首页 > 最新文献

IEEE Embedded Systems Letters最新文献

英文 中文
Software Synthesis From High-Level Specification for Swarm Robotic Applications 针对蜂群机器人应用的高级规范软件合成
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-12-05 DOI: 10.1109/LES.2023.3339159
Woosuk Kang;EunJin Jeong;Kyonghwan Yoon;Soonhoi Ha
Programming for swarm robots is challenging due to platform diversity and the gap between individual and swarm behaviors. To tackle this challenge, we propose a component-based software synthesis method from a high-level specification. To support heterogeneous robots and maximize code reuse, we adopt a component-based approach that classifies software components into three categories: 1) robot; 2) algorithm; and 3) consensus. We generate a task graph model for an individual robot from a high-level specification and use a software synthesizer to generate the target code from the task graph model. Through a proof-of-concept implementation with a group searching application, the viability of the proposed technique is demonstrated.
由于平台的多样性以及个体行为与群体行为之间的差距,为群体机器人编程具有挑战性。为应对这一挑战,我们提出了一种基于组件的软件合成方法,该方法源自高级规范。为了支持异构机器人并最大限度地实现代码重用,我们采用了一种基于组件的方法,将软件组件分为三类:1) 机器人;2) 算法;3) 共识。我们根据高级规范为单个机器人生成任务图模型,并使用软件合成器根据任务图模型生成目标代码。通过一个群组搜索应用的概念验证实施,证明了所提技术的可行性。
{"title":"Software Synthesis From High-Level Specification for Swarm Robotic Applications","authors":"Woosuk Kang;EunJin Jeong;Kyonghwan Yoon;Soonhoi Ha","doi":"10.1109/LES.2023.3339159","DOIUrl":"https://doi.org/10.1109/LES.2023.3339159","url":null,"abstract":"Programming for swarm robots is challenging due to platform diversity and the gap between individual and swarm behaviors. To tackle this challenge, we propose a component-based software synthesis method from a high-level specification. To support heterogeneous robots and maximize code reuse, we adopt a component-based approach that classifies software components into three categories: 1) robot; 2) algorithm; and 3) consensus. We generate a task graph model for an individual robot from a high-level specification and use a software synthesizer to generate the target code from the task graph model. Through a proof-of-concept implementation with a group searching application, the viability of the proposed technique is demonstrated.","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"16 3","pages":"243-246"},"PeriodicalIF":1.7,"publicationDate":"2023-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Development of Deep Learning-Aided Vision Guidance System for AUV Homing Applications 设计和开发用于自动潜航器寻航应用的深度学习辅助视觉制导系统
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-12-05 DOI: 10.1109/LES.2023.3339145
V. Bala Naga Jyothi;S. Jai Akash;G. Ananda Ramadass;N. Vedachalam;Hrishikesh Venkataraman
In the current subsea industry scenario, autonomous underwater vehicles (AUVs) are widely used for expeditions and explorations. However, the mission duration is limited due to the limitations in the battery capacity. To increase the endurance, there is a need for a submerged docking station (DS) to charge the battery, also to update the next mission profile. In this letter, deep learning (DL) technique aided short-range vision guidance is envisaged for a reliable and precise AUV homing operation. Intelligent control algorithms with an efficient DL-based you only look once (YOLO) v5-image processing techniques are used for DS detection and tracking and deployed in an edge computer integrated into AUV prototype. The developed illuminated DS and AUV prototype with high-definition camera has been demonstrated in test tank at depth of 2 m. An analysis was conducted on the DS data set, which comprised 132 images of clear and turbid water, 13 were designated for testing, 40 for validation, and 79 for training purposes. The results were observed that the probability of detecting the DS is 95%, detection range is 5 m, the probability of homing toward the DS is CEP 90 with the position error of 5% in less-turbid waters and in high-turbid waters, 60% is the probability of DS detection with position error up to 25%, detectable range is 1 m. The proposed embedded hardware is extremely useful for underwater reliable homing applications.
