{"title":"Maximizing Sums of Non-monotone Submodular and Linear Functions: Understanding the Unconstrained Case","authors":"Kobi Bodek, Moran Feldman","doi":"10.48550/arXiv.2204.03412","DOIUrl":"https://doi.org/10.48550/arXiv.2204.03412","url":null,"abstract":"Motivated by practical applications, recent works have considered maximization of sums of a submodular function $g$ and a linear function $ell$. Almost all such works, to date, studied only the special case of this problem in which $g$ is also guaranteed to be monotone. Therefore, in this paper we systematically study the simplest version of this problem in which $g$ is allowed to be non-monotone, namely the unconstrained variant, which we term Regularized Unconstrained Submodular Maximization (RegularizedUSM). Our main algorithmic result is the first non-trivial guarantee for general RegularizedUSM. For the special case of RegularizedUSM in which the linear function $ell$ is non-positive, we prove two inapproximability results, showing that the algorithmic result implied for this case by previous works is not far from optimal. Finally, we reanalyze the known Double Greedy algorithm to obtain improved guarantees for the special case of RegularizedUSM in which the linear function $ell$ is non-negative; and we complement these guarantees by showing that it is not possible to obtain (1/2, 1)-approximation for this case (despite intuitive arguments suggesting that this approximation guarantee is natural).","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131480756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chidambaram Baskaran, Pawan Nayak, R. Manoj, Sampath Shantanu, Karuppiah Aravindhan
{"title":"Key Learnings from Pre-Silicon Safety Compliant Bootrom Firmware Development","authors":"Chidambaram Baskaran, Pawan Nayak, R. Manoj, Sampath Shantanu, Karuppiah Aravindhan","doi":"10.5121/csit.2022.120605","DOIUrl":"https://doi.org/10.5121/csit.2022.120605","url":null,"abstract":"Safety needs of real-time embedded devices are becoming a must in automotive and industrial markets. The BootROM firmware being part of the device drives the need for the firmware to adhere to required safety standards for these end markers. Most software practices for safety compliance assume that software development is carried out once the devices are available. The BootROM firmware development discussed in this paper involves meeting safety compliance need while device on which it is to be executed is being designed concurrently. In this case, the firmware development is done primarily on pre-silicon development environments which are slow and developers have limited access. These aspects present a unique challenge to developing safety compliant BootROM firmware. Hence, it is important to understand the challenges and identify the right methodology for ensuring that the firmware meets the safety compliance with right level of efficiency. The authors in this paper share their learnings from three safety compliant BootROM firmware development and propose an iterative development flow including safety artefacts generation iteratively. Concurrent firmware development along with device design may sound risky for iterative development and one may wonder it may lead to more effort but the learnings suggests that iterative development is ideal. All the three BootROM firmware development has so far not resulted in any critical bugs that needed another update of the firmware and refabrication of the device.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127136376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Build Automation Tools for Software Development","authors":"Mridula Prakash","doi":"10.5121/csit.2022.120608","DOIUrl":"https://doi.org/10.5121/csit.2022.120608","url":null,"abstract":"The automated processes will play an increasingly vital role in continuous integration as the pace of design and development of new software picks up. With the importance of software build automation tools taking center stage, the present paper undertakes a comparative analysis of three best available solutions - Maven, Gradle and Bazel. We aim to evaluate the solutions based on their efficiency and performance in the context of software build automation and deployment. There are some fundamental differences in the way each tools approach builds. The aim of this study is also to provide the reader with a complete overview of the selected build automation tools and, the relevant features and capabilities of interest. In addition, the paper leads to a broader view on the future of the build automation tools ecosystem.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128760295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yahya Aseri, Khalid Alreemy, Salem Alelyani, Mohamed Mohanna
{"title":"Meeting Challenges of Modern Standard Arabic and Saudi Dialect Identification","authors":"Yahya Aseri, Khalid Alreemy, Salem Alelyani, Mohamed Mohanna","doi":"10.5121/csit.2022.120628","DOIUrl":"https://doi.org/10.5121/csit.2022.120628","url":null,"abstract":"Dialect identification is a prior requirement for learning lexical and morphological knowledge a language variation that can be beneficial for natural language processing (NLP) and potential AI downstream tasks. In this paper, we present the first work on sentence-level Modern Standard Arabic (MSA) and Saudi Dialect (SD) identification where we trained and tested three classifiers (Logistic regression, Multi-nominal Na¨ıve Bayes, and Support Vector Machine) on datasets collected from Saudi Twitter and automatically labeled as (MSA) or SD. The model for each configuration was built using two levels of language models, i.e., unigram and bi-gram, as feature sets for training the systems. The model reported high-accuracy performance using 10-fold cross- validations with average 98.98%. This model was evaluated on another unseen, manually-annotated dataset. The best performance of these classifiers was achieved by Multi-nominal Naïve Bayes, reporting 89%.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114702154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust for Big Data Usage in Cloud","authors":"Hazirah Bee Yusof Ali, Lili Marziana Abdullah","doi":"10.5121/csit.2022.120624","DOIUrl":"https://doi.org/10.5121/csit.2022.120624","url":null,"abstract":"Integrating big data with an agile cloud platform can significantly affect how businesses achieve their objectives. Many companies are moving to the cloud, but the trust issue seemed to make a move to the cloud slower. This paper investigated the factors that affect Service Satisfaction that led to Trust. Since the sample was not normally distributed, the researchers used the PLS-SEM tool to analyse the relationship of the variables. The variables are Data Security, Data Privacy, Cloud Benefits, Reputation, Service Level Agreement (SLA), Risk Management, Service Satisfaction and Trust. The variables were linked together based on the analysis from qualitative research supported by theories, and the linkages were being validated through quantitative data analysis. The quantitative data analysis found that Data Security, Cloud Benefits, Reputation and SLA influence Service Satisfaction and Service Satisfaction influences trust.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121389209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meghashyam Ashwathnarayan, V. J, A. Kamath, Jayakrishna Guddeti
