首页 > 最新文献

Microprocessors and Microsystems最新文献

英文 中文
Fault modeling for external energy or internal cell defect in quantum dot cellular automata 量子点元胞自动机中外部能量或内部细胞缺陷的故障建模
IF 2.6 4区 计算机科学 Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.1016/j.micpro.2023.104948
Debajyoty Banik

Nanotechnology has made the circuits more susceptible to errors. It takes a lot of space and power to make sequential reversible circuits testable using one of the conventional methods (such as cascading gates with the original circuit). I suggest a superior testing strategy for sequential circuits based on conservative logic. The primary goal of this effort is to create a testable sequential circuit that is compact in terms of circuit area and other cost parameters. My method does not require changing the original circuit. So, incorporating testable features using the proposed method does not affect the complexity of the overall circuit. In this work, stuck-at-fault modeling for external unwanted energy or internal cell defect in low-power molecular QCA is also derived. The reversible double-edge triggered (DET) flip-flop is tested using the suggested approach. The proposed methodology can still be applied to achieve 100% fault coverage for unidirectional stuck-at-fault in quantum cellular automata (QCA) designs. The design is assigned into practice using a layered technique since it is more reliable and economical.

纳米技术使电路更容易出错。使用一种常规方法(如与原始电路的级联门)对顺序可逆电路进行测试需要大量的空间和功率。我提出了一种基于保守逻辑的顺序电路的优越测试策略。这项工作的主要目标是创建一个可测试的顺序电路,在电路面积和其他成本参数方面是紧凑的。我的方法不需要改变原来的电路。因此,使用所提出的方法合并可测试特征不会影响整个电路的复杂性。本文还建立了小功率分子QCA中外部多余能量或内部细胞缺陷的故障卡滞模型。采用该方法对可逆双边缘触发触发器进行了测试。所提出的方法仍然可以应用于量子元胞自动机(QCA)设计中单向故障卡滞的100%故障覆盖率。由于分层技术更可靠和经济,因此设计被分配到实践中。
{"title":"Fault modeling for external energy or internal cell defect in quantum dot cellular automata","authors":"Debajyoty Banik","doi":"10.1016/j.micpro.2023.104948","DOIUrl":"https://doi.org/10.1016/j.micpro.2023.104948","url":null,"abstract":"<div><p>Nanotechnology has made the circuits more susceptible to errors. It takes a lot of space and power to make sequential reversible circuits testable using one of the conventional methods (such as cascading gates with the original circuit). I suggest a superior testing strategy for sequential circuits based on conservative logic. The primary goal of this effort is to create a testable sequential circuit that is compact in terms of circuit area and other cost parameters. My method does not require changing the original circuit. So, incorporating testable features using the proposed method does not affect the complexity of the overall circuit. In this work, stuck-at-fault modeling for external unwanted energy or internal cell defect in low-power molecular QCA is also derived. The reversible double-edge triggered (DET) flip-flop is tested using the suggested approach. The proposed methodology can still be applied to achieve 100% fault coverage for unidirectional stuck-at-fault in quantum cellular automata (QCA) designs. The design is assigned into practice using a layered technique since it is more reliable and economical.</p></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92046144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction notice to the articles published in the special issue embedded system from “Microprocessors and Microsystems” 《微处理器与微系统》嵌入式系统专刊文章撤回通知
IF 2.6 4区 计算机科学 Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.1016/j.micpro.2023.104972
{"title":"Retraction notice to the articles published in the special issue embedded system from “Microprocessors and Microsystems”","authors":"","doi":"10.1016/j.micpro.2023.104972","DOIUrl":"https://doi.org/10.1016/j.micpro.2023.104972","url":null,"abstract":"","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S014193312300217X/pdfft?md5=de0c28b605a9506bcca421fc6c60a2e5&pid=1-s2.0-S014193312300217X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138471765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction notice to “Applications of internet of things (IOT) to improve the stability of a grid connected power system using interline power flow controller” [Microprocessors and Microsystems 76 (2020) 103038] 关于“物联网(IOT)在利用线间潮流控制器提高并网电力系统稳定性中的应用”的撤回通知[微处理器与微系统76 (2020)103038]
IF 2.6 4区 计算机科学 Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.1016/j.micpro.2023.104941
G. Radhakrishnan , V. Gopalakrishnan
{"title":"Retraction notice to “Applications of internet of things (IOT) to improve the stability of a grid connected power system using interline power flow controller” [Microprocessors and Microsystems 76 (2020) 103038]","authors":"G. Radhakrishnan ,&nbsp;V. Gopalakrishnan","doi":"10.1016/j.micpro.2023.104941","DOIUrl":"10.1016/j.micpro.2023.104941","url":null,"abstract":"","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0141933123001850/pdfft?md5=9c39cd78c348dc2f5f482827c00f13ab&pid=1-s2.0-S0141933123001850-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135371225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental EMFI detection on a RISC-V core using the Trace Verifier solution 使用跟踪验证解决方案在RISC-V核心上进行实验性EMFI检测
IF 2.6 4区 计算机科学 Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.1016/j.micpro.2023.104968
Anthony Zgheib, Olivier Potin, Jean-Baptiste Rigaud, Jean-Max Dutertre

