4,067 results on '"Interrupt"'
Search Results
2. The Logic Rules for the Safety of Automatic Drive
- Author
-
Li, Yongdong, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Hung, Jason C., editor, Yen, Neil Y., editor, and Chang, Jia-Wei, editor
- Published
- 2023
- Full Text
- View/download PDF
3. Interrupts and Power Management
- Author
-
Ünsalan, Cem, Gürhan, Hüseyin Deniz, Yücel, Mehmet Erkin, Ünsalan, Cem, Gürhan, Hüseyin Deniz, and Yücel, Mehmet Erkin
- Published
- 2022
- Full Text
- View/download PDF
4. Interruptible Nodes: Reducing Queueing Costs in Irregular Streaming Dataflow Applications on Wide-SIMD Architectures.
- Author
-
Timcheck, Stephen and Buhler, Jeremy
- Subjects
- *
COST , *A priori , *BIOINFORMATICS , *FINITE, The , *MEMORY , *RUN time systems (Computer science) - Abstract
Streaming dataflow applications are an attractive target to parallelize on wide-SIMD processors such as GPUs. These applications can be expressed as a pipeline of compute nodes connected by edges, which feed outputs from one node to the next. Streaming applications often exhibit irregular dataflow, where the amount of output produced for one input is unknown a priori. Inserting finite queues between pipeline nodes can ameliorate the impact of irregularity and improve SIMD lane occupancy. The sizing of these queues is driven by both performance and safety considerations- relative queue sizes should be chosen to reduce runtime overhead and maximize throughput, but each node's output queue must be large enough to accommodate the maximum number of outputs produced by one SIMD vector of inputs to the node. When safety and performance considerations conflict, the application may incur excessive memory usage and runtime overhead. In this work, we identify properties of applications that lead to such undesirable behaviors, with examples from applications implemented in our MERCATOR framework for irregular streaming on GPUs. To address these issues, we propose extensions to support interruptible nodes that can be suspended mid-execution if their output queues fill. We illustrate the impacts of adding interruptible nodes to the MERCATOR framework on representative irregular streaming applications from the domains of branching search and bioinformatics. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. IEmu: Interrupt modeling from the logic hidden in the firmware.
- Author
-
Wei, Yuan, Wang, Yongjun, Zhou, Lei, Zhou, Xu, and Jiang, Zhiyuan
- Subjects
- *
REVERSE engineering , *AUTOMATIC control systems , *INTERNET of things , *PROTOTYPES , *LOGIC - Abstract
The security of embedded firmware has become a critical issue in light of the rapid development of the Internet of Things. Current security analysis approaches, such as dynamic analysis, still face bottlenecks and difficulties due to the wide variety of devices and systems. Recent dynamic analysis approaches for embedded firmware have attempted to provide a general solution but heavily rely on detailed device manuals. Meanwhile, approaches that do not rely on manuals have randomness in interrupt triggering, which weakens emulation fidelity and dynamic analysis efficiency. In this paper, we propose a redundant-check-based embedded firmware interrupt modeling and security analysis method that does not rely on commercial manuals. This method involves reverse engineering the control flow of firmware binary and accurately extracting the correct interrupt triggering rules to emulate embedded firmware. We have implemented functional prototypes on QEMU, called IEmu , and evaluated it with 26 firmware in different MCUs. Our results demonstrate significant advantages compared to the recent state-of-the-art approach. On average, IEmu has improved interrupt path exploration efficiency by 2.4 times and fuzz testing coverage by 19%. IEmu restored the interrupt triggering logic in the manual, and emulated three firmware where the state-of-the-art emulator have limitations and found vulnerabilities. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Software Design
- Author
-
Morshed, Bashir I. and Morshed, Bashir I
- Published
- 2021
- Full Text
- View/download PDF
7. Der Zeigarnik-Effekt. Ein unzuverlässiges Phänomen? : Eine Replikationsstudie
- Author
-
Siegfried, Lisa and Siegfried, Lisa
- Abstract
Das Ziel dieser Arbeit war es, die Erinnerung an unterbrochene Handlungen im Vergleich zu abgeschlossenen Handlungen zu untersuchen. Hierfür wurde die Versuchsanordnung I von Zeigarnik aus dem Jahr 1927 repliziert. In einem Experiment wurden 38 Versuchspersonen insgesamt 22 Aufgaben präsentiert, wobei bei der Hälfte der Aufgaben die Handlung vor Beendigung unterbrochen wurde. Anschließend wurden die Versuchspersonen gebeten, alle Aufgaben, an die sie sich erinnern können, aufzuzählen. Die Ergebnisse ergaben keine Präferenz für die Erinnerung an unerledigte oder erledigte Aufgaben. Somit konnten Zeigarniks Ergebnisse nicht repliziert werden. Es wird vermutet, dass die Abrufstrategien der Versuchspersonen für den beobachteten Nulleffekt verantwortlich sein könnten., The aim of this study was to investigate the difference between memorizing interrupted tasks compared to completed tasks. To achieve this, the first experiment by Zeigarnik from her work in 1927 was replicated. In the replication, 38 participants were presented with a total of 22 tasks, with half of the tasks being interrupted before completion. Subsequently, participants were asked to list all tasks they could remember. The results showed no preference for remembering unfinished or finished tasks. Thus, Zeigarnik's findings could not be replicated. It is possible that the retrieval strategies of the participants may be responsible for the observed null effect., Masterarbeit Universität Innsbruck 2024
- Published
- 2024
8. Extensible and Configurable RISC-V Based Virtual Prototype
- Author
-
Herdt, Vladimir, Große, Daniel, Le, Hoang M., Drechsler, Rolf, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Liang, Qilian, Series Editor, Martin, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zhang, Junjie James, Series Editor, Kazmierski, Tom J., editor, Steinhorst, Sebastian, editor, and Große, Daniel, editor
- Published
- 2020
- Full Text
- View/download PDF
9. Statistical Model Checking of Processor Systems in Various Interrupt Scenarios
- Author
-
Strnadel, Josef, Hutchison, David, Editorial Board Member, Kanade, Takeo, Editorial Board Member, Kittler, Josef, Editorial Board Member, Kleinberg, Jon M., Editorial Board Member, Mattern, Friedemann, Editorial Board Member, Mitchell, John C., Editorial Board Member, Naor, Moni, Editorial Board Member, Pandu Rangan, C., Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Terzopoulos, Demetri, Editorial Board Member, Tygar, Doug, Editorial Board Member, Weikum, Gerhard, Series Editor, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, and Margaria, Tiziana, editor
