scispace - formally typeset
Search or ask a question

Showing papers on "Application software published in 2019"


Journal ArticleDOI
TL;DR: A convenient, integrated automatic log-in platform with powerful security has been constructed using a smartphone-based fingerprint recognition function using the blockchain theory to prepare against tampering/forging/leaking of a user’s fingerprint information by hackers.
Abstract: Door locks and user authentication are the major issues in the current banking industry. There are a number of user future computing techniques, and security is especially essential to these methods. Existing digital door locks have the problem of opening easily with a stolen PIN number or by electrical shock. Thus, this study proposed and implemented an integrated automatic log-in platform based on mobile fingerprint recognition by applying the blockchain theory. As a result of this research, a convenient, integrated automatic log-in platform with powerful security has been constructed using a smartphone-based fingerprint recognition function. There are three major functions of the platform. First, it is possible to authenticate the user in PC, mobile device, and IoT environments through fingerprint recognition. Second, the platform includes SDK to develop application software for user authentication and IoT services. Last is its strengthened security using the blockchain theory to prepare against tampering/forging/leaking of a user’s fingerprint information by hackers.

77 citations


Proceedings ArticleDOI
21 Oct 2019
TL;DR: The main intent of this work is to improve the reliability of autonomous systems, providing a strategy to link the verification methodology with the testing one, and it is possible to derive a different set of patterns intended for on-line testing.
Abstract: In the last decade, a growing number of electronic devices have been designed to be deployed in safety-critical autonomous systems. Many application domains, such as autonomous vehicles, robots, nano-drones, are exploring artificial intelligence solutions to handle the increasing computation requirements. Besides, due to their safety-critical application scenarios, they are demanding for even more reliable and advanced systems. These requirements clearly entail a growing complexity in modern processors and System-on-a-Chip design, leading to new efforts in verification and testing phases. These new devices must be also compliant with emerging functional safety standards that regulate their usage during the entire lifetime. The main intent of this work is to improve the reliability of autonomous systems, providing a strategy to link the verification methodology with the testing one. Starting from an almost exhaustive verification set, it is possible to derive a different set of patterns intended for on-line testing. This achievement is gained by taking into account the constraints due to the final system application and the common requirements of the embedded devices used in autonomous systems. Experimental results are provided on an open-source RISC-V processor assembled on an autonomous nano-drone.

14 citations


Journal ArticleDOI
TL;DR: In this paper, the authors present techniques to enjoy the benefits of persistent memory programming on conventional hardware using byte-addressable non-volatile memory (NVM) for managing persistent application state.
Abstract: Driven by the advent of byte-addressable non-volatile memory, the persistent memory style of programming will gain traction among developers, taking its rightful place alongside existing paradigms for managing persistent application state. Until NVM becomes available on all computers, developers can use the techniques presented in this article to enjoy the benefits of persistent memory programming on conventional hardware.

12 citations


Proceedings ArticleDOI
29 May 2019
TL;DR: This paper analyses performance trade-offs of secure boot for medium-scale embedded systems, such as Beaglebone and Raspberry Pi, and evaluates two secure boot techniques, one is only software-based, and the second is supported by a hardware-based cryptographic storage unit.
Abstract: With the proliferation of the Internet of Things (IoT), the need to prioritize the overall system security is more imperative than ever. The IoT will profoundly change the established usage patterns of embedded systems, where devices traditionally operate in relative isolation. Internet connectivity brought by the IoT exposes such previously isolated internal device structures to cyber-attacks through the Internet, which opens new attack vectors and vulnerabilities. For example, a malicious user can modify the firmware or operating system by using a remote connection, aiming to deactivate standard defenses against malware. The criticality of applications, for example, in the Industrial IoT (IIoT) further underlines the need to ensure the integrity of the embedded software. One common approach to ensure system integrity is to verify the operating system and application software during the boot process. However, safety-critical IoT devices have constrained boot-up times, and home IoT devices should become available quickly after being turned on. Therefore, the boot-time can affect the usability of a device. This paper analyses performance trade-offs of secure boot for medium-scale embedded systems, such as Beaglebone and Raspberry Pi. We evaluate two secure boot techniques, one is only software-based, and the second is supported by a hardware-based cryptographic storage unit. For the software-based method, we show that secure boot merely increases the overall boot time by 4%. Moreover, the additional cryptographic hardware storage increases the boot-up time by 36%.