Physical attacks are powerful threats that can cause changes in the execution behavior of a program. Control-Flow Integrity (CFI) is used to check the program’s flow execution, ensuring that it remains unaltered by these attacks. The RISC-V Trace Encoder (TE) provides valuable information about the user program’s execution path, and is used as part of a CFI solution. An enhanced version of the TE specifications permits detecting intricate fault models such as the corruption of any discontinuity instruction, using an additional Trace Verifier (TV) hardware module. In this paper, we present a buffer overflow software attack simulation and experimental ElectroMagnetic Fault Injection (EMFI) attacks conducted on an Field Programmable Gate Array (FPGA) board that implements a RISC-V core linked to the enhanced TE and TV modules. Unlike existing CFI solutions, our proposed approach does not require modifications to the RISC-V compiler, user application code or the RISC-V core. The average overhead of our solution in terms of hardware area, memory and power consumption are equal to 13.6%, 3.5% and 9% respectively.

物理攻击是一种强大的威胁,可以导致程序的执行行为发生变化。控制流完整性(CFI)用于检查程序的流执行,确保它不受这些攻击的影响。RISC-V跟踪编码器(TE)提供有关用户程序执行路径的宝贵信息,并作为CFI解决方案的一部分使用。TE规范的增强版本允许检测复杂的故障模型,例如使用额外的跟踪验证器(TV)硬件模块检测任何不连续指令的损坏。在本文中,我们提出了一种缓冲溢出软件攻击仿真和实验性电磁故障注入(EMFI)攻击,该攻击在现场可编程门阵列(FPGA)板上进行,该板实现了与增强型TE和TV模块相连的RISC-V核心。与现有的CFI解决方案不同,我们提出的方法不需要修改RISC-V编译器、用户应用程序代码或RISC-V核心。我们的解决方案在硬件面积、内存和功耗方面的平均开销分别为13.6%、3.5%和9%。
{"title":"Experimental EMFI detection on a RISC-V core using the Trace Verifier solution","authors":"Anthony Zgheib,&nbsp;Olivier Potin,&nbsp;Jean-Baptiste Rigaud,&nbsp;Jean-Max Dutertre","doi":"10.1016/j.micpro.2023.104968","DOIUrl":"https://doi.org/10.1016/j.micpro.2023.104968","url":null,"abstract":"<div><p>Physical attacks are powerful threats that can cause changes in the execution behavior of a program. Control-Flow Integrity (CFI) is used to check the program’s flow execution, ensuring that it remains unaltered by these attacks. The RISC-V Trace Encoder (TE) provides valuable information about the user program’s execution path, and is used as part of a CFI solution. An enhanced version of the TE specifications permits detecting intricate fault models such as the corruption of any discontinuity instruction, using an additional Trace Verifier (TV) hardware module. In this paper, we present a buffer overflow software attack simulation and experimental ElectroMagnetic Fault Injection (EMFI) attacks conducted on an Field Programmable Gate Array (FPGA) board that implements a RISC-V core linked to the enhanced TE and TV modules. Unlike existing CFI solutions, our proposed approach does not require modifications to the RISC-V compiler, user application code or the RISC-V core. The average overhead of our solution in terms of hardware area, memory and power consumption are equal to 13.6%, 3.5% and 9% respectively.</p></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91959632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fischer machine learning for mobile cloud computing in eHealth systems using blockchain mechanism Fischer机器学习在电子医疗系统中使用区块链机制进行移动云计算
IF 2.6 4区 计算机科学 Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.1016/j.micpro.2023.104969
Nithya Rekha Sivakumar , Sara Abdelwahab Ghorashi , Nada Ahmed , Hafiza Elbadie Ahmed Elsrej , Shakila Basheer

