标准是由赫尔曼·戈德斯坦和约翰·冯·诺伊曼于1947年制定的,它不包含用于并行处理信息的块。程序模式,包括并发程序,在1950-1960年期间在俄罗斯新西伯利亚开发,包括Yanov, Martiniuk, Ershov和Lavrov的程序方案,用于正式证明(并发)程序正确性并最大化其效率。1962年Carl Petri博士论文中提出的位置转移网,实质上是上述方法的统一,在有向二部图中只有两种类型的节点;卡尔·佩特里的一个重要修改是在图形上引入了一个动态过程,其中符号位于转换触发产生和消耗的位置。Petri网的一个吸引人的地方是应用Hack、Molloy、TadaoMurata等人在1970 - 1980年开发的形式化分析技术的可能性。网络被广泛应用于并行程序建模、制造和运输系统等方面。并发程序设计语言的出现是通过传统程序设计语言的构造来加载Petri网图元素。根据卡尔·佩特里点火规则,一个单一的过渡在一组可点火过渡中以非确定的方式选择一个步骤点火。研究并发系统在所有允许的可能性下的行为是一个很好的抽象,这对于验证通信协议特别有用。并发(并行)编程以同时执行几个操作为代价获得加速,这成为1990年在Hans-Dieter Burkhard的著作中引入Anjey Salvitsky解雇规则的基本动机。它也被称为最大射击策略,并将网络转化为图灵完全系统。1976年,Tilak Agerwala证明了包含特殊抑制弧的抑制Petri网的图灵完备性,该抑制弧用于检查位置标记是否为零。在德米特里·扎伊采夫(Dmitry Zaitsev)于2010-2020年以显式形式构建了一系列通用Petri网之后,包括包含大约40个顶点的最小Petri网,很明显,由于计算算术函数的增量方式(类似于Kleene和Minsky计数器自动机的递归函数),Petri网的运行速度比图灵机慢得多。阿纳托利·斯普索夫(Anatoly Sleptsov)是乌克兰杰出的计算机科学科学家,也是1988-1991年德米特里·扎伊采夫的博士导师,他向德米特里·扎伊采夫暗示了在几个实例中同时启动过渡的想法。德米特里·扎伊采夫博士论文中提出了多通道转换的时间petri网的相应理论,包括状态方程和代数等价变换,并将其应用于Opera-Topaz软件的制造控制和管理中,该类网络是工作流网络的前身。后来,德米特里·扎伊采夫(Dmitry Zaitsev)引入了一类具有多次发射转换的位置转换网,并将其称为Sleptsov网,其结果证明,它比具有卡尔·佩特里发射规则的位置转换网运行速度要快得多。
{"title":"Preface for special issue Petri/Sleptsov net based technology of programming for parallel, emergent and distributed systems","authors":"D. Zaitsev, D. Probert","doi":"10.1080/17445760.2021.1970158","DOIUrl":"https://doi.org/10.1080/17445760.2021.1970158","url":null,"abstract":"Schemata for concurrent processes sharing some resources first appeared for manufacture processes in works of family research duet Frank and Lillian Gilbreth in 1921. Flow chart standard, developed in 1947 by Herman Goldstine and John von Neumann, did not contain blocks for parallel processing of information. Program schemata, including concurrent programs, was developed in Novosibirsk, Russia, during 1950–1960 that includes program schemes of Yanov, Martiniuk, Ershov, and Lavrov for formal proof of (concurrent) program correctness andmaximising their efficiency. Place-transition nets, which were introduced in doctoral dissertation of Carl Petri in 1962 represent, in essence, a unification of the mentioned approaches having only two types of nodes in a directed bipartite graph; a crucial amendment of Carl Petri was the introduction of a dynamical process on the graphwith tokens situated inside places which were produced and consumed as a result of transitions firing. An attractionof Petri netswas apossibility of applying formal techniquesof analysis developed in 1970–1980by Hack, Molloy, TadaoMurata and others. Nets were widely applied for modelling concurrent programs, manufacturing and transportation systems etc. Concurrent programming languages appeared which were loading elements of Petri net graph by constructs of convectional programming languages. According to the Carl Petri firing rule, a single transition fires at a step chosen in nondeterminiatic way among the set of firable transitions. It was a brilliant abstraction to study behaviour of concurrent systems with regard to ALL permitted possibilities that was especially useful for verification of communication protocols. Concurrent (parallel) programming gains speed-up at the expense of doing a few actions simultaneously that becomes the basic motivation of introducing in 1990 the Anjey Salvitsky firing rule published in works of Hans-Dieter Burkhard. It was also called the maximal firing strategy and transformed the net into a Turing-complete system. In 1976, Tilak Agerwala proved Turing-completeness of inhibitor Petri nets which contain a special inhibitor arc to check whether a place marking is zero. After constructing a series of universal Petri nets in an explicit form by Dmitry Zaitsev in 2010–2020, including minimal ones containing about forty vertices, it became clear that a Petri net runs exponentially slower than a Turing machine because of incremental way of computing arithmetic functions (similar to