在当前的海底工业领域,自动潜航器(AUV)被广泛用于探险和勘探。然而,由于电池容量的限制,任务持续时间有限。为了延长续航时间,需要一个水下对接站(DS)来为电池充电,同时更新下一次任务的配置文件。在这封信中,我们设想利用深度学习(DL)技术辅助短程视觉制导,实现可靠、精确的 AUV 归航操作。智能控制算法与高效的基于深度学习的只看一次(YOLO)v5 图像处理技术被用于 DS 检测和跟踪,并部署在集成到 AUV 原型的边缘计算机中。已在 2 米深的试验水槽中演示了所开发的带高清摄像头的照明潜水器和自动潜航器原型。对潜水器数据集进行了分析,该数据集包括 132 幅清澈和浑浊水域的图像,其中 13 幅指定用于测试,40 幅用于验证,79 幅用于培训。结果表明,探测到水下摄影机的概率为 95%,探测距离为 5 米;在湍流较小的水域,探测到水下摄影机的概率为 CEP 90,位置误差为 5%;在湍流较大的水域,探测到水下摄影机的概率为 60%,位置误差为 25%,探测距离为 1 米。
{"title":"Design and Development of Deep Learning-Aided Vision Guidance System for AUV Homing Applications","authors":"V. Bala Naga Jyothi;S. Jai Akash;G. Ananda Ramadass;N. Vedachalam;Hrishikesh Venkataraman","doi":"10.1109/LES.2023.3339145","DOIUrl":"https://doi.org/10.1109/LES.2023.3339145","url":null,"abstract":"In the current subsea industry scenario, autonomous underwater vehicles (AUVs) are widely used for expeditions and explorations. However, the mission duration is limited due to the limitations in the battery capacity. To increase the endurance, there is a need for a submerged docking station (DS) to charge the battery, also to update the next mission profile. In this letter, deep learning (DL) technique aided short-range vision guidance is envisaged for a reliable and precise AUV homing operation. Intelligent control algorithms with an efficient DL-based you only look once (YOLO) v5-image processing techniques are used for DS detection and tracking and deployed in an edge computer integrated into AUV prototype. The developed illuminated DS and AUV prototype with high-definition camera has been demonstrated in test tank at depth of 2 m. An analysis was conducted on the DS data set, which comprised 132 images of clear and turbid water, 13 were designated for testing, 40 for validation, and 79 for training purposes. The results were observed that the probability of detecting the DS is 95%, detection range is 5 m, the probability of homing toward the DS is CEP 90 with the position error of 5% in less-turbid waters and in high-turbid waters, 60% is the probability of DS detection with position error up to 25%, detectable range is 1 m. The proposed embedded hardware is extremely useful for underwater reliable homing applications.","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"16 2","pages":"198-201"},"PeriodicalIF":1.6,"publicationDate":"2023-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141182041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ML-Based Trojan Classification: Repercussions of Toxic Boundary Nets 基于 ML 的木马分类:有毒边界网的影响
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-12-04 DOI: 10.1109/LES.2023.3338543
Saleh Mulhem;Felix Muuss;Christian Ewert;Rainer Buchty;Mladen Berekovic
Machine learning (ML) algorithms were recently adapted for testing integrated circuits and detecting potential design backdoors. Such testing mechanisms mainly rely on the available training dataset and the extracted features of the Trojan circuit. In this letter, we demonstrate that this method is attackable by exploiting a structural problem of classifiers for hardware Trojan (HT) detection in gate-level netlists, called the boundary net (BN) problem. There, an adversary modifies the labels of those BNs, connecting the original logic to the Trojan circuit. We show that the proposed adversarial label-flipping attacks (ALFAs) are potentially highly toxic to the accuracy of supervised ML-based Trojan detection approaches. The experimental results indicate that an adversary needs to flip only 0.09% of all labels to achieve an accuracy drop of over 9%, demonstrating one of the most efficient ALFAs in the HT detection research domain.