The Electronic Healthcare (eHealth) systems are competent to ensure effective care engineering and intensified healthcare quality which are user-friendly cache and administration, in Electronic Health Records (EHRs). For secure EHRs of Mobile Cloud-based eHealth systems, ensuring high security and data privacy, Interplanetary File System in healthcare has traditionally been concentrated. However, there has been a recent push towards achieving high quality of e-health services because blockchain-based health care applications require QoS guarantees in terms of requirements such as network latency and end-to-end delay. In this work, an Extended Validation Certification-based Fischer Neural Network Optimization (EVC-FNNO) method for secured Mobile Cloud-based E-Health Systems is proposed. With the identity being the digital certificate, the EVC is provided with the identity to the mobile cloud user who will transact in the network. In this way, the mobile cloud user is being ensured to access the ledger for the transaction. Therefore, both data privacy and security is said to be provided. Next, with Fischer Neural Network Optimization (FNNO), every authenticated mobile cloud user via EVC then possess a copy of shared ledger, therefore resolving data acquisition in cloud server and hence solving network latency. The proposed method is verified by some demonstrative examples in addressing QoS. The empirical results show that the EVC-FNNO method provides an efficient solution by validating the mobile cloud user sensitive health information with digital certificate. Security analysis proves that the EVC-FNNO method is secure. We also conduct comprehensive performance evaluations that demonstrate the high efficiency of the EVC-FNNO method in terms of end-to-end delay, network latency and data privacy, compared to the existing data sharing methods.

