{"title":"Hard Real-Time scheduling on a multicore platform","authors":"Guillaume Vigeant, A. Beaulieu, S. Givigi","doi":"10.1109/SYSCON.2015.7116771","DOIUrl":"https://doi.org/10.1109/SYSCON.2015.7116771","url":null,"abstract":"Multicore microcontrollers are rapidly penetrating the real-time systems market with a promise of increased processing throughput and lower energy consumption compared to traditional single-core processors. Consequently, it sparked a wave of research in Soft Real-Time (SRT) scheduling algorithms for multicore processors producing many different scheduling algorithms that are good at harnessing the added power of the multicore processors but lack the required determinism to be used in Hard Real-Time (HRT) systems.We present the Multicore Priority Ceiling Protocol scheduling algorithm for HRT systems along with its schedulability test for HRT systems running on a single instance of a modified RTOS. We also developed a tool that uses our schedulability test to solve the task partitioning problem using a Particle Swarm Optimization.","PeriodicalId":251318,"journal":{"name":"2015 Annual IEEE Systems Conference (SysCon) Proceedings","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117057714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Data-Forwarding based channel condition acknowledgment for Cognitive Radio Mobility Based Routing","authors":"Y. Sun, Roujia Sun, Fenyu Jiang, C. Phillips","doi":"10.1109/SYSCON.2015.7116829","DOIUrl":"https://doi.org/10.1109/SYSCON.2015.7116829","url":null,"abstract":"This paper proposes an Data-Forwarding based multiple-channel selection scheme for CRMBR (Cognitive Radio Mobility Based Routing Protocol) [1] in CR enabled Mobile Ad Hoc Networks (CRMANET). Meanwhile in the new scheme, nodes along the route do not send ACKs in MAC layer for acknowledging successful transmission between two neighbors. Instead, the CR function allows the previous hop to understand the transmission results, together with the real time multi-channel conditions. This proposal significantly reduces the required bandwidth through ACK message suppression. Simulation results show that the feedback of multiple-channel conditions also benefits the channel selection mechanism before data transmission therefore improving the network throughput by around 5% compared to the traditional MAC ACK scheme in CRMBR.","PeriodicalId":251318,"journal":{"name":"2015 Annual IEEE Systems Conference (SysCon) Proceedings","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121605361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Backtracking Search Optimization Algorithm-based approach to PID controller tuning for torque motor systems","authors":"R. Precup, A. Balint, M. Radac, E. Petriu","doi":"10.1109/SYSCON.2015.7116740","DOIUrl":"https://doi.org/10.1109/SYSCON.2015.7116740","url":null,"abstract":"This paper suggests the Backtracking Search Optimization Algorithm (BSOA)-based tuning of the parameters of proportional-integral-derivative (PID) controllers for a pancake direct current (DC) torque motor systems. These motors are important in the framework of Diesel engine exhaust gas recirculation valves in automotive applications. The BSOAs solve optimization problems that minimize objective functions expressed as the weighted sum of overshoot plus the integral of squared control error. The parameters of the PID controllers are the elements of the vector variables of the objective functions. The impact of the parameter that controls the amplitude of the search direction matrix is analyzed in terms of a digitally simulated case study that performs the shaft angle control.","PeriodicalId":251318,"journal":{"name":"2015 Annual IEEE Systems Conference (SysCon) Proceedings","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125551881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"System risk analysis enhanced with system graph properties","authors":"Floriane Brunetto, Julien Peuch, S. Bassetto","doi":"10.1109/SYSCON.2015.7116766","DOIUrl":"https://doi.org/10.1109/SYSCON.2015.7116766","url":null,"abstract":"Classical failure modes and effects analyses are known to be tedious activities and perceived by design teams as reengineering efforts. This research investigates a new manner to cut down side effects of classical risks analyses. It proposes to use the complexity measure of the underlying graph of the system being designed, to infer information about risks. To do so, the research method is three-folded: (1) a literature review is made to select relevant risk analyses and graph methodologies employed during design to ground our proposal (2) the proposal is built (3) the feasibility of this concept is tested over a real product design. The main result of this paper is to unveil a