- Published
- 2018
- Full Text
- View/download PDF
10. Asynchrony and persistence in reaction systems.
- Author
-
Koutny, Maciej, Pietkiewicz-Koutny, Marta, and Yakovlev, Alex
- Subjects
- *
ASYNCHRONOUS learning , *SEMANTICS - Abstract
Reaction systems are a model of interactive computation, where the interaction between a system — itself built up of a number of reactions — and its environment is modelled through context sequences provided by the environment. The standard execution semantics of reaction systems is synchronous, i.e., at each computational step all the enabled reactions are executed. In this paper, we 'de-synchronise' such an execution model by allowing only a subset of enabled reactions to be executed. We then study the resulting asynchronous model assuming two fundamental execution policies. The first one allows any subset of reactions to be executed, and the second one draws each subset from a pre-defined pool. We also introduce and discuss the notion of persistence of reactions and sets of reactions in the resulting models of asynchronous reaction systems. In particular, we demonstrate that reaction persistence can be implemented. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
11. Modeling the interrupt transmission process of SR-IOV cryptographic device
- Author
-
Lei SUN, Shuai LI, and Songhui GUO
- Subjects
interrupt ,SR-IOV ,cryptographic device ,queuing model ,performance ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The SR-IOV cryptographic device generates a large number of I/O interrupts when performing operations in a virtualized environment,causing the CPU to frequently switch between the Root mode and the Non-Root mode,which brings huge system performance overhead and affects the operational performance of SR-IOV cryptographic device.Aiming at this problem,the I/O interrupt of SR-IOV cryptographic device was analyzed,and a M/M/1 queuing model according to the cryptographic task first-come-first-served rules was constructed.What’s more,the key factors affecting system performance were analyzed,and the validity of the model via simulation and experiment was verified,and finally the system performance was tested.The results show that the model can quantitatively analyze the impact of the interrupt frequency on the interrupt response time and system queue length.
- Published
- 2019
- Full Text
- View/download PDF
12. Modeling the interrupt transmission process of SR-IOV cryptographic device
- Author
-
SUN Lei, LI Shuai, GUO Songhui
- Subjects
interrupt ,sr-iov ,cryptographic device ,queuing model ,performance ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The SR-IOV cryptographic device generates a large number of I/O interrupts when performing operations in a virtualized environment, causing the CPU to frequently switch between the Root mode and the Non-Root mode, which brings huge system performance overhead and affects the operational performance of SR-IOV cryptographic device. Aiming at this problem, the I/O interrupt of SR-IOV cryptographic device was analyzed, and a M/M/1 queuing model according to the cryptographic task first-come-first-served rules was constructed. What’s more, the key factors affecting system performance were analyzed, and the validity of the model via simulation and experiment was verified, and finally the system performance was tested. The results show that the model can quantitatively analyze the impact of the interrupt frequency on the interrupt response time and system queue length.
- Published
- 2019
- Full Text
- View/download PDF
13. Implementasi Algoritma Kalkulasi Interupsi pada Rancang Bangun Tachometer Digital
- Author
-
Putut Son Maria and Elva Susianti
- Subjects
Digital tachometer ,interrupt ,data communication ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Tachometer is an important tool for measuring the rotational speed of electro-mechanical machines and other rotating objects. In a closed-loop system, it should have a mechanism by which sensory instruments must be able to produce and deliver feedback values that can be fetched by the controller. Most commercial tachometers do not have such data communication features, making it difficult to be employed in closed loop systems. This study aims to develop a tachometer which is programmed using calculation on interrupt-based algorithm and has data communication capabilities as well. The algorithm was designed over the minimum features of a microcontroller chip, namely a timer and interrupt. The proposed algorithm that was tested on the prototype results good performance for the typical electro-mechanical machines with a measurement error range between 0.1 and 1.2%. The equation for the calculation of rotation per minute (rpm) has also been revised to provide a more valid formula.
- Published
- 2018
14. Practical Keystroke Timing Attacks in Sandboxed JavaScript
- Author
-
Lipp, Moritz, Gruss, Daniel, Schwarz, Michael, Bidner, David, Maurice, Clémentine, Mangard, Stefan, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Weikum, Gerhard, Series Editor, Foley, Simon N., editor, Gollmann, Dieter, editor, and Snekkenes, Einar, editor
- Published
- 2017
- Full Text
- View/download PDF
15. Polyphonic manifestations of pedagogy: Epilog(s) that interrupt sense(s)
- Author
-
Silvia Grinberg and Luis Gabriel Porta
- Subjects
Pedagogy ,Future ,Condition ,Interrupt ,Schooling crisis ,Education (General) ,L7-991 ,Special aspects of education ,LC8-6691 - Abstract
We propose four irruptions as an epilogue, they seek tensions and meanings in relation to the task of education and pedagogy that, as a conceptual record, offers us lines to inhabit and think about the world in which we live, but also the one we would like to live. Multiple claims and recipes resonate for education in the digital age. Since the end of the last century, education policies have moved between two vertices: crisis and reforms. Reforms of schooling that have been launched in the most diverse countries and regions that make up the globalized world promising answers to this question. It is in this climate of time that Biesta and Säfström propose their manifesto for education where, as they point out, moving between what is and what is not, has become the crossroads for contemporary schooling. Probably, this image is one of the most global in the globalized world. Of course, its effects and local affections are multiple and diverse. This dossier is installed there: to inhabit the educational word, to ask about it. This calls for the imperative need to be manifested by education in a way that allows us to escape a duality that has done nothing but undermine the school without offering lines with which to weave other plots. Interrupting is also the challenge for a theory of education that tries to escape to the crossroads by staying in tension, destabilizing the future by recognizing its openness, opening the possibility to different future potentials.
- Published
- 2018
- Full Text
- View/download PDF
16. Modeling and Verification of an Interrupt System in C/OS-III with TMSVL
- Author
-
Cui, Jin, Duan, Zhenhua, Tian, Cong, Zhang, Nan, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Liu, Shaoying, editor, and Duan, Zhenhua, editor
- Published
- 2016
- Full Text
- View/download PDF
17. GAN-Based Data Augmentation Strategy for Sensor Anomaly Detection in Industrial Robots
- Author
-
Haodong Lu, Xiaoming He, Miao Du, Kun Wang, and Kai Qian
- Subjects
Online model ,Computer science ,business.industry ,Real-time computing ,Stability (learning theory) ,Inference ,Automation ,law.invention ,Industrial robot ,law ,Robot ,Anomaly detection ,Electrical and Electronic Engineering ,Interrupt ,business ,Instrumentation - Abstract
In the current industry world, the industrial robot has emerged as a critical device to make the manufacturing process more efficient through automation. However, abnormal operation of industrial robots caused by sensor failures may interrupt the entire manufacturing process, thereby increasing production costs. In this paper, we first propose a domain-specific framework consisting of offline training and online inference to effectively detect anomalies in the scenario of industrial robotic sensors. In a nutshell, the framework can be identified in three folds: (1) the offline training obtaining historical data from the database to train the time series and anomaly detection models; (2) the online inference deploying the offline trained models for online anomaly detection in real-time; (3) the incremental learning updating the online model for a new type of anomalies. We then propose an improved Generative Adversarial Networks (GANs) named MSGAN with the adaptive update strategy mechanism based on WGAN-GP to generate fake anomaly samples, improving anomaly detection accuracy. Specifically, the Wasserstein distance with the gradient penalty is introduced to improve training stability and sample quality. Moreover, adapting the generator’s complexity in robotic sensors, an adaptive update strategy based on the loss change ratio is adopted to speed up training convergence. Extensive experiments based on real robotic sensor datasets demonstrate the effectiveness of the proposed framework. Moreover, the results demonstrate that the detection accuracy can be improved by the synthetic samples based on the proposed MSGAN algorithm.