电子医疗(eHealth)系统能够在电子健康记录(EHRs)中确保有效的护理工程和增强的医疗质量,这些都是用户友好的缓存和管理。为了确保基于移动云的电子医疗系统的安全,确保高安全性和数据隐私,星际文件系统在医疗保健领域一直是传统的重点。然而,最近一直在推动实现高质量的电子医疗服务,因为基于区块链的医疗保健应用需要在网络延迟和端到端延迟等要求方面提供QoS保证。在这项工作中,提出了一种基于扩展验证认证的Fischer神经网络优化(EVC-FNNO)方法,用于安全的基于移动云的电子医疗系统。身份作为数字证书,EVC向在网络中进行交易的移动云用户提供身份。通过这种方式,确保移动云用户能够访问交易的分类账。因此,数据隐私和安全都被认为是提供的。接下来,通过Fischer Neural Network Optimization (FNNO),每个通过EVC认证的移动云用户都拥有一份共享账本副本,从而解决云服务器上的数据采集问题,从而解决网络延迟问题。通过实例验证了该方法在QoS寻址中的有效性。实证结果表明,EVC-FNNO方法通过数字证书对移动云用户的敏感健康信息进行验证,提供了一种有效的解决方案。安全性分析证明EVC-FNNO方法是安全的。我们还进行了综合性能评估,与现有的数据共享方法相比,EVC-FNNO方法在端到端延迟、网络延迟和数据隐私方面具有很高的效率。
{"title":"Fischer machine learning for mobile cloud computing in eHealth systems using blockchain mechanism","authors":"Nithya Rekha Sivakumar ,&nbsp;Sara Abdelwahab Ghorashi ,&nbsp;Nada Ahmed ,&nbsp;Hafiza Elbadie Ahmed Elsrej ,&nbsp;Shakila Basheer","doi":"10.1016/j.micpro.2023.104969","DOIUrl":"https://doi.org/10.1016/j.micpro.2023.104969","url":null,"abstract":"<div><p>The Electronic Healthcare (eHealth) systems are competent to ensure effective care engineering and intensified healthcare quality which are user-friendly cache and administration, in Electronic Health Records (EHRs). For secure EHRs of Mobile Cloud-based eHealth systems, ensuring high security and data privacy, Interplanetary File System in healthcare has traditionally been concentrated. However, there has been a recent push towards achieving high quality of e-health services because blockchain-based health care applications require QoS guarantees in terms of requirements such as network latency and end-to-end delay. In this work, an Extended Validation Certification-based Fischer Neural Network Optimization (EVC-FNNO) method for secured Mobile Cloud-based E-Health Systems is proposed. With the identity being the digital certificate, the EVC is provided with the identity to the mobile cloud user who will transact in the network. In this way, the mobile cloud user is being ensured to access the ledger for the transaction. Therefore, both data privacy and security is said to be provided. Next, with Fischer Neural Network Optimization (FNNO), every authenticated mobile cloud user via EVC then possess a copy of shared ledger, therefore resolving data acquisition in cloud server and hence solving network latency. The proposed method is verified by some demonstrative examples in addressing QoS. The empirical results show that the EVC-FNNO method provides an efficient solution by validating the mobile cloud user sensitive health information with digital certificate. Security analysis proves that the EVC-FNNO method is secure. We also conduct comprehensive performance evaluations that demonstrate the high efficiency of the EVC-FNNO method in terms of end-to-end delay, network latency and data privacy, compared to the existing data sharing methods.</p></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91959633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction notice to “Application of Machine Learning and Big Data in Doubly Fed Induction Generator based Stability Analysis of Multi Machine System using Substantial Transformative Optimization Algorithm” [Microprocessors and Microsystems 73 (2020) 102971] “机器学习和大数据在基于双馈感应发电机的多机系统稳定性分析中的应用”[微处理器与微系统]73 (2020)102971]
IF 2.6 4区 计算机科学 Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.1016/j.micpro.2023.104942
V. Subha Seethalakshmi , R. Karthigaivel , N. Vengadachalam , S. Selvakumaran
{"title":"Retraction notice to “Application of Machine Learning and Big Data in Doubly Fed Induction Generator based Stability Analysis of Multi Machine System using Substantial Transformative Optimization Algorithm” [Microprocessors and Microsystems 73 (2020) 102971]","authors":"V. Subha Seethalakshmi ,&nbsp;R. Karthigaivel ,&nbsp;N. Vengadachalam ,&nbsp;S. Selvakumaran","doi":"10.1016/j.micpro.2023.104942","DOIUrl":"10.1016/j.micpro.2023.104942","url":null,"abstract":"","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0141933123001862/pdfft?md5=a48894a240cf9261b64bd305c867c9f7&pid=1-s2.0-S0141933123001862-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135411776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploration of optimal functional Trojan-resistant hardware intellectual property (IP) core designs during high level synthesis 在高级合成过程中探索最优功能抗特洛伊木马硬件知识产权(IP)核心设计
IF 2.6 4区 计算机科学 Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.1016/j.micpro.2023.104973
Anirban Sengupta, Aditya Anshul, Rahul Chaurasia

