آرشیو مقالات

عنوان مقاله نویسنده(ها) مربوط به کنفرانس چکیده خرید مقاله
Babak Djalaei, Mostafa E. Salehi
سمپوزیوم بین‌المللی سیستم‌ها و فن‌آوری‌های بی‌درنگ و نهفته RTEST 2018
With the expansion of embedded systems and the new applications of these computing systems in Internet of Things, smart homes and sensors, such systems are faced with a large amount of data. Therefore, designing an embedded system for Massive sensor data analysis for detecting a situation and making a decision is becoming more complex. Machine learning algorithms are a promising method for designing such systems. Neural networks are very popular learning systems to be used in data analysis. However, huge computations of the neural networks make them unsuitable for embedded systems which have strict limitations on energy consumption and execution time as the main design concerns. In this paper we propose an optimization for multi-layer perceptron neural networks based on neuron saturation states. Experimental results show that in average 89% of neurons are in saturated state for benchmark applications. Since in a saturated neuron, exact numerical value is not required, predicting the saturation state helps to perform the computation with less effort. The goal of the saturation prediction is to keep accuracy while minimizing the computations.
Marzieh Ashrafiamiri, Amir Hosein Afandizadeh Zargari, Seyed Mohammad-Hossein Farzam, Siavash Bayat Sarmadi
سمپوزیوم بین‌المللی سیستم‌ها و فن‌آوری‌های بی‌درنگ و نهفته RTEST 2018
Smart vehicles are one of the applications of the Internet of Things. Controller area network (CAN) is the standard mean for its communication. The security of CAN is important and may be prone to side channel attacks. DPA is one of such attacks, which is considered among the most serious threats against cryptographic devices. Various metrics have been proposed to evaluate the resistance of different implementations against these attacks. Some of these metrics need side-channel attacks to be conducted and depend on the considered power model. Due to the vast variety of proposed side-channel attacks and power models, comprehensively evaluating a design under these metrics is commonly considered to be a tedious task. To alleviate this situation, t-test has been proposed. The non-specific variation of t-test does not need to suppose a power model for leakage assessment. In this paper, we have evaluated three implementations of AES on an FPGA. In the first design, no side-channel countermeasure is implemented while the second and the third implementations make use of masking and shuffling, respectively. Evaluation results show that significant reduction occurs in terms of side-channel leakage when masking or shuffling is applied. Results imply that shuffling and masking are proper choices for area-restricted and time-restricted devices, respectively.
Bardia Safaei, Amir Mahdi Hosseini Monazzah, Taha Shahroodi, Alireza Ejlali
سمپوزیوم بین‌المللی سیستم‌ها و فن‌آوری‌های بی‌درنگ و نهفته RTEST 2018
With the widespread use of Internet of Things (IoT) in every aspect of human’s daily life, communications of such an enormous amount of existing embedded devices in these systems arise many new challenges from power consumption, performance, and reliability perspectives. Communications in an IoT infrastructure are managed by a set of policies which are determined by Objective Functions (OFs). Thus, OFs are the most important contributors in facing with the mentioned challenges. In this paper, due to the lack of information on how OFs affect the primary properties of an IoT infrastructure, we have compared three well-known OFs (OF0, MRHOF, and OFFL) from power consumption, performance, and reliability perspectives. This paper would pave the way for scholars to realize which of the three mentioned areas are more affected by OFs. Our evaluation results on Contiki’s IoT simulation environment (COOJA) illustrate, OFs could affect the power consumption by up to 71.2%, while their impacts on reliability and performance would be as high as 77.5% and 25.15%, respectively.
Simone Agliano, Mohammad Ashjaei, Moris Behnam, Lucia Lo Bello
سمپوزیوم بین‌المللی سیستم‌ها و فن‌آوری‌های بی‌درنگ و نهفته RTEST 2018
Software defined networking and network virtualization are widely considered promising techniques for reducing the complexity of network management in many contexts that require high Quality of Service (QoS) and the support for heterogeneous architectures. In this paper we address a network architecture, here called a virtualized SDN network that combines the benefits of SDN and virtualization. To cope with the demand for efficiently sharing a platform among several services, here a resource management mechanism to reserve and control network resources among various services in the virtualized SDN networks is proposed. The mechanism is implemented on an SDN controller and a set of experiments show the effectiveness of the proposed approach.
