187 research outputs found

    Approximate computing design exploration through data lifetime metrics

    Get PDF
    When designing an approximate computing system, the selection of the resources to modify is key. It is important that the error introduced in the system remains reasonable, but the size of the design exploration space can make this extremely difficult. In this paper, we propose to exploit a new metric for this selection: data lifetime. The concept comes from the field of reliability, where it can guide selective hardening: the more often a resource handles "live" data, the more critical it be-comes, the more important it will be to protect it. In this paper, we propose to use this same metric in a new way: identify the less critical resources as approximation targets in order to minimize the impact on the global system behavior and there-fore decrease the impact of approximation while increasing gains on other criteria

    SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach

    Full text link
    This paper presents the development of a Supervisory Control and Data Acquisition (SCADA) system testbed used for cybersecurity research. The testbed consists of a water storage tank's control system, which is a stage in the process of water treatment and distribution. Sophisticated cyber-attacks were conducted against the testbed. During the attacks, the network traffic was captured, and features were extracted from the traffic to build a dataset for training and testing different machine learning algorithms. Five traditional machine learning algorithms were trained to detect the attacks: Random Forest, Decision Tree, Logistic Regression, Naive Bayes and KNN. Then, the trained machine learning models were built and deployed in the network, where new tests were made using online network traffic. The performance obtained during the training and testing of the machine learning models was compared to the performance obtained during the online deployment of these models in the network. The results show the efficiency of the machine learning models in detecting the attacks in real time. The testbed provides a good understanding of the effects and consequences of attacks on real SCADA environmentsComment: E-Preprin

    Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach

    Get PDF
    According to recent security analysis reports, malicious software (a.k.a. malware) is rising at an alarming rate in numbers, complexity, and harmful purposes to compromise the security of modern computer systems. Recently, malware detection based on low-level hardware features (e.g., Hardware Performance Counters (HPCs) information) has emerged as an effective alternative solution to address the complexity and performance overheads of traditional software-based detection methods. Hardware-assisted Malware Detection (HMD) techniques depend on standard Machine Learning (ML) classifiers to detect signatures of malicious applications by monitoring built-in HPC registers during execution at run-time. Prior HMD methods though effective have limited their study on detecting malicious applications that are spawned as a separate thread during application execution, hence detecting stealthy malware patterns at run-time remains a critical challenge. Stealthy malware refers to harmful cyber attacks in which malicious code is hidden within benign applications and remains undetected by traditional malware detection approaches. In this paper, we first present a comprehensive review of recent advances in hardware-assisted malware detection studies that have used standard ML techniques to detect the malware signatures. Next, to address the challenge of stealthy malware detection at the processor’s hardware level, we propose StealthMiner, a novel specialized time series machine learning-based approach to accurately detect stealthy malware trace at run-time using branch instructions, the most prominent HPC feature. StealthMiner is based on a lightweight time series Fully Convolutional Neural Network (FCN) model that automatically identifies potentially contaminated samples in HPC-based time series data and utilizes them to accurately recognize the trace of stealthy malware. Our analysis demonstrates that using state-of-the-art ML-based malware detection methods is not effective in detecting stealthy malware samples since the captured HPC data not only represents malware but also carries benign applications’ microarchitectural data. The experimental results demonstrate that with the aid of our novel intelligent approach, stealthy malware can be detected at run-time with 94% detection performance on average with only one HPC feature, outperforming the detection performance of state-of-the-art HMD and general time series classification methods by up to 42% and 36%, respectively

    Survey on virtual coaching for older adults

    Get PDF
    Virtual coaching has emerged as a promising solution to extend independent living for older adults. A virtual coach system is an always-attentive personalized system that continuously monitors user's activity and surroundings and delivers interventions - that is, intentional messages - in the appropriate moment. This article presents a survey of different approaches in virtual coaching for older adults, from the less technically supported tools to the latest developments and future avenues for research. It focuses on the technical aspects, especially on software architectures, user interaction and coaching personalization. Nevertheless, some aspects from the fields of personality/social psychology are also presented in the context of coaching strategies. Coaching is considered holistically, including matters such as physical and cognitive training, nutrition, social interaction and mood.The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No. 769830

    Industrial Cyber-Physical System Evolution Detection and Alert Generation

    Get PDF
    Industrial Cyber-Physical System (ICPS) monitoring is increasingly being used to make decisions that impact the operation of the industry. Industrial manufacturing environments such as production lines are dynamic and evolve over time due to new requirements (new customer needs, conformance to standards, maintenance, etc.) or due to the anomalies detected. When an evolution happens (e.g., new devices are introduced), monitoring systems must be aware of it in order to inform the user and to provide updated and reliable information. In this article, CALENDAR is presented, a software module for a monitoring system that addresses ICPS evolutions. The solution is based on a data metamodel that captures the structure of an ICPS in different timestamps. By comparing the data model in two subsequent timestamps, CALENDAR is able to detect and effectively classify the evolution of ICPSs at runtime to finally generate alerts about the detected evolution. In order to evaluate CALENDAR with different ICPS topologies (e.g., different ICPS sizes), a scalability test was performed considering the information captured from the production lines domain

