{"title":"A software control flow checking technique in multi-core processors","authors":"Mohammad Reza Heidari Iman, Pejman Yaghmaie","doi":"10.1504/ijes.2020.10029450","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029450","url":null,"abstract":"Multi-core processors can benefit performance, power consumption and level of parallelism, which is the primary reason why they are employed in safety-critical embedded systems. Nowadays the use of safety-critical multi-core embedded systems in different industries is growing significantly. In these systems, an error may result in a severe failure which can lead to disaster. In order to prevent such failure, the fault tolerance of the systems should be improved. Some of the important errors, which can cause failures, are the control flow errors changing the execution flow of a multi-core program and eventually leading to core failure. To detect them, different control flow checking techniques have been proposed, almost all of which have so far aimed to detect errors in single-core processors. In this paper, a software control flow checking technique in multi-core processors, called SCFC-MC, has been proposed wherein, in addition to executing the program, each thread monitors the execution flow of another thread, thereby eliminating every single point of failure. Experimental results show that applying SCFC-MC to a quad-core processor [Intel(R) Core(TM) i7-4710HQ] results in the detection of about 95% of control flow errors with less than 20% performance overhead.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117001037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hash-based and privacy-aware movie recommendations in a big data environment","authors":"Tingting Shao, Xuening Chen","doi":"10.1504/ijes.2020.10025052","DOIUrl":"https://doi.org/10.1504/ijes.2020.10025052","url":null,"abstract":"Movie recommendation is an important activity in the people's daily entertainment. Typically, through analysing the users' ever-watched movie list, a movie recommender system can recommend appropriate new movies to the target user. However, traditional movie recommendation techniques, e.g., collaborative filtering (CF) often face the following two challenges. First, as CF is essentially a traversal technique, the recommendation efficiency is often low. Second, traditional movie recommender systems often assume that the users' ever-watched movie list for decision-making is centralised, which makes it hard to be applied to the distributed movie recommendation scenarios. In view of these challenges, in this paper, we bring forth an efficient and privacy-aware online movie recommendation approach based on hashing technique. Through experiments on famous MovieLens dataset, we show that our proposal shows a better performance compared with other approaches in terms of recommendation efficiency and accuracy while users' private information is protected.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123243967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A robust error control coding-based watermarking algorithm for FPGA IP protection","authors":"Zhenyu Liu, Xin Su, Dafang Zhang, Jing Long","doi":"10.1504/ijes.2020.10029456","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029456","url":null,"abstract":"The ownership of intellectual property (IP) for integrated circuit (IC) is difficult to identify when the watermarks are attacked and damaged in previous work. To address this issue, we propose a robust error control coding (ECC)-based watermarking algorithm for FPGA IP protection. Firstly, the Blakley threshold scheme is used to share the signature of IP user and generate watermarks. The watermarks are then encrypted and finally embedded into FPGA IP design. The signature sharing makes it unnecessary to ensure that all watermarks are reliable in authentication. The complete signature can be retrieved with several watermarks even if other watermarks are damaged. Secondly, the IP owner's image signature is used for copyright identification, and the image is shared by the threshold multi-secret sharing method to solve the resource overhead problem. The image itself is fault-tolerant. Even if the image has a bit error rate of 16.74%, the copyright content can be successfully identified. The fault tolerance of the image has greatly improved the robustness of the watermark. Experiments show that the algorithm not only has low overhead for watermark embedding, but also achieves good results in terms of robustness.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121102322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-adjustive DE and KELM-based image watermarking in DCT domain using fuzzy entropy","authors":"V. P. Vishwakarma, Varsha Sisaudia","doi":"10.1504/ijes.2020.10029447","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029447","url":null,"abstract":"With advances in machine learning and development of neural networks that are efficient and accurate, this paper explores the use of kernel extreme learning machine (KELM) to develop a semi-blind watermarking technique for grey-scale images in discrete cosine transform domain. Fuzzy entropy is employed for selection of the blocks where the watermark bits are to be embedded. A dataset formed from these blocks is used to train KELM. The nonlinear regression property of KELM predicts the values where watermark bits are embedded. Self-adjustive differential evolution (SeAdDE) controls the strength of the scaling factors finds their optimal values. The adaptiveness of differential evolution (DE) helps in self-adjustment and varies the DE parameters to explore best solutions. This saves time as the manual hit and trial method for finding the appropriate parameter values is avoided. The scheme presented shows robustness against various attacks like histogram equalisation, resizing, JPEG compression, Weiner filtering, etc. and still also retains the quality of the watermarked image. Thus, the proposed technique can be used as a solution to ensure authenticity via watermarking.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125268221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Zhuang, Yi Zhan, Yue Han, Jian Su, Chunming Gao, Dan Yang
{"title":"Design of a hand gesture recognition system based on forearm surface electromyography feedback","authors":"Wei Zhuang, Yi Zhan, Yue Han, Jian Su, Chunming Gao, Dan Yang","doi":"10.1504/ijes.2020.10029453","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029453","url":null,"abstract":"This paper presents a study of using surface electromyography (SEMG) for hand gesture recognitions. A SEMG acquisition system is discussed in this paper. The characteristics of SEMG are introduced and the transformation characteristics are analysed as well. Then the selected gestures and the location for the SEMG sensor are determined. The process of pattern recognition and the reason of selecting SVM classifier are presented in detail, and the kernel function selection of SVM is discussed. Three optimisation methods of parameters are compared using the cross-validation method. Finally, the parameters obtained by the genetic algorithm are used to test the model and the recognition performance.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128531270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Zhuang, Su-li Xu, Yue Han, Jian Su, Chunming Gao, Dan Yang