- Published
- 2022
18. On the Effectiveness of Using Graphics Interrupt as a Side Channel for User Behavior Snooping
- Author
-
Chunfu Jia, Jianwen Tian, Debin Gao, and Haoyu Ma
- Subjects
business.industry ,Computer science ,Interface (computing) ,OpenGL ,Cloud computing ,CUDA ,Embedded system ,Overhead (computing) ,Side channel attack ,Electrical and Electronic Engineering ,Interrupt ,Graphics ,business ,ComputingMethodologies_COMPUTERGRAPHICS - Abstract
Graphics Processing Units (GPUs) are now a key component of many devices and systems, including those in the cloud and data centers, thus are also subject to side-channel attacks. Existing side-channel attacks on GPUs typically leak information from graphics libraries like OpenGL and CUDA, which require creating contentions within the GPU resource space and are being mitigated with software patches. This paper evaluates potential side channels exposed at a lower-level interface between GPUs and CPUs, namely the graphics interrupts. These signals could indicate unique signatures of GPU workload, allowing a spy process to infer the behavior of other processes. We demonstrate the practicality and generality of such side-channel exploitation with a variety of assumed attack scenarios. Simulations on both Nvidia and Intel graphics adapters showed that our attack could achieve high accuracy, while in-depth studies were also presented to explore the low-level rationale behind such effectiveness. On top of that, we further propose a practical mitigation scheme which protects GPU workloads against the graphics-interrupt-based side-channel attack by piggybacking mask payloads on them to generate interfering graphics interrupt ``noises’'. Experiments show that our mitigation technique effectively prohibited spy processes from inferring user behaviors via analyzing runtime patterns of graphics interrupt with only trivial overhead.
- Published
- 2022
19. Evaluating Latency in Multiprocessing Embedded Systems for the Smart Grid
- Author
-
Sara Alonso, Jesús Lázaro, Jaime Jiménez, Unai Bidarte, and Leire Muguira
- Subjects
virtualization ,Xen hypervisor ,system-on-chip ,latency ,Cyclictest ,interrupt ,Technology - Abstract
Smart grid endpoints need to use two environments within a processing system (PS), one with a Linux-type operating system (OS) using the Arm Cortex-A53 cores for management tasks, and the other with a standalone execution or a real-time OS using the Arm Cortex-R5 cores. The Xen hypervisor and the OpenAMP framework allow this, but they may introduce a delay in the system, and some messages in the smart grid need a latency lower than 3 ms. In this paper, the Linux thread latencies are characterized by the Cyclictest tool. It is shown that when Xen hypervisor is used, this scenario is not suitable for the smart grid as it does not meet the 3 ms timing constraint. Then, standalone execution as the real-time part is evaluated, measuring the delay to handle an interrupt created in programmable logic (PL). The standalone application was run in A53 and R5 cores, with Xen hypervisor and OpenAMP framework. These scenarios all met the 3 ms constraint. The main contribution of the present work is the detailed characterization of each real-time execution, in order to facilitate selecting the most suitable one for each application.
- Published
- 2021
- Full Text
- View/download PDF
20. TDMA BASED DELAY SENSITIVE AND ENERGY EFFICIENT PROTOCOL FOR WBAN
- Author
-
REEMA GOYAL, H. S. BHADAURIA, R. B. PATEL, and D. PRASAD
- Subjects
PDA ,Interrupt ,Slot adjustment ,Emergency data ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Technology (General) ,T1-995 - Abstract
The fundamental function of Wireless Body Area Network (WBAN) is to convey information over short distances. Because of their tremendous potential in medical and home applications, WBANs have raised tremendous research interests in recent years. This paper presents an energy-efficient and delay sensitive medium access control (MAC) protocol suitable for communication in a WBAN for remote monitoring of physiological signals such as EEG, ECG etc. In the proposed scheme, sensors are allowed to interrupt the PDA in case of emergency so that immediate action may be taken to avoid any causality, hence provides support to deal with emergency data along with the normal data. For performance analysis viewpoints the proposed scheme is simulated and compared with IEEE 802.15.4 standard. The simulation results shows that the proposed scheme is better in QoS for emergency (higher priority) data and gives better performance in terms of the average transmission time and energy efficiency
- Published
- 2017
21. Predicting wax deposition using robust machine learning techniques
- Author
-
Cuthbert Shang Wui Ng, Menad Nait Amar, and Ashkan Jahanbani Ghahfarokhi
- Subjects
Variables ,Coefficient of determination ,Mean squared error ,media_common.quotation_subject ,Flow assurance ,Energy Engineering and Power Technology ,Geology ,Geotechnical Engineering and Engineering Geology ,Wax deposition ,Fuel Technology ,Geochemistry and Petrology ,Multilayer perceptron ,Interrupt ,Algorithm ,media_common ,Mathematics ,Specific gravity - Abstract
Accurate prediction of wax deposition is of vital interest in digitalized systems to avoid many issues that interrupt the flow assurance during production of hydrocarbon fluids. The present investigation aims at establishing rigorous intelligent schemes for predicting wax deposition under extensive production conditions. To do so, multilayer perceptron (MLP) optimized with Levenberg-Marquardt algorithm (MLP-LMA) and Bayesian Regularization algorithm (MLP-BR) were taught using 88 experimental measurements. These latter were described by some independent variables, namely temperature (in K), specific gravity, and compositions of C1–C3, C4–C7, C8–C15, C16–C22, C23–C29 and C30+.The obtained results showed that MLP-LMA achieved the best performance with an overall root mean square error of 0.2198 and a coefficient of determination (R2) of 0.9971. The performance comparison revealed that MLP-LMA outperforms the prior approaches in the literature.