recursive functions of Kleene and Minsky counter automata). Anatoly Sleptsov, an outstanding Ukrainian scientist in computer science, a PhD supervisor of Dmitry Zaitsev during 1988–1991, hinted to Dmitry Zaitsev an idea of firing a transition in a few instances at the same time. The corresponding theoryof timedPetri netswithmultichannel transitions, including state equation and algebraic equivalent transformations, was developed in Dmitry Zaitsev doctoral dissertation and applied","PeriodicalId":45411,"journal":{"name":"International Journal of Parallel Emergent and Distributed Systems","volume":"36 1","pages":"495 - 497"},"PeriodicalIF":1.1,"publicationDate":"2021-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42386652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study and evaluation of automatic GPU offloading method from various language applications 从各种语言应用程序中研究和评估GPU自动卸载方法
IF 1.1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-09-06 DOI: 10.1080/17445760.2021.1971666
Y. Yamato
ABSTRACT Heterogeneous hardware other than a small-core central processing unit (CPU) is increasingly being used, such as a graphics processing unit (GPU), field-programmable gate array (FPGA) or many-core CPU. However, to use heterogeneous hardware, programmers must have sufficient technical skills to utilise OpenMP, CUDA, and OpenCL. On the basis of this, we previously proposed environment-adaptive software that enables automatic conversion, configuration, and high performance operation of once-written code, in accordance with the hardware to be placed. However, the source language for offloading was mainly C/C++ language applications, and there was no research into common offloading for various language applications. In this paper, for a new challenge, we study a common method for automatically offloading various language applications in not only C language but also Python and Java. We evaluate the effectiveness of the proposed method in multiple applications of various languages. GRAPHICAL ABSTRACT
除小核中央处理器(CPU)外,越来越多地使用异构硬件,如图形处理单元(GPU)、现场可编程门阵列(FPGA)或多核CPU。然而,要使用异构硬件,程序员必须有足够的技术技能来利用OpenMP、CUDA和OpenCL。在此基础上,我们之前提出了环境自适应软件,它可以根据要放置的硬件自动转换、配置和对一次编写的代码进行高性能操作。然而,用于卸载的源语言主要是C/ c++语言应用程序,没有对各种语言应用程序的通用卸载进行研究。本文针对新的挑战,研究了一种通用的自动卸载各种语言应用程序的方法,不仅包括C语言,还包括Python和Java。我们评估了所提出的方法在不同语言的多种应用中的有效性。图形抽象
{"title":"Study and evaluation of automatic GPU offloading method from various language applications","authors":"Y. Yamato","doi":"10.1080/17445760.2021.1971666","DOIUrl":"https://doi.org/10.1080/17445760.2021.1971666","url":null,"abstract":"ABSTRACT Heterogeneous hardware other than a small-core central processing unit (CPU) is increasingly being used, such as a graphics processing unit (GPU), field-programmable gate array (FPGA) or many-core CPU. However, to use heterogeneous hardware, programmers must have sufficient technical skills to utilise OpenMP, CUDA, and OpenCL. On the basis of this, we previously proposed environment-adaptive software that enables automatic conversion, configuration, and high performance operation of once-written code, in accordance with the hardware to be placed. However, the source language for offloading was mainly C/C++ language applications, and there was no research into common offloading for various language applications. In this paper, for a new challenge, we study a common method for automatically offloading various language applications in not only C language but also Python and Java. We evaluate the effectiveness of the proposed method in multiple applications of various languages. GRAPHICAL ABSTRACT","PeriodicalId":45411,"journal":{"name":"International Journal of Parallel Emergent and Distributed Systems","volume":"37 1","pages":"22 - 39"},"PeriodicalIF":1.1,"publicationDate":"2021-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45293595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Survey on the benefits of using memristors for PUFs puf用忆阻器的好处调查
