To see the other types of publications on this topic, follow the link: Hardware isolation.

Journal articles on the topic 'Hardware isolation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Hardware isolation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shang, Ming. "A New Hardware Isolation Architecture." Applied Mechanics and Materials 530-531 (February 2014): 631–36. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.631.

Full text
Abstract:
Virtual systems are usually attacked due to the vulnerabilities in the hypervisor. The hypervisor cannot solve this because its code size is too big to implement totally right. This paper proposed a new hardware-software architecture based on hardware isolation, which adds a new component in CPU to provide hard-level isolation. Even when the malicious code gets the highest software privilege, it cannot break into another domain from current domain. This paper also gives the implementation of the booting, memory isolation, scheduling, interrupt handling and inter-domain communication.
APA, Harvard, Vancouver, ISO, and other styles
2

Hu, Nianhang, Mengmei Ye, and Sheng Wei. "Surviving Information Leakage Hardware Trojan Attacks Using Hardware Isolation." IEEE Transactions on Emerging Topics in Computing 7, no. 2 (April 1, 2019): 253–61. http://dx.doi.org/10.1109/tetc.2017.2648739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hooker, Sara. "The hardware lottery." Communications of the ACM 64, no. 12 (December 2021): 58–65. http://dx.doi.org/10.1145/3467017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kaplan, David. "Hardware VM Isolation in the Cloud." Queue 21, no. 4 (August 31, 2023): 49–67. http://dx.doi.org/10.1145/3623392.

Full text
Abstract:
Confidential computing is a security model that fits well with the public cloud. It enables customers to rent VMs while enjoying hardware-based isolation that ensures that a cloud provider cannot purposefully or accidentally see or corrupt their data. SEV-SNP was the first commercially available x86 technology to offer VM isolation for the cloud and is deployed in Microsoft Azure, AWS, and Google Cloud. As confidential computing technologies such as SEV-SNP develop, confidential computing is likely to simply become the default trust model for the cloud.
APA, Harvard, Vancouver, ISO, and other styles
5

Kaplan, David. "Hardware VM Isolation in the Cloud." Communications of the ACM 67, no. 1 (December 21, 2023): 54–59. http://dx.doi.org/10.1145/3624576.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zeng, Qiang Hong, Shi Jian Zhu, Jing Jun Lou, and Shui Qing Xie. "Hardware Design for Active Vibration Isolation Controller." Advanced Materials Research 211-212 (February 2011): 1061–65. http://dx.doi.org/10.4028/www.scientific.net/amr.211-212.1061.

Full text
Abstract:
The active vibration control system are described in this paper, and the controller was designed for the active control system, the controller is based on ARM Cortex M3 microcontroller core, ICP series acceleration sensor is use for signal acquisition module, the A / D converter module was designed based on ADS1158 chip, the D/ A converter module was designed based on DAC8564 chip. The controller has the characteristics of high speed and versatility.
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Sui, Lu Peng, and Samuel Irving. "Accelerating GPU Hardware Transactional Memory with Snapshot Isolation." ACM SIGARCH Computer Architecture News 45, no. 2 (September 14, 2017): 282–94. http://dx.doi.org/10.1145/3140659.3080204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Omar, Hamza, and Omer Khan. "PRISM." ACM Transactions on Architecture and Code Optimization 18, no. 3 (June 2021): 1–25. http://dx.doi.org/10.1145/3450523.

Full text
Abstract:
Multicores increasingly deploy safety-critical parallel applications that demand resiliency against soft-errors to satisfy the safety standards. However, protection against these errors is challenging due to complex communication and data access protocols that aggressively share on-chip hardware resources. Research has explored various temporal and spatial redundancy-based resiliency schemes that provide multicores with high soft-error coverage. However, redundant execution incurs performance overheads due to interference effects induced by aggressive resource sharing. Moreover, these schemes require intrusive hardware modifications and fall short in providing efficient system availability guarantees. This article proposes PRISM, a resilient multicore architecture that incorporates strong hardware isolation to form redundant clusters of cores, ensuring a non-interference-based redundant execution environment. A soft error in one cluster does not effect the execution of the other cluster, resulting in high system availability. Implementing strong isolation for shared hardware resources, such as queues, caches, and networks requires logic for partitioning. However, it is less intrusive as complex hardware modifications to protocols, such as hardware cache coherence, are avoided. The PRISM approach is prototyped on a real Tilera Tile-Gx72 processor that enables primitives to implement the proposed cluster-level hardware resource isolation. The evaluation shows performance benefits from avoiding destructive hardware interference effects with redundant execution, while delivering superior system availability.
APA, Harvard, Vancouver, ISO, and other styles
9

Cho, Yeongpil. "Fine-Grained Isolation to Protect Data against In-Process Attacks on AArch64." Electronics 9, no. 2 (February 1, 2020): 236. http://dx.doi.org/10.3390/electronics9020236.

