Int. J. Embed. Syst.最新文献

筛选
英文 中文
A software control flow checking technique in multi-core processors 一种多核处理器软件控制流检测技术
Int. J. Embed. Syst. Pub Date : 2020-05-11 DOI: 10.1504/ijes.2020.10029450
Mohammad Reza Heidari Iman, Pejman Yaghmaie
{"title":"A software control flow checking technique in multi-core processors","authors":"Mohammad Reza Heidari Iman, Pejman Yaghmaie","doi":"10.1504/ijes.2020.10029450","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029450","url":null,"abstract":"Multi-core processors can benefit performance, power consumption and level of parallelism, which is the primary reason why they are employed in safety-critical embedded systems. Nowadays the use of safety-critical multi-core embedded systems in different industries is growing significantly. In these systems, an error may result in a severe failure which can lead to disaster. In order to prevent such failure, the fault tolerance of the systems should be improved. Some of the important errors, which can cause failures, are the control flow errors changing the execution flow of a multi-core program and eventually leading to core failure. To detect them, different control flow checking techniques have been proposed, almost all of which have so far aimed to detect errors in single-core processors. In this paper, a software control flow checking technique in multi-core processors, called SCFC-MC, has been proposed wherein, in addition to executing the program, each thread monitors the execution flow of another thread, thereby eliminating every single point of failure. Experimental results show that applying SCFC-MC to a quad-core processor [Intel(R) Core(TM) i7-4710HQ] results in the detection of about 95% of control flow errors with less than 20% performance overhead.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117001037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hash-based and privacy-aware movie recommendations in a big data environment 在大数据环境下基于哈希和隐私的电影推荐
Int. J. Embed. Syst. Pub Date : 2020-05-11 DOI: 10.1504/ijes.2020.10025052
Tingting Shao, Xuening Chen
{"title":"Hash-based and privacy-aware movie recommendations in a big data environment","authors":"Tingting Shao, Xuening Chen","doi":"10.1504/ijes.2020.10025052","DOIUrl":"https://doi.org/10.1504/ijes.2020.10025052","url":null,"abstract":"Movie recommendation is an important activity in the people's daily entertainment. Typically, through analysing the users' ever-watched movie list, a movie recommender system can recommend appropriate new movies to the target user. However, traditional movie recommendation techniques, e.g., collaborative filtering (CF) often face the following two challenges. First, as CF is essentially a traversal technique, the recommendation efficiency is often low. Second, traditional movie recommender systems often assume that the users' ever-watched movie list for decision-making is centralised, which makes it hard to be applied to the distributed movie recommendation scenarios. In view of these challenges, in this paper, we bring forth an efficient and privacy-aware online movie recommendation approach based on hashing technique. Through experiments on famous MovieLens dataset, we show that our proposal shows a better performance compared with other approaches in terms of recommendation efficiency and accuracy while users' private information is protected.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123243967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A robust error control coding-based watermarking algorithm for FPGA IP protection 一种基于鲁棒误差控制编码的FPGA IP保护水印算法
Int. J. Embed. Syst. Pub Date : 2020-05-11 DOI: 10.1504/ijes.2020.10029456
Zhenyu Liu, Xin Su, Dafang Zhang, Jing Long
{"title":"A robust error control coding-based watermarking algorithm for FPGA IP protection","authors":"Zhenyu Liu, Xin Su, Dafang Zhang, Jing Long","doi":"10.1504/ijes.2020.10029456","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029456","url":null,"abstract":"The ownership of intellectual property (IP) for integrated circuit (IC) is difficult to identify when the watermarks are attacked and damaged in previous work. To address this issue, we propose a robust error control coding (ECC)-based watermarking algorithm for FPGA IP protection. Firstly, the Blakley threshold scheme is used to share the signature of IP user and generate watermarks. The watermarks are then encrypted and finally embedded into FPGA IP design. The signature sharing makes it unnecessary to ensure that all watermarks are reliable in authentication. The complete signature can be retrieved with several watermarks even if other watermarks are damaged. Secondly, the IP owner's image signature is used for copyright identification, and the image is shared by the threshold multi-secret sharing method to solve the resource overhead problem. The image itself is fault-tolerant. Even if the image has a bit error rate of 16.74%, the copyright content can be successfully identified. The fault tolerance of the image has greatly improved the robustness of the watermark. Experiments show that the algorithm not only has low overhead for watermark embedding, but also achieves good results in terms of robustness.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121102322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-adjustive DE and KELM-based image watermarking in DCT domain using fuzzy entropy 基于模糊熵的DCT域自调整DE和kelm图像水印
