Search results for "Deployment"
showing 10 items of 173 documents
Enabling partially reconfigurable IP cores parameterisation and integration using MARTE and IP-XACT
2012
International audience; This paper presents a framework which facilitates the parameterization and integration of IP cores into partially reconfigurable SoC platforms, departing from a high-level of abstraction. The approach is based in a Model-Driven Engineering (MDE) methodology, which exploits two widely used standards for Systems-on-Chip specification, MARTE and IP-XACT. The presented work deals with the deployment level of the MDE approach, in which the abstract components of the platform are first linked to the lower level IP-XACT counterparts. At this phase, information for parameterization and integration is readily available, and a synthesizable model can be obtained from the gener…
Search without rescue? Evaluating the international search and rescue response to earthquake disasters
2020
Earthquakes around the world are unnecessarily lethal and destructive, adversely affecting the health and well-being of affected populations. Most immediate deaths and injuries are caused by building collapse, making search and rescue (SAR) an early priority. In this review, we assess the SAR response to earthquake disasters. First, we review the evidence for the majority of individuals being rescued locally, often by relatives and neighbours. We then summarise evidence for successful live rescues by international SAR (ISAR) teams, along with the costs, ethics and other considerations of deployment. Finally, we propose an alternative approach to postdisaster ISAR, with the goal of reducing …
Wireless NoC for Inter-FPGA Communication: Theoretical Case for Future Datacenters
2020
Integration of FPGAs in datacenters might have different motivations from acceleration to energy efficiency, but the goal of better performance tops all. FPGAs are being utilized in a variety of ways today, tightly coupled with heterogenous computing resources, and as a standalone network of homogenous resources. Open source software stacks, propriety tool chain, and programming languages with advanced methodologies are hitting hard on the programmability wall of the FPGAs. The deployment of FPGAs in datacenters will neither be sustainable nor economical, without realizing the multi-tenancy in multiple FPGAs. Inter-FPGA communication among multiple FPGAs remained relatively less addressed p…
Smart Urban Energy Districts and Energy Policies
2018
The deployment of smart cities appears a strategic factor for reducing environmental impact and increasing competitivity of economic systems across the world. Although terminology is similar worldwide, the different political assets and social enviroments largely affect the development models. Drivers indeed are quite different, such as the speed at which transformations take place. As a result, implementation of measures is carried out differently and realizations of smart city projects can be strongly different. Europe, China and U.S.A. approaches are compared in this paper to provide the reader with a broader view about different smart city implementations, with a focus on the electricit…
Secure and efficient verification for data aggregation in wireless sensor networks
2017
Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…
Finding Software Bugs in Embedded Devices
2021
AbstractThe goal of this chapter is to introduce the reader to the domain of bug discovery in embedded systems which are at the core of the Internet of Things. Embedded software has a number of particularities which makes it slightly different to general purpose software. In particular, embedded devices are more exposed to software attacks but have lower defense levels and are often left unattended. At the same time, analyzing their security is more difficult because they are very “opaque”, while the execution of custom and embedded software is often entangled with the hardware and peripherals. These differences have an impact on our ability to find software bugs in such systems. This chapt…
Mini-COVIDNet: Efficient Lightweight Deep Neural Network for Ultrasound Based Point-of-Care Detection of COVID-19
2021
Lung ultrasound (US) imaging has the potential to be an effective point-of-care test for detection of COVID-19, due to its ease of operation with minimal personal protection equipment along with easy disinfection. The current state-of-the-art deep learning models for detection of COVID-19 are heavy models that may not be easy to deploy in commonly utilized mobile platforms in point-of-care testing. In this work, we develop a lightweight mobile friendly efficient deep learning model for detection of COVID-19 using lung US images. Three different classes including COVID-19, pneumonia, and healthy were included in this task. The developed network, named as Mini-COVIDNet, was bench-marked with …
A distributed detection and prevention scheme from malicious nodes in vehicular networks
2016
Summary Vehicular environments still remain vulnerable to various potential attacks because of continuous interactions and information exchange between vehicles despite the deployment of authentication techniques by communication standards. Therefore, an authenticated node with a certificate could initiate an attack while complying with implemented protocols. Some mechanisms were proposed to enhance communication technologies, but none of them was able to anticipate nodes' behavior. They also mismanage oscillating vehicles, because they evict them automatically after misbehaving. In this paper, we propose a preventive mechanism, namely, Intrusion Prevention and Detection System (IPDS), able…
Fuzzy set qualitative comparative analysis (fsQCA) applied to the adaptation of the automobile industry to meet the emission standards of climate cha…
2021
Abstract Facing global climate change challenges entails a sustainable development of transportation. Governments and automobile manufacturers are highly aware of how a large-scale deployment of Electric Vehicles (EVs) can reduce greenhouse gas (GHG) emissions and mitigate global warming. This study aids the design of the adaptation strategies of the automotive industry to meet global goals on climate change by means of a fuzzy-set qualitative comparative analysis (fsQCA), which makes it possible to measure the level of actors’ satisfaction. This allows identification of a combination of factors leading to the outcome while dealing with uncertain environments due to the heterogeneous nature…
Optimal Relays Deployment for 802.16j Networks
2012
In this paper, we consider optimal relay station deployment for the IEEE 802.16j networks. IEEE 802.16j is an emerging wireless broadband networking standard that integrates infrastructure base stations with multihop relay technology. The proposed relay deployment mechanism allows us to maximize network capacity for every user or to maximize total network capacity, and, therefore, to reach greater network capacity values while employing smaller number of relay stations. With the proposed approach, the necessary number of relays for a region can be found.