Hamid Reza Faragardi, Saeid Dehnavi, Alessandro V. Papadopoulos, Thomas Nolte
سمپوزیوم بین‌المللی سیستم‌ها و فن‌آوری‌های بی‌درنگ و نهفته RTEST 2018
This paper concentrates on cloud computing as one of the principal building blocks of a smart factory to provide a huge data storage space and a highly scalable computational capacity. The cloud computing system used in a smart factory should be a time-predictable computing framework to be able to satisfy hard-real requirements of various applications existing in manufacturing systems. Interleaving an intermediate computing layer –called Fog– between a factory and a cloud data center is a promising solution for such a system to deal with the latency requirements of hard real-time applications. In this paper, a time-predictable cloud framework is proposed which is able to satisfy end-to-end latency requirements in a smart factory. To propose such an industrial cloud framework, we not only use the existing real-time technologies such as Industrial Ethernet and Real-time XEN hypervisor, but we also discuss unaddressed challenges. Among the unaddressed challenges, the partitioning of a given workload between a fog platform and a cloud data center is targeted. Addressing the partitioning problem not only provides a resource provisioning mechanism, but also gives us a prominent design decision to know how much computing resource is required to develop a Fog platform, and how large should be the minimum communication bandwidth between a fog and a cloud data center.
Abolhassan Shamsaie, Jafar Habibi, Erfan Abdi
سمپوزیوم بین‌المللی سیستم‌ها و فن‌آوری‌های بی‌درنگ و نهفته RTEST 2018
Development of Internet of things (IoT) applications brings a new movement to the functionality of wireless sensor networks (WSNs) from only environment sensing and data gathering to collaborative inferring and ubiquitous intelligence. In intelligent WSNs, nodes collaborate to exchange the information needed to achieve the required inference or smartness. Efficiency or correctness of many smart applications rely on efficient, timely, reliable, and ubiquitous inference of information which may continually change in interaction with other nodes. In this paper, we introduce a framework which provides a generic solution for such common ubiquitous inferences. this framework brings the reliability and ubiquity for inferences using the redundancy characteristic of the gossiping protocols. With this framework the implementation of such inferences and the control of their speed and cost is abstracted by providing the developers with a proposed middleware and some dissemination control services. We develop a prototype implementation of the proposed framework and a few inference examples on TinyOS to evaluate the effectiveness of the framework and the efficiency of the inferences. To this aim, we utilize TOSSIM simulator in various densities and different number of nodes. Results of the evaluations demonstrate that in all nodes, the inferring time after a change is about a few seconds (less than a minute) and the cost of maintenance in steady state is about a few sends (less than 10) per hour.
Zbigniew Szadkowski, Anna Szadkowska
سمپوزیوم بین‌المللی سیستم‌ها و فن‌آوری‌های بی‌درنگ و نهفته RTEST 2018
The emission of radio waves from Extensive Air Showers (EAS), initiated by ultrahigh-energy cosmic rays, has been attributed to geomagnetic emission and charge excess processes. At frequencies 10-100 MHz this process leads to coherent radiation. Nowadays, the radio detection technique is used in many experiments consisting in studying EAS. One of them is the Auger Engineering Radio Array (AERA), located within the Pierre Auger Observatory. The frequency band observed by AERA radio stations is 30-80 MHz. The investigated frequency range is often very contaminated by human-made and narrowband radio frequency interferences (RFI). Suppression of these contaminations is crucial to lower the rate of spurious triggers. An adaptive filter based on the Least Mean Squares (LMS) algorithm can be an alternative one for currently used IIR-notch non-adaptive filter. The paper presents the 32/64-stage filters based on non-canonical FIR filter implemented into cost-effective Cyclone IV and Cyclone V Altera FPGAs with a sufficient safety margin of the registered performance for the global clock above 200 MHz to obey the Nyguist requirement.