Full text
Abstract:
In-process attacks are a new class of attacks that circumvent protection schemes centered around inter-process isolation. Against these attacks, researchers have proposed fine-grained data isolation schemes that can protect sensitive data from malicious accesses even during the same process. Their proposals based on salient hardware features, such as ARM® processor architecture’s domain protection, are quite successful, but it cannot be applied to a specific architecture, namely AArch64, as this does not provide the same hardware features. In this paper, therefore, we present Sealer, a fine-grained data isolation scheme applicable in AArch64. Sealer achieves its objective by brilliantly harmonizing two hardware features of AArch64: The eXecute-no-Read and the cryptographic extension. Sealer provides application developers with a set of application programming interface (API) so that the developers can enjoy the fine-grained data isolation in their own way.
APA, Harvard, Vancouver, ISO, and other styles
10

Verghese, Ben, Anoop Gupta, and Mendel Rosenblum. "Performance isolation." ACM SIGOPS Operating Systems Review 32, no. 5 (December 1998): 181–92. http://dx.doi.org/10.1145/384265.291044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

LI, Xiao-Qing, Xiao-Dong ZHAO, and Qing-Kai ZENG. "One-Way Isolation Execution Model Based on Hardware Virtualization." Journal of Software 23, no. 8 (September 11, 2012): 2207–22. http://dx.doi.org/10.3724/sp.j.1001.2012.04131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Maene, Pieter, Johannes Gotzfried, Ruan de Clercq, Tilo Muller, Felix Freiling, and Ingrid Verbauwhede. "Hardware-Based Trusted Computing Architectures for Isolation and Attestation." IEEE Transactions on Computers 67, no. 3 (March 1, 2018): 361–74. http://dx.doi.org/10.1109/tc.2017.2647955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Li Guo, and Jing Gao. "Switch Module Designed to Meet the EPS Reliability Intelligent Control." Applied Mechanics and Materials 623 (August 2014): 195–201. http://dx.doi.org/10.4028/www.scientific.net/amm.623.195.

Full text
Abstract:
This paper considers the design of switch module. It is a key part of intelligent control emergency power supply. The working reliability of the switch module is an important performance index. Firstly, paper according to the characteristics that watchdog microprocessor software vulnerabilities and a control state to maintain after crash recovery, the design software reset and hardware reset propose two solutions. Next, data acquisition and data communications hardware are using photoelectric isolation technology. To achieve true electrical isolation, the system uses three power supply witch are electrically independent. And then, module data communication protocol used MODBUS_RTU, and design force control configuration software debugging interface. Finally, Experimental verification of the software programs and hardware circuit correctness and reliability. Module design reflects the improved anti-jamming capability, while more suitable for general purpose, industrialization and production.
APA, Harvard, Vancouver, ISO, and other styles
14

Zhao, WenHan, Feng Wen, Chen Han, Zhoujian Chu, Qingyue Yao, and Kesong Ji. "Development of GIS Switch State Judgment System Based on Image Recognition." Journal of Physics: Conference Series 2065, no. 1 (November 1, 2021): 012009. http://dx.doi.org/10.1088/1742-6596/2065/1/012009.

Full text
Abstract:
Abstract Aiming at the fast opening and closing speed of the GIS isolation/grounding switch, manual observation is more difficult, so it is difficult to judge the current switch status. This paper proposes an OpenCV-based image identification algorithm to identify the position of the switch movable contact during the opening and closing process of the isolating switch, thereby judging the state of the isolating switch. This system uses Raspberry Pi as the main hardware core, the server drives the CMOS camera through Raspberry Pi 4B, collects image information in the GIS optical observation window, and performs simple processing, and transmits it to the Raspberry Pi 4B based on the UDP protocol as the main core. In the upper computer and adopt the target detection algorithm based on OpenCV to track the current isolation/grounding switch contact position and determine the current opening and closing state.
APA, Harvard, Vancouver, ISO, and other styles
15

Janz, Viktor, Georgi I. Wassilew, Carsten F. Perka, and Michael Müller. "Cerclages after Femoral Osteotomy Are at Risk for Bacterial Colonization during Two-Stage Septic Total Hip Arthroplasty Revision." Journal of Bone and Joint Infection 3, no. 3 (July 6, 2018): 138–42. http://dx.doi.org/10.7150/jbji.24819.

Full text
Abstract:
Abstract. Aims: In cases of a two-stage septic total hip arthroplasty (THA) exchange a femoral osteotomy with subsequent cerclage stabilization may be necessary to remove a well-fixed stem. This study aims to investigate the rate of bacterial colonization and risk of infection persistence associated with in situ cerclage hardware in two-stage septic THA exchange.Patients and Methods: Twenty-three patients undergoing two-stage THA exchange between 2011 and 2016 were included in this retrospective cohort study. During the re-implantation procedure synovial fluid, periprosthetic tissue samples and sonicate fluid cultures (SFC) of the cerclage hardware were acquired.Results: Seven of 23 (30%) cerclage-SFC produced a positive bacterial isolation. Six of the seven positive cerclage-SFC were acquired during THA re-implantation.Two of the seven patients (29%) with a positive bacterial isolation from the cerclage hardware underwent a THA-revision for septic complications. The other five patients had their THA in situ at last follow-up.Conclusions: Despite surgical debridement and antimicrobial therapy, a bacterial colonization of cerclage hardware occurs and poses a risk for infection persistence. All cerclage hardware should be removed or exchanged during THA reimplantation.
APA, Harvard, Vancouver, ISO, and other styles
16

Hategekimana, Festus, Taylor JL Whitaker, Md Jubaer Hossain Pantho, and Christophe Bobda. "IoT Device security through dynamic hardware isolation with cloud-Based update." Journal of Systems Architecture 109 (October 2020): 101827. http://dx.doi.org/10.1016/j.sysarc.2020.101827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Wahbe, Robert, Steven Lucco, Thomas E. Anderson, and Susan L. Graham. "Efficient software-based fault isolation." ACM SIGOPS Operating Systems Review 27, no. 5 (December 1993): 203–16. http://dx.doi.org/10.1145/173668.168635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Karnopp, D. "Active and Semi-Active Vibration Isolation." Journal of Mechanical Design 117, B (June 1, 1995): 177–85. http://dx.doi.org/10.1115/1.2836452.