机器学习(ML)算法最近被用于测试集成电路和检测潜在的设计后门。这种测试机制主要依赖于可用的训练数据集和提取的木马电路特征。在这封信中,我们利用门级网表中硬件木马(HT)检测分类器的一个结构性问题,即边界网(BN)问题,证明这种方法是可以攻击的。在这种情况下,对手会修改这些 BN 的标签,将原始逻辑与木马电路连接起来。我们的研究表明,所提出的对抗性标签翻转攻击(ALFAs)可能会对基于监督式 ML 的木马检测方法的准确性造成严重影响。实验结果表明,对抗者只需翻转所有标签的 0.09%,就能使准确率下降 9% 以上,是 HT 检测研究领域最有效的 ALFA 之一。
{"title":"ML-Based Trojan Classification: Repercussions of Toxic Boundary Nets","authors":"Saleh Mulhem;Felix Muuss;Christian Ewert;Rainer Buchty;Mladen Berekovic","doi":"10.1109/LES.2023.3338543","DOIUrl":"https://doi.org/10.1109/LES.2023.3338543","url":null,"abstract":"Machine learning (ML) algorithms were recently adapted for testing integrated circuits and detecting potential design backdoors. Such testing mechanisms mainly rely on the available training dataset and the extracted features of the Trojan circuit. In this letter, we demonstrate that this method is attackable by exploiting a structural problem of classifiers for hardware Trojan (HT) detection in gate-level netlists, called the boundary net (BN) problem. There, an adversary modifies the labels of those BNs, connecting the original logic to the Trojan circuit. We show that the proposed adversarial label-flipping attacks (ALFAs) are potentially highly toxic to the accuracy of supervised ML-based Trojan detection approaches. The experimental results indicate that an adversary needs to flip only 0.09% of all labels to achieve an accuracy drop of over 9%, demonstrating one of the most efficient ALFAs in the HT detection research domain.","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"16 3","pages":"251-254"},"PeriodicalIF":1.7,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10341539","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142091016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cost-Effective Indoor Surveillance System With Multihop Router Network 利用多跳路由器网络的经济型室内监控系统
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-12-01 DOI: 10.1109/LES.2023.3337432
Debajyoti Biswas;Suvankar Barai
In this letter, a cost-effective sensing-capable multihop router network architecture has been designed for the hotel indoor surveillance system with the help of wemos D1 R2, Arduino Mega, relays, and sensors (WARS). To make each router, there are mainly three components, i.e., one access point (AP), one station (STA), and one controller. These components have different working functionalities. Though we have focused on hotel surveillance systems but the network will be useful for broad application purposes, including home, hospital, restaurant, agriculture, etc., according to the requirement of sensors. To regulate the information of the sensor, a smartphone application (APP) has been designed. With this architecture, the proposed multihop network can increase the regularity performance of the hotel without violating customers’ privacy.
在这封信中,我们借助 wemos D1 R2、Arduino Mega、中继器和传感器(WARS),为酒店室内监控系统设计了一种经济高效的具有传感能力的多跳路由器网络架构。每个路由器主要由三个组件组成,即一个接入点(AP)、一个站点(STA)和一个控制器。这些组件具有不同的工作功能。虽然我们将重点放在酒店监控系统上,但根据传感器的要求,该网络将适用于家庭、医院、餐厅、农业等广泛的应用领域。为了管理传感器的信息,我们设计了一个智能手机应用程序(APP)。通过这种架构,拟议的多跳网络可以在不侵犯客户隐私的情况下提高酒店的正常运行性能。
{"title":"Cost-Effective Indoor Surveillance System With Multihop Router Network","authors":"Debajyoti Biswas;Suvankar Barai","doi":"10.1109/LES.2023.3337432","DOIUrl":"https://doi.org/10.1109/LES.2023.3337432","url":null,"abstract":"In this letter, a cost-effective sensing-capable multihop router network architecture has been designed for the hotel indoor surveillance system with the help of wemos D1 R2, Arduino Mega, relays, and sensors (WARS). To make each router, there are mainly three components, i.e., one access point (AP), one station (STA), and one controller. These components have different working functionalities. Though we have focused on hotel surveillance systems but the network will be useful for broad application purposes, including home, hospital, restaurant, agriculture, etc., according to the requirement of sensors. To regulate the information of the sensor, a smartphone application (APP) has been designed. With this architecture, the proposed multihop network can increase the regularity performance of the hotel without violating customers’ privacy.","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"16 2","pages":"218-221"},"PeriodicalIF":1.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141181889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Embedded Systems Letters Publication Information IEEE嵌入式系统通讯出版信息