Vahid Panahi
سمپوزیوم بین‌المللی سیستم‌ها و فن‌آوری‌های بی‌درنگ و نهفته RTEST 2018
Usually real-time control systems are designed by periodic con-trollers with conservative period selection to guarantee the plant stability and control performance. However, in resource-constrained systems, the performance may temporarily degrade due to disturbances, a matter which could be better managed if there were sufficient resources to select smaller control periods. In this paper, we present a dynamic resource management ap-proach to efficiently distribute the processing power among con-current control tasks to improve the overall system control per-formance. The key idea is to use the self-triggered control ap-proach to postpone the trigger of control tasks for non-disturbed plants and allocate the freed resources to run addi-tional instances of the control tasks of the disturbed plants. We show that this idea improves the overall control performance of the disturbed plants in different scenarios.
Mehran Alidoost Nia, Fathiyeh Faghih
سمپوزیوم بین‌المللی سیستم‌ها و فن‌آوری‌های بی‌درنگ و نهفته RTEST 2018
The heterogeneity in cyber-physical systems (CPS) and the diverse situations that they may face with, along with the environmental hazards raise the need to self-stabilization. The uncertain nature of CPS necessitates a probabilistic view for analyzing the system stabilization-time that is a highly critical metric in distributed/time-sensitive applications. Calculating the worst-case expected stabilization-time and possible improvements help to have safer designs of CPS applications. In this paper, a mutual exclusion algorithm based on PIF (Propagation of Information with Feedback) self-stabilizing algorithm is selected in synchronous environment as a case study. Using probabilistic analysis, we present a set of guidelines for utilizing this algorithm in time-sensitive applications. We have also utilized an approximation method for improving the scalability of our probabilistic analysis and did a set of experiments to show how this analysis could be used in the design of topologies with the goal of having an optimal worst-case expected stabilization-time. Our results show that using this approach, we can significantly improve the worst-case expected stabilization-time.
Mehrdad Ghorbani, Milad Pasand, Alireza Ghasem Bayati, Neda Baheri
سمپوزیوم بین‌المللی سیستم‌ها و فن‌آوری‌های بی‌درنگ و نهفته RTEST 2018
In this paper, the development of a real-time hardware-in-the-loop (HIL) test for a spacecraft is investigated. The spacecraft mission is to transfer a satellite from 400km circular to 400-7000km elliptical orbit by a small upper stage. The main parts of the mission are de-tumbling, pointing, spin-up, and orbital transfer maneuvers. The developed HIL test aims at demonstrating the performance of the guidance, navigation, and control (GNC) algorithms, simulating the mission operation plan (MOP), completing the end-to-end hardware verification, and testing throughout the whole mission. In the presented framework, four modules are considered: 1) Onboard computer (OBC) and onboard hardware (OBH) module; 2) Onboard software (OBS) module; 3) Flight simulator (FS) module; 4) Logger and command computer (LCC) module. The GNC algorithms and MOP are programmed in the OBC while it communicates with a six degrees of freedom flight simulator, implemented in C# language in the visual studio environment, via CAN bus. The HIL test is performed while sensors have been substituted with dummy thermal samples to simulate their energy consumption function, because the environmental conditions of space and the sensors dependence on the current attitude cannot be duplicated in the laboratory environment. The FS module can be executed in a real-time approach with the frequency of 1 kHz and even faster. All results have been proven to be satisfactory with respect to orbit transfer mission and consequently, the onboard hardware and software are verified to be reliable enough after several repeats of the test.
Farshad Gholami, Niousha Attar, Hassan Haghighi, Mojtaba Vahidi-Asl, Meysam Valueian, Saina Mohamadyari
سمپوزیوم بین‌المللی سیستم‌ها و فن‌آوری‌های بی‌درنگ و نهفته RTEST 2018
Despite great advances in different software testing areas, one important challenge, achieving an automated test oracle, has been overlooked by academia and industry. Among various approaches for constructing a test oracle, machine learning techniques have been successful in recent years. However, there are some situations in which the existing machine learning based oracles have deficiencies. These situations include testing of applications with low observability, such as embedded software and multimedia software programs. There are also cases in testing embedded software in which explicit historical data in form of input-output relationships is not available, and situations in which the comparison between expected results and actual outputs is impossible or hard. Addressing these deficiencies, this paper proposes a new black box solution to construct automated oracles which can be applied to embedded software and other programs with low observability. To achieve this, we employ an Artificial Neural Network (ANN) algorithm to build a model which only requires input values, and the program’s corresponding pass/fail behaviors, as the training set. We have conducted extensive experiments on several benchmarks. The results manifest a higher accuracy of the proposed approach comparing with a well-known machine learning based method.
