Paper Title |
Authors |
Conference |
Abstract |
|
PCM-Oriented Cache Management Strategies for Solid-Stage Disks |
Hamed Farbeh
Nezam Rohbani
|
سمپوزیوم بینالمللی سیستمها و فنآوریهای بیدرنگ و نهفته RTEST 2018 |
Cache memories are used in flash-based SSDs to improve the performance of disks. Conventional DRAM caches suffer from high energy consumption due to pre-charge and refresh operations and leakage current. ... more
Cache memories are used in flash-based SSDs to improve the performance of disks. Conventional DRAM caches suffer from high energy consumption due to pre-charge and refresh operations and leakage current. In addition, DRAM cells are volatile memories and lose data in power-off. Moreover, according to ITRS, DRAM cells are not scalable below 22nm technology size. Emerging non-volatile memories, e.g. phase-change memory (PCM) offers a near-DRAM performance. In addition, PCM gives non-volatility, negligible leakage power and higher degree of scalability. Two main challenges of exploiting PCM as an alternative to DRAM cells are their limited write endurance and high write latency. This paper proposes a method on how to efficiently manage PCM as a SSD cache. This technique is based on swapping blocks inside a cache set, called Swapped-LRU. This technique reduces the gap between the hottest and coldest line in a set by 7x. In addition, we propose an early write-back technique to improve the cache miss latency. less
Cache memories are used in flash-based SSDs to improve the performance of disks. Conventional DRAM caches suffer from high energy consumption due to pre-charge and refresh operations and leakage current. ... more
|
خرید مقاله
|
Optimizing Embedded Neural Networks Based on Saturated States |
Babak Djalaei
Mostafa E. Salehi
|
سمپوزیوم بینالمللی سیستمها و فنآوریهای بیدرنگ و نهفته RTEST 2018 |
With the expansion of embedded systems and the new applications of these computing systems in Internet of Things, smart homes and sensors, such systems are faced with a large amount ... more
With the expansion of embedded systems and the new applications of these computing systems in Internet of Things, smart homes and sensors, such systems are faced with a large amount of data. Therefore, designing an embedded system for Massive sensor data analysis for detecting a situation and making a decision is becoming more complex. Machine learning algorithms are a promising method for designing such systems. Neural networks are very popular learning systems to be used in data analysis. However, huge computations of the neural networks make them unsuitable for embedded systems which have strict limitations on energy consumption and execution time as the main design concerns. In this paper we propose an optimization for multi-layer perceptron neural networks based on neuron saturation states. Experimental results show that in average 89% of neurons are in saturated state for benchmark applications. Since in a saturated neuron, exact numerical value is not required, predicting the saturation state helps to perform the computation with less effort. The goal of the saturation prediction is to keep accuracy while minimizing the computations. less
With the expansion of embedded systems and the new applications of these computing systems in Internet of Things, smart homes and sensors, such systems are faced with a large amount ... more
|
خرید مقاله
|
Towards Side Channel Secure Cyber-Physical Systems |
Marzieh Ashrafiamiri
Amir Hosein Afandizadeh Zargari
Seyed Mohammad-Hossein Farzam
Siavash Bayat Sarmadi
|
سمپوزیوم بینالمللی سیستمها و فنآوریهای بیدرنگ و نهفته RTEST 2018 |
Smart vehicles are one of the applications of the Internet of Things. Controller area network (CAN) is the standard mean for its communication. The security of CAN is important and ... more
Smart vehicles are one of the applications of the Internet of Things. Controller area network (CAN) is the standard mean for its communication. The security of CAN is important and may be prone to side channel attacks. DPA is one of such attacks, which is considered among the most serious threats against cryptographic devices. Various metrics have been proposed to evaluate the resistance of different implementations against these attacks. Some of these metrics need side-channel attacks to be conducted and depend on the considered power model. Due to the vast variety of proposed side-channel attacks and power models, comprehensively evaluating a design under these metrics is commonly considered to be a tedious task. To alleviate this situation, t-test has been proposed. The non-specific variation of t-test does not need to suppose a power model for leakage assessment. In this paper, we have evaluated three implementations of AES on an FPGA. In the first design, no side-channel countermeasure is implemented while the second and the third implementations make use of masking and shuffling, respectively. Evaluation results show that significant reduction occurs in terms of side-channel leakage when masking or shuffling is applied. Results imply that shuffling and masking are proper choices for area-restricted and time-restricted devices, respectively. less
Smart vehicles are one of the applications of the Internet of Things. Controller area network (CAN) is the standard mean for its communication. The security of CAN is important and ... more
|
خرید مقاله
|
Objective Function: A Key Contributor in Internet of Things Primitive Properties |
Bardia Safaei
Amir Mahdi Hosseini Monazzah
Taha Shahroodi
Alireza Ejlali
|
سمپوزیوم بینالمللی سیستمها و فنآوریهای بیدرنگ و نهفته RTEST 2018 |
With the widespread use of Internet of Things (IoT) in every aspect of human’s daily life, communications of such an enormous amount of existing embedded devices in these systems arise ... more