12 citations


Journal ArticleDOI
25 Dec 2019
TL;DR: Article is devoted to development of SCADA-component for trunk gas pipeline's compressor workshop, based on «Windows» operating system and integrated environment TRACE MODE (SCADA/HMI).
Abstract: Nowadays, at all levels of created automated control systems for technological processes, programmable technical means are used that require specific software within framework of necessary functional tasks. This software should include a set of software tools that communicate with technical devices and organize «human-machine interface» (HMI) in the form of application software for AWPs with assigned communication tasks for persons, responsible for management decision-making: operators, dispatchers, managers. However, hardware architecture is unique for each particular case, so it is necessary to refine or create a new control system. This is a rather laborious process. To simplify creation of such systems SCADA-systems are used.Article is devoted to development of SCADA-component for trunk gas pipeline's compressor workshop. Developed component allows tracking the characteristics of gas transportation process selected by operator. Development is based on «Windows» operating system and integrated environment TRACE MODE (SCADA/HMI).

12 citations




Journal ArticleDOI
TL;DR: The results show that the LibHSA infrastructure greatly simplifies the effort integrating FPGAs and customized hardware into existing accelerator systems, runtimes and application software.
Abstract: Heterogeneous computing plays an ever-increasing role in power-efficient, high-performance embedded systems for various data processing tasks, such as computer vision. One possibility to accelerate this kind of application is the usage of FPGAs as a co-processor for standard CPUs. Although hardware design is becoming easier by utilizing High-Level-Synthesis tools, the question of interfacing FPGAs and CPUs has yet to be completely solved. The Heterogeneous System Architecture (HSA) Foundation defines and publishes architecture neutral standards for heterogeneous systems and programming models. While compatible CPU, GPU and DSP designs exist, FPGA models have not been defined yet. This paper describes the IP library LibHSA, which greatly simplifies integration of domain specific FPGA acceleration into existing HSA compliant systems. It allows FPGA based accelerators to take immediate advantage of high-level language tool chains. Including user space memory access, low-latency task dispatch and other benefits of the HSA programming model. We will demonstrate LibHSA with a programmable image processor implementation on a Xilinx FPGA. The image processor supports low-level algorithms, e.g. Sobel, Median, Laplace, or Gaussian. Our results show that the LibHSA infrastructure greatly simplifies the effort integrating FPGAs and customized hardware into existing accelerator systems, runtimes and application software.

9 citations


Journal ArticleDOI
TL;DR: The anti-ageing model (SEANA model) is proposed to support in preventing the software from prematurely aged, thus prolong its usage and sustainable in their environment and further support the greenness and sustainability of software products.
Abstract: Software ageing is a phenomenon that normally occurs in a long running software. Progressive degradation of software performance is a symptom that shows software is getting aged and old. Researchers believe that the ageing phenomenon can be delayed by applying anti-ageing techniques towards the software or also known as software rejuvenation. Software ageing factors are classified into two categories: internal and external factors. This study focuses on external factors of software ageing, and are categorized into three main factors: environment, human and functional. These three factors were derived from empirical study that been conducted involving fifty software practitioners in Malaysia. The anti-ageing model (SEANA model) is proposed to support in preventing the software from prematurely aged, thus prolong its usage and sustainable in their environment. SEANA model is implemented in collaboration with a government agency in Malaysia to verify and validate the model in real environment. The prototype of SEANA model was developed and applied in the real case study. Furthermore, the anti-ageing guideline and actions are suggested for ageing factors to delay the ageing phenomenon in application software and further support the greenness and sustainability of software products.