- Published
- 2022
22. ES2: Building an Efficient and Responsive Event Path for I/O Virtualization
- Author
-
Ruhui Ma, Haibing Guan, Jian Li, and Hu Xiaokang
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Event (computing) ,Hypervisor ,Cloud computing ,computer.software_genre ,Virtualization ,Computer Science Applications ,Scheduling (computing) ,I/O virtualization ,Hardware and Architecture ,Operating system ,Latency (engineering) ,Interrupt ,business ,computer ,Software ,Information Systems - Abstract
Hypervisor intervention in the virtual I/O event path is a main performance bottleneck for I/O virtualization because of the incurred costly VM exits. The shortcomings of prior software solutions against virtual interrupt delivery, a major source of VM exits, promoted the emergence of the hardware-based Posted-Interrupt (PI) technology. PI can provide non-exit interrupt delivery without compromising any virtualization benefit. However, it only acts on the half of the event path, i.e., the interrupt path, while guests' I/O requests may also trigger a large amount of VM exits. Additionally, PI may still suffer a severe latency from the vCPU scheduling while delivering interrupts. Aiming at an optimal event path, we propose ES2 to simultaneously improve bidirectional I/O event delivery between guests and their devices. On the basis of PI, ES2 introduces hybrid I/O handling scheme for efficient I/O request delivery and intelligent interrupt redirection for enhanced I/O responsiveness. It does not require any modification to guest OS. We demonstrate that ES2 greatly reduces I/O-related VM exits with the exit handling time (EHT) below 2.5% for TCP streams and 0.1% for UDP streams, increases guest throughput by 1.9× for Memcached and 1.6× for Nginx, and keeps guest latency at a low level.
- Published
- 2022
23. Meta-Scheduling for the Wireless Downlink Through Learning With Bandit Feedback
- Author
-
Gustavo de Veciana, Sanjay Shakkottai, and Jianhan Song
- Subjects
Queueing theory ,Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,Throughput ,Meta-scheduling ,Computer Science Applications ,Scheduling (computing) ,Software deployment ,Telecommunications link ,Wireless ,Electrical and Electronic Engineering ,Interrupt ,business ,Software - Abstract
In this paper, we study learning-assisted multi-user scheduling for the wireless downlink. There have been many scheduling algorithms developed that optimize for a plethora of performance metrics; however a systematic approach across diverse performance metrics and deployment scenarios is still lacking. We address this by developing a meta-scheduler-given a diverse collection of schedulers, we develop a learning-based overlay algorithm (meta-scheduler) that selects that “best” scheduler from amongst these for each deployment scenario. More formally, we develop a multi-armed bandit (MAB) framework for meta-scheduling that assigns and adapts a score for each scheduler to maximize reward (e.g., mean delay, timely throughput etc.). The meta-scheduler is based on a variant of the Upper Confidence Bound algorithm (UCB), but adapted to interrupt the queuing dynamics at the base-station so as to filter out schedulers that might render the system unstable. We show that the algorithm has a poly-logarithmic regret in the expected reward with respect to a genie that chooses the optimal scheduler for each scenario. Finally through simulation, we show that the meta-scheduler learns the choice of the scheduler to best adapt to the deployment scenario (e.g. load conditions, performance metrics).
- Published
- 2022
24. Automatic Detection, Validation, and Repair of Race Conditions in Interrupt-Driven Embedded Software
- Author
-
Yu Wang, Tingting Yu, Xuandong Li, Linzhang Wang, Fengjuan Gao, and Jianhua Zhao
- Subjects
Embedded software ,Program analysis ,Resource (project management) ,Computer science ,business.industry ,Embedded system ,Concurrent computing ,Static analysis ,Interrupt ,Symbolic execution ,business ,Software ,Race condition - Abstract
Interrupt-driven programs are widely deployed in safety-critical embedded systems to perform hardware and resource dependent data operation tasks. The frequent use of interrupts in these systems can cause race conditions to occur due to interactions between application tasks and interrupt handlers (or two interrupt handlers). Numerous program analysis and testing techniques have been proposed to detect races in multithreaded programs. Little work, however, has addressed race condition problems related to hardware interrupts. In this paper, we present SDRacer, an automated framework that can detect, validate and repair race conditions in interrupt-driven embedded software. It uses a combination of static analysis and symbolic execution to generate input data for exercising the potential races. It then employs virtual platforms to dynamically validate these races by forcing the interrupts to occur at the potential racing points. Finally, it provides repair candidates to eliminate the detected races. We evaluate SDRacer on nine real-world embedded programs written in C language. The results show that SDRacer can precisely detect and successfully fix race conditions.
- Published
- 2022
25. Modified Z-Source DC Circuit Breaker With Enhanced Performance During Commissioning and Reclosing
- Author
-
Satish Naik Banavath, Venkata Raghavendra I, and Sreekanth Thamballa
- Subjects
Computer science ,business.industry ,Electrical engineering ,Thyristor ,Topology (electrical circuits) ,Inductor ,Fault (power engineering) ,law.invention ,Power (physics) ,Capacitor ,law ,Electrical and Electronic Engineering ,Interrupt ,business ,Circuit breaker - Abstract
Solid-state dc circuit breaker (SSCB) plays a very important role in the dc system protection against fast rising overload and short-circuit faults. Among various SSCB topologies, z-source dc circuit breakers (ZSCBs) have a great ability to interrupt the fault at a much faster rate, without even using a fault sensing circuit. However, ZSCBs suffer from various issues such as: 1) high starting current in the main thyristor (SCR), 2) unwanted power flow in the load during commissioning and reclosing of ZSCBs, and 3) negative current flow through the load at starting/reclosing of the ZSCB. These problems arise due to the fact that the z-source series capacitor stays charged even after the fault is interrupted or cleared. Unwanted power flow, negative current circulation in the load needs special attention especially in unidirectional loads and also in electromechanical systems. Hence, this article proposes a modified ZSCB to address the aforementioned problems. The proposed topology employs power semiconductor devices such as IGBTs to discharge the capacitor before the next interruption cycle. Initially, a detailed analysis, with simulation and experimental validation showing the issues with the existing ZSCB is presented. Later, a detailed analysis of the proposed modified ZSCB is presented, followed by an extensive simulation and experimental validation on a laboratory scale 120-V/3.5-A (400 W) prototype.
- Published
- 2022
26. Introduction to Interrupts
- Author
-
Brock J. LaMeres
- Subjects
Asynchronous communication ,Computer science ,Operating system ,Central processing unit ,Interrupt ,computer.software_genre ,Port (computer networking) ,computer ,Interrupt request - Abstract
This chapter introduces the concept of an interrupt (IRQ) as a way to efficiently deal with asynchronous external events that the CPU must handle [1–3]. The details of the MSP430 interrupt system are then presented and an example of using the port interrupts on the LaunchPad™ board is examined.
- Published
- 2023
27. Bringing up RISC-V Interrupts using Rust Programming Language
- Author
-
Ahmed, Aisha Khalid Mohamed, Informaatioteknologian ja viestinnän tiedekunta - Faculty of Information Technology and Communication Sciences, and Tampere University
- Subjects
SoC-Hub ,information technology ,ballast ,RISC-V ,Interrupt ,rust ,MPSoC ,Master's Programme in Information Technology ,programming - Abstract
RISC-V ISA is a popular open and royalty-free ISA that enables the development of low-cost Systems-on-Chip (SoCs). Ballast is a novel multicore RISC-V-based SoC developed by SoC Hub in collaboration with different companies for Internet of Things (IoT) applications. It includes multiple subsystems that feature three RISC-V cores. Interrupts allow processor power saving and fast interaction with external pe- ripherals. Having proper software support for interrupts enables easy and accurate configuration. Additionally, safety is a concern, and having a language that guar- antees safe operation, such as Rust, will minimize catastrophic bugs. This thesis outlines the process of implementing interrupt software support in the Ballast SoC using the Rust programming language, as well as test techniques for ensuring proper interrupts operation. Software support was implemented as part of Hardware Abstraction Layer (HAL), and two use cases were developed to test the implemented software and validate interrupts on the Ballast SoC development board. Interrupts were successfully brought up in Ballast SoC and were proven to func- tion correctly using the test methodologies introduced in this thesis. Moreover, the developed software support can easily be utilized on other SoCs that use similar cores (such as the new SoC Hub chip Headsail) by including it as a dependency crate using Cargo tool.