Hardware Trojans that have the capability to change the computed functional output in intellectual property (IP) cores, integrated into computing systems can be a vital reliability concern in the context of correct system operation. Therefore, determining an optimal Trojan-resistant hardware design architecture that considers multi-objective orthogonal parameters such as area and delay is crucial. This paper presents a novel exploration of optimal hardware IP core design methodology with Trojan defense capability (i.e., detection and isolation) during high level synthesis (HLS) that provides isolation of functional Trojan in a system design to ensure reliable and correct functional behavior. The proposed methodology is robust and provides the capability to yield the correct output value using HLS-based triple modular redundancy (TMR) logic and a distinct multivendor allocation policy. Therefore, the proposed HLS methodology can generate an optimal hardware IP core/system-on-chip (SoC) design with functional Trojan defense capability. The paper presents an overall flow of the proposed methodology along with a demonstrative case study on designing optimal Trojan resistant finite impulse response filter (FIR) hardware SoC design. Results of the proposed approach are evaluated in terms of design cost, convergence time, security and optimality analysis, and comparison with prior works. The proposed approach is able to generate fully functional Trojan-resistant optimal SoC designs with minimum overhead, as evident from optimality analysis and design cost.

硬件木马具有改变知识产权(IP)核心中计算功能输出的能力,集成到计算系统中,在正确的系统操作上下文中可能是一个重要的可靠性问题。因此,确定一个考虑多目标正交参数(如面积和延迟)的最佳抗特洛伊木马硬件设计架构至关重要。本文提出了一种新颖的探索,在高层次合成(HLS)过程中具有特洛伊木马防御能力(即检测和隔离)的最佳硬件IP核设计方法,该方法在系统设计中提供功能性特洛伊木马的隔离,以确保可靠和正确的功能行为。所提出的方法具有鲁棒性,并提供了使用基于hls的三模冗余(TMR)逻辑和独特的多供应商分配策略产生正确输出值的能力。因此,提出的HLS方法可以生成具有特洛伊木马防御能力的最佳硬件IP核/片上系统(SoC)设计。本文介绍了该方法的总体流程以及设计最佳抗特洛伊木马有限脉冲响应滤波器(FIR)硬件SoC设计的示范案例研究。本文从设计成本、收敛时间、安全性和最优性分析等方面对该方法进行了评价,并与前人的研究成果进行了比较。从最优性分析和设计成本可以看出,所提出的方法能够以最小的开销生成功能齐全的抗特洛伊木马优化SoC设计。
{"title":"Exploration of optimal functional Trojan-resistant hardware intellectual property (IP) core designs during high level synthesis","authors":"Anirban Sengupta,&nbsp;Aditya Anshul,&nbsp;Rahul Chaurasia","doi":"10.1016/j.micpro.2023.104973","DOIUrl":"https://doi.org/10.1016/j.micpro.2023.104973","url":null,"abstract":"<div><p>Hardware Trojans that have the capability to change the computed functional output in intellectual property (IP) cores, integrated into computing systems can be a vital reliability concern in the context of correct system operation. Therefore, determining an optimal Trojan-resistant hardware design architecture that considers multi-objective orthogonal parameters such as area and delay is crucial. This paper presents a novel exploration of optimal hardware IP core design methodology with Trojan defense capability (<em>i.e.,</em> detection and isolation) during high level synthesis (HLS) that provides isolation of functional Trojan in a system design to ensure reliable and correct functional behavior. The proposed methodology is robust and provides the capability to yield the correct output value using HLS-based triple modular redundancy (TMR) logic and a distinct multivendor allocation policy. Therefore, the proposed HLS methodology can generate an optimal hardware IP core/system-on-chip (SoC) design with functional Trojan defense capability. The paper presents an overall flow of the proposed methodology along with a demonstrative case study on designing optimal Trojan resistant finite impulse response filter (FIR) hardware SoC design. Results of the proposed approach are evaluated in terms of design cost, convergence time, security and optimality analysis, and comparison with prior works. The proposed approach is able to generate fully functional Trojan-resistant optimal SoC designs with minimum overhead, as evident from optimality analysis and design cost.</p></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134656190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vision-based robotics using open FPGAs 使用开放式fpga的基于视觉的机器人
IF 2.6 4区 计算机科学 Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.1016/j.micpro.2023.104974
Felipe Machado , Rubén Nieto , Jesús Fernández-Conde , David Lobato , José M. Cañas

