- Huisi Zhou;Dantong Ouyang;Liming Zhang;
Static compaction methods aim at finding unnecessary test patterns to reduce the size of the test set as a post-process of test generation.Techniques based on partial maximum satisfiability are often used to track many hard problems in various domains,including artificial intelligence,computational biology,data mining,and machine learning.We observe that part of the test patterns generated by the commercial Automatic Test Pattern Generation(ATPG) tool is redundant,and the relationship between test patterns and faults,as a significant information,can effectively induce the test patterns reduction process.Considering a test pattern can detect one or more faults,we map the problem of static test compaction to a partial maximum satisfiability problem.Experiments on ISCAS89,ISCAS85,and ITC99 benchmarks show that this approach can reduce the initial test set size generated by TetraMAX18 while maintaining fault coverage.
2021年01期 v.26 1-8页 [查看摘要][在线阅读][下载 631K] [下载次数:70 ] |[网刊下载次数:0 ] |[引用频次:1 ] |[阅读次数:0 ] - Ke Gao;Jia Song;Xu Wang;Huifeng Li;
The hypersonic vehicle model is characterized by strong coupling,nonlinearity,and acute changes of aerodynamic parameters,which are challenging for control system design.This study investigates a novel compound control scheme that combines the advantages of the Fractional-Order Proportional-Integral-Derivative(FOPID) controller and Linear Active Disturbance Rejection Control(LADRC) for reentry flight control of hypersonic vehicles with actuator faults.First,given that the controller has adjustable parameters,the frequency-domain analysis-method-based parameter tuning strategy is utilized for the FOPID controller and LADRC method(FOLADRC).Then,the influences of the actuator model on the anti-disturbance capability and parameter tuning of the FOLADRC-based closed-loop control system are analyzed.Finally,the simulation results indicate that the proposed FOLADRC approach has satisfactory performance in terms of rapidity,accuracy,and robustness under the normal operating condition and actuator fault condition.
2021年01期 v.26 9-23页 [查看摘要][在线阅读][下载 2020K] [下载次数:72 ] |[网刊下载次数:0 ] |[引用频次:20 ] |[阅读次数:0 ] - Jie Xiao;Zhanhui Shi;Weidong Zhu;Jianhui Jiang;Qianwei Zhou;Jungang Lou;Yujiao Huang;Qiou Ji;Ziwen Sun;
Hardening reliability-critical gates in a circuit is an important step to improve the circuit reliability at a low cost.However,accurately locating the reliability-critical gates is a key prerequisite for the efficient implementation of the hardening operation.In this paper,a probabilistic-based calculation method developed for locating the reliabilitycritical gates in a circuit is described.The proposed method is based on the generation of input vectors and the sampling of reliability-critical gates using uniform non-Bernoulli sequences,and the criticality of the gate reliability is measured by combining the structure information of the circuit itself.Both the accuracy and the efficiency of the proposed method have been illustrated by various simulations on benchmark circuits.The results show that the proposed method has an efficient performance in locating accuracy and algorithm runtime.
2021年01期 v.26 24-35页 [查看摘要][在线阅读][下载 1627K] [下载次数:34 ] |[网刊下载次数:0 ] |[引用频次:5 ] |[阅读次数:0 ] - Wang Xiao Tan;Jiliang Zhang;Yuanjing Zhang;Zheng Qin;Yong Ding;Xingwei Wang;
Wireless sensor technology plays an important role in the military,medical,and commercial fields nowadays.Wireless Body Area Network(WBAN) is a special application of the wireless sensor network in human health monitoring,through which patients can know their physical condition in real time and respond to emergencies on time.Data reliability,guaranteed by the trust of nodes in WBAN,is a prerequisite for the effective treatment of patients.Therefore,authenticating the sensor nodes and the sink nodes in WBAN is necessary.This paper proposes a lightweight Physical Unclonable Function(PUF)-based and cloud-assisted authentication mechanism for multi-hop body area networks,which compared with the star single-hop network,can enhance the adaptability to human motion and the integrity of data transmission.Such authentication mechanism can significantly reduce the storage overhead and resource loss in the data transmission process.
2021年01期 v.26 36-47页 [查看摘要][在线阅读][下载 1642K] [下载次数:64 ] |[网刊下载次数:0 ] |[引用频次:8 ] |[阅读次数:0 ] - Renjie Lu;Haihua Shen;Zhihua Feng;Huawei Li;Wei Zhao;Xiaowei Li;
Hardware Trojans(HTs) have drawn increasing attention in both academia and industry because of their significant potential threat.In this paper,we propose HTDet,a novel HT detection method using information entropybased clustering.To maintain high concealment,HTs are usually inserted in the regions with low controllability and low observability,which will result in that Trojan logics have extremely low transitions during the simulation.This implies that the regions with the low transitions will provide much more abundant and more important information for HT detection.The HTDet applies information theory technology and a density-based clustering algorithm called Density-Based Spatial Clustering of Applications with Noise(DBSCAN) to detect all suspicious Trojan logics in the circuit under detection.The DBSCAN is an unsupervised learning algorithm,that can improve the applicability of HTDet.In addition,we develop a heuristic test pattern generation method using mutual information to increase the transitions of suspicious Trojan logics.Experiments on circuit benchmarks demonstrate the effectiveness of HTDet.
2021年01期 v.26 48-61页 [查看摘要][在线阅读][下载 1618K] [下载次数:34 ] |[网刊下载次数:0 ] |[引用频次:6 ] |[阅读次数:0 ] - Yu Tai;Wei Hu;Lu Zhang;Dejun Mu;Ryan Kastner;
Information Flow Tracking(IFT) is an established formal method for proving security properties related to confidentiality,integrity,and isolation.It has seen promise in identifying security vulnerabilities resulting from design flaws,timing channels,and hardware Trojans for secure hardware design.However,existing IFT methods tend to take a qualitative approach and only enforce binary security properties,requiring strict non-interference for the properties to hold while real systems usually allow a small amount of information flows to enable desirable interactions.Consequently,existing methods are inadequate for reasoning about quantitative security properties or measuring the security of a design in order to assess the severity of a security vulnerability.In this work,we propose two multi-flow solutions—multiple verifications for replicating existing IFT model and multi-flow IFT method.The proposed multi-flow IFT method provides more insight into simultaneous information flow behaviors and allows for proof of quantitative information flow security properties,such as diffusion,randomization,and boundaries on the amount of simultaneous information flows.Experimental results show that our method can be used to prove a new type of information flow security property with verification performance benefits.
2021年01期 v.26 62-71页 [查看摘要][在线阅读][下载 1017K] [下载次数:40 ] |[网刊下载次数:0 ] |[引用频次:3 ] |[阅读次数:0 ] - Zhan Zhang;Xiang Cong;Wei Feng;Haipeng Zhang;Guodong Fu;Jianyun Chen;
The rapid development of wearable computing technologies has led to an increased involvement of wearable devices in the daily lives of people.The main power sources of wearable devices are batteries;so,researchers must ensure high performance while reducing power consumption and improving the battery life of wearable devices.The purpose of this study is to analyze the new features of an Energy-Aware Scheduler(EAS) in the Android 7.1.2 operating system and the scarcity of EAS schedulers in wearable application scenarios.Also,the paper proposed an optimization scheme of EAS scