Embedded Systems and Applications最新文献

筛选
英文 中文
Maximizing Sums of Non-monotone Submodular and Linear Functions: Understanding the Unconstrained Case 非单调次模函数和线性函数的和最大化:对无约束情况的理解
Embedded Systems and Applications Pub Date : 2022-04-07 DOI: 10.48550/arXiv.2204.03412
Kobi Bodek, Moran Feldman
{"title":"Maximizing Sums of Non-monotone Submodular and Linear Functions: Understanding the Unconstrained Case","authors":"Kobi Bodek, Moran Feldman","doi":"10.48550/arXiv.2204.03412","DOIUrl":"https://doi.org/10.48550/arXiv.2204.03412","url":null,"abstract":"Motivated by practical applications, recent works have considered maximization of sums of a submodular function $g$ and a linear function $ell$. Almost all such works, to date, studied only the special case of this problem in which $g$ is also guaranteed to be monotone. Therefore, in this paper we systematically study the simplest version of this problem in which $g$ is allowed to be non-monotone, namely the unconstrained variant, which we term Regularized Unconstrained Submodular Maximization (RegularizedUSM). Our main algorithmic result is the first non-trivial guarantee for general RegularizedUSM. For the special case of RegularizedUSM in which the linear function $ell$ is non-positive, we prove two inapproximability results, showing that the algorithmic result implied for this case by previous works is not far from optimal. Finally, we reanalyze the known Double Greedy algorithm to obtain improved guarantees for the special case of RegularizedUSM in which the linear function $ell$ is non-negative; and we complement these guarantees by showing that it is not possible to obtain (1/2, 1)-approximation for this case (despite intuitive arguments suggesting that this approximation guarantee is natural).","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131480756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Key Learnings from Pre-Silicon Safety Compliant Bootrom Firmware Development Pre-Silicon Safety Compliant Bootrom固件开发的关键经验
Embedded Systems and Applications Pub Date : 2022-03-26 DOI: 10.5121/csit.2022.120605
Chidambaram Baskaran, Pawan Nayak, R. Manoj, Sampath Shantanu, Karuppiah Aravindhan
{"title":"Key Learnings from Pre-Silicon Safety Compliant Bootrom Firmware Development","authors":"Chidambaram Baskaran, Pawan Nayak, R. Manoj, Sampath Shantanu, Karuppiah Aravindhan","doi":"10.5121/csit.2022.120605","DOIUrl":"https://doi.org/10.5121/csit.2022.120605","url":null,"abstract":"Safety needs of real-time embedded devices are becoming a must in automotive and industrial markets. The BootROM firmware being part of the device drives the need for the firmware to adhere to required safety standards for these end markers. Most software practices for safety compliance assume that software development is carried out once the devices are available. The BootROM firmware development discussed in this paper involves meeting safety compliance need while device on which it is to be executed is being designed concurrently. In this case, the firmware development is done primarily on pre-silicon development environments which are slow and developers have limited access. These aspects present a unique challenge to developing safety compliant BootROM firmware. Hence, it is important to understand the challenges and identify the right methodology for ensuring that the firmware meets the safety compliance with right level of efficiency. The authors in this paper share their learnings from three safety compliant BootROM firmware development and propose an iterative development flow including safety artefacts generation iteratively. Concurrent firmware development along with device design may sound risky for iterative development and one may wonder it may lead to more effort but the learnings suggests that iterative development is ideal. All the three BootROM firmware development has so far not resulted in any critical bugs that needed another update of the firmware and refabrication of the device.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127136376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Build Automation Tools for Software Development 为软件开发构建自动化工具
Embedded Systems and Applications Pub Date : 2022-03-26 DOI: 10.5121/csit.2022.120608
Mridula Prakash
{"title":"Build Automation Tools for Software Development","authors":"Mridula Prakash","doi":"10.5121/csit.2022.120608","DOIUrl":"https://doi.org/10.5121/csit.2022.120608","url":null,"abstract":"The automated processes will play an increasingly vital role in continuous integration as the pace of design and development of new software picks up. With the importance of software build automation tools taking center stage, the present paper undertakes a comparative analysis of three best available solutions - Maven, Gradle and Bazel. We aim to evaluate the solutions based on their efficiency and performance in the context of software build automation and deployment. There are some fundamental differences in the way each tools approach builds. The aim of this study is also to provide the reader with a complete overview of the selected build automation tools and, the relevant features and capabilities of interest. In addition, the paper leads to a broader view on the future of the build automation tools ecosystem.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128760295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meeting Challenges of Modern Standard Arabic and Saudi Dialect Identification 面对现代标准阿拉伯语和沙特方言识别的挑战