8 citations


Journal ArticleDOI
TL;DR: For optimizing the usage of yarn in a spindle traverse movement, a high-performance implementation a heuristic genetic algorithm (GA) that allows achieving the optimization task efficiently is presented.
Abstract: To achieve a high productive manufacturing ability and reduce dead yarn accumulation, a novel computer numerical control (CNC) machine and an efficient methodology was proposed to generate optimal or near optimal sequences of tool paths for minimizing manufacturing time. Two methods are available to generate complicated and customized photo-based carpets: to fit pre-drawn curves on a fabric backing by using a portable tufting gun and to generate available tool paths from a computer-aided manufacturing (CAM) system for a robotic tufting gun. These two operations are not suitable for high-speed applications. The solution proposed in this study starts from the original needle location paths provided by computer graphic software to solve a traversing tuft problem (TTP). The obstacle of the innovative manufacturing process, in reducing the time of the travel path for the tufting of the CNC machine, was solved. The methodology can be easily implemented using a CAM system. Several industrial experiments were proposed, which demonstrate substantial improvements of the proposed algorithm over solutions provided by application software. Moreover, for optimizing the usage of yarn in a spindle traverse movement, we present a high-performance implementation a heuristic genetic algorithm (GA) that allows achieving the optimization task efficiently. A graphical user interface that integrates the entire process was presented.

8 citations


Posted Content
TL;DR: A framework for the design of deterministic automotive software that transparently integrates with the AP communication mechanisms is proposed and illustrated in a case study based on the brake assistant demonstrator application provided by the AUTOSAR consortium.
Abstract: AUTOSAR Adaptive Platform is an emerging industry standard that tackles the challenges of modern automotive software design, but does not provide adequate mechanisms to enforce deterministic execution. This poses profound challenges to testing and maintenance of the application software, which is particularly problematic for safety-critical applications. In this paper, we analyze the problem of nondeterminism in AP and propose a framework for the design of deterministic automotive software that transparently integrates with the AP communication mechanisms. We illustrate our approach in a case study based on the brake assistant demonstrator application that is provided by the AUTOSAR consortium. We show that the original implementation is nondeterministic and discuss a deterministic solution based on our framework.

Journal ArticleDOI
TL;DR: In this paper, the authors developed a workflow to run and share computational studies on the public cloud Microsoft Azure, which uses Docker containers to create an image of the application software stack and adopt several tools that facilitate creating and managing virtual machines on compute nodes and submitting jobs to these nodes.
Abstract: In a new effort to make our research transparent and reproducible by others, we developed a workflow to run and share computational studies on the public cloud Microsoft Azure. It uses Docker containers to create an image of the application software stack. We also adopt several tools that facilitate creating and managing virtual machines on compute nodes and submitting jobs to these nodes. The configuration files for these tools are part of an expanded "reproducibility package" that includes workflow definitions for cloud computing, in addition to input files and instructions. This facilitates re-creating the cloud environment to re-run the computations under the same conditions. Although cloud providers have improved their offerings, many researchers using high-performance computing (HPC) are still skeptical about cloud computing. Thus, we ran benchmarks for tightly coupled applications to confirm that the latest HPC nodes of Microsoft Azure are indeed a viable alternative to traditional on-site HPC clusters. We also show that cloud offerings are now adequate to complete computational fluid dynamics studies with in-house research software that uses parallel computing with GPUs. Finally, we share with the community what we have learned from nearly two years of using Azure cloud to enhance transparency and reproducibility in our computational simulations.


Journal ArticleDOI
TL;DR: Perceived ease of use was directly and indirectly related to attitude towards the use of business software through its effect on perceived usefulness, whereas attitude towardsThe use ofbusiness software strongly affected the intention to use the software.
Abstract: Business schools strive to improve students’ analytical skills by incorporating advanced business application software courses into their curricula. This study examined how business school students perceived the ease of using the software and the usefulness of using the software in learning. The study also explored whether and how students’ perceived ease of use and usefulness of the software affected their attitude towards the use of business software and their intention to use the software. Data were collected from 159 Chinese business school students in a higher education institution in Macao. Results showed students generally agreed the software was easy to learn and use, and they agreed the software was useful. The results of structural equation modeling showed that perceived ease of use was directly and indirectly related to attitude towards the use of business software through its effect on perceived usefulness, whereas attitude towards the use of business software strongly affected the intention to use the software.