- Published
- 2023
28. ORACALL: An Oracle-Based Attack on Cellular Automata Guided Logic Locking
- Author
-
Hrivu Banerjee, Akashdeep Saha, Rajat Subhra Chakraborty, and Debdeep Mukhopadhyay
- Subjects
Combinational logic ,Discrete mathematics ,Sequential logic ,Computer science ,business.industry ,Encryption ,Computer Graphics and Computer-Aided Design ,Cellular automaton ,Oracle ,Logic gate ,State (computer science) ,Electrical and Electronic Engineering ,Interrupt ,business ,Software ,Computer Science::Cryptography and Security - Abstract
In logic locking, the finite-state machine (FSM) embedded in a sequential circuit is often chosen to be obfuscated. Such an obfuscation scheme using a class of nongroup additive cellular automata (CA) called $D1 * CA$ and $D1 * CA_{\mathrm{ dual}}$ to obfuscate each state transition of an FSM has been proposed previously. Since $D1 * CA$ and $D1 * CA_{\mathrm{ dual}}$ provide high testability even in the absence of scan-based design-for-testability techniques, they conceal the sequential elements, thus thwarting several existing scan-chain attacks. In this article, we introduce a novel attack to extract the secret key used to obfuscate each state transition of the FSM, by utilizing the information leaked by the leftmost CA cell, which is obtained via an oracle query to the obfuscated circuit. The proposed attack has two variants: 1) when the combinational circuit of the Interrupt Logic is not logic encrypted and 2) when the Interrupt Logic is logic encrypted with a $k$ -bit key. The first attack variant has a complexity of $\mathcal {O}(n \cdot m)$ , where $n$ denotes the number of transitions in the FSM, and $m$ denotes the maximum transition cycle length of the underlying $D1 * CA$ . The second attack variant has a complexity of $\mathcal {O}(n\cdot q_{\mathrm{ max}})$ , where $q_{\mathrm{ max}}$ denotes the maximum number of oracle queries (equal to the number of primary inputs involved in that state transition), followed by a SAT-attack to extract the $k$ -bit key of the corresponding Interrupt Logic . The experimental evaluation of the attack on CA-based obfuscated benchmark circuits establishes the effectiveness of our proposed attack.
- Published
- 2021
29. Reactive Designs of Interrupts in Circus Time
- Author
-
Wei, Kun, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Liu, Zhiming, editor, Woodcock, Jim, editor, and Zhu, Huibiao, editor
- Published
- 2013
- Full Text
- View/download PDF
30. Research and Improvement of Linux Real-Time Performance
- Author
-
Yang, Yang, Hua, LingLing, Kacprzyk, Janusz, editor, and Wu, Yanwen, editor
- Published
- 2012
- Full Text
- View/download PDF
31. Dynamic Race Detection Techniques for Interrupt-Driven Programs
- Author
-
Tchamgoue, Guy Martin, Kim, Kyong Hoon, Jun, Yong-Kee, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Kim, Tai-hoon, editor, Lee, Young-hoon, editor, and Fang, Wai-chi, editor
- Published
- 2012
- Full Text
- View/download PDF
32. Investigating Time Properties of Interrupt-Driven Programs
- Author
-
Huang, Yanhong, Zhao, Yongxin, Shi, Jianqi, Zhu, Huibiao, Qin, Shengchao, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Gheyi, Rohit, editor, and Naumann, David, editor
- Published
- 2012
- Full Text
- View/download PDF
33. AC Current Interruption Characteristics of Liquid Nitrogen
- Author
-
Zhiyuan Liu, Li Hongxu, Yingsan Geng, Youping Tu, Jianhua Wang, Muhammad Junaid, Bin Xiang, and Dongyu Wang
- Subjects
Electric arc ,Materials science ,Nuclear engineering ,Water cooling ,Superconducting magnet ,Electrical and Electronic Engineering ,Liquid nitrogen ,Current (fluid) ,Interrupt ,Condensed Matter Physics ,Switchgear ,Electronic, Optical and Magnetic Materials ,Power (physics) - Abstract
There is an increasing tendency to integrate several High-temperature superconducting equipment into a network. Along with it is the increasing demand for cryogenic power switches that could work in the liquid nitrogen (LN2) to reduce temperature transfer areas. However, none of the current AC arc extinguishing mediums could work reliably in the LN2. As the insulation and cooling medium of the HTS equipment, LN2 can be a potential arc extinguishing medium due to its strong cooling effect. However, the AC interruption performance of LN2 is unknown up to now. The objective of this paper is to obtain the AC interruption performance of the LN2. A free-burning type and a magnetic blowout type LN2 switch are tested, respectively. Current ranging from 1 kA to 6.3 kA is conducted. Heat loss of the arcing process is also calculated. Experimental results show that a 2700 A AC is successfully interrupted by the free burning type switch at a 10 mm gap. The increase of the contact gap leads to slight growth in current interruption ability. Meanwhile, the magnetic blowout type can interrupt an AC higher than 6300 A. Based on the high interrupting properties of LN2, a potential application in novel environmentally friendly switchgear is proposed. The LN2 switch in the switchgear can switch the closed-loop current that could be typically more than 50% of the continuous current. Meanwhile, the heat loss generated during the arcing process will not add an extra burden to the cooling system of the switchgear.
- Published
- 2021
34. Controlled Fast Vacuum Breaking of an AC Short-Circuit Current in a Short-arcing Time
- Author
-
Shaogui Ai, Xiaofei Yao, Jianagang Ding, Chen Guan, Yingsan Geng, Zhiyuan Liu, Kui Ma, and Jianhua Wang
- Subjects
Computer science ,business.industry ,Electrical engineering ,Transmission system ,AC power ,Condensed Matter Physics ,Fault (power engineering) ,Electronic, Optical and Magnetic Materials ,Power (physics) ,Transient (oscillation) ,Electrical and Electronic Engineering ,Interrupt ,business ,Short circuit ,Circuit breaker - Abstract
A quick elimination of short-circuit faults in a short time can significantly promote the transient stability of an AC power grid. This paper proposes controlled fast vacuum breaking (CFVB) of a short-circuit current within a short-arcing time. The CFVB technology performs the following: determining a lower-limit opening speed of 3.5 m/s for a 40.5 kV fast vacuum circuit breaker (FVCB), quickly predicting the fault current-zero within 4.0 ± 0.4 ms to command the FVCB to open at a selected current phase-angle, and optimizing an electromagnetic repulsion actuator with an opening time of 2.5 ± 0.05 ms to achieve an accurate opening operation. The CFVB technology was deployed in a prototype of single-phase multiple-break 363 kV FVCB to validate its feasibility. The validation involved test duties of T100s(b) and T100a following standards IEC 62271-100 2017 and GB/T 1984–2014. Test results demonstrated that by adopting the CFVB technology, the 363 kV FVCB can successfully interrupt a fault current of 80 kA rms within the first half-wave fault current with a short-arcing time of 2.5 ms. Further application of the CFVB technology could help promote the transient stability of power distribution and transmission systems.