Full text
Abstract:
In the five decades since the founding of the ASME Design Engineering Division, the important problem of vibration isolation has been attacked first through the design of passive spring-damper suspensions and later by the use of active and semi-active elements. This paper reviews the historical development of theoretical concepts necessary for the design of isolation systems and indicates how control theory began to influence vibration isolation in the last half of this period. Practical active and semi-active suspensions have only recently become possible with the advent of powerful but relatively inexpensive signal processors. To illustrate these developments for engineers who have not been intimately involved with active systems, only simple vibrational system models will be discussed, although some modern hardware will be shown which is now being applied to complex systems. Instead of attempting to review the many theoretical concepts which have been proposed for active systems, this article will focus on a relatively simple idea with which the author has been associated over the past thirty years; namely the “skyhook” damper. This idea came through purely theoretical studies but is now used in combination with other concepts in production suspension systems. Two quite different application areas will be discussed. The first involves stable platforms to provide extreme isolation for delicate manufacturing operations against seismic inputs and the second involves automotive suspensions. Although similar concepts are found in these two application areas, the widely varying requirements result in very different suspension hardware. The special case of the semi-active damper, which requires very little control power and is presently reaching production, will also be discussed.
APA, Harvard, Vancouver, ISO, and other styles
19

Karnopp, D. "Active and Semi-Active Vibration Isolation." Journal of Vibration and Acoustics 117, B (June 1, 1995): 177–85. http://dx.doi.org/10.1115/1.2838660.

Full text
Abstract:
In the five decades since the founding of the ASME Design Engineering Division, the important problem of vibration isolation has been attacked first through the design of passive spring-damper suspensions and later by the use of active and semi-active elements. This paper reviews the historical development of theoretical concepts necessary for the design of isolation systems and indicates how control theory began to influence vibration isolation in the last half of this period. Practical active and semi-active suspensions have only recently become possible with the advent of powerful but relatively inexpensive signal processors. To illustrate these developments for engineers who have not been intimately involved with active systems, only simple vibrational system models will be discussed, although some modern hardware will be shown which is now being applied to complex systems. Instead of attempting to review the many theoretical concepts which have been proposed for active systems, this article will focus on a relatively simple idea with which the author has been associated over the past thirty years; namely the “skyhook” damper. This idea came through purely theoretical studies but is now used in combination with other concepts in production suspension systems. Two quite different application areas will be discussed. The first involves stable platforms to provide extreme isolation for delicate manufacturing operations against seismic inputs and the second involves automotive suspensions. Although similar concepts are found in these two application areas, the widely varying requirements result in very different suspension hardware. The special case of the semi-active damper, which requires very little control power and is presently reaching production, will also be discussed.
APA, Harvard, Vancouver, ISO, and other styles
20

Goli, Mehran, Muhammad Hassan, Daniel Große, and Rolf Drechsler. "Security validation of VP-based SoCs using dynamic information flow tracking." it - Information Technology 61, no. 1 (February 25, 2019): 45–58. http://dx.doi.org/10.1515/itit-2018-0027.

Full text
Abstract:
Abstract Modern System-on-Chips (SoCs) are notoriously insecure. Hence, the fundamental security feature of IP isolation is heavily used, e. g., secured Memory Mapped IOs (MMIOs), or secured address ranges in case of memories, are marked as non-accessible. One way to provide strong assurance of security is to define isolation as information flow policy in hardware using the notion of non-interference. Since, an insecure hardware opens up the door for attacks across the entire system stack (from software down to hardware), the security validation process should start as early as possible in the SoC design cycle, i. e. at Electronic System Level (ESL). Hence, in this paper we propose the first dynamic information flow analysis at ESL. Our approach allows to validate the run-time behavior of a given SoC implemented using Virtual Prototypes (VPs) against security threat models, such as information leakage (confidentiality) and unauthorized access to data in a memory (integrity). Experiments show the applicability and efficacy of the proposed method on various VPs including a real-world system.
APA, Harvard, Vancouver, ISO, and other styles
21

Wu, Bojian, Yujie Zhao, Song Wang, and Zongfeng Li. "The Ground Test System of Double Layer Air Floating Platform and Its Application." Journal of Physics: Conference Series 2562, no. 1 (August 1, 2023): 012034. http://dx.doi.org/10.1088/1742-6596/2562/1/012034.