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-28 DOI: 10.1109/LES.2023.3328491
{"title":"IEEE Embedded Systems Letters Publication Information","authors":"","doi":"10.1109/LES.2023.3328491","DOIUrl":"https://doi.org/10.1109/LES.2023.3328491","url":null,"abstract":"","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"15 4","pages":"C2-C2"},"PeriodicalIF":1.6,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10330208","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138454429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multistage Multirate Filterbank for FPGA Resource Optimization 用于 FPGA 资源优化的多级多态滤波器库
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-28 DOI: 10.1109/LES.2023.3337323
L. H. Arnaldi
In this letter, the problem of optimization of multirate filterbanks is addressed. The factors that define the efficiency of these multirate systems are investigated and the implementations of structures in stages are analyzed. The latter, together with the polyphase implementations of the filters, allows obtaining optimal filterbanks in the use of resources for the FPGAs.
本信探讨了多级滤波器库的优化问题。研究了决定这些多级系统效率的因素,并分析了分级结构的实现。后者与滤波器的多相实现相结合,可在使用 FPGA 资源时获得最佳滤波器库。
{"title":"Multistage Multirate Filterbank for FPGA Resource Optimization","authors":"L. H. Arnaldi","doi":"10.1109/LES.2023.3337323","DOIUrl":"https://doi.org/10.1109/LES.2023.3337323","url":null,"abstract":"In this letter, the problem of optimization of multirate filterbanks is addressed. The factors that define the efficiency of these multirate systems are investigated and the implementations of structures in stages are analyzed. The latter, together with the polyphase implementations of the filters, allows obtaining optimal filterbanks in the use of resources for the FPGAs.","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"16 3","pages":"259-262"},"PeriodicalIF":1.7,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Vulnerability in Hardware Description Languages: Opcode Language Processing 检测硬件描述语言中的漏洞:操作码语言处理
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-21 DOI: 10.1109/LES.2023.3334728
Alaaddin Goktug Ayar;Abdullah Sahruri;Sercan Aygun;Mehran Shoushtari Moghadam;M. Hassan Najafi;Martin Margala
Detecting vulnerable code blocks has become a highly popular topic in computer-aided design, especially with the advancement of natural language processing (NLP). Analyzing hardware description languages (HDLs), such as Verilog, involves dealing with lengthy code. This letter introduces an innovative identification of attack-vulnerable hardware by the use of opcode processing. Leveraging the advantage of architecturally defined opcodes and expressing all operations at the beginning of each code line, the word processing problem is efficiently transformed into opcode processing. This research converts a benchmark dataset into an intermediary code stack, subsequently classifying secure and fragile codes using NLP techniques. The results reveal a framework that achieves up to 94% accuracy when employing sophisticated convolutional neural networks (CNNs) architecture with extra embedding layers. Thus, it provides a means for users to quickly verify the vulnerability of their HDL code by inspecting a supervised learning model trained on the predefined vulnerabilities. It also supports the superior efficacy of opcode-based processing in Trojan detection by analyzing the outcomes derived from a model trained using the HDL dataset.