    Development of a Digitally Controlled Inductive Power Transfer System with Post-Regulation for Variable Load Demand

    Get PDF
    none6noInductive Power Transfer (IPT) is an emerging technology enabling a contactless charging process in manifold applications such as electric vehicles, wearable and portable devices, or biomedical applications. Such technology can be profitably used to develop enhanced electronic solutions in the framework of smart cities, homes and smart workplaces. This paper presents the development and realization of a series–series compensated IPT System (IPTS) followed by a post-regulator implemented by means of a DC–DC converter. Such a system is modeled through a first harmonic approximation method, and a sensitivity analysis of the IPTS performance is carried out with respect to the variations of the primary inverter switching frequency and phase-shift angle. As an element of novelty of this work, the bias points are determined which allow the efficiency maximization while ensuring system controllability. An enhanced dynamic modeling of the system is then performed by means of a coupled mode theory, including the inverter phase-shift modulation and extending its validity to whatever operating frequency. A digital control of the post-regulator is implemented by means of a commercial low-cost microcontroller enabling the output voltage regulation under both fixed and variable load conditions through a voltage mode control technique. An IPTS prototype is eventually realized, which is able to correctly perform the output voltage regulation at the desired nominal value of 12 V for static resistive loads in the range [5, 24] W, yielding the output power in the range [6, 28.8]Wand the experimental efficiencies going from 72.1% (for 24 W) to 91.7% (for 5 W). The developed system can also be effectively used to deliver up to 35Woutput power to variable loads, as demonstrated during the battery charging test. Finally, an excellent output voltage regulation is ascertained for load transients between 5 W and 24 W, with limited over- and undershoot amplitudes (less than 3% of the nominal output voltage), thus enabling the use of the proposed system for both fixed and variable loads in the framework of smart homes and workplaces applications.openKateryna Stoyka, Antonio Vitale, Massimo Costarella, Alfonso Avella, Mario Pucciarelli, Paolo ViscontiStoyka, Kateryna; Vitale, Antonio; Costarella, Massimo; Avella, Alfonso; Pucciarelli, Mario; Visconti, Paol

    Reliability in Power Electronics and Power Systems

    Get PDF
    L'abstract è presente nell'allegato / the abstract is in the attachmen

    Power Electronics and Energy Management for Battery Storage Systems

    Get PDF
    The deployment of distributed renewable generation and e-mobility systems is creating a demand for improved dynamic performance, flexibility, and resilience in electrical grids. Various energy storages, such as stationary and electric vehicle batteries, together with power electronic interfaces, will play a key role in addressing these requests thanks to their enhanced functionality, fast response times, and configuration flexibility. For the large-scale implementation of this technology, the associated enabling developments are becoming of paramount importance. These include energy management algorithms; optimal sizing and coordinated control strategies of different storage technologies, including e-mobility storage; power electronic converters for interfacing renewables and battery systems, which allow for advanced interactions with the grid; and increase in round-trip efficiencies by means of advanced materials, components, and algorithms. This Special Issue contains the developments that have been published b researchers in the areas of power electronics, energy management and battery storage. A range of potential solutions to the existing barriers is presented, aiming to make the most out of these emerging technologies

    Design Space Exploration and Resource Management of Multi/Many-Core Systems

    Get PDF
    The increasing demand of processing a higher number of applications and related data on computing platforms has resulted in reliance on multi-/many-core chips as they facilitate parallel processing. However, there is a desire for these platforms to be energy-efficient and reliable, and they need to perform secure computations for the interest of the whole community. This book provides perspectives on the aforementioned aspects from leading researchers in terms of state-of-the-art contributions and upcoming trends

    Solar Power System Plaing & Design

    Get PDF
    Photovoltaic (PV) and concentrated solar power (CSP) systems for the conversion of solar energy into electricity are technologically robust, scalable, and geographically dispersed, and they possess enormous potential as sustainable energy sources. Systematic planning and design considering various factors and constraints are necessary for the successful deployment of PV and CSP systems. This book on solar power system planning and design includes 14 publications from esteemed research groups worldwide. The research and review papers in this Special Issue fall within the following broad categories: resource assessments, site evaluations, system design, performance assessments, and feasibility studies
    • …
    corecore