Embedded Systems and Applications Pub Date : 2022-03-26 DOI: 10.5121/csit.2022.120628
Yahya Aseri, Khalid Alreemy, Salem Alelyani, Mohamed Mohanna
{"title":"Meeting Challenges of Modern Standard Arabic and Saudi Dialect Identification","authors":"Yahya Aseri, Khalid Alreemy, Salem Alelyani, Mohamed Mohanna","doi":"10.5121/csit.2022.120628","DOIUrl":"https://doi.org/10.5121/csit.2022.120628","url":null,"abstract":"Dialect identification is a prior requirement for learning lexical and morphological knowledge a language variation that can be beneficial for natural language processing (NLP) and potential AI downstream tasks. In this paper, we present the first work on sentence-level Modern Standard Arabic (MSA) and Saudi Dialect (SD) identification where we trained and tested three classifiers (Logistic regression, Multi-nominal Na¨ıve Bayes, and Support Vector Machine) on datasets collected from Saudi Twitter and automatically labeled as (MSA) or SD. The model for each configuration was built using two levels of language models, i.e., unigram and bi-gram, as feature sets for training the systems. The model reported high-accuracy performance using 10-fold cross- validations with average 98.98%. This model was evaluated on another unseen, manually-annotated dataset. The best performance of these classifiers was achieved by Multi-nominal Naïve Bayes, reporting 89%.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114702154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust for Big Data Usage in Cloud 云环境下大数据使用的信任
Embedded Systems and Applications Pub Date : 2022-03-26 DOI: 10.5121/csit.2022.120624
Hazirah Bee Yusof Ali, Lili Marziana Abdullah
{"title":"Trust for Big Data Usage in Cloud","authors":"Hazirah Bee Yusof Ali, Lili Marziana Abdullah","doi":"10.5121/csit.2022.120624","DOIUrl":"https://doi.org/10.5121/csit.2022.120624","url":null,"abstract":"Integrating big data with an agile cloud platform can significantly affect how businesses achieve their objectives. Many companies are moving to the cloud, but the trust issue seemed to make a move to the cloud slower. This paper investigated the factors that affect Service Satisfaction that led to Trust. Since the sample was not normally distributed, the researchers used the PLS-SEM tool to analyse the relationship of the variables. The variables are Data Security, Data Privacy, Cloud Benefits, Reputation, Service Level Agreement (SLA), Risk Management, Service Satisfaction and Trust. The variables were linked together based on the analysis from qualitative research supported by theories, and the linkages were being validated through quantitative data analysis. The quantitative data analysis found that Data Security, Cloud Benefits, Reputation and SLA influence Service Satisfaction and Service Satisfaction influences trust.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121389209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtualised Ecosystem to Envisage Numerous Applications on an Automotive Microcontroller 虚拟生态系统设想在汽车微控制器上的众多应用
Embedded Systems and Applications Pub Date : 2022-03-26 DOI: 10.5121/csit.2022.120602
Meghashyam Ashwathnarayan, V. J, A. Kamath, Jayakrishna Guddeti
{"title":"Virtualised Ecosystem to Envisage Numerous Applications on an Automotive Microcontroller","authors":"Meghashyam Ashwathnarayan, V. J, A. Kamath, Jayakrishna Guddeti","doi":"10.5121/csit.2022.120602","DOIUrl":"https://doi.org/10.5121/csit.2022.120602","url":null,"abstract":"In automotive electronics, new technologies are getting integrated into basic framework creating ways for new software-defined architectures. Virtualization is one of most discussed technologies which will offer a functionality growth into architecture of automobile. This paper introduces concept of validating test cases from multiple IPs on virtualised framework and also investigate the feasibility of implementing protection mechanism on memory segment dedicated for a virtual machine (VM). We describe a proof-of-concept which can be used to promote the use of virtualisation to extend the coverage of post silicon validation. Experimental results are presented as a quantitative evaluation of using virtualization for different testcase scenarios.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115539947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the Effect of IoT Adoption on the Behavior of Firms: An Agent-based Model 理解物联网对企业行为的影响:一个基于主体的模型
Embedded Systems and Applications Pub Date : 2022-03-26 DOI: 10.5121/csit.2022.120619
Riccardo Occa, Francesco Bertolotti