IF 1.1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-09-06 DOI: 10.1080/17445760.2021.1972295
Muayad J. Aljafar, J. Acken
This paper reviews memristive PUFs (Physical Unclonable Functions) reported in the literature. The paper explains the motivation for using memristor technology for implementing PUFs. It focuses on PUFs’ applications, sizes, analysis, and physical variations. In addition, the paper presents the number of samples generated using Monte Carlo simulation for evaluating the PUF circuits. This paper also describes the protocols, functionality, and methodologies proposed in the memristive PUF literature. Although memristive PUFs are not commercialized yet, there is a high expectation of exploiting the memristors as fundamental elements in the next generation of hardware security primitives (e.g. PUF) due to their unique characteristics such as forming process, temporal drift, nonlinearity, bidirectionality, nonvolatility and model complexity. There have been some survey papers on memristor PUFs in the past, however, the field has continued to develop so a comprehensive survey including recent publications seemed in order at this time. Lately, memristor technology improvement has accelerated, therefore creating a need for an updated survey of the applications of memristors for PUFs. GRAPHICAL ABSTRACT
本文综述了文献报道的记忆性puf(物理不可克隆功能)。本文解释了使用忆阻器技术实现puf的动机。它侧重于puf的应用、大小、分析和物理变化。此外,本文还介绍了用蒙特卡罗模拟产生的样本数量来评估PUF电路。本文还描述了记忆PUF文献中提出的协议、功能和方法。尽管忆阻PUF尚未商业化,但由于其独特的特性,如形成过程、时间漂移、非线性、双向性、非易失性和模型复杂性,人们对将忆阻器作为下一代硬件安全原语(例如PUF)的基本元素寄予了很高的期望。过去已经有一些关于记忆电阻器puf的调查论文,然而,该领域仍在继续发展,因此在这个时候,包括最近出版物在内的全面调查似乎是有必要的。最近,忆阻器技术的改进已经加速,因此需要对puf的忆阻器应用进行更新的调查。图形抽象
{"title":"Survey on the benefits of using memristors for PUFs","authors":"Muayad J. Aljafar, J. Acken","doi":"10.1080/17445760.2021.1972295","DOIUrl":"https://doi.org/10.1080/17445760.2021.1972295","url":null,"abstract":"This paper reviews memristive PUFs (Physical Unclonable Functions) reported in the literature. The paper explains the motivation for using memristor technology for implementing PUFs. It focuses on PUFs’ applications, sizes, analysis, and physical variations. In addition, the paper presents the number of samples generated using Monte Carlo simulation for evaluating the PUF circuits. This paper also describes the protocols, functionality, and methodologies proposed in the memristive PUF literature. Although memristive PUFs are not commercialized yet, there is a high expectation of exploiting the memristors as fundamental elements in the next generation of hardware security primitives (e.g. PUF) due to their unique characteristics such as forming process, temporal drift, nonlinearity, bidirectionality, nonvolatility and model complexity. There have been some survey papers on memristor PUFs in the past, however, the field has continued to develop so a comprehensive survey including recent publications seemed in order at this time. Lately, memristor technology improvement has accelerated, therefore creating a need for an updated survey of the applications of memristors for PUFs. GRAPHICAL ABSTRACT","PeriodicalId":45411,"journal":{"name":"International Journal of Parallel Emergent and Distributed Systems","volume":"37 1","pages":"40 - 67"},"PeriodicalIF":1.1,"publicationDate":"2021-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45220575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Thermal and energy-aware utilisation management on MPSoC architectures MPSoC架构上的热和能源意识利用率管理
IF 1.1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-09-03 DOI: 10.1080/17445760.2021.1941008
Dulana Rupanetti, Hassan A. Salamy