检测易受攻击的代码块已成为计算机辅助设计领域的热门话题,尤其是随着自然语言处理技术(NLP)的发展。分析硬件描述语言(HDL),如 Verilog,需要处理冗长的代码。这封信介绍了一种通过使用操作码处理来识别易受攻击硬件的创新方法。利用架构定义操作码的优势,并在每行代码的开头表达所有操作,可以高效地将文字处理问题转化为操作码处理问题。这项研究将基准数据集转换为中间代码堆栈,随后使用 NLP 技术对安全代码和脆弱代码进行分类。研究结果表明,当采用带有额外嵌入层的复杂卷积神经网络(CNN)架构时,该框架的准确率可达 94%。因此,它为用户提供了一种方法,通过检查根据预定义漏洞训练的监督学习模型,快速验证其 HDL 代码的脆弱性。它还通过分析使用 HDL 数据集训练的模型得出的结果,支持基于操作码的处理在木马检测中的卓越功效。
{"title":"Detecting Vulnerability in Hardware Description Languages: Opcode Language Processing","authors":"Alaaddin Goktug Ayar;Abdullah Sahruri;Sercan Aygun;Mehran Shoushtari Moghadam;M. Hassan Najafi;Martin Margala","doi":"10.1109/LES.2023.3334728","DOIUrl":"https://doi.org/10.1109/LES.2023.3334728","url":null,"abstract":"Detecting vulnerable code blocks has become a highly popular topic in computer-aided design, especially with the advancement of natural language processing (NLP). Analyzing hardware description languages (\u0000<monospace>HDLs</monospace>\u0000), such as Verilog, involves dealing with lengthy code. This letter introduces an innovative identification of attack-vulnerable hardware by the use of \u0000<monospace>opcode</monospace>\u0000 processing. Leveraging the advantage of architecturally defined \u0000<monospace>opcodes</monospace>\u0000 and expressing all operations at the beginning of each code line, the word processing problem is efficiently transformed into \u0000<monospace>opcode</monospace>\u0000 processing. This research converts a benchmark dataset into an intermediary code stack, subsequently classifying secure and fragile codes using NLP techniques. The results reveal a framework that achieves up to 94% accuracy when employing sophisticated convolutional neural networks (CNNs) architecture with extra embedding layers. Thus, it provides a means for users to quickly verify the vulnerability of their \u0000<monospace>HDL</monospace>\u0000 code by inspecting a supervised learning model trained on the predefined vulnerabilities. It also supports the superior efficacy of \u0000<monospace>opcode</monospace>\u0000-based processing in Trojan detection by analyzing the outcomes derived from a model trained using the \u0000<monospace>HDL</monospace>\u0000 dataset.","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"16 2","pages":"222-226"},"PeriodicalIF":1.6,"publicationDate":"2023-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141181870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DSCAM: Latency-Guaranteed and High-Capacity Content-Addressable Memory on FPGAs DSCAM:FPGA 上的延迟保证和大容量内容可寻址存储器
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-20 DOI: 10.1109/LES.2023.3334288
Shervin Vakili;Amirhossein Zarei
This letter introduces an original and highly efficient method to implement high-capacity content-addressable memories on field programmable gate arrays (FPGAs). The method includes a new hardware architecture and an optimization technique to determine crucial design parameters. The memory contents are partially synthesized and implemented on FPGA logic fabrics. The proposed architecture offers high throughput and fixed-latency searches. Experimental results show that the proposed method enables the implementation of an IPv4 forwarding table with over 520 K prefixes on a cost-effective AMD-Xilinx UltraScale + FPGA, providing a lookup latency of less than 28 ns and a minimum throughput of 215 million lookups per second. The source code of this work is available on GitHub.