- Published
- 2021
35. Resolving visual motion through perceptual gaps
- Author
-
Grace Edwards, Chris I. Baker, and Lina Teichmann
- Subjects
business.industry ,Cognitive Neuroscience ,media_common.quotation_subject ,Motion Perception ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Experimental and Cognitive Psychology ,Object (philosophy) ,Article ,Motion (physics) ,Visual motion ,Neuropsychology and Physiological Psychology ,Perception ,Humans ,Computer vision ,Artificial intelligence ,Interrupt ,Psychology ,business ,Phenomenology (particle physics) ,ComputingMethodologies_COMPUTERGRAPHICS ,media_common - Abstract
Perceptual gaps can be caused by objects in the foreground temporarily occluding objects in the background or by eyeblinks, which briefly but frequently interrupt visual information. Resolving visual motion across perceptual gaps is particularly challenging, as object position changes during the gap. We examine how visual motion is maintained and updated through externally driven (occlusion) and internally driven (eyeblinks) perceptual gaps. Focusing on both phenomenology and potential mechanisms such as suppression, extrapolation, and integration, we present a framework for how perceptual gaps are resolved over space and time. We finish by highlighting critical questions and directions for future work.
- Published
- 2021
36. RB Allocation Scheme for eMBB and URLLC Coexistence in 5G and Beyond
- Author
-
Huan Zhang, Xiaodong Guo, and Xuefen Zhang
- Subjects
Technology ,Mathematical optimization ,Article Subject ,Computer Networks and Communications ,Computer science ,Reliability (computer networking) ,Mobile broadband ,TK5101-6720 ,Multiplexing ,Constraint (information theory) ,Transmission (telecommunications) ,Telecommunication ,Resource allocation ,Electrical and Electronic Engineering ,Interrupt ,5G ,Information Systems - Abstract
In this paper, we studied resource allocation in a dynamic multiplexing scenario of two 5G services, namely, enhanced mobile broadband (eMBB) and ultrareliable low-latency communication (URLLC). Considering that eMBB services focus on high data rates while URLLC is very strict in terms of latency and reliability, we formulate a joint eMBB/URLLC resource allocation problem. To solve the formulated problem, in particular, we propose a joint resource allocation algorithm that can satisfy both eMBB user rate and URLLC interrupt probability requirements. We propose an RB allocation scheme that takes into account the needs of eMBB and URLLC users. The program consists of two phases as follows: (1) establish an RB allocation for eMBB users and (2) assign the minislot for URLLC users and calculate the transmission power of URLLC users that ensures the reliability constraint. We also realize and verify the algorithm through the simulation.
- Published
- 2021
37. A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks
- Author
-
M. L. Radziukevich
- Subjects
common cryptographic key ,Relation (database) ,Artificial neural network ,secret modification ,business.industry ,Computer science ,Binary number ,Cryptography ,cryptographic strength ,Information technology ,T58.5-58.64 ,Pseudorandom binary sequence ,combined method ,Symmetric-key algorithm ,Synchronization (computer science) ,Interrupt ,business ,Algorithm ,Computer Science::Cryptography and Security ,synchronized artificial neural networks - Abstract
This article discusses one of the ways to generate a common cryptographic key using synchronized artificial neural networks. This option is based on a combined method of forming a cryptographic key [1]. The proposed combined formation consists of two stages: the formation of partially coinciding binary sequences using synchronized artificial neural networks and the elimination of mismatched bits by open comparison of the parities of bit pairs. The purpose of this article is to increase the cryptographic strength of this method in relation to a cryptanalyst. In this regard, it is proposed to prematurely interrupt the synchronization process at the first stage of the combined method and make changes to the resulting binary sequence by randomly inverting a certain number of bits. To confirm the quality of this method, possible attacks are considered and the scale of enumeration of possible values is illustrated. The results obtained showed that the combined method of forming a cryptographic key with a secret modification of the synchronization results of artificial neural networks, proposed in this article, provides its high cryptographic strength, commensurate with the cryptographic strength of modern symmetric encryption algorithms, with a relatively simple implementation.
- Published
- 2021
38. An Ensemble Approach to Control Network Traffic on IoT
- Author
-
K.V.V.Satyanarayana and K. Sree Lakshmi
- Subjects
Task (computing) ,Computer science ,business.industry ,Network packet ,Server ,General Engineering ,Control network ,Window (computing) ,Interrupt ,business ,Internet of Things ,Computer network - Abstract
Cyber security is most widely seen in many domains. From various domains these attacks plays the major role in damaging the servers and making websites unavailable. Many challenges are facing with the various cyber attacks.Internet of Things (IoT) is most widely used to define as a pervasive network of a (broad) range of connected smart nodes that offer diverse digital services, including the collection of environmental and user data. Detection of cyber attacks is difficult task and this may cause the loss of data packets and may interrupt the server. In this paper, the Enhancement is developed to handle the attack packets effectively. This is the window based application i,e based on the window size the data is processed. The Enhancement is called as an Amplified and Forward for Bi- Directional traffic from Attacks. This is very significant model to detect the several types of attacks that occur in IoT. Results show the performance of proposed system.
- Published
- 2021
39. A novel unsupervised method for anomaly detection in time series based on statistical features for industrial predictive maintenance
- Author
-
Herberth Birck Fröhlich, Laure Siret, Renan Bonnard, Márcio da Silva Arantes, and Jesimar da Silva Arantes
- Subjects
Downtime ,Receiver operating characteristic ,Computer science ,Applied Mathematics ,Univariate ,computer.software_genre ,Predictive maintenance ,Computer Science Applications ,Computational Theory and Mathematics ,Modeling and Simulation ,Benchmark (computing) ,Anomaly detection ,Data mining ,Time series ,Interrupt ,computer ,Information Systems - Abstract
Industrial production processes are increasingly collecting data from machines in operation due to the cost reduction and popularization of sensor technologies. Valuable information is generated by using the right sensors and proper techniques on the machine’s current state in operation. This extraction allows detecting whether the machine is operating in a degraded state and then, if necessary, interrupts its operation before it goes into a broken state. The detection of the abnormal behavior of a machine is relevant since detection at the right time can reduce financial costs due to machine breakdown and production downtime. This work proposes a novel unsupervised method to detect anomalies in industrial machines and interrupt their operation before this machine goes into a state of breakdown. The proposed method receives as input a set of time series data from several sensors. Using a collection of statistical features, it calculates an indicator that characterizes the failure’s severity, issuing an alert to the machine operator if necessary. The method was evaluated in two benchmarks with known univariate data and two proprietary datasets with multivariate data. Conducted experiments revealed the low computational time spent on training and on evaluation. Overall results measured in Area Under the Receiver Operating Characteristic Curve (AUC) in Yahoo’s benchmark were 89.3%; in Numenta, it was 70.3%, and in the two multivariate datasets evaluated, it was 92.4% and 91.2%. These high AUC values reveal the potential of the proposed method applied in predictive maintenance in a large soybean oil production industry.