Proceedings ArticleDOI
01 Jan 2019
TL;DR: Inuksuk as mentioned in this paper relies on today's Trusted execution environments (TEEs) as available both on the CPU and storage device, to achieve programmable write protection, where the focus is on armoring data instead of counteracting malware.
Abstract: Unauthorized data alteration has been a longstanding threat since the emergence of malware. System and application software can be reinstalled and hardware can be replaced, but user data is priceless in many cases. Especially in recent years, ransomware has become high-impact due to its direct monetization model. State-of-the-art defenses are mostly based on known signature or behavior analysis, and more importantly, require an uncompromised OS kernel. However, malware with the highest software privileges has shown its obvious existence. We propose to move from current detection/recovery based mechanisms to data loss prevention, where the focus is on armoring data instead of counteracting malware. Our solution, Inuksuk, relies on today's Trusted Execution Environments (TEEs), as available both on the CPU and storage device, to achieve programmable write protection. We back up a copy of user-selected files as write-protected at all times, and subsequent updates are written as new versions securely through TEE. We implement Inuksuk on Windows 7 and 10, and Linux (Ubuntu); our core design is OS and application agnostic, and incurs no run-time performance penalty for applications. File transfer disruption can be eliminated or alleviated through access modes and customizable update policies (e.g., interval, granularity). For Inuksuk's adoptability in modern OSes, we have also ported Flicker (EuroSys 2008), a defacto standard tool for in-OS privileged TEE management, to the latest 64-bit Windows.

Journal ArticleDOI
TL;DR: A new Android-based, interactive flow solver capable of running on a wider range of multiple, wirelessly-connected mobile GPUs, and the extension of calculations across multiple devices in this way allows the tackling of problems which are larger and of higher-resolution that previous.

Journal ArticleDOI
TL;DR: The results show that the accurate positioning of static remote entities can be achieved using a single smartphone and the accurate real-time positioning of the mobile terminal is provided when three or more scattered terminal nodes cooperate sharing the samples taken synchronously.
Abstract: Locating the position of a remote node on a wireless network is becoming more relevant, as we move forward in the Internet of things and in autonomous vehicles. This paper proposes a new system to implement the location of remote nodes. A new prototype Android application has been developed to collect real measurements and to study the performance of several smartphone’s sensors and location algorithms, including an innovative one, based on the second order cone programming (SOCP) relaxation. The application collects the WiFi access points information and the terminal location. An internal odometry module developed for the prototype is used when Android’s service is unavailable. This paper compares the performance of existing location estimators given in closed form, an existing SOCP one, and the new SOCP location estimator proposed, which has reduced complexity. An algorithm to merge measurements from non-identical terminals is also proposed. Cooperative and terminal stand-alone operations are compared, showing a higher performance for SOCP-based ones, that are capable of estimating the path loss exponent and the transmission power. The heterogeneous terminals were also used in the tests. Our results show that the accurate positioning of static remote entities can be achieved using a single smartphone. On the other hand, the accurate real-time positioning of the mobile terminal is provided when three or more scattered terminal nodes cooperate sharing the samples taken synchronously.

Proceedings ArticleDOI
TL;DR: This work proposes to move from current detection/recovery based mechanisms to data loss prevention, where the focus is on armoring data instead of counteracting malware, and relies on today's Trusted Execution Environments, as available both on the CPU and storage device, to achieve programmable write protection.
Abstract: Unauthorized data alteration has been a longstanding threat since the emergence of malware. System and application software can be reinstalled and hardware can be replaced, but user data is priceless in many cases. Especially in recent years, ransomware has become high-impact due to its direct monetization model. State-of-the-art defenses are mostly based on known signature or behavior analysis, and more importantly, require an uncompromised OS kernel. However, malware with the highest software privileges has shown its obvious existence. We propose to move from current detection/recovery based mechanisms to data loss prevention, where the focus is on armoring data instead of counteracting malware. Our solution, Inuksuk, relies on today's Trusted Execution Environments (TEEs), as available both on the CPU and storage device, to achieve programmable write protection. We back up a copy of user-selected files as write-protected at all times, and subsequent updates are written as new versions securely through TEE. We implement Inuksuk on Windows 7 and 10, and Linux (Ubuntu); our core design is OS and application agnostic, and incurs no run-time performance penalty for applications. File transfer disruption can be eliminated or alleviated through access modes and customizable update policies (e.g., interval, granularity). For Inuksuk's adoptability in modern OSes, we have also ported Flicker (EuroSys 2008), a defacto standard tool for in-OS privileged TEE management, to the latest 64-bit Windows.