Robotics increasingly provides practical applications for society, such as manufacturing, autonomous driving, robot vacuum cleaners, robots in logistics, drones for inspection, etc. Typical requirements in this field are fast response time, low power consumption, parallelism, and flexibility. According to these features, FPGAs are a suitable computing substrate for robots. A few vendors have dominated the FPGA market with their proprietary tools and hardware devices, resulting in fragmented ecosystems with few standards and little interoperation. New and complete open toolchains for FPGAs are emerging from the open-source community. This article presents an open-source library of Verilog modules useful for vision-based robots, including reusable image processing blocks for perception and reactive control blocks. This library has been developed using open tools, but its Verilog modules are fully compatible with any proprietary toolchain. In addition, three applications with a real robot and open FPGAs have been developed for experimental validation using this library. In the last application, the mobile robot successfully follows a colored object using two low-cost cameras (to increase the robot’s field of view) and includes a third camera on top of a servo-driven turret for tracking a second independent object while following the first one in parallel. Resource consumption of all applications has been measured and compared with state-of-the-art proprietary toolchains, revealing that reconfigurable computing with open FPGAs using open tools is now an attractive alternative to designing and creating intelligent vision-based robotic applications using vendor-dependent proprietary tools and FPGAs.

机器人技术越来越多地为社会提供实际应用,例如制造业、自动驾驶、机器人吸尘器、物流机器人、用于检查的无人机等。该领域的典型要求是快速响应时间、低功耗、并行性和灵活性。根据这些特点,fpga是一种适合机器人的计算基板。少数供应商凭借其专有的工具和硬件设备主导了FPGA市场,导致了缺乏标准和互操作性的支离破碎的生态系统。新的和完整的fpga开放工具链正在从开源社区中出现。本文介绍了一个对基于视觉的机器人有用的Verilog模块的开源库,包括用于感知的可重用图像处理块和反应性控制块。这个库是使用开放工具开发的,但它的Verilog模块与任何专有工具链完全兼容。此外,还利用该库开发了三个具有真实机器人和开放式fpga的应用程序,以进行实验验证。在最后一个应用中,移动机器人使用两个低成本的摄像头(增加机器人的视野)成功地跟踪了一个彩色物体,并在伺服驱动的炮塔顶部包括第三个摄像头,用于在平行跟踪第一个物体的同时跟踪第二个独立物体。对所有应用程序的资源消耗进行了测量,并与最先进的专有工具链进行了比较,结果表明,使用开放工具的开放式fpga的可重构计算现在是使用依赖于供应商的专有工具和fpga设计和创建基于视觉的智能机器人应用程序的有吸引力的替代方案。
{"title":"Vision-based robotics using open FPGAs","authors":"Felipe Machado ,&nbsp;Rubén Nieto ,&nbsp;Jesús Fernández-Conde ,&nbsp;David Lobato ,&nbsp;José M. Cañas","doi":"10.1016/j.micpro.2023.104974","DOIUrl":"https://doi.org/10.1016/j.micpro.2023.104974","url":null,"abstract":"<div><p>Robotics increasingly provides practical applications for society, such as manufacturing, autonomous driving, robot vacuum cleaners, robots in logistics, drones for inspection, etc. Typical requirements in this field are fast response time, low power consumption, parallelism, and flexibility. According to these features, FPGAs are a suitable computing substrate for robots. A few vendors have dominated the FPGA market with their proprietary tools and hardware devices, resulting in fragmented ecosystems with few standards and little interoperation. New and complete open toolchains for FPGAs are emerging from the open-source community. This article presents an open-source library of Verilog modules useful for vision-based robots, including reusable image processing blocks for perception and reactive control blocks. This library has been developed using open tools, but its Verilog modules are fully compatible with any proprietary toolchain. In addition, three applications with a real robot and open FPGAs have been developed for experimental validation using this library. In the last application, the mobile robot successfully follows a colored object using two low-cost cameras (to increase the robot’s field of view) and includes a third camera on top of a servo-driven turret for tracking a second independent object while following the first one in parallel. Resource consumption of all applications has been measured and compared with state-of-the-art proprietary toolchains, revealing that reconfigurable computing with open FPGAs using open tools is now an attractive alternative to designing and creating intelligent vision-based robotic applications using vendor-dependent proprietary tools and FPGAs.</p></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0141933123002193/pdfft?md5=944968e7587656838631a9dd978cf062&pid=1-s2.0-S0141933123002193-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134656018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Network-on-Chip using metaheuristic algorithms: A comprehensive survey 利用元启发式算法优化片上网络:一个全面的调查
IF 2.6 4区 计算机科学 Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.1016/j.micpro.2023.104970
Mohammad Masdari , Sultan Noman Qasem , Hao-Ting Pai