Full text
Abstract:
Abstract The suspension test system within the high microgravity scientific experiment cabinet is equipped with double-layer vibration isolation, effectively isolating external disturbances and creating a high microgravity environment within the inner body. Based on this characteristic, this paper proposes a double-layer plane air platform ground test system design. By using a high-precision acceleration sensor and gyroscope of the suspension test platform, the system coordinates the measurement of the double-layer air floating platform. The control mode and algorithm for double-layer vibration isolation in the suspension test platform are simulated through ground physics. Ground verification results from the double-layer plane air flotation test system show that the double-layer attitude control hardware of the suspension test platform meets the requirements, and the algorithm control effect is good, which provides sufficient experimental evidence for the normal operation of the suspension test system in orbit.
APA, Harvard, Vancouver, ISO, and other styles
22

Chiang, Mao Hsiung, and Hao Ting Lin. "The Leveling Position Control of a Four-Axial Active Pneumatic Isolation System Using PWM-Driving Parallel Dual-On/Off Valves." Applied Mechanics and Materials 110-116 (October 2011): 3176–83. http://dx.doi.org/10.4028/www.scientific.net/amm.110-116.3176.

Full text
Abstract:
This study aims to develop a leveling position control of an active PWM-controlled pneumatic isolation table system. A novel concept using parallel dual-on/off valves with PWM control signals is implemented to realize active control and to improve the conventional pneumatic isolation table that supported by four pneumatic cushion isolators. In this study, the cushion isolators are not only passive vibration isolation devices, but also pneumatic actuators in active position control. Four independent closed-loop position feedback control system are designed and implemented for the four axial isolators. In this study, on/off valves are used, and PWM is realized by software. Therefore, additional hardware circuit is not required to implement PWM and not only cost down but also reach control precision of demand. In the controller design, the Fourier series-based adaptive sliding-mode controller with H∞ tracking performance is used to deal with the uncertainty and time-varying problems of pneumatic system. Finally, the experiments on the pneumatic isolation table system for synchronous position and trajectory tracking control, including no-load and loading conditions, and synchronous position control with master-slave method, are implemented in order to verify that the controller for each cushion isolator can realize good position and trajectory tracking performance.
APA, Harvard, Vancouver, ISO, and other styles
23

Rathore, Muhammad Siraj. "KVM vs. LXC: Comparing Performance and Isolation of Hardware-assisted Virtual Routers." American Journal of Networks and Communications 2, no. 4 (2013): 88. http://dx.doi.org/10.11648/j.ajnc.20130204.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Rivera, J. Germán. "Hardware-Based Data Protection/Isolation at Runtime in Ada Code for Microcontrollers." ACM SIGAda Ada Letters 37, no. 2 (June 13, 2018): 43–50. http://dx.doi.org/10.1145/3232693.3232705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Lu, Qi, and M. Satyanaranyanan. "Isolation-only transactions for mobile computing." ACM SIGOPS Operating Systems Review 28, no. 2 (April 1994): 81–87. http://dx.doi.org/10.1145/198153.198164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Xu, Xian Cheng, and Chuan You Yuan. "A New Method for Security Isolation and Data Transfer." Applied Mechanics and Materials 701-702 (December 2014): 902–6. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.902.

Full text
Abstract:
This paper presents both physical and logical methods that are completely one-way transmission without feedback. The imposed hardware isolation is achieved based on the light transmission property with low cost optic components, while the efficiency and accuracy of data transmission is guaranteed by defining new protocol structure based on UDP. Experiments demonstrate that high performance have been achieved after using our proposed protocol mechanism.
APA, Harvard, Vancouver, ISO, and other styles
27

Ivić, Igor R. "Statistical Evaluation of Time Multiplexing to Mitigate Differential Reflectivity Bias Due to Cross-Polar Coupling." Journal of Atmospheric and Oceanic Technology 33, no. 1 (January 2016): 127–47. http://dx.doi.org/10.1175/jtech-d-14-00224.1.

Full text
Abstract:
AbstractOne of the main challenges to the use of phased array radar for weather observations is the implementation of dual polarization with acceptable levels of cross-polar fields induced by the antenna. For example, to achieve acceptable differential reflectivity (ZDR) bias (e.g., less than 0.1 dB) using simultaneous transmission and reception of H and V polarized waves, the isolation between coaxial cross-polar and copolar beams needs to be in excess of 50 dB. Because such isolation cannot be achieved at an affordable price by antenna hardware, additional methods are required to attain supplementary isolation of orthogonal channels. One such option is time multiplexing. Herein, this approach is evaluated from the statistical aspect, whereby the depolarization caused by the radar hardware is accounted for in this study. An evaluation is conducted using theoretical analysis as well as simulated and time series data from a weather radar. The main criteria for evaluation are the bias and standard deviation of differential reflectivity estimates. The results indicate that the implementation of the time-multiplexing method has the capability to significantly improve upon the radar intrinsic cross-polar isolation. However, it is demonstrated herein that the reflectivity gradients in range adversely affect the efficacy of the method and that the standard deviation of estimates can significantly increase as a result of the time-multiplexing application.
APA, Harvard, Vancouver, ISO, and other styles
28

Jain, Shvetank, Fareha Shafique, Vladan Djeric, and Ashvin Goel. "Application-level isolation and recovery with solitude." ACM SIGOPS Operating Systems Review 42, no. 4 (April 25, 2008): 95–107. http://dx.doi.org/10.1145/1357010.1352603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Zverev, M., V. Vostrikova, and D. Teselkin. "Recovering Information from Wireless Sensors in Hardware and Software Platforms." Journal of Physics: Conference Series 2096, no. 1 (November 1, 2021): 012030. http://dx.doi.org/10.1088/1742-6596/2096/1/012030.