Journal ArticleDOI
TL;DR: This paper proposes a reusable component identification approach from the source-code of a singular object-oriented software system especially related to multimedia tools based on making use of two kinds of dependency relations among different software elements namely structural and lexical relations.
Abstract: Software reuse focuses on developing software using reusability principles. Component Based Software Engineering (CBSE) is one of the approaches that support software reuse by utilizing reusable software components. Many approaches have been proposed in the literature to mine reusable components from existing object-oriented software. But, almost all of these approaches are dependent on the selection of third-party application software as clients. Therefore, this paper proposes a reusable component identification approach from the source-code of a singular object-oriented software system especially related to multimedia tools. The proposed approach is based on making use of two kinds of dependency relations among different software elements namely structural and lexical relations. These relations, help us to measure cohesion at the component level using two proposed cohesion metrics. The cohesion values are further used as objective functions in the multi-objective search-based evolutionary algorithm, namely NSGA-III to identify the set of reusable components as different clusters. The proposed approach is validated by applying it to six open source Java applications of different sizes and belonging to multimedia domains.

Journal ArticleDOI
TL;DR: The application of basic video content of Mobil Device Platform in China is analyzed and the future development scheme is studied to further activate the video platform market.
Abstract: In this paper, the write analysis the application of basic video content of Mobil Device Platform in China and studies the future development scheme. According to the survey, as of 2019, 78% of Chinese total population is the Internet service users and application software users. Mobile Device Platform is independently developed to provide video content application services, which already have 640 million video application users from 2013 to the present. 65% of users install and use more than two video content applications. In China TikTok, Kuai Shou, MeiPai and other video content applications, not only can easily achieve simple user interface and users can directly shoot video content. These production functions is different from YouTube, a famous video platform in the United States. In the video platform market, the core competitiveness is content creation. In the future, the integration of video content of VR, AR and other video projects will expecte to further activate the video platform market.

Proceedings ArticleDOI
25 Mar 2019
TL;DR: A data-centric approach to AxC is proposed, which can boost the performance of memory-subsystem-limited applications and proposes a data-access approximation technique called data subsetting, in which all accesses to a data structure are redirected to a subset of its elements so that the overall footprint of memory accesses is decreased.
Abstract: Approximate Computing (AxC), which leverages the intrinsic resilience of applications to approximations in their underlying computations, has emerged as a promising approach to improving computing system efficiency. Most prior efforts in AxC take a compute-centric approach and approximate arithmetic or other compute operations through design techniques at different levels of abstraction. However, emerging workloads such as machine learning, search and data analytics process large amounts of data and are significantly limited by the memory sub-systems of modern computing platforms.In this work, we shift the focus of approximations from computations to data, and propose a data-centric approach to AxC, which can boost the performance of memory-subsystem-limited applications. The key idea is to modulate the application’s data-accesses in a manner that reduces off-chip memory traffic. Specifically, we propose a data-access approximation technique called data subsetting, in which all accesses to a data structure are redirected to a subset of its elements so that the overall footprint of memory accesses is decreased. We realize data subsetting in a manner that is transparent to hardware and requires only minimal changes to application software. Recognizing that most applications of interest represent and process data as multi-dimensional arrays or tensors, we develop a templated data structure called SubsettableTensor that embodies mechanisms to define the accessible subset and to suitably redirect accesses to elements outside the subset. As a further optimization, we observe that data subsetting may cause some computations to become redundant and propose a mechanism for application software to identify and eliminate such computations. We implement SubsettableTensor as a C++ class and evaluate it using parallel software implementations of 7 machine learning applications on a 48-core AMD Opteron server. Our experiments indicate that data subsetting enables 1.33×–4.44× performance improvement with <0.5% loss in application-level quality, underscoring its promise as a new approach to approximate computing.