- Published
- 2021
40. An approximate dynamic programming approach to project scheduling with uncertain resource availabilities
- Author
-
Haitao Li, Zhe Xu, and Fang Xie
- Subjects
Mathematical optimization ,Computer science ,Property (programming) ,Heuristic (computer science) ,Applied Mathematics ,02 engineering and technology ,Base (topology) ,01 natural sciences ,Dynamic programming ,020303 mechanical engineering & transports ,Resource (project management) ,0203 mechanical engineering ,Modeling and Simulation ,0103 physical sciences ,Markov decision process ,Interrupt ,Heuristics ,010301 acoustics - Abstract
We study the stochastic resource-constrained project scheduling problem with uncertain resource availability, called SRCPSP-URA, and model it as a sequential decision problem. A new Markov decision process (MDP) model is developed for the SRCPSP-URA. It dynamically and adaptively determines not only which activity to start at a stage, but also which to interrupt and delay when there is not sufficient resource capacity. To tackle the curse-of-dimensionality of an exact solution approach, we devise and implement a rollout-based approximate dynamic programming (ADP) algorithm with priority-rule heuristic as the base policy, for which theoretical sequential improvement property is proved. Computational results show that with moderately more computational time, our ADP algorithm significantly outperforms the priority-rule heuristics for test instances up to 120 activities.
- Published
- 2021
41. Accelerate Monte Carlo Simulation for Probability Measures by an Interrupt Mechanism
- Author
-
Shuping Dang, Mohamed-Slim Alouini, and Basem Shihada
- Subjects
Mathematical optimization ,Computer science ,Monte Carlo method ,Complex system ,Computational resource ,Computer Science Applications ,Consistency (database systems) ,Modeling and Simulation ,A priori and a posteriori ,Electrical and Electronic Engineering ,Interrupt ,Astrophysics::Galaxy Astrophysics ,Statistical hypothesis testing ,Probability measure - Abstract
Monte Carlo simulation (MCS) is useful for verifying analytical derivations and studying complex systems on an empirical basis. Although MCS is straightforward and does not require a priori knowledge of the sampled probability measures (PMs), it consumes a tremendous amount of computational resource and suffers from slow simulation procedures for sophisticated systems. To mitigate this drawback of MCS, we make full use of the monotone property and the logarithmic presentation convention of PMs in regard to power related metrics (PRMs) in communications science and propose an easy-to-implement interrupt mechanism to accelerate MCS for estimating PMs. To facilitate the programming on different platforms and provide a solid theoretical foundation, we present a generic implementation framework suited for estimating PMs with certain properties by MCS and analyze the underlying theory of the interrupt mechanism. In particular, we apply the de Moivre-Laplace theorem and analytic continuation to prove the asymptotic consistency under the indirect setup of MCS. We also design a hypothesis test for studying the proposed mechanism on a statistical basis.
- Published
- 2021
42. An Efficient and Reliable Solid-State Circuit Breaker Based on Mixture Device
- Author
-
Chao Liu, Xiaorui Xu, Bo Zhang, Ruize Sun, Wanjun Chen, and Zhaoji Li
- Subjects
Computer science ,020208 electrical & electronic engineering ,Thyristor ,Topology (electrical circuits) ,02 engineering and technology ,Automotive engineering ,Power (physics) ,Reliability (semiconductor) ,Overvoltage ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Interrupt ,Circuit breaker ,Voltage - Abstract
In this letter, a novel solid-state circuit breaker (SSCB) based on mixture device (MD-SSCB) is proposed for dc distribution systems. The proposed MD-SSCB can actively interrupt faults without introducing additional thyristor, charging power supply, and charging strategies. Besides, the interruption capability of the MD-SSCB is not affected by the parameters of the outer circuit. As a result, the MD-SSCB has advantages of compact structure, economic design, high efficiency, and high reliability. Moreover, the MD-SSCB can turn off its thyristors without reverse voltage stress, which eliminates the severe reverse overvoltage problem in the fault-interrupting process, and hence further enhances the reliability of the breaker. Detailed operation principle and design guidelines of the MD-SSCB are discussed through mathematical modeling. The feasibility of the proposed breaker is validated by experimental results.
- Published
- 2021
43. On the Influence of Charging Stations Spatial Distribution on Aerial Wireless Networks
- Author
-
Yujie Qin, Mustafa A. Kishk, and Mohamed-Slim Alouini
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Battery (electricity) ,Queueing theory ,Computer Networks and Communications ,Renewable Energy, Sustainability and the Environment ,Wireless network ,Computer science ,Real-time computing ,Drone ,Computer Science - Networking and Internet Architecture ,Charging station ,Hardware_GENERAL ,Interrupt ,Stochastic geometry ,Energy harvesting - Abstract
Using drones for cellular coverage enhancement is a recent technology that has shown a great potential in various practical scenarios. However, one of the main challenges that limits the performance of drone-enabled wireless networks is the limited flight time. In particular, due to the limited on-board battery size, the drone needs to frequently interrupt its operation and fly back to a charging station to recharge/replace its battery. In addition, the charging station might be responsible to recharge multiple drones. Given that the charging station has limited capacity, it can only serve a finite number of drones simultaneously. Hence, in order to accurately capture the influence of the battery limitation on the performance, it is required to analyze the dynamics of the time spent by the drones at the charging stations. In this paper, we use tools from queuing theory and stochastic geometry to study the influence of each of the charging stations limited capacity and spatial density on the performance of a drone-enabled wireless network.