Full text
Abstract:
Abstract The work considers the task of information processing in a subsystem of the hardware-software platform of the simulator complex - a mobile system of simulating isolation breathing apparatuses. The problem of predicting values when data packets are lost during their wireless transmission has been revealed. To solve the problem, an algorithm for data processing based on neural network technology has been developed, which allows reducing the number of data packet losses by predicting the lost values. The experimental studies confirmed the adequacy and effectiveness of the proposed algorithm. The use of neural networks in solving the problems of information processing has improved the accuracy of this process.
APA, Harvard, Vancouver, ISO, and other styles
30

Park, Woojung, Haeyoung Kim, Janghyun Ji, Jaegeun Moon, and Howon Kim. "Lightweight RISC-V Trusted Execution Environment with Hardware-based Encryption and Memory Isolation." Journal of Digital Contents Society 23, no. 9 (September 30, 2022): 1813–22. http://dx.doi.org/10.9728/dcs.2022.23.9.1813.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Hao, Jingjing, and Michel Kinnaert. "Sensor fault detection and isolation over wireless sensor network based on hardware redundancy." Journal of Physics: Conference Series 783 (January 2017): 012006. http://dx.doi.org/10.1088/1742-6596/783/1/012006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Piao, Chang Hao, and Teng Cong. "Study on Isolation Monitoring of High-Voltage Battery System." Applied Mechanics and Materials 44-47 (December 2010): 571–75. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.571.

Full text
Abstract:
After comparing the pros and cons of various isolation monitoring methods, this article presents the isolation monitoring method which based on unbalanced bridge and the characteristics of high-voltage battery system. Battery is an important component for Hybird-electric vehicle. The safety of high-voltage battery system is important specification for Hybird-electric vehicle. This device which uses Freescale’s 16-bit microcontroller with CAN communications capabilities achieve real-time and accurate measurement of isolation resistance of high-voltage battery system. The article focuses on the working principle of the device, hardware design and software design. This device has high accuracy, real-time, reliability and good working environment adaptability. The measuring accuracy meets the requirement of actual project.
APA, Harvard, Vancouver, ISO, and other styles
33

Hafaifa, Ahmed, Ferhat Laaouad, and Kouider Laroussi. "Fuzzy modeling and control for detection and isolation of surge in industrial centrifugal compressors." Journal of Automatic Control 19, no. 1 (2009): 19–26. http://dx.doi.org/10.2298/jac0901019h.

Full text
Abstract:
This paper provides the possible application of the fuzzy approaches in fault detection and isolation area for a class of complex industrial processes with uncertain interval parameters. The main idea of fuzzy fault detection and isolation is to build a model of a diagnosis procedures, using rules-based Fuzzy Expert System, capable to minimize false alarms enhance detectability and isolability and minimize detection time by hardware implementation to improve reliability, safety and global efficiency. This paper illustrates an alternative implementation to the compression systems supervision task using the basic principles of model-based fault detection and isolation associated with the self-tuning of surge measurements with subsequent appropriate corrective actions. Using a combination of fuzzy modeling approach makes it possible to devise a fault-isolation scheme based on the given incidence matrix. Simulation results of a fault detection and isolation for a compression system are provided, which illustrate the relevance of the proposed FDI method.
APA, Harvard, Vancouver, ISO, and other styles
34

Busi, Matteo, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, and Frank Piessens. "Securing Interruptible Enclaved Execution on Small Microprocessors." ACM Transactions on Programming Languages and Systems 43, no. 3 (September 30, 2021): 1–77. http://dx.doi.org/10.1145/3470534.

Full text
Abstract:
Computer systems often provide hardware support for isolation mechanisms such as privilege levels, virtual memory, or enclaved execution. Over the past years, several successful software-based side-channel attacks have been developed that break, or at least significantly weaken, the isolation that these mechanisms offer. Extending a processor with new architectural or micro-architectural features brings a risk of introducing new software-based side-channel attacks. This article studies the problem of extending a processor with new features without weakening the security of the isolation mechanisms that the processor offers. Our solution is heavily based on techniques from research on programming languages. More specifically, we propose to use the programming language concept of full abstraction as a general formal criterion for the security of a processor extension. We instantiate the proposed criterion to the concrete case of extending a microprocessor that supports enclaved execution with secure interruptibility. This is a very relevant instantiation, as several recent papers have shown that interruptibility of enclaves leads to a variety of software-based side-channel attacks. We propose a design for interruptible enclaves and prove that it satisfies our security criterion. We also implement the design on an open-source enclave-enabled microprocessor and evaluate the cost of our design in terms of performance and hardware size.
APA, Harvard, Vancouver, ISO, and other styles
35

Huang, Xuegong, Yutong Zhai, and Guisong He. "Research on Vibration Control Technology of Robot Motion Based on Magnetorheological Elastomer." Materials 15, no. 18 (September 18, 2022): 6479. http://dx.doi.org/10.3390/ma15186479.