{"title":"The design and implementation of a wearable human activity recognition system based on IMU","authors":"Wei Zhuang, Su-li Xu, Yue Han, Jian Su, Chunming Gao, Dan Yang","doi":"10.1504/ijes.2020.10029452","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029452","url":null,"abstract":"In recent years, with the rapid development of the inertial measurement unit (IMU) and wireless body area network, and the maturity of pattern recognition theory, the technology of human activity recognition gradually gets the attention of researchers, becoming the research hotspot in this field. On the basis of existing IMU, this paper designs a wearable human activity recognition system, which consists of microprocessor, three-axis accelerometer, three-axis gyroscope, power module and so on. The system can provide real-time, continuous human motion information (acceleration and angular velocity information) to the Android control unit, and it can realise the real-time receiving, dynamic display and storage of human motion information.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127985995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Campanile, M. Gribaudo, M. Iacono, Michele Mastroianni
{"title":"Modelling performances of an autonomic router running under attack","authors":"L. Campanile, M. Gribaudo, M. Iacono, Michele Mastroianni","doi":"10.1504/ijes.2020.10029276","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029276","url":null,"abstract":"Modern warehouse-scale computing facilities, seamlessly enabled by virtualisation technologies, are based on thousands of independent computing nodes that are administered according to efficiency criteria that depend on workload. Networks play a pivotal role in these systems, as they are likely to be the performance bottleneck, and because of the high variability of data and management traffic. Because of the scale of the system, the prevalent network management model is based on autonomic networking, a paradigm based on self-regulation of the networking subsystem, that requires routers capable of adapting their policies to traffic by a local or global strategy. In this paper we focus on performance modelling of autonomic routers, to provide a simple, yet representative elementary performance model to provide a starting point for a comprehensive autonomic network modelling approach. The proposed model is used to evaluate the behaviour of a router under attack under realistic workload and parameters assumptions.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130751686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decentralised control-based interaction framework for secure data transmission in internet of automated vehicles","authors":"B. Gupta, Megha Quamara","doi":"10.1504/ijes.2020.10029264","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029264","url":null,"abstract":"Recent technological advancements in the field of communication and control are transforming the transportation industry by extending the capabilities of conventional human-controlled vehicles to partially or fully automated vehicles. These vehicles create a network, also termed as internet of automated vehicles (IAV), having the capability of sensing the data from the surroundings and using it as feedback mechanism in order to assist drivers and the static infrastructure for safe navigation and control. However, a uniform framework is required to isolate the interactions among the vehicles and different entities for secure transmission and control. In this paper, we propose a decentralised control-based interaction framework to promote smooth transmission of sensor data in automated vehicular systems and verify the correctness of the underlying policy model on access control policy testing (ACPT) tool. In addition, we present some case studies to show the effectiveness of the proposed framework in real-time applications.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126806187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure RGB image steganography based on modified LSB substitution","authors":"L. Almazaydeh","doi":"10.1504/ijes.2020.10029272","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029272","url":null,"abstract":"Different steganography techniques have been presented based on RGB image as the image is considered secure cover for hidden data. Specifically, this paper presents edge-based image steganographic method using parameterised Canny edge detector that relies on embedding the secret message bits into variable LSB length of the blue colour channel of the cover image. The blue colour channel is selected because the steganography-based research showed that the visual perception of blue colour intensity is less distinct than the red and green colours. Secret message bits are embedded up to four bits of LSB which are selected by a random number generator. Additionally, as the less significant information is carried out by the LSB of each pixel so slight changes of LSB will not affect the visual quality of the cover image. The proposed algorithm was tested on a set of RGB colour images, and satisfactory results were demonstrated regarding minimum distortion in the blue colour of a pixel and visually identical original and stego image.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122800054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on intelligent obstacle avoidance control method for mobile robot in multi-barrier environment","authors":"Yafei Wang, Ming Ma","doi":"10.1504/ijes.2020.10029257","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029257","url":null,"abstract":"In a current multi-obstacle environment, mobile robots are needed to control obstacle avoidance ability intelligently. Therefore, a method of mobile robot obstacle avoidance control in multi-obstacle environment is proposed based on the minimum risk index. This method first segments the path of obstacle environment according to certain rules. Then, robots are constrained through the constrained time according to requirements of robot obstacle avoidance. Therefore, calculating motion obtains necessary and sufficient conditions with no collision avoidance relationship. Then, impact danger level of each movement stage for the robot is evaluated by considering the spatial distance, inertia, and relative movement speed of multiple obstacle environments. The global safety path is planned, the intelligent avoidance function is calculated, and intelligent avoidance control is implemented. Finally, simulation results show that our proposed method is a common method in intelligent obstacle avoidance, timely tracking of moving target, and makes full use of space.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125855025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}