这封信介绍了一种在现场可编程门阵列(FPGA)上实现大容量内容可寻址存储器的高效独创方法。该方法包括一种新的硬件架构和一种用于确定关键设计参数的优化技术。存储器内容在 FPGA 逻辑结构上进行部分合成和实现。所提出的架构可提供高吞吐量和固定延迟搜索。实验结果表明,所提出的方法能够在高性价比的 AMD-Xilinx UltraScale + FPGA 上实现包含超过 520 K 个前缀的 IPv4 转发表,查询延迟小于 28 ns,最低吞吐量为每秒 2.15 亿次查询。这项工作的源代码可在 GitHub 上获取。
{"title":"DSCAM: Latency-Guaranteed and High-Capacity Content-Addressable Memory on FPGAs","authors":"Shervin Vakili;Amirhossein Zarei","doi":"10.1109/LES.2023.3334288","DOIUrl":"https://doi.org/10.1109/LES.2023.3334288","url":null,"abstract":"This letter introduces an original and highly efficient method to implement high-capacity content-addressable memories on field programmable gate arrays (FPGAs). The method includes a new hardware architecture and an optimization technique to determine crucial design parameters. The memory contents are partially synthesized and implemented on FPGA logic fabrics. The proposed architecture offers high throughput and fixed-latency searches. Experimental results show that the proposed method enables the implementation of an IPv4 forwarding table with over 520 K prefixes on a cost-effective AMD-Xilinx UltraScale + FPGA, providing a lookup latency of less than 28 ns and a minimum throughput of 215 million lookups per second. The source code of this work is available on GitHub.","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"16 2","pages":"182-185"},"PeriodicalIF":1.6,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141181890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sec-NoC: A Lightweight Secure Communication System for On-Chip Interconnects Sec-NoC:用于片上互连的轻量级安全通信系统
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-16 DOI: 10.1109/LES.2023.3333561
Syam Sankar;Ruchika Gupta;John Jose;Sukumar Nandi
Modern multicore processors use network-on-chip (NoC) as the communication backbone. With aggressive product release deadlines due to competition from peers, the usage of third-party intellectual property (IP) blocks for NoCs is a common practice. Hardware Trojans in NoC can lead to performance degradation and the exposure of sensitive information through data leakage. We address this problem by devising a secure, lightweight cryptosystem called secure NoC (Sec-NoC) to be used for on-chip communications, ensuring confidentiality and integrity. The Sec-NoC implements authenticated packet encryption as well as an integrity check at network interfaces. The recovery from faults is facilitated by injecting NACKs and retransmissions into the network. Unlike the existing works, a key-encapsulation method is also discussed for sharing the symmetric key between two nodes. Experimental results show that the Sec-NoC experiences a latency overhead of 1.3% only with minimal area and power overhead.
现代多核处理器使用片上网络(NoC)作为通信骨干。由于同行竞争激烈,产品发布期限紧迫,在 NoC 中使用第三方知识产权(IP)模块已成为一种普遍做法。NoC 中的硬件木马会导致性能下降,并通过数据泄漏暴露敏感信息。为了解决这个问题,我们设计了一种安全、轻量级的密码系统,称为安全 NoC(Sec-NoC),用于片上通信,确保保密性和完整性。Sec-NoC 实现了经过验证的数据包加密以及网络接口的完整性检查。通过在网络中注入 NACK 和重传,可以帮助从故障中恢复。与现有研究不同,本文还讨论了在两个节点之间共享对称密钥的密钥封装方法。实验结果表明,Sec-NoC 的延迟开销仅为 1.3%,而面积和功耗开销却很小。
{"title":"Sec-NoC: A Lightweight Secure Communication System for On-Chip Interconnects","authors":"Syam Sankar;Ruchika Gupta;John Jose;Sukumar Nandi","doi":"10.1109/LES.2023.3333561","DOIUrl":"https://doi.org/10.1109/LES.2023.3333561","url":null,"abstract":"Modern multicore processors use network-on-chip (NoC) as the communication backbone. With aggressive product release deadlines due to competition from peers, the usage of third-party intellectual property (IP) blocks for NoCs is a common practice. Hardware Trojans in NoC can lead to performance degradation and the exposure of sensitive information through data leakage. We address this problem by devising a secure, lightweight cryptosystem called secure NoC (Sec-NoC) to be used for on-chip communications, ensuring confidentiality and integrity. The Sec-NoC implements authenticated packet encryption as well as an integrity check at network interfaces. The recovery from faults is facilitated by injecting NACKs and retransmissions into the network. Unlike the existing works, a key-encapsulation method is also discussed for sharing the symmetric key between two nodes. Experimental results show that the Sec-NoC experiences a latency overhead of 1.3% only with minimal area and power overhead.","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"16 2","pages":"214-217"},"PeriodicalIF":1.6,"publicationDate":"2023-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141182030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CollectiveHLS: Ultrafast Knowledge-Based HLS Design Optimization CollectiveHLS:基于知识的超快 HLS 设计优化