Patent
26 Feb 2019
TL;DR: In this article, a split-screen display method for tablet computer application software, a storage medium and a tablet computer, and belongs to the technical field of electronic equipment, is described, which replaces part or all of the operation interface with a first interface and a second interface which do not overlap each other according to the operation on the application software.
Abstract: The invention relates to a split-screen display method for tablet computer application software, a storage medium and a tablet computer, and belongs to the technical field of electronic equipment. Themethod replaces part or all of the operation interface with a first interface and a second interface which do not overlap each other according to the operation on the operation interface of the application software, and the second interface is realized by running the mobile phone interface program in the application software. As such, that page can be browsed on the same screen by using the firstinterface information, At that same time, the second interface is used to display a detail page, the user can conveniently select in the first interface, and uses the second interface to browse, switching between upper and lower pages can be avoided, and the user exprence is good; and the second interface is realized by running the mobile phone terminal interface program, so that the mobile phoneterminal program can be transplanted conveniently, so that the realization of the invention is more convenient and the realization cost is relatively low.

Proceedings ArticleDOI
04 Jul 2019
TL;DR: A simple and manageable approach for WCET measurement of runnables and tasks by taking a battery management system as an application is discussed and the generation of Rte and Os is described as they play an important role at RTOS level.
Abstract: As the performance and safety requirements on the automotive electronic control unit (ECU) is increasing rapidly., multi-core ECUs comes to fulfill these requirements. In addition to these reasons., multi-core ECUs are becoming common because of the low cost., size., and power consumption. As we are moving towards multi-core., what changes we have to do and what are the challenges will facing during migration from single core to multi-core ECUs. In automotive operations., most of the tasks have hard deadline constraint hence deadline should not be missed. But due to increasing complexity in the single core ECU deadline may miss due to loaded CPU. In multi-core ECU., chances of deadline miss are very less. There is one more reason., we are moving towards multi-core is application integration. Instead of using one ECU for one application., we can integrate two or more applications (ECUs) on a single multicore ECU. We will discuss only one application and its performance. In this paper., we will discuss a simple and manageable approach for WCET measurement of runnables and tasks by taking a battery management system as an application. The generation of Rte and Os is also described as they play an important role at RTOS level.

Proceedings ArticleDOI
13 Jun 2019
TL;DR: This paper uses symbolic execution to do automated path testing of nuclear safety-level DCS application software, and gives a complete automated testing methods.
Abstract: Nuclear power plant safety-level DCS (Distributed Control System) is the central nerve of the entire nuclear power plant, ensuring the safety and reliability of safety-level DCS application software is crucial. The safety-level DCS has to deal with different working conditions, and the corresponding DCS software has to perform different signal processing processes, and each processing process forms a software path. The safety-level DCS serves as a safety protection for nuclear power plants and requires the desired results for each path. Testing the path is an important way to ensure software reliability. This paper uses symbolic execution to do automated path testing of nuclear safety-level DCS application software, and gives a complete automated testing methods. This gives a new idea to automated testing of DCS software paths.

Book ChapterDOI
08 Sep 2019
TL;DR: It is shown that the cross-platform nature of the proposed solution allows to transfer the kernel of the control system to various platforms without significant alterations in the architecture of the solution, reducing the financial and time costs for designing the final solution.
Abstract: The paper is dedicated to building a programmable automation controller to execute simple technological tasks (packaging, press, etc.). The proposed approach allows to select the minimum sufficient configuration of the software and hardware platform and application software, depending on the technical task for the controlled object, taking into account the computing capabilities of the platform. It is shown that the cross-platform nature of the proposed solution allows to transfer the kernel of the control system to various platforms without significant alterations in the architecture of the solution, reducing the financial and time costs for designing the final solution. The proposed solution allows the user, on the one hand, to make a choice from the whole variety of technical solutions of one that fully meets the requirements of the task, and on the other hand, the options for eliminating emergency situations associated with the inability of the software and hardware platform to perform the tasks. A practical example of finding a synthesized solution to the control of hydraulic cylinders is also considered.