new manner to consider risks for improving their control during design stages.","PeriodicalId":251318,"journal":{"name":"2015 Annual IEEE Systems Conference (SysCon) Proceedings","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114537484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strategic frequency adaptation for mid-range magnetic induction-based Wireless Underground Sensor Networks","authors":"Agnelo R. Silva, M. Moghaddam","doi":"10.1109/SYSCON.2015.7116842","DOIUrl":"https://doi.org/10.1109/SYSCON.2015.7116842","url":null,"abstract":"Some classes of sensing applications target scenarios where the overall system, including antenna and energy sub-system, is placed under the ground, through concrete, or under-the-debris (disaster scenario). A real-time soil moisture sensing system deployed at the root zone of a crop area for precise irrigation and an oil pipeline leak detection (PLD) system are particular examples of interest discussed in this work. Communication solutions for these scenarios have been recently investigated in the Wireless Underground Sensor Networks (WUSN) literature and magnetic induction (MI) technology is usually regarded as the best candidate for low-power and mid-range (i.e., 15..30m) wireless underground communication. Nonetheless, underground MI systems are still significantly impacted by changes at the electrical properties of the medium surrounding the MI nodes, such as due to the soil moisture variability. The design of a MI system for the worst-case scenario (e.g., high soil moisture) is a strategic approach but it may significantly reduce the application bandwidth. Therefore, the dynamic frequency adaptation has the potential of balancing robustness and higher bandwidth for MI-WUSNs. In this work, a novel design procedure is proposed for the optimization problem of selecting the proper operational frequency for MI-WUSN nodes according to the medium conditions.","PeriodicalId":251318,"journal":{"name":"2015 Annual IEEE Systems Conference (SysCon) Proceedings","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126249895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Rad, Mohan Muppidi, A. Jaimes, S. Agaian, M. Jamshidi
{"title":"A novel image encryption method to reduce decryption execution time in cloud","authors":"P. Rad, Mohan Muppidi, A. Jaimes, S. Agaian, M. Jamshidi","doi":"10.1109/SYSCON.2015.7116797","DOIUrl":"https://doi.org/10.1109/SYSCON.2015.7116797","url":null,"abstract":"Parallel computing on cloud infrastructure had gained tremendous attention and popularity in recent years. In this paper, we propose a new technique to encrypt an image for secure image transmission and parallel decryption using cloud resources. The encoding of the image is done using the FFT conjugate complex property and private random phase key value shared between sender and receiver. First, using FFT complex conjugate property, we construct a two dimensional matrix consisting of real and imaginary portion of the image. Second, we encrypt the complex conjugate matrix using private random phase key value shared between sender and receiver. Detailed simulations have been carried out to test the encryption algorithm. Furthermore, we use cloud resources for the development of an efficient parallel image encryption and decryption algorithm. Significant speedup was achieved using different image size and number of cloud servers.","PeriodicalId":251318,"journal":{"name":"2015 Annual IEEE Systems Conference (SysCon) Proceedings","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133492795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending design space optimization heuristics for use with stochastic colored Petri nets","authors":"C. Bodenstein, A. Zimmermann","doi":"10.1109/SYSCON.2015.7116742","DOIUrl":"https://doi.org/10.1109/SYSCON.2015.7116742","url":null,"abstract":"Automatic design optimization of complex systems is a time-consuming task. This paper presents multiphase variants of well-known heuristics for an efficient indirect system optimization with simulation. The tradeoff between accuracy and achievable speedup is analyzed for examples including a benchmark function as well as simulated values for a stochastic colored Petri net application. The analysis are carried out with TOE (TimeNET optimization environment), a software prototype implemented for this task recently.","PeriodicalId":251318,"journal":{"name":"2015 Annual IEEE Systems Conference (SysCon) Proceedings","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129962849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huan Lin, Ji Wu, Chunchun Yuan, Yaping Luo, M. Brand, Luc Engelen