Full text
Abstract:
The vibration and impact of a humanoid bipedal robot during movements such as walking, running and jumping may cause potential damage to the robot’s mechanical joints and electrical systems. In this paper, a composite bidirectional vibration isolator based on magnetorheological elastomer (MRE) is designed for the cushioning and damping of a humanoid bipedal robot under foot contact forces. In addition, the vibration isolation performance of the vibration isolator was tested experimentally, and then, a vibration isolator dynamics model was developed. For the bipedal robot foot impact, based on the vibration isolator model, three vibration reduction control algorithms are simulated, and the results show that the vibration damping effect can reach 85%. Finally, the MRE vibration isolator hardware-in-the-loop-simulation experiment platform based on dSPACE has been built to verify the vibration reduction control effect of the fuzzy PID algorithm. The result shows the vibration amplitude attenuates significantly, and this verifies the effectiveness of the fuzzy PID damping control algorithm.
APA, Harvard, Vancouver, ISO, and other styles
36

Roshanravan, Sajad, and Saeed Shamaghdari. "Simultaneous fault detection and isolation and fault-tolerant control using supervisory control technique: asynchronous switching approach." Proceedings of the Institution of Mechanical Engineers, Part I: Journal of Systems and Control Engineering 234, no. 8 (December 24, 2019): 900–911. http://dx.doi.org/10.1177/0959651819893891.

Full text
Abstract:
This article focuses on the design of a novel active fault-tolerant control scheme based on supervisory control technique for a class of nonlinear systems. This framework relies on a supervisory switching among a finite family of predesigned candidate controllers, which simultaneously performs isolation and accommodation of intermittent faults. This method does not require any additional model or filter bank for fault isolation. Two controller switching algorithms are introduced based on the dwell time and state which are designed especially for this purpose. There is often some time delay between fault occurrence and accommodation. This delay, which is called as the fault detection and isolation delay, causes the asynchronous switching between the system mode and the candidate controller. For the investigation of the stability of the faulty system under asynchronous switching, we explicitly construct piecewise Lyapunov function based on the knowledge of the known Lyapunov function for each operating mode. Then, by using this piecewise Lyapunov function, a new average dwell-time condition is provided on the maximum admissible fault occurrence rate. This condition guarantees the input-to-state stability of the system with respect to the reference signal. The behavior and performance of the proposed fault-tolerant control/fault detection and isolation scheme are demonstrated on the pitch-axis air vehicle model. The hardware-in-the-loop simulation is an important test for the evaluation of the air vehicle autopilot system before flight test. Therefore, the hardware-in-the-loop simulation results are presented to illustrate the effectiveness of the proposed method in the autopilot control loop.
APA, Harvard, Vancouver, ISO, and other styles
37

Whitaker, Andrew, Marianne Shaw, and Steven D. Gribble. "Scale and performance in the Denali isolation kernel." ACM SIGOPS Operating Systems Review 36, SI (December 31, 2002): 195–209. http://dx.doi.org/10.1145/844128.844147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Chen, Cong, Zhong Hong, and Jian-Min Jiang. "Scheduling in Real-Time Mobile Systems." ACM Transactions on Embedded Computing Systems 21, no. 3 (May 31, 2022): 1–36. http://dx.doi.org/10.1145/3517747.

Full text
Abstract:
To guarantee the safety and security of a real-time mobile system such as an intelligent transportation system, it is necessary to model and analyze its behaviors prior to actual development. In particular, the mobile objects in such systems must be isolated from each other so that they do not collide with each other. Since isolation means two or more mobile objects must not be located in the same place at the same time, a scheduling policy is required to control and coordinate the movement of such objects. However, traditional scheduling theories are based on task scheduling which is coarse-grained and cannot be directly used for fine-grained isolation controls. In this article, we first propose a fine-grained event-based formal model called a time dependency structure and use it to model and analyze real-time mobile systems. Next, an event-based schedule is defined and the composition of schedules is discussed. Then, we investigate the schedulability of isolation—that is, checking whether a given schedule ensures the isolation relationship among mobile objects or not. After that, we present an automation approach for scheduling generation to guarantee isolation controls in real-time mobile systems. Finally, case studies and simulation experiments demonstrate the usability and effectiveness of our approach.
APA, Harvard, Vancouver, ISO, and other styles
39

Majumder, Shibarchi, Jens Frederik Dalsgaard Nielsen, Thomas Bak, and Anders la Cour-Harbo. "Reliable flight control system architecture for agile airborne platforms: an asymmetric multiprocessing approach." Aeronautical Journal 123, no. 1264 (June 2019): 840–62. http://dx.doi.org/10.1017/aer.2019.30.