With the widespread use of Internet of Things (IoT) in every aspect of human’s daily life, communications of such an enormous amount of existing embedded devices in these systems arise many new challenges from power consumption, performance, and reliability perspectives. Communications in an IoT infrastructure are managed by a set of policies which are determined by Objective Functions (OFs). Thus, OFs are the most important contributors in facing with the mentioned challenges. In this paper, due to the lack of information on how OFs affect the primary properties of an IoT infrastructure, we have compared three well-known OFs (OF0, MRHOF, and OFFL) from power consumption, performance, and reliability perspectives. This paper would pave the way for scholars to realize which of the three mentioned areas are more affected by OFs. Our evaluation results on Contiki’s IoT simulation environment (COOJA) illustrate, OFs could affect the power consumption by up to 71.2%, while their impacts on reliability and performance would be as high as 77.5% and 25.15%, respectively. less
With the widespread use of Internet of Things (IoT) in every aspect of human’s daily life, communications of such an enormous amount of existing embedded devices in these systems arise ... more
|
خرید مقاله
|
Resource Management and Control in Virtualized SDN Networks |
Simone Agliano
Mohammad Ashjaei
Moris Behnam
Lucia Lo Bello
|
سمپوزیوم بینالمللی سیستمها و فنآوریهای بیدرنگ و نهفته RTEST 2018 |
Software defined networking and network virtualization are widely considered promising techniques for reducing the complexity of network management in many contexts that require high Quality of Service (QoS) and the ... more
Software defined networking and network virtualization are widely considered promising techniques for reducing the complexity of network management in many contexts that require high Quality of Service (QoS) and the support for heterogeneous architectures. In this paper we address a network architecture, here called a virtualized SDN network that combines the benefits of SDN and virtualization. To cope with the demand for efficiently sharing a platform among several services, here a resource management mechanism to reserve and control network resources among various services in the virtualized SDN networks is proposed. The mechanism is implemented on an SDN controller and a set of experiments show the effectiveness of the proposed approach. less
Software defined networking and network virtualization are widely considered promising techniques for reducing the complexity of network management in many contexts that require high Quality of Service (QoS) and the ... more
|
خرید مقاله
|
A Time-Predictable Fog-Integrated Cloud Framework: One Step Forward in the Deployment of a Smart Factory |
Hamid Reza Faragardi
Saeid Dehnavi
Alessandro V. Papadopoulos
Thomas Nolte
|
سمپوزیوم بینالمللی سیستمها و فنآوریهای بیدرنگ و نهفته RTEST 2018 |
This paper concentrates on cloud computing as one of the principal building blocks of a smart factory to provide a huge data storage space and a highly scalable computational capacity. ... more
This paper concentrates on cloud computing as one of the principal building blocks of a smart factory to provide a huge data storage space and a highly scalable computational capacity. The cloud computing system used in a smart factory should be a time-predictable computing framework to be able to satisfy hard-real requirements of various applications existing in manufacturing systems. Interleaving an intermediate computing layer –called Fog– between a factory and a cloud data center is a promising solution for such a system to deal with the latency requirements of hard real-time applications. In this paper, a time-predictable cloud framework is proposed which is able to satisfy end-to-end latency requirements in a smart factory. To propose such an industrial cloud framework, we not only use the existing real-time technologies such as Industrial Ethernet and Real-time XEN hypervisor, but we also discuss unaddressed challenges. Among the unaddressed challenges, the partitioning of a given workload between a fog platform and a cloud data center is targeted. Addressing the partitioning problem not only provides a resource provisioning mechanism, but also gives us a prominent design decision to know how much computing resource is required to develop a Fog platform, and how large should be the minimum communication bandwidth between a fog and a cloud data center. less
This paper concentrates on cloud computing as one of the principal building blocks of a smart factory to provide a huge data storage space and a highly scalable computational capacity. ... more
|
خرید مقاله
|
A Framework for Reliable and Ubiquitous Inference in Wireless Sensor Network |
Abolhassan Shamsaie
Jafar Habibi
Erfan Abdi
|
سمپوزیوم بینالمللی سیستمها و فنآوریهای بیدرنگ و نهفته RTEST 2018 |
Development of Internet of things (IoT) applications brings a new movement to the functionality of wireless sensor networks (WSNs) from only environment sensing and data gathering to collaborative inferring and ... more
Development of Internet of things (IoT) applications brings a new movement to the functionality of wireless sensor networks (WSNs) from only environment sensing and data gathering to collaborative inferring and ubiquitous intelligence. In intelligent WSNs, nodes collaborate to exchange the information needed to achieve the required inference or smartness. Efficiency or correctness of many smart applications rely on efficient, timely, reliable, and ubiquitous inference of information which may continually change in interaction with other nodes. In this paper, we introduce a framework which provides a generic solution for such common ubiquitous inferences. this framework brings the reliability and ubiquity for inferences using the redundancy characteristic of the gossiping protocols. With this framework the implementation of such inferences and the control of their speed and cost is abstracted by providing the developers with a proposed middleware and some dissemination control services.