{"title":"A systematic approach for safety evidence collection in the safety-critical domain","authors":"Huan Lin, Ji Wu, Chunchun Yuan, Yaping Luo, M. Brand, Luc Engelen","doi":"10.1109/SYSCON.2015.7116751","DOIUrl":"https://doi.org/10.1109/SYSCON.2015.7116751","url":null,"abstract":"In order to show that the required safety objectives are met, it is necessary to collect safety evidence in the form of consistent and complete data. However, manual safety evidence collection is usually tedious and time-consuming, due to a large number of artifacts and implicit relations between them. The potential ambiguities in the textual description of safety objectives even increase the difficulties of collecting the necessary safety evidence. Consequently, suppliers, who have to ensure that the required objectives have been fulfilled, need to investigate safety evidence requirements very carefully and rigorously to avoid collecting any ineffective information, or missing any important information. This paper proposes a systematic, model-based approach to facilitate manual safety evidence collection with clear evidence requirements. To evaluate the effectiveness of our approach, an industrial case study on an avionics Real-Time Operating System (RTOS) is conducted. A large number of evidence items are collected from thousands of artifacts (involving more than 10,000 test cases and nearly thousand pages of requirement specification), for demonstrating the compliance of system development with the avionic safety standard RTCA DO-178C.","PeriodicalId":251318,"journal":{"name":"2015 Annual IEEE Systems Conference (SysCon) Proceedings","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129545623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Benavidez, Mohan Muppidi, P. Rad, John J. Prevost, M. Jamshidi, L. Brown
{"title":"Cloud-based realtime robotic Visual SLAM","authors":"P. Benavidez, Mohan Muppidi, P. Rad, John J. Prevost, M. Jamshidi, L. Brown","doi":"10.1109/SYSCON.2015.7116844","DOIUrl":"https://doi.org/10.1109/SYSCON.2015.7116844","url":null,"abstract":"Prior work has shown that Visual SLAM (VSLAM) algorithms can successfully be used for realtime processing on local robots. As the data processing requirements increase, due to image size or robot velocity constraints, local processing may no longer be practical. Offloading the VSLAM processing to systems running in a cloud deployment of Robot Operating System (ROS) is proposed as a method for managing increasing processing constraints. The traditional bottleneck with VSLAM performing feature identification and matching across a large database. In this paper, we present a system and algorithms to reduce computational time and storage requirements for feature identification and matching components of VSLAM by offloading the processing to a cloud comprised of a cluster of compute nodes. We compare this new approach to our prior approach where only the local resources of the robot were used, and examine the increase in throughput made possible with this new processing architecture.","PeriodicalId":251318,"journal":{"name":"2015 Annual IEEE Systems Conference (SysCon) Proceedings","volume":"125 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133799855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thamer F. Alrowili, Mutlaq B. Al-Otaibi, Mohammed S. Alharbi
{"title":"Predicting citizens' acceptance of M-government services in Saudi Arabia an empirical investigation","authors":"Thamer F. Alrowili, Mutlaq B. Al-Otaibi, Mohammed S. Alharbi","doi":"10.1109/SYSCON.2015.7116821","DOIUrl":"https://doi.org/10.1109/SYSCON.2015.7116821","url":null,"abstract":"In Saudi Arabia, the use of Mobile Government (M-government) services such as issuing an Exit / Re-entry visa by mobile phone is less than expected numbers. One of the biggest challenges of implementing M-government is user acceptance. This research offers theoretical and empirical insights related to the acceptance of government services via the use of the mobile phone system from a customer perspective. This paper adopts the technology acceptance model (TAM) and other theories to examine the influence on the user for accepting M-government services. In this study, TAM model was extended by adding three factors: experience, trust and time. All of these had a significant effect of the acceptance of M-government services. These factors have been reported in previous studies, but no study has incorporated all three factors. It was found that the parameters of the regression model are significant. Therefore, the variables adopted in this study play an important role in the acceptance of M-government in Saudi Arabia.","PeriodicalId":251318,"journal":{"name":"2015 Annual IEEE Systems Conference (SysCon) Proceedings","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123299720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}