Int. J. Embed. Syst. Pub Date : 2020-05-11 DOI: 10.1504/ijes.2020.10029447
V. P. Vishwakarma, Varsha Sisaudia
{"title":"Self-adjustive DE and KELM-based image watermarking in DCT domain using fuzzy entropy","authors":"V. P. Vishwakarma, Varsha Sisaudia","doi":"10.1504/ijes.2020.10029447","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029447","url":null,"abstract":"With advances in machine learning and development of neural networks that are efficient and accurate, this paper explores the use of kernel extreme learning machine (KELM) to develop a semi-blind watermarking technique for grey-scale images in discrete cosine transform domain. Fuzzy entropy is employed for selection of the blocks where the watermark bits are to be embedded. A dataset formed from these blocks is used to train KELM. The nonlinear regression property of KELM predicts the values where watermark bits are embedded. Self-adjustive differential evolution (SeAdDE) controls the strength of the scaling factors finds their optimal values. The adaptiveness of differential evolution (DE) helps in self-adjustment and varies the DE parameters to explore best solutions. This saves time as the manual hit and trial method for finding the appropriate parameter values is avoided. The scheme presented shows robustness against various attacks like histogram equalisation, resizing, JPEG compression, Weiner filtering, etc. and still also retains the quality of the watermarked image. Thus, the proposed technique can be used as a solution to ensure authenticity via watermarking.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125268221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design of a hand gesture recognition system based on forearm surface electromyography feedback 基于前臂表面肌电反馈的手势识别系统设计
Int. J. Embed. Syst. Pub Date : 2020-05-11 DOI: 10.1504/ijes.2020.10029453
Wei Zhuang, Yi Zhan, Yue Han, Jian Su, Chunming Gao, Dan Yang
{"title":"Design of a hand gesture recognition system based on forearm surface electromyography feedback","authors":"Wei Zhuang, Yi Zhan, Yue Han, Jian Su, Chunming Gao, Dan Yang","doi":"10.1504/ijes.2020.10029453","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029453","url":null,"abstract":"This paper presents a study of using surface electromyography (SEMG) for hand gesture recognitions. A SEMG acquisition system is discussed in this paper. The characteristics of SEMG are introduced and the transformation characteristics are analysed as well. Then the selected gestures and the location for the SEMG sensor are determined. The process of pattern recognition and the reason of selecting SVM classifier are presented in detail, and the kernel function selection of SVM is discussed. Three optimisation methods of parameters are compared using the cross-validation method. Finally, the parameters obtained by the genetic algorithm are used to test the model and the recognition performance.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128531270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The design and implementation of a wearable human activity recognition system based on IMU 基于IMU的可穿戴人体活动识别系统的设计与实现
Int. J. Embed. Syst. Pub Date : 2020-05-11 DOI: 10.1504/ijes.2020.10029452
Wei Zhuang, Su-li Xu, Yue Han, Jian Su, Chunming Gao, Dan Yang
{"title":"The design and implementation of a wearable human activity recognition system based on IMU","authors":"Wei Zhuang, Su-li Xu, Yue Han, Jian Su, Chunming Gao, Dan Yang","doi":"10.1504/ijes.2020.10029452","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029452","url":null,"abstract":"In recent years, with the rapid development of the inertial measurement unit (IMU) and wireless body area network, and the maturity of pattern recognition theory, the technology of human activity recognition gradually gets the attention of researchers, becoming the research hotspot in this field. On the basis of existing IMU, this paper designs a wearable human activity recognition system, which consists of microprocessor, three-axis accelerometer, three-axis gyroscope, power module and so on. The system can provide real-time, continuous human motion information (acceleration and angular velocity information) to the Android control unit, and it can realise the real-time receiving, dynamic display and storage of human motion information.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127985995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modelling performances of an autonomic router running under attack 自主路由器在攻击下的性能建模
Int. J. Embed. Syst. Pub Date : 2020-05-05 DOI: 10.1504/ijes.2020.10029276
L. Campanile, M. Gribaudo, M. Iacono, Michele Mastroianni
{"title":"Modelling performances of an autonomic router running under attack","authors":"L. Campanile, M. Gribaudo, M. Iacono, Michele Mastroianni","doi":"10.1504/ijes.2020.10029276","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029276","url":null,"abstract":"Modern warehouse-scale computing facilities, seamlessly enabled by virtualisation technologies, are based on thousands of independent computing nodes that are administered according to efficiency criteria that depend on workload. Networks play a pivotal role in these systems, as they are likely to be the performance bottleneck, and because of the high variability of data and management traffic. Because of the scale of the system, the prevalent network management model is based on autonomic networking, a paradigm based on self-regulation of the networking subsystem, that requires routers capable of adapting their policies to traffic by a local or global strategy. In this paper we focus on performance modelling of autonomic routers, to provide a simple, yet representative elementary performance model to provide a starting point for a comprehensive autonomic network modelling approach. The proposed model is used to evaluate the behaviour of a router under attack under realistic workload and parameters assumptions.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130751686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralised control-based interaction framework for secure data transmission in internet of automated vehicles 基于分散控制的自动网联安全数据传输交互框架