Patent
16 Aug 2019
TL;DR: In this article, a cross-platform application software development architecture system is presented, which consists of a user interface layer, a service logic layer, hardware control layer, an import layer and a starting layer.
Abstract: The invention discloses a cross-platform application software development architecture system. The system comprises a user interface layer, a service logic layer, a hardware control layer, an import layer and a starting layer which are sequentially arranged from the front end to the bottom layer, the user interface layer, the service logic layer, the hardware control layer, the import layer and the starting layer adopt the same code, multiple sets of deployment are developed at a time, the development efficiency is improved, and the development cost is reduced. Based on the design concept of amicro-service architecture, the invention provides a cross-platform cross-language development architecture system compatible with various hardware terminals, and real-time, cloud-priority and high-availability distributed service processing of application software is realized.

Proceedings ArticleDOI
01 Nov 2019
TL;DR: This work describes an alternative to static analysis and conventional testing that monitors and enforces formally specified properties describing a system’s physical state that can detect and mitigate: malware threats; sensor and network attacks; software bugs; sensor, actuator and communication faults; and inadvertent or malicious operator errors.
Abstract: Our ability to ensure software correctness is especially challenged by autonomous systems. In particular, the use of artificial intelligence can cause unpredictable behavior when encountering situations that were not included in the training data. We describe an alternative to static analysis and conventional testing that monitors and enforces formally specified properties describing a system’s physical state. All external inputs and outputs are monitored by multiple parallel automata synthesized from guards specified as linear temporal logic (LTL) formulas capturing application-specific correctness, safety, and liveness properties. Unlike conventional runtime verification, adding guards does not impact application software performance since the monitor automata are implemented in configurable hardware. In order to remove all dependencies on software, input/output controllers and drivers may also be implemented in configurable hardware. A reporting or corrective action may be taken when a guard is triggered. This architecture is consistent with the guidance prescribed in ASTM F3269-17, Methods to Safely Bound Behavior of Unmanned Aircraft Systems Containing Complex Functions. The monitor and input/output subsystem’s minimal and isolated implementations are amenable to model checking since all components are independent finite state machines. Because this approach makes no assumptions about the root cause of deviation from specifications, it can detect and mitigate: malware threats; sensor and network attacks; software bugs; sensor, actuator and communication faults; and inadvertent or malicious operator errors. We demonstrate this approach with rules defining a virtual cage for a commercially available drone.

Journal ArticleDOI
01 Jul 2019
TL;DR: The characteristics of the system are the continuous assessment of the power-on maintenance of spare parts, personnel training and actual system software, which is of great significance to the actual work.
Abstract: The calibration flight is an important technical means to verify the performance and accuracy of the TT&C equipment. In the flying, the equipment is power-on/power-off and the transponder mode is switched according to the needs. The transponder is a borrower. In the case of giving-back, it is especially important to recurring maintenance for the attachment. Through the system design, the original monitoring standby machine, the analog power supply chassis and the analogue controllers state of the transponder state, and three Bosch card and one serial server are used to fully simulate the on-board application environment. The industrial tablet application software adopts C# design to realize effective information interaction with the monitoring standby machine through serial port and network communication. The characteristics of the system are the continuous assessment of the power-on maintenance of spare parts, personnel training and actual system software, which is of great significance to the actual work.

Patent
30 Apr 2019
TL;DR: In this paper, an intelligent manhole cover monitoring system based on internet-of-thing technology is presented. The system comprises manhole-cover terminal monitors, a data acquisition gateway and cloud platform management software, wherein each manhole COVER terminal monitor is a LoRa-based wireless transmission module.
Abstract: The invention discloses an intelligent manhole cover monitoring system based on internet-of-thing technology. The system comprises manhole cover terminal monitors, a data acquisition gateway and cloudplatform management software, wherein each manhole cover terminal monitor is a LoRa-based wireless transmission module. Besides, the system also comprises an inclination angle detector, a pressure-sensitive sensor, a combustible gas detector and a GPS positioning device and the like. The data acquisition gateway is a LoRa node data aggregation gateway. The gateway communicates with the distributed manhole cover terminals through a LoRa wireless network. The cloud platform management software is composed of a series of application software and middleware, and comprises a data communication server, Web platform software and mobile APP software. The data acquisition gateway communicates with the cloud platform software through a TCP/IP protocol. The system is reasonable in design structure,can effectively save manhole cover management cost and reduce occurrence of manhole cover accidents, improves city environment and image and is suitable for popularization.