Network on Chip (NoC) is an interesting technology that benefits from several processing elements and the necessary communication facilities, to provide an answer to the ever-growing need for more processing power. Metaheuristic algorithms are important tools that have been used for dealing with various NP-hard problems in different domains. Such algorithms are also widely used in the NoC context by many frameworks for optimizing various characteristics of the NoC environments. Nonetheless, there is a lack of a comprehensive survey to put forward a thorough study of such schemes. To fill this gap, this article presents a comprehensive survey and classification of the metaheuristic-based schemes designed for various NoC topologies. For this purpose, first, some background knowledge is provided which helps to understand the studied schemes. Then, a taxonomy of the investigated approaches based on their applied metaheuristic algorithms is presented and in each category, schemes are studied and their main contributions and properties as well as their limitations are discussed. At last, a comparison of the techniques, tools, and methods that have been used in the studied schemes are provided along with the concluding remarks and future research directions.

片上网络(NoC)是一项有趣的技术,它受益于几个处理元件和必要的通信设施,以满足日益增长的对更多处理能力的需求。元启发式算法是处理不同领域中各种np困难问题的重要工具。这些算法也被许多框架广泛应用于NoC环境中,用于优化NoC环境的各种特征。然而,缺乏一项全面的调查来提出对这些计划的深入研究。为了填补这一空白,本文对针对各种NoC拓扑设计的基于元启发式的方案进行了全面的调查和分类。为此,首先提供一些背景知识,这有助于理解所研究的方案。然后,根据应用的元启发式算法对所研究的方法进行了分类,并在每个类别中对方案进行了研究,讨论了它们的主要贡献和性质以及它们的局限性。最后,对研究方案中使用的技术、工具和方法进行了比较,并给出了结论和未来的研究方向。
{"title":"Optimizing Network-on-Chip using metaheuristic algorithms: A comprehensive survey","authors":"Mohammad Masdari ,&nbsp;Sultan Noman Qasem ,&nbsp;Hao-Ting Pai","doi":"10.1016/j.micpro.2023.104970","DOIUrl":"https://doi.org/10.1016/j.micpro.2023.104970","url":null,"abstract":"<div><p>Network on Chip (NoC) is an interesting technology that benefits from several processing elements and the necessary communication facilities, to provide an answer to the ever-growing need for more processing power. Metaheuristic algorithms are important tools that have been used for dealing with various NP-hard problems in different domains. Such algorithms are also widely used in the NoC context by many frameworks for optimizing various characteristics of the NoC environments. Nonetheless, there is a lack of a comprehensive survey to put forward a thorough study of such schemes. To fill this gap, this article presents a comprehensive survey and classification of the metaheuristic-based schemes designed for various NoC topologies. For this purpose, first, some background knowledge is provided which helps to understand the studied schemes. Then, a taxonomy of the investigated approaches based on their applied metaheuristic algorithms is presented and in each category, schemes are studied and their main contributions and properties as well as their limitations are discussed. At last, a comparison of the techniques, tools, and methods that have been used in the studied schemes are provided along with the concluding remarks and future research directions.</p></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92046110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SmartDelta project: Automated quality assurance and optimization across product versions and variants SmartDelta项目:跨产品版本和变体的自动化质量保证和优化
IF 2.6 4区 计算机科学 Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.1016/j.micpro.2023.104967
Mehrdad Saadatmand , Muhammad Abbas , Eduard Paul Enoiu , Bernd-Holger Schlingloff , Wasif Afzal , Benedikt Dornauer , Michael Felderer