Ali Behnoudfar
سمپوزیوم بین‌المللی سیستم‌ها و فن‌آوری‌های بی‌درنگ و نهفته RTEST 2018
Real-time systems are increasingly coming to be implemented in multiprocessor and multicore platforms. In order to achieve full performance gain on these platforms, there is a need for an efficient and scalable implementation. One possible source of inefficiency in these platforms is the shared data structure used for interaction and coordination between threads. In order to prevent race condition resulting from concurrent access to these shared data structures, a locking mechanism is usually used, which while providing safety, limits the performance gain, as at any time, data structure can be accessed by at most one thread of execution. Concurrent data structures try to address these issues. In this work shared data structure used in the context of a real-time multicore scheduling in a real-time operating system is changed to a concurrent version to achieve improved performance and scalability in these platforms.
Seyed Hossein Hosseini Zahani
سمپوزیوم بین‌المللی سیستم‌ها و فن‌آوری‌های بی‌درنگ و نهفته RTEST 2018
In this paper, we present an online method in unidirectional IoT systems to synchronize the data streams of multiple sensors, including wearable and environmental. Our proposed method is based on information theory concepts. First we use an entropy-based method to find events on environmental sensors data stream. After that, we use mutual information matching algorithm to find corresponding event in wearable sensors data stream. Indeed, we use physical interactions between wearable and environmental sensors in order to find shared events. Our experiments demonstrate that our proposed method can improve the quality of sensors data stream and therefore it can be used for the monitoring task in unidirectional IoT systems.
Mojtaba Hatami, Mahmoud Naghibzadeh
سمپوزیوم بین‌المللی سیستم‌ها و فن‌آوری‌های بی‌درنگ و نهفته RTEST 2018
Recent trends in real-time systems are towards multicores and parallel processes in the form of directed acyclic graphs. The scheduling aspect of such systems has been worked on and many methods are developed. Nevertheless, the need for more efficient approaches which can use fewer number of cores has not vanished. Semi-partitioned scheduling of hard real-time parallel tasks in multicores is studied in this paper. Since there is no benefit in completing a task much before its deadline, after scheduling a parallel task, if it is beneficial for other tasks, the execution of this task is further moved towards its deadline, i.e., stretching, to make room for tasks with closer deadlines. A new concept, prior+, load of tasks is used to rank all tasks of each directed acyclic graph and order them for scheduling. The scheduler is offline and the schedule map is used during run time. One benefit of this is the reduction of the scheduling overhead during run time which helps to safely accept loads. The comparative evaluations show the algorithms performance is superior to the state of the art ones. It also confirmed that the new concept of prior+ load of a task is very effective in scheduling real-time directed acyclic graphs and suggests that it can as well be useful in scheduling workflows.
Boshra Taheri, Fathiyeh Faghih
سمپوزیوم بین‌المللی سیستم‌ها و فن‌آوری‌های بی‌درنگ و نهفته RTEST 2018
In recent years, Android have become a popular operating system for smartphones. Regarding this growing trend, a wide variety of applications are being developed for this platform. Due to limited energy supply on such smartphones, the energy consumption of an application plays a significant role in users’ satisfaction. Recent studies in this field reveals that a considerable number of applications suffer from energy issues. To this end, we are going to provide a systematic framework for application developers aiming to improve the level of energy consumption in application. In this research, we elaborate a profiling technique in order to model users’ behavior in accordance with how they use the application.