{"title":"Understanding the Effect of IoT Adoption on the Behavior of Firms: An Agent-based Model","authors":"Riccardo Occa, Francesco Bertolotti","doi":"10.5121/csit.2022.120619","DOIUrl":"https://doi.org/10.5121/csit.2022.120619","url":null,"abstract":"In the context of increasing diffusion of technologies related to Industry 4.0 and the Internet of Things in particular, we have developed an agent-based model to simulate the effect of IoT diffusion in companies and verify potential benefits and risks. The model analyses how firms react to the spread of IoT in the market by analysing its effects on firms' pricing and quality strategies, its impact on variable production costs, and the long-term survival rate of firms. The model shows how IoT diffusion has the potential to influence the market by supporting both quality and cost improvements. The results of the model also confirm the potential for significant benefits for businesses, suggesting the opportunity to support the introduction and application of IoT, and clearly show how the use of IoT can be a key strategic choice in competitive market contexts focused on cost strategies to increase business performance and prospects.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"152 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133523531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Object-Driven Collision Detection with 2D Cameras using Artificial Intelligence and Computer Vision 基于人工智能和计算机视觉的二维相机对象驱动碰撞检测
Embedded Systems and Applications Pub Date : 2022-03-26 DOI: 10.5121/csit.2022.120626
Yang Liu, Evan Gunnell, Yu Sun, Hao Zheng
{"title":"An Object-Driven Collision Detection with 2D Cameras using Artificial Intelligence and Computer Vision","authors":"Yang Liu, Evan Gunnell, Yu Sun, Hao Zheng","doi":"10.5121/csit.2022.120626","DOIUrl":"https://doi.org/10.5121/csit.2022.120626","url":null,"abstract":"Autonomous driving is one of the most popular technologies in artificial intelligence. Collision detection is an important issue in automatic driving, which is related to the safety of automatic driving. Many collision detection methods have been proposed, but they all have certain limitations and cannot meet the requirements for automatic driving. Camera is one of the most popular methods to detect objects. The obstacle detection of the current camera is mostly completed by two or more cameras (binocular technology) or used in conjunction with other sensors (such as a depth camera) to achieve the purpose of distance detection. In this paper, we propose an algorithm to detect obstacle distances from photos or videos of a single camera.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116676205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging OpenAmp in Embedded Mixed-Safety Critical Systems 在嵌入式混合安全关键系统中利用OpenAmp
Embedded Systems and Applications Pub Date : 2022-03-26 DOI: 10.5121/csit.2022.120604
Mridula Prakash
{"title":"Leveraging OpenAmp in Embedded Mixed-Safety Critical Systems","authors":"Mridula Prakash","doi":"10.5121/csit.2022.120604","DOIUrl":"https://doi.org/10.5121/csit.2022.120604","url":null,"abstract":"This aim of this paper is to understand OpenAMP framework and provide details on how to use OpenAMP for designing mixed-safety critical systems. OpenAMP is an open-source software framework that provides software components for working with Asymmetric multiprocessing (AMP) systems. The paper explains the software components of OpenAMP and provides details to use OpenAMP for embedded system designs.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126282535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SSL/TLS Encrypted Traffic Application Layer Protocol and Service Classification SSL/TLS加密流量应用层协议与服务分类
Embedded Systems and Applications Pub Date : 2022-03-26 DOI: 10.5121/csit.2022.120621
Kunhao Li, B. Lang, Hongyu Liu, Shaojie Chen
{"title":"SSL/TLS Encrypted Traffic Application Layer Protocol and Service Classification","authors":"Kunhao Li, B. Lang, Hongyu Liu, Shaojie Chen","doi":"10.5121/csit.2022.120621","DOIUrl":"https://doi.org/10.5121/csit.2022.120621","url":null,"abstract":"Network traffic protocols and service classification are the foundations of network quality of service (QoS) and security technologies, which have attracted increasing attention in recent years. At present, encryption technologies, such as SSL/TLS, are widely used in network transmission, so traditional traffic classification technologies cannot analyze encrypted packet payload. This paper first proposes a two-level application layer protocol classification model that combines packets and sessions information to address this problem. The first level extracts packet features, such as entropy and randomness of ciphertext, and then classifies the protocol. The second level regards the session as a unit and determines the final classification results by voting on the results of the first level. Many application layer protocols only correspond to one specific service, but HTTPS is used for many services. For the HTTPS service classification problem, we combine session features and packet features and establish a service identification model based on CNN-LSTM. We construct a dataset in a laboratory environment. The experimental results show that the proposed method achieves 99.679% and 96.27% accuracy in SSL/TLS application layer protocol classification and HTTPS service classification, respectively. Thus, the service classification model performs better than other existing methods.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129063790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信