Software systems are often built in increments with additional features or enhancements on top of existing products. This incremental development may result in the deterioration of certain quality aspects. In other words, the software can be considered an evolving entity emanating different quality characteristics as it gets updated over time with new features or deployed in different operational environments. Approaching software development with this mindset and awareness regarding quality evolution over time can be a key factor for the long-term success of a company in today’s highly competitive market of industrial software-intensive products. Therefore, it is important to be able to accurately analyze and determine the quality implications of each change and increment to a software system. To address this challenge, the multinational SmartDelta project develops automated solutions for the quality assessment of product deltas in a continuous engineering environment. The project provides smart analytics from development artifacts and system executions, offering insights into quality degradation or improvements across different product versions, and providing recommendations for the next builds. This paper presents the challenges in incremental software development tackled in the scope of the SmartDelta project, and the solutions that are produced and planned in the project, along with the industrial impact of the project for software-intensive industrial systems.

软件系统通常以增量的方式构建,在现有产品的基础上增加附加功能或增强功能。这种增量开发可能会导致某些质量方面的恶化。换句话说,软件可以被认为是一个不断发展的实体,随着时间的推移,随着新特性的更新或在不同的操作环境中部署,它会发出不同的质量特征。在当今高度竞争的工业软件密集型产品市场中,以这种心态和意识来进行软件开发是公司长期成功的关键因素。因此,能够准确地分析和确定软件系统的每个变更和增量的质量含义是很重要的。为了应对这一挑战,跨国公司SmartDelta项目开发了自动化解决方案,用于在连续工程环境中对产品delta进行质量评估。该项目从开发工件和系统执行中提供智能分析,提供跨不同产品版本的质量退化或改进的见解,并为下一个构建提供建议。本文介绍了在SmartDelta项目范围内解决的增量软件开发中的挑战,以及项目中产生和计划的解决方案,以及项目对软件密集型工业系统的工业影响。
{"title":"SmartDelta project: Automated quality assurance and optimization across product versions and variants","authors":"Mehrdad Saadatmand ,&nbsp;Muhammad Abbas ,&nbsp;Eduard Paul Enoiu ,&nbsp;Bernd-Holger Schlingloff ,&nbsp;Wasif Afzal ,&nbsp;Benedikt Dornauer ,&nbsp;Michael Felderer","doi":"10.1016/j.micpro.2023.104967","DOIUrl":"https://doi.org/10.1016/j.micpro.2023.104967","url":null,"abstract":"<div><p>Software systems are often built in increments with additional features or enhancements on top of existing products. This incremental development may result in the deterioration of certain quality aspects. In other words, the software can be considered an evolving entity emanating different quality characteristics as it gets updated over time with new features or deployed in different operational environments. Approaching software development with this mindset and awareness regarding quality evolution over time can be a key factor for the long-term success of a company in today’s highly competitive market of industrial software-intensive products. Therefore, it is important to be able to accurately analyze and determine the quality implications of each change and increment to a software system. To address this challenge, the multinational SmartDelta project develops automated solutions for the quality assessment of product deltas in a continuous engineering environment. The project provides smart analytics from development artifacts and system executions, offering insights into quality degradation or improvements across different product versions, and providing recommendations for the next builds. This paper presents the challenges in incremental software development tackled in the scope of the SmartDelta project, and the solutions that are produced and planned in the project, along with the industrial impact of the project for software-intensive industrial systems.</p></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0141933123002119/pdfft?md5=f2f4c77923b79d0a277b67398c986b39&pid=1-s2.0-S0141933123002119-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92046145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Microprocessors and Microsystems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1