نرجس ظهيري, سيد مهدي وحيدي‌پور, جواد سليمي
بیست و چهارمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
يکي از مسائل مهم در شبکه‌هاي اجتماعي، تشخيص جوامع است که در سال‌هاي اخير روش‌هاي متعددي براي آن ارائه شده است. نظريه بازي‌ها از روش‌هاي نوين در اين زمينه است. در اين مقاله، مسئله تشخيص جوامع هم‌پوشان با استفاده از بازي تشکيل ائتلاف مدل و سپس حل شده است. در جوامع هم‌پوشان هر فرد مي‌تواند عضو چندين گروه باشد. در اين راستا الگوريتمي سلسله مراتبي مبتني بر بازي تشکيل ائتلاف ارائه شده است. از عمده‌ترين نقاط ضعف الگوريتم مورد استفاده، وابستگي بيش از حد آن به يکي از پارامترها مي‌باشد به نحوي که براي ديتاست‌هاي مختلف مقادير متفاوتي دارد. در اين مقاله با بکارگيري معيار فاصله وابستگي به اين پارامتر از بين رفته است. معيار فاصله در تمامي فرمول‌ها تاثير داده شده است و براي اولين بار بازي تشکيل ائتلاف در تشخيص جوامع با استفاده از مفهوم فاصله توسعه داده شده است. علاوه بر از بين بردن حساسيت به پارامتر در الگوريتم جديد، آزمايش‌هاي انجام شده نشان مي‌دهد که کيفيت جوامع تشخيص داده شده به طور ميانگين ۴ درصد بهتر شده است.
فاطمه قوانلوي قاجار, عطيه شريعتي مهر, نرجس خيامي شاد
بیست و چهارمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
تشخيص جامعه در شبکه‌هاي اجتماعي از نظر محاسباتي کاري چالش برانگيز است و توجه محققان زيادي را در دهه اخير به خود جلب کرده است. بيشتر مقالات در اين حوزه بر مدل‌سازي ويژگي‌هاي ساختاري تمرکز کرده‌اند. در اکثر اين مقالات، روش‌ها جوامع را يکي پس از ديگري و به صورت سري يا نوبتي تشخيص مي‌دهند. با هدف افزايش سرعت محاسبات، الگوريتم‌هاي تشخيص جامعه موازي‌سازي شدند. الگوريتم انتشار برچسب (LPA) به دليل بازدهي زماني، روش مؤثري براي موازي‌سازي است. در اين مقاله، اين الگوريتم به صورتي بازنويسي شده است که جوامع همپوشان را تشخيص دهد؛ در جوامع همپوشان يک فرد/گره مي‌تواند همزمان به بيش از يک جامعه متعلق باشد. همچنين، مبتني بر مدل نگاشت - کاهش الگوريتم جديد پياده‌سازي شده است. آزمايش‌هاي طراحي شده نشان مي‌دهد که الگوريتم پياده‌سازي شده از الگوريتم‌هاي مشابه تشخيص جوامع همپوشان مانند LPA، SLPA و COPRA براساس معيار ماژولاريتي کارکرد بهتري دارد.
مهدي سالخورده ‌حقيقي, سيد‌ محمد ابراهيمي
بیست و چهارمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
گزارش‌هاي خبري در رسانه‌هاي اجتماعي و خبري به وسيله تعداد زيادي سند ارائه مي‌شوند و شامل موضوعاتي هستند که جوامع و نظرات مختلف را در برمي‌گيرند. آگاهي از رابطه‌‌ ميان افراد در اسناد مي‌تواند به خوانندگان کمک کند تا يک دانش اوليه در‌خصوص موضوع و هدف در اسناد مختلف به‌دست آورند. در پژوهش حاضر، به بررسي مسئله‌ي تشخيص جوامعي پرداخته خواهد شد که هدف اصلي، خوشه‌بندي افرادي است که نام آن‌ها در مجموعه‌اي از اسناد خبري آورده شده است؛ اين افراد در جوامعي با مواضع مرتبط، خوشه‌بندي مي‌شوند. در اين پژوهش يک روش تشخيص جوامع موضع افراد بهبود يافته مبتني بر شبکه دوستي به نام SCIFNET ارائه شده است. روش پيشنهادي از ساختار الگوريتم ژنتيک جهت اين مهم استفاده نموده است. در آزمايش‌ها معيار صحت به منظور مقايسه استفاده شده است که براي رسيدن به اين مهم از شاخص Rand index (که يک شاخص مهم در ارزيابي کيفيت خوشه‌بندي است) استفاده شده است. نتايج حاصل از آزمايش‌ها که برمبناي پايگاه‌هاي داده‌ي واقعي (اسناد منتشر يافته در رسانه خبري گوگل نيوز در رابطه با يک موضوع خاص) به‌ دست‌ آمده‌اند، حاکي از کارآمدي و بهره‌وري مطلوب روش پيشنهادي است.