High operating temperatures have been a major problem in embedded systems due to high throughput and compact designs required by modern applications. This paper introduces a novel strategy to subdue these high peak temperatures of MPSoC systems by incorporating task migration and task swapping, to eliminate hot spots and thermal gradients. The work further confirms that the proposed techniques help mitigate power consumption while maintaining a high throughput to satisfy the deadline requirements of the tasks in the system. A heuristic approach is presented that helps mitigate the hot spots and gradients specifically formed from the high-frequency execution of high-priority tasks. In addition, energy-aware task migration reduced the energy consumption in the system. Extensive experimental testing on actual hardware and simulation showed very plausible results to confirm the capability of the presented techniques to reduce peak temperatures along with reduced energy consumption in the system. The presented techniques performed better than many other standard and state-of-the-art published approaches in the literature. GRAPHICAL ABSTRACT
由于现代应用需要高吞吐量和紧凑的设计,高工作温度一直是嵌入式系统的主要问题。本文介绍了一种新的策略,通过结合任务迁移和任务交换来降低MPSoC系统的高温峰值,以消除热点和热梯度。这项工作进一步证实了所提出的技术有助于降低功耗,同时保持高吞吐量,以满足系统中任务的截止日期要求。提出了一种启发式方法,有助于缓解由高优先级任务的高频执行而形成的热点和梯度。此外,能量感知任务迁移降低了系统的能耗。在实际硬件和仿真上进行的大量实验测试显示了非常可信的结果,以证实所提出的技术能够降低峰值温度并降低系统中的能耗。所提出的技术比文献中许多其他标准和最先进的出版方法表现得更好。图形抽象
{"title":"Thermal and energy-aware utilisation management on MPSoC architectures","authors":"Dulana Rupanetti, Hassan A. Salamy","doi":"10.1080/17445760.2021.1941008","DOIUrl":"https://doi.org/10.1080/17445760.2021.1941008","url":null,"abstract":"High operating temperatures have been a major problem in embedded systems due to high throughput and compact designs required by modern applications. This paper introduces a novel strategy to subdue these high peak temperatures of MPSoC systems by incorporating task migration and task swapping, to eliminate hot spots and thermal gradients. The work further confirms that the proposed techniques help mitigate power consumption while maintaining a high throughput to satisfy the deadline requirements of the tasks in the system. A heuristic approach is presented that helps mitigate the hot spots and gradients specifically formed from the high-frequency execution of high-priority tasks. In addition, energy-aware task migration reduced the energy consumption in the system. Extensive experimental testing on actual hardware and simulation showed very plausible results to confirm the capability of the presented techniques to reduce peak temperatures along with reduced energy consumption in the system. The presented techniques performed better than many other standard and state-of-the-art published approaches in the literature. GRAPHICAL ABSTRACT","PeriodicalId":45411,"journal":{"name":"International Journal of Parallel Emergent and Distributed Systems","volume":"36 1","pages":"449 - 469"},"PeriodicalIF":1.1,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/17445760.2021.1941008","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48563759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Algorithm for identifying clients based on dynamic MAC addresses in narrowly targeted secure networks using deep learning neural networks 基于深度学习神经网络的窄目标安全网络中动态MAC地址的客户端识别算法
IF 1.1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-09-03 DOI: 10.1080/17445760.2021.1941007
A. Tyutyunnik, E. Lobaneva, A. Lazarev
Existing algorithms for identifying clients on a network segment are based on static client binding by MAC address. MAC address generation is based on pseudo-random sequences of 0–256 characters. With this feature in mind, software was developed based on an algorithm for generating MAC addresses using bidirectional neural networks, followed by integration of a decision support system module. A secondary feature of the developed software is the ability to set a MAC validity timeout, which will limit access to the network segment and increase the security factor.