{"title":"Virtualised Ecosystem to Envisage Numerous Applications on an Automotive Microcontroller","authors":"Meghashyam Ashwathnarayan, V. J, A. Kamath, Jayakrishna Guddeti","doi":"10.5121/csit.2022.120602","DOIUrl":"https://doi.org/10.5121/csit.2022.120602","url":null,"abstract":"In automotive electronics, new technologies are getting integrated into basic framework creating ways for new software-defined architectures. Virtualization is one of most discussed technologies which will offer a functionality growth into architecture of automobile. This paper introduces concept of validating test cases from multiple IPs on virtualised framework and also investigate the feasibility of implementing protection mechanism on memory segment dedicated for a virtual machine (VM). We describe a proof-of-concept which can be used to promote the use of virtualisation to extend the coverage of post silicon validation. Experimental results are presented as a quantitative evaluation of using virtualization for different testcase scenarios.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115539947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding the Effect of IoT Adoption on the Behavior of Firms: An Agent-based Model","authors":"Riccardo Occa, Francesco Bertolotti","doi":"10.5121/csit.2022.120619","DOIUrl":"https://doi.org/10.5121/csit.2022.120619","url":null,"abstract":"In the context of increasing diffusion of technologies related to Industry 4.0 and the Internet of Things in particular, we have developed an agent-based model to simulate the effect of IoT diffusion in companies and verify potential benefits and risks. The model analyses how firms react to the spread of IoT in the market by analysing its effects on firms' pricing and quality strategies, its impact on variable production costs, and the long-term survival rate of firms. The model shows how IoT diffusion has the potential to influence the market by supporting both quality and cost improvements. The results of the model also confirm the potential for significant benefits for businesses, suggesting the opportunity to support the introduction and application of IoT, and clearly show how the use of IoT can be a key strategic choice in competitive market contexts focused on cost strategies to increase business performance and prospects.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"152 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133523531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Object-Driven Collision Detection with 2D Cameras using Artificial Intelligence and Computer Vision","authors":"Yang Liu, Evan Gunnell, Yu Sun, Hao Zheng","doi":"10.5121/csit.2022.120626","DOIUrl":"https://doi.org/10.5121/csit.2022.120626","url":null,"abstract":"Autonomous driving is one of the most popular technologies in artificial intelligence. Collision detection is an important issue in automatic driving, which is related to the safety of automatic driving. Many collision detection methods have been proposed, but they all have certain limitations and cannot meet the requirements for automatic driving. Camera is one of the most popular methods to detect objects. The obstacle detection of the current camera is mostly completed by two or more cameras (binocular technology) or used in conjunction with other sensors (such as a depth camera) to achieve the purpose of distance detection. In this paper, we propose an algorithm to detect obstacle distances from photos or videos of a single camera.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116676205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leveraging OpenAmp in Embedded Mixed-Safety Critical Systems","authors":"Mridula Prakash","doi":"10.5121/csit.2022.120604","DOIUrl":"https://doi.org/10.5121/csit.2022.120604","url":null,"abstract":"This aim of this paper is to understand OpenAMP framework and provide details on how to use OpenAMP for designing mixed-safety critical systems. OpenAMP is an open-source software framework that provides software components for working with Asymmetric multiprocessing (AMP) systems. The paper explains the software components of OpenAMP and provides details to use OpenAMP for embedded system designs.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126282535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SSL/TLS Encrypted Traffic Application Layer Protocol and Service Classification","authors":"Kunhao Li, B. Lang, Hongyu Liu, Shaojie Chen","doi":"10.5121/csit.2022.120621","DOIUrl":"https://doi.org/10.5121/csit.2022.120621","url":null,"abstract":"Network traffic protocols and service classification are the foundations of network quality of service (QoS) and security technologies, which have attracted increasing attention in recent years. At present, encryption technologies, such as SSL/TLS, are widely used in network transmission, so traditional traffic classification technologies cannot analyze encrypted packet payload. This paper first proposes a two-level application layer protocol classification model that combines packets and sessions information to address this problem. The first level extracts packet features, such as entropy and randomness of ciphertext, and then classifies the protocol. The second level regards the session as a unit and determines the final classification results by voting on the results of the first level. Many application layer protocols only correspond to one specific service, but HTTPS is used for many services. For the HTTPS service classification problem, we combine session features and packet features and establish a service identification model based on CNN-LSTM. We construct a dataset in a laboratory environment. The experimental results show that the proposed method achieves 99.679% and 96.27% accuracy in SSL/TLS application layer protocol classification and HTTPS service classification, respectively. Thus, the service classification model performs better than other existing methods.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129063790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}