محسن جابري, فرزين يغمايي
بیست و چهارمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
بازيابي تصاوير يکي از مهم‌ترين مسائل مطرح شده در حوزه بينايي ماشين مي‌باشد که کاربرد گسترده‌اي در علوم مختلف دارد. چالش‌هاي فراواني در زمينه بازيابي تصاوير براساس محتوا وجود دارد، از جمله آنها مي‌توان به وجود نويز، پس زمينه پيچيده و عدم وجود نور کافي در تصاوير اشاره کرد. براي غلبه بر اين مشکلات بايد ويژگي‌هاي استخراج شده قابليت تمايز خوبي داشته باشند. در اين مقاله از الگوريتم کدگذاري خطي با قيد محلي به منظور استخراج ويژگي از تصاوير براي بازيابي استفاده شده است. در ابتدا ويژگي‌هاي SIFT از تصاوير پايگاه داده استخراج مي‌شوند. سپس ويژگي‌هاي استخراج شده خوشه‌بندي شده و مراکز خوشه‌ها به عنوان نماينده هر دسته انتخاب مي‌شود. پس از خوشه‌بندي توصيفگرها، از ضرايب بازنمايي توصيفگرهاي هر دسته با توجه به نماينده‌هاي توليد شده از مرحله قبل، از الگوريتم کدگذاري خطي با قيد محلي به عنوان ويژگي استفاده مي‌شود. در نهايت از اين ويژگي‌هاي توليد شده براي بازيابي تصاوير استفاده خواهد شد. نتايج آزمايشات روي پايگاه داده Caltech-101 برتري روش ارائه شده را در بازيابي تصاوير نسبت به روش‌هاي مطرح در اين حوزه نشان مي‌دهد.
حامد رضوان‌نيا, غلام‌حسين اکباتاني‌فرد
بیست و چهارمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
با گسترش روزافزون اينترنت اشياء نقش مهم پروتکل مسيريابي شبکه‌هاي کم‌توان و پُر اتلاف، که توسط کارگروه مهندسي اينترنت به‌عنوان يک استاندارد مسيريابي ويژه معرفي گرديده، بيشتر شده است. به‌جهت محدوديت‌هاي ذاتي شبکه‌هاي مبتني بر RPL، اين شبکه‌ها در معرض انواع حملات قرار مي‌گيرند. حتي اگر از مکانيزم‌هاي رمزنگاري به‌عنوان اولين خط دفاعي استفاده شود تنها مي‌توان از حملات خارجي محافظت نمود. هنگامي که گره‌ها به‌عنوان يک مهاجم داخلي در نظر گرفته شوند تکنيک‌هاي رمزنگاري نمي‌توانند هيچ‌گونه محافظتي از شبکه‌ها انجام دهند. يکي از مهم‌ترين و جدي‌ترين اين نوع حملات، حمله سياه‌چاله است که در آن يک گره مهاجم همه بسته‌هايي که تصور مي‌گردد ارسال خواهند شد را حذف مي‌نمايد. معيار مصرف انرژي به‌عنوان يکي از مهم‌ترين محدوديت‌هاي شبکه‌هاي RPL در روش‌هاي ارائه شده کنوني براي مقابله با اين حمله در نظر گرفته نشده است. در اين مقاله يک مکانيزم انرژي‌کارا جهت کاهش اثرات اين حمله با بيشترين نرخ دريافت بسته‌هاي داده و دقت بالا ارائه مي‌گردد. در اين مکانيزم هر گره رفتار مشکوک گره‌هاي همسايه را با شنود چگونگي ارسال و دريافت بسته‌ها تشخيص مي‌دهد. ارزيابي‌هاي انجام شده توسط سيستم‌عامل کانتيکي نشان مي‌دهد مکانيزم فوق داراي نرخ دريافت بسته بالا، تأخير کم و مصرف انرژي مناسب مي‌باشد.
1 124 125 126 127 128 129 130 143