- Published
- 2021
44. A Taxonomy of Concurrency Bugs in Event-Driven Programs
- Author
-
Tchamgoue, Guy Martin, Ha, Ok-Kyoon, Kim, Kyong-Hoon, Jun, Yong-Kee, Kim, Tai-hoon, editor, Adeli, Hojjat, editor, Kim, Haeng-kon, editor, Kang, Heau-jo, editor, Kim, Kyung Jung, editor, Kiumi, Akingbehin, editor, and Kang, Byeong-Ho, editor
- Published
- 2011
- Full Text
- View/download PDF
45. Embedded VxWorks System of Touch Screen Interrupt Handling Mechanism Design Based on the ARM9
- Author
-
Gai-ning, Han, Yong-feng, Li, and Zhu, Min, editor
- Published
- 2011
- Full Text
- View/download PDF
46. Polyphonic manifestations of pedagogy: Epilog(s) that interrupt sense(s).
- Author
-
GRINBERG, Silvia and PORTA, Luis
- Subjects
- *
EDUCATION , *TEACHING , *SCHOOLS - Abstract
We propose four irruptions as an epilogue, they seek tensions and meanings in relation to the task of education and pedagogy that, as a conceptual record, offers us lines to inhabit and think about the world in which we live, but also the one we would like to live. Multiple claims and recipes resonate for education in the digital age. Since the end of the last century, education policies have moved between two vertices: crisis and reforms. Reforms of schooling that have been launched in the most diverse countries and regions that make up the globalized world promising answers to this question. It is in this climate of time that Biesta and Säfström propose their manifesto for education where, as they point out, moving between what is and what is not, has become the crossroads for contemporary schooling. Probably, this image is one of the most global in the globalized world. Of course, its effects and local affections are multiple and diverse. This dossier is installed there: to inhabit the educational word, to ask about it. This calls for the imperative need to be manifested by education in a way that allows us to escape a duality that has done nothing but undermine the school without offering lines with which to weave other plots. Interrupting is also the challenge for a theory of education that tries to escape to the crossroads by staying in tension, destabilizing the future by recognizing its openness, opening the possibility to different future potentials. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
47. Improvement of Erection Related Incision Pain in Circumcision Patients using Interrupted Rapid Eye Movement Sleep: A Randomized Controlled Study.
- Author
-
A-juan Dai, Miao Li, Li-li Wang, Ting Liu, Xiao-hua Wang, and Yu-hua Huang
- Subjects
- *
PENILE erection , *RAPID eye movement sleep , *CIRCUMCISION , *PAIN , *RANDOMIZED controlled trials - Abstract
Introduction: Postoperative pain from male circumcision (MC) is common especially in the sleep-related erection period. This study aims to explore the effect of interrupted rapid eye movement (IREM) sleep on relieving SRE-related incision pain and the improvement of other clinical outcomes. Materials and Methods: This simple randomized controlled study was conducted between May and November 2016. Approval was obtained from the local ethical committee on 5 May 2016. Ninety participants who underwent male circumcision were divided into the interrupted rapid eye movement sleep group and the control group. The times and the cumulative time of erection-related moderate and severe pain in minutes at night for 3 days after the operation were observed and compared. We also compared the condition of the incision swelling and healing. Sleep time at night was used to evaluate the safety of interrupted rapid eye movement sleep. Results: For the first 3 days after the operation, the times of sleep-related erection pain were significantly decreased in the IREM sleep group (P = .010). Five patients reported that there was no pain during night. The cumulative time of erection-related moderate and severe pain was statistically decreased in the interrupted rapid eye movement sleep group (P = .034). After 3 days, there was no moderate and severe pain related to sleep-related erection in the 2 groups. There were no significant differences in incision swelling (P = .768), healing (P = .626), and sleep time (P = .231). Conclusion: Interrupted rapid eye movement sleep is an effective, simple, and free treatment to relieve incision pain of sleep-related erections. [ABSTRACT FROM AUTHOR]
- Published
- 2018
48. MIXED HARMONIC RUNNABLE SCHEDULING FOR AUTOMOTIVE SOFTWARE ON MULTI-CORE PROCESSORS.
- Author
-
Kyung-Jung Lee, Jae-Woo Kim, Hyuk-Jun Chang, and Hyun-Sik Ahn
- Subjects
- *
AUTOMOBILE software , *AUTOMOTIVE electronics , *PRODUCTION scheduling , *MULTICORE processors , *PERFORMANCE of automobiles , *ALGORITHMS - Abstract
The performance of automotive electronic control units (ECUs) has improved following the development of multi-core processors. These processors facilitate fast computing performance without increasing clock speed. System developers partition automotive application runnables to have parallelizability and avoid interference between various software modules. To improve the performance of such systems, an efficient scheduler is necessary. In this regard, for multicore ECUs, the automotive open system architecture (AUTOSAR) suggests partitioned static priority scheduling for parallelized software. In the AUTOSAR approach, clustering and partitioning of runnables for specific cores becomes difficult, but there is no exact criterion followed for partitioning the runnables. Consequently, cores are not balanced against loads, and under contingency conditions, there is a chance that tasks will miss deadlines. In this study, we address this problem by exploring a mixed harmonic runnable scheduling algorithm that includes partitioned scheduling. We tested this algorithm using high load conditions under contingency consequences, and we evaluated it using models of periodic runnables, periodic interrupts, and event-triggered interrupts. The performance parameters considered in this paper are balancing performance and the deadline missing rate. Our results indicate that the proposed algorithm can contribute toward improving the functional safety of vehicles. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
49. 支持安全策略检查的用户态驱动框架研究.
- Author
-
陈昊, 罗蕾, 李允, and 陈丽蓉
- Abstract
Device drivers play critical roles in overall security and reliability of an operating system. However, the complexity and variety make them unexpected to be trusted. Recent efforts have demonstrated that running device drivers in the user-space will improve the system reliability and reduce the difficulty of driver development. However, it also brings in potential threats. This paper presented a general lightweight user-level driver framework dedicated to security purpose. The framework restricted the possible behaviors of a driver in a secure boundary by integrating security strategies into a kernel-level command interpreter, and thus, ensured the security and isolation of device drivers. The evaluation shows that minor overhead will imposed to the system when compares to the kernel-level device drivers, and this overhead does not make a significant impact to the system performance. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
50. A novel control system simulation modeling method considering the real hardware platform and the software structure.
- Author
-
Du, Pengcheng, Liu, Jiaxi, Lv, Kun, Pei, Le, and Li, Liyi
- Subjects
- *
COMPUTER software , *PARAMETER estimation , *SIMULATION methods & models , *COMPUTER algorithms - Abstract
During the realization of a control algorithm for the practical motor driver system, simulation is an important procedure before the algorithm is implanted into the DSP chip. In most circumstances, the simulation is done before the algorithm is realized, which is simulated under the condition of continuous control system. However, the simulation neglects the effect of the discrete system caused by the software structure, which the algorithm in DSP is triggered by the events trigger interrupt. Moreover, the model is complicated and cannot reflect the real hardware and the pipelined algorithm. Furthermore, the accuracy and running time of the simulation model are controlled by the simulation step setting. In this paper, a novel discrete simulation model is realized and introduced to consider the effect of both hardware and software and to reduce the running time with a considerable accuracy. The unification of the parameters is also considered in the model to make the system more efficient. The result reveals that the proposed method reflects the effect of both the real hardware and the software, which form a close loop between the simulation and algorithm realization. The simulation runtime is reduced, while the accuracy is unchanged, and it is suitable for the simulation of high-speed motor driver system. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.