IF 1.6 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-07 DOI: 10.1109/LES.2023.3330610
Aggelos Ferikoglou;Andreas Kakolyris;Vasilis Kypriotis;Dimosthenis Masouros;Dimitrios Soudris;Sotirios Xydis
High-level synthesis (HLS) has democratized field programmable gate arrays (FPGAs) by enabling high-level device programmability and rapid microarchitecture customization through the use of directives. Nevertheless, the manual selection of the appropriate directives, i.e., the annotations included in the high-level source code to instruct the synthesis process, is a difficult task for programmers without a hardware background. In this letter, we present CollectiveHLS, an ultrafast knowledge-based HLS design optimization method that automatically extracts the most promising directive configurations and applies them to the original source code. The proposed optimization scheme is a fully data-driven approach for generalized HLS tuning, as it is not based on quality of result models or meta-heuristics. We design, implement, and evaluate our method with more than 100 applications of Machsuite, Rodinia, and GitHub on a ZCU104 FPGA. We achieve an average geometric mean speedup of x14.1 and x10.5 compared to the unoptimized, i.e., without HLS directives and optimized designs, a high design feasibility score, and an average inference latency of 38 ms.
高级综合(HLS)通过使用指令实现高级器件可编程性和快速微体系结构定制,从而使现场可编程门阵列(FPGA)平民化。然而,对于没有硬件背景的程序员来说,手动选择合适的指令(即包含在高级源代码中用于指导综合过程的注释)是一项艰巨的任务。在这封信中,我们介绍了一种基于知识的超快 HLS 设计优化方法 CollectiveHLS,它能自动提取最有前途的指令配置,并将其应用到原始源代码中。所提出的优化方案是一种完全由数据驱动的通用 HLS 调整方法,因为它不是基于结果质量模型或元启发式方法。我们在 ZCU104 FPGA 上用 Machsuite、Rodinia 和 GitHub 的 100 多个应用程序设计、实现和评估了我们的方法。与未优化(即不使用 HLS 指令)和优化设计相比,我们实现了 x14.1 和 x10.5 的平均几何平均速度提升、较高的设计可行性得分以及 38 毫秒的平均推理延迟。
{"title":"CollectiveHLS: Ultrafast Knowledge-Based HLS Design Optimization","authors":"Aggelos Ferikoglou;Andreas Kakolyris;Vasilis Kypriotis;Dimosthenis Masouros;Dimitrios Soudris;Sotirios Xydis","doi":"10.1109/LES.2023.3330610","DOIUrl":"10.1109/LES.2023.3330610","url":null,"abstract":"High-level synthesis (HLS) has democratized field programmable gate arrays (FPGAs) by enabling high-level device programmability and rapid microarchitecture customization through the use of directives. Nevertheless, the manual selection of the appropriate directives, i.e., the annotations included in the high-level source code to instruct the synthesis process, is a difficult task for programmers without a hardware background. In this letter, we present CollectiveHLS, an ultrafast knowledge-based HLS design optimization method that automatically extracts the most promising directive configurations and applies them to the original source code. The proposed optimization scheme is a fully data-driven approach for generalized HLS tuning, as it is not based on quality of result models or meta-heuristics. We design, implement, and evaluate our method with more than 100 applications of Machsuite, Rodinia, and GitHub on a ZCU104 FPGA. We achieve an average geometric mean speedup of x14.1 and x10.5 compared to the unoptimized, i.e., without HLS directives and optimized designs, a high design feasibility score, and an average inference latency of 38 ms.","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"16 2","pages":"235-238"},"PeriodicalIF":1.6,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135508131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Embedded Systems Letters
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1