We develop a prototype implementation of the proposed framework and a few inference examples on TinyOS to evaluate the effectiveness of the framework and the efficiency of the inferences. To this aim, we utilize TOSSIM simulator in various densities and different number of nodes. Results of the evaluations demonstrate that in all nodes, the inferring time after a change is about a few seconds (less than a minute) and the cost of maintenance in steady state is about a few sends (less than 10) per hour. less
Development of Internet of things (IoT) applications brings a new movement to the functionality of wireless sensor networks (WSNs) from only environment sensing and data gathering to collaborative inferring and ... more
|
خرید مقاله
|
Delayed LMS filters suppressing the RFI in cosmic rays radio detection |
Zbigniew Szadkowski
Anna Szadkowska
|
سمپوزیوم بینالمللی سیستمها و فنآوریهای بیدرنگ و نهفته RTEST 2018 |
The emission of radio waves from Extensive Air Showers (EAS), initiated by ultrahigh-energy cosmic rays, has been attributed to geomagnetic emission and charge excess processes. At frequencies 10-100 MHz this ... more
The emission of radio waves from Extensive Air Showers (EAS), initiated by ultrahigh-energy cosmic rays, has been attributed to geomagnetic emission and charge excess processes. At frequencies 10-100 MHz this process leads to coherent radiation. Nowadays, the radio detection technique is used in many experiments consisting in studying EAS. One of them is the Auger Engineering Radio Array (AERA), located within the Pierre Auger Observatory. The frequency band observed by AERA radio stations is 30-80 MHz. The investigated frequency range is often very contaminated by human-made and narrowband radio frequency interferences (RFI). Suppression of these contaminations is crucial to lower the rate of spurious triggers.
An adaptive filter based on the Least Mean Squares (LMS) algorithm can be an alternative one for currently used IIR-notch non-adaptive filter. The paper presents the 32/64-stage filters based on non-canonical FIR filter implemented into cost-effective Cyclone IV and Cyclone V Altera FPGAs with a sufficient safety margin of the registered performance for the global clock above 200 MHz to obey the Nyguist requirement. less
The emission of radio waves from Extensive Air Showers (EAS), initiated by ultrahigh-energy cosmic rays, has been attributed to geomagnetic emission and charge excess processes. At frequencies 10-100 MHz this ... more
|
خرید مقاله
|
Performance Adaptation of Real-Time Control Tasks by Dynamic Scheduling: A Self-Triggered Control Approach |
Vahid Panahi
|
سمپوزیوم بینالمللی سیستمها و فنآوریهای بیدرنگ و نهفته RTEST 2018 |
Usually real-time control systems are designed by periodic con-trollers with conservative period selection to guarantee the plant stability and control performance. However, in resource-constrained systems, the performance may temporarily degrade ... more
Usually real-time control systems are designed by periodic con-trollers with conservative period selection to guarantee the plant stability and control performance. However, in resource-constrained systems, the performance may temporarily degrade due to disturbances, a matter which could be better managed if there were sufficient resources to select smaller control periods. In this paper, we present a dynamic resource management ap-proach to efficiently distribute the processing power among con-current control tasks to improve the overall system control per-formance. The key idea is to use the self-triggered control ap-proach to postpone the trigger of control tasks for non-disturbed plants and allocate the freed resources to run addi-tional instances of the control tasks of the disturbed plants. We show that this idea improves the overall control performance of the disturbed plants in different scenarios. less
Usually real-time control systems are designed by periodic con-trollers with conservative period selection to guarantee the plant stability and control performance. However, in resource-constrained systems, the performance may temporarily degrade ... more
|
خرید مقاله
|
Probabilistic Analysis of Self-Stabilizing Systems: A Case Study on a Mutual Exclusion Algorithm |
Mehran Alidoost Nia
Fathiyeh Faghih
|
سمپوزیوم بینالمللی سیستمها و فنآوریهای بیدرنگ و نهفته RTEST 2018 |
The heterogeneity in cyber-physical systems (CPS) and the diverse situations that they may face with, along with the environmental hazards raise the need to self-stabilization. The uncertain nature of CPS ... more
The heterogeneity in cyber-physical systems (CPS) and the diverse situations that they may face with, along with the environmental hazards raise the need to self-stabilization. The uncertain nature of CPS necessitates a probabilistic view for analyzing the system stabilization-time that is a highly critical metric in distributed/time-sensitive applications. Calculating the worst-case expected stabilization-time and possible improvements help to have safer designs of CPS applications. In this paper, a mutual exclusion algorithm based on PIF (Propagation of Information with Feedback) self-stabilizing algorithm is selected in synchronous environment as a case study. Using probabilistic analysis, we present a set of guidelines for utilizing this algorithm in time-sensitive applications. We have also utilized an approximation method for improving the scalability of our probabilistic analysis and did a set of experiments to show how this analysis could be used in the design of topologies with the goal of having an optimal worst-case expected stabilization-time. Our results show that using this approach, we can significantly improve the worst-case expected stabilization-time. less
The heterogeneity in cyber-physical systems (CPS) and the diverse situations that they may face with, along with the environmental hazards raise the need to self-stabilization. The uncertain nature of CPS ... more
|
خرید مقاله
|