现有的网段客户端识别算法是基于MAC地址静态绑定客户端。MAC地址生成基于0-256个字符的伪随机序列。考虑到这一特点,软件是基于使用双向神经网络生成MAC地址的算法开发的,随后集成了一个决策支持系统模块。开发的软件的第二个特性是能够设置MAC有效期超时,这将限制对网段的访问并增加安全系数。
{"title":"Algorithm for identifying clients based on dynamic MAC addresses in narrowly targeted secure networks using deep learning neural networks","authors":"A. Tyutyunnik, E. Lobaneva, A. Lazarev","doi":"10.1080/17445760.2021.1941007","DOIUrl":"https://doi.org/10.1080/17445760.2021.1941007","url":null,"abstract":"Existing algorithms for identifying clients on a network segment are based on static client binding by MAC address. MAC address generation is based on pseudo-random sequences of 0–256 characters. With this feature in mind, software was developed based on an algorithm for generating MAC addresses using bidirectional neural networks, followed by integration of a decision support system module. A secondary feature of the developed software is the ability to set a MAC validity timeout, which will limit access to the network segment and increase the security factor.","PeriodicalId":45411,"journal":{"name":"International Journal of Parallel Emergent and Distributed Systems","volume":"36 1","pages":"470 - 481"},"PeriodicalIF":1.1,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/17445760.2021.1941007","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43281639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Star structure connectivities of pancake graphs and burnt pancake graphs 煎饼图和烧焦煎饼图的星形结构连通性
IF 1.1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-09-03 DOI: 10.1080/17445760.2021.1941006
Subinur Dilixiati, Eminjan Sabir, J. Meng
Let H be a connected subgraph of a graph G. The H-structure connectivity of G is the cardinality of a minimum set of subgraphs in G, whose deletion disconnects G and every element in the set is isomorphic to H. Similarly, the H-substructure connectivity of G is the cardinality of a minimum set of subgraphs in G, whose deletion disconnects G and every element in the set is isomorphic to a connected subgraph of H. Structure connectivity and substructure connectivity generalise the classic connectivity. Let and be the n-dimensional pancake graph and n-dimensional burnt pancake graph, respectively. In this paper we show , and .
设H是图G的连通子图。G的H-结构连通性是G中最小子图集的基数,其删除断开了G,并且该集中的每个元素都同构于H。类似地,G的H-子结构连通性也是G中最小子集的基数,其删除断开了G,并且集合中的每个元素同构于H的连通子图。结构连通性和子结构连通性推广了经典连通性。设和分别是n维饼图和n维焦饼图。在本文中,我们展示了、和。
{"title":"Star structure connectivities of pancake graphs and burnt pancake graphs","authors":"Subinur Dilixiati, Eminjan Sabir, J. Meng","doi":"10.1080/17445760.2021.1941006","DOIUrl":"https://doi.org/10.1080/17445760.2021.1941006","url":null,"abstract":"Let H be a connected subgraph of a graph G. The H-structure connectivity of G is the cardinality of a minimum set of subgraphs in G, whose deletion disconnects G and every element in the set is isomorphic to H. Similarly, the H-substructure connectivity of G is the cardinality of a minimum set of subgraphs in G, whose deletion disconnects G and every element in the set is isomorphic to a connected subgraph of H. Structure connectivity and substructure connectivity generalise the classic connectivity. Let and be the n-dimensional pancake graph and n-dimensional burnt pancake graph, respectively. In this paper we show , and .","PeriodicalId":45411,"journal":{"name":"International Journal of Parallel Emergent and Distributed Systems","volume":"36 1","pages":"440 - 448"},"PeriodicalIF":1.1,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/17445760.2021.1941006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49082386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
International Journal of Parallel Emergent and Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1