Full text
Abstract:
AbstractSystem software subsystems in an unmanned aircraft system share hardware resources due to space, weight, and power constraints. Such subsystems have different criticality, requirements, and failure rates, and can cause undesired interference when sharing the same hardware. A component with high failure rate can reduce the reliability of the system unless a fault containment mechanism is adopted.This work proposes an asymmetric multiprocessor architecture to establish isolation at the hardware level for distributed implementation of safety-critical subsystems along with user defined payload subsystems on the same hardware with minimally reduced reliability of the system. To achieve that, subsystems are strategically segregated in separate processors, connected to an on-chip protective interconnect for inter-processor communications. A custom watchdog and reset mechanism are implemented to reset a specific processor without affecting the entire system if required. The architecture is demonstrated on a FPGA chip. In addition, an example of an optimised distribution is provided for a specific flight control system with five subsystems.
APA, Harvard, Vancouver, ISO, and other styles
40

Choi, Joseph I., and Kevin R. B. Butler. "Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities." Security and Communication Networks 2019 (April 2, 2019): 1–28. http://dx.doi.org/10.1155/2019/1368905.

Full text
Abstract:
When two or more parties need to compute a common result while safeguarding their sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled circuits. The traditional enabler of SMC is cryptography, but the significant number of cryptographic operations required results in these techniques being impractical for most real-time, online computations. Trusted execution environments (TEEs) provide hardware-enforced isolation of code and data in use, making them promising candidates for making SMC more tractable. This paper revisits the history of improvements to SMC over the years and considers the possibility of coupling trusted hardware with SMC. This paper also addresses three open challenges: (1) defeating malicious adversaries, (2) mobile-friendly TEE-supported SMC, and (3) a more general coupling of trusted hardware and privacy-preserving computation.
APA, Harvard, Vancouver, ISO, and other styles
41

Rybakov, S. A., and N. Yu Polyakov. "Input/output virtualization of Elbrus microprocessors." Radio industry (Russia) 30, no. 3 (September 8, 2020): 34–39. http://dx.doi.org/10.21778/2413-9599-2020-30-3-34-39.

Full text
Abstract:
The article describes and compares the methods of input-output (I/O) virtualization, adapted for the Elbrus architecture. The presented methods of software emulation and paravirtualization of devices do not require hardware support and provide complete isolation of real devices from virtual ones at the hypervisor level, which allows for better consolidation of physical I/O. Direct assignment of the device to the guest provides better performance over the other methods, but requires hardware modifications in the I/O Memory Management Unit (IOMMU). Hardware support for I/O virtualization was implemented in the new generation of Elbrus microprocessors. The research results can help the users of the Elbrus platform virtualization to setup a detailed configuration of the virtual machine I/O to optimize each guest system for specific tasks.
APA, Harvard, Vancouver, ISO, and other styles
42

Majumder, S., J. F. D. Nielsen, A. La Cour-Harbo, H. Schiøler, and T. Bak. "A real-time on-chip network architecture for mixed criticality aerospace systems." Aeronautical Journal 123, no. 1269 (August 13, 2019): 1788–806. http://dx.doi.org/10.1017/aer.2019.80.

Full text
Abstract:
ABSTRACTIntegrated Modular Avionics enables applications of different criticality levels to share the same hardware platform with an established temporal and spatial isolation. On-chip communication systems for such platforms must support different bandwidth and latency requirements of applications while preserving time predictability. In this paper, our concern is a time-predictable on-chip network architecture for targeting applications in mixed-criticality aerospace systems. The proposed architecture introduces a mixed, priority-based and time-division-multiplexed arbitration scheme to accommodate different bandwidth and latency in the same network while preserving worst-case time predictability for end-to-end communication without packet loss. Furthermore, as isolation of erroneous transmission by a faulty application is a key aspect of contingency management, the communication system should support isolation mechanisms to prevent interference. For this reason, a sampling port and isolated sampling buffer-based approach is proposed with a transmission authorisation control mechanism, guaranteeing spatial and temporal isolation between communicating systems.
APA, Harvard, Vancouver, ISO, and other styles
43

Valente, Giacomo, Paolo Giammatteo, Vittoriano Muttillo, Luigi Pomante, and Tania Di Mascio. "A Lightweight, Hardware-Based Support for Isolation in Mixed-Criticality Network-on-Chip Architectures." Advances in Science, Technology and Engineering Systems Journal 4, no. 4 (2019): 561–73. http://dx.doi.org/10.25046/aj040467.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Russinovich, Mark. "Confidential Computing: Elevating Cloud Security and Privacy." Queue 21, no. 4 (August 31, 2023): 44–48. http://dx.doi.org/10.1145/3623461.

Full text
Abstract:
Confidential Computing (CC) fundamentally improves our security posture by drastically reducing the attack surface of systems. While traditional systems encrypt data at rest and in transit, CC extends this protection to data in use. It provides a novel, clearly defined security boundary, isolating sensitive data within trusted execution environments during computation. This means services can be designed that segment data based on least-privilege access principles, while all other code in the system sees only encrypted data. Crucially, the isolation is rooted in novel hardware primitives, effectively rendering even the cloud-hosting infrastructure and its administrators incapable of accessing the data. This approach creates more resilient systems capable of withstanding increasingly sophisticated cyber threats, thereby reinforcing data protection and sovereignty in an unprecedented manner.
APA, Harvard, Vancouver, ISO, and other styles
45

Bustamante, Ricardo, Gilberto Mosqueda, and Minkyu Kim. "Enhanced Seismic Protection System for an Emergency Diesel Generator Unit." Energies 15, no. 5 (February 25, 2022): 1728. http://dx.doi.org/10.3390/en15051728.