Int. J. Embed. Syst. Pub Date : 2020-05-05 DOI: 10.1504/ijes.2020.10029264
B. Gupta, Megha Quamara
{"title":"Decentralised control-based interaction framework for secure data transmission in internet of automated vehicles","authors":"B. Gupta, Megha Quamara","doi":"10.1504/ijes.2020.10029264","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029264","url":null,"abstract":"Recent technological advancements in the field of communication and control are transforming the transportation industry by extending the capabilities of conventional human-controlled vehicles to partially or fully automated vehicles. These vehicles create a network, also termed as internet of automated vehicles (IAV), having the capability of sensing the data from the surroundings and using it as feedback mechanism in order to assist drivers and the static infrastructure for safe navigation and control. However, a uniform framework is required to isolate the interactions among the vehicles and different entities for secure transmission and control. In this paper, we propose a decentralised control-based interaction framework to promote smooth transmission of sensor data in automated vehicular systems and verify the correctness of the underlying policy model on access control policy testing (ACPT) tool. In addition, we present some case studies to show the effectiveness of the proposed framework in real-time applications.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126806187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure RGB image steganography based on modified LSB substitution 基于改进LSB替换的安全RGB图像隐写
Int. J. Embed. Syst. Pub Date : 2020-05-05 DOI: 10.1504/ijes.2020.10029272
L. Almazaydeh
{"title":"Secure RGB image steganography based on modified LSB substitution","authors":"L. Almazaydeh","doi":"10.1504/ijes.2020.10029272","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029272","url":null,"abstract":"Different steganography techniques have been presented based on RGB image as the image is considered secure cover for hidden data. Specifically, this paper presents edge-based image steganographic method using parameterised Canny edge detector that relies on embedding the secret message bits into variable LSB length of the blue colour channel of the cover image. The blue colour channel is selected because the steganography-based research showed that the visual perception of blue colour intensity is less distinct than the red and green colours. Secret message bits are embedded up to four bits of LSB which are selected by a random number generator. Additionally, as the less significant information is carried out by the LSB of each pixel so slight changes of LSB will not affect the visual quality of the cover image. The proposed algorithm was tested on a set of RGB colour images, and satisfactory results were demonstrated regarding minimum distortion in the blue colour of a pixel and visually identical original and stego image.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122800054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Research on intelligent obstacle avoidance control method for mobile robot in multi-barrier environment 多障碍环境下移动机器人智能避障控制方法研究
Int. J. Embed. Syst. Pub Date : 2020-05-05 DOI: 10.1504/ijes.2020.10029257
Yafei Wang, Ming Ma
{"title":"Research on intelligent obstacle avoidance control method for mobile robot in multi-barrier environment","authors":"Yafei Wang, Ming Ma","doi":"10.1504/ijes.2020.10029257","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029257","url":null,"abstract":"In a current multi-obstacle environment, mobile robots are needed to control obstacle avoidance ability intelligently. Therefore, a method of mobile robot obstacle avoidance control in multi-obstacle environment is proposed based on the minimum risk index. This method first segments the path of obstacle environment according to certain rules. Then, robots are constrained through the constrained time according to requirements of robot obstacle avoidance. Therefore, calculating motion obtains necessary and sufficient conditions with no collision avoidance relationship. Then, impact danger level of each movement stage for the robot is evaluated by considering the spatial distance, inertia, and relative movement speed of multiple obstacle environments. The global safety path is planned, the intelligent avoidance function is calculated, and intelligent avoidance control is implemented. Finally, simulation results show that our proposed method is a common method in intelligent obstacle avoidance, timely tracking of moving target, and makes full use of space.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125855025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信