Full text
Abstract:
Nuclear power plants are required to maintain operation after an earthquake, leading to a safe shutdown if necessary. In the case of a loss of offsite power, the onsite emergency diesel generator is critical to ensure procedural operations of the nuclear power plant. As a means to reduce the overall seismic risk, a three-dimensional seismic protection system is proposed to enhance the seismic performance of the emergency diesel generator. The proposed seismic isolation system decouples the horizontal and vertical components of shaking and considers available hardware to achieve an effective isolation solution over the range of excitation frequencies considered. Numerical analysis of the proposed system demonstrates a reduction in seismic demands on the emergency diesel generator and provides a higher safety margin than conventional base installation procedures. Umbilical lines that cross the isolation plane are considered and impose additional constraints on the displacement capacity of the isolation system. However, increasing the displacement capacity of these components can significantly increase the safety margin against failure. The seismic protection system can be customized depending on the seismic hazard and application to different seismic regions.
APA, Harvard, Vancouver, ISO, and other styles
46

Wahyu Wibowo, Ferry, and . "Implementation of FPGA in Index Data Storage as A Database." International Journal of Engineering & Technology 7, no. 4.40 (December 16, 2018): 94–97. http://dx.doi.org/10.14419/ijet.v7i4.40.24083.

Full text
Abstract:
Nowadays, the database applications have been built on the top of file systems. Although this system is very tough it has a side that should be aware and concerned. If the database doesn’t manage well it will cause some problems i.e. data redundancy and inconsistency, difficult to access data, data isolation, and integrity problems. The data inconsistency could be emerged by duplication of information from one or many different files or multiple file formats. the hardware-based implementation provides benefits in modifying and reconfiguring, meanwhile, the acceleration using this approaching has a good performance than software-based. In major cases, both of them using a bridge to connect each other which is called co-hardware/software. Â
APA, Harvard, Vancouver, ISO, and other styles
47

Shue, David, Michael J. Freedman, and Anees Shaikh. "Fairness and isolation in multi-tenant storage as optimization decomposition." ACM SIGOPS Operating Systems Review 47, no. 1 (January 29, 2013): 16–21. http://dx.doi.org/10.1145/2433140.2433145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Cerone, Andrea, and Alexey Gotsman. "Analysing Snapshot Isolation." Journal of the ACM 65, no. 2 (March 8, 2018): 1–41. http://dx.doi.org/10.1145/3152396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Na, Wonbin, Changwoo Park, Seokjoo Lee, Seongo Yu, and Hyeongcheol Lee. "Sensitivity-Based Fault Detection and Isolation Algorithm for Road Vehicle Chassis Sensors." Sensors 18, no. 8 (August 18, 2018): 2720. http://dx.doi.org/10.3390/s18082720.

Full text
Abstract:
Vehicle control systems such as ESC (electronic stability control), MDPS (motor-driven power steering), and ECS (electronically controlled suspension) improve vehicle stability, driver comfort, and safety. Vehicle control systems such as ACC (adaptive cruise control), LKA (lane-keeping assistance), and AEB (autonomous emergency braking) have also been actively studied in recent years as functions that assist drivers to a higher level. These DASs (driver assistance systems) are implemented using vehicle sensors that observe vehicle status and send signals to the ECU (electronic control unit). Therefore, the failure of each system sensor affects the function of the system, which not only causes discomfort to the driver but also increases the risk of accidents. In this paper, we propose a new method to detect and isolate faults in a vehicle control system. The proposed method calculates the constraints and residuals of 12 systems by applying the model-based fault diagnosis method to the sensor of the chassis system. To solve the inaccuracy in detecting and isolating sensor failure, we applied residual sensitivity to a threshold that determines whether faults occur. Moreover, we applied a sensitivity analysis to the parameters semi-correlation table to derive a fault isolation table. To validate the FDI (fault detection and isolation) algorithm developed in this study, fault signals were injected and verified in the HILS (hardware-in-the-loop simulation) environment using an RCP (rapid control prototyping) device.
APA, Harvard, Vancouver, ISO, and other styles
50

Hörmer, Andreas Johann, Manuela Wenger, and Reinhard Zeif. "An innovative FDIR approach for the power supply of the PRETTY SDR satellite payload." e & i Elektrotechnik und Informationstechnik 139, no. 1 (February 2022): 33–40. http://dx.doi.org/10.1007/s00502-022-00989-3.

Full text
Abstract:
AbstractCubeSat missions are characterized by short development times and challenging budget constraints. Due to the constraints in terms of mass, volume, and power, it is often not possible to increase reliability by adding redundant subsystems to the spacecraft. Therefore, it is necessary to implement important error-proofing mechanisms to still be able to derive a high scientific benefit from these missions. Once the satellite has been launched, physical access to the satellite’s hardware is no longer possible. For this reason, systems are often implemented that allow automatic failure detection, isolation of the failure from other systems, as well as automatic recovery (FDIR). This paper describes the advantages and areas of application of software-defined radio platforms (SDRs) on board of small satellites and CubeSats. In addition, important aspects of the hardware FDIR concept of the PRETTY SDR payload system are presented. In order to prevent the hardware from being damaged with a fault-free power supply, different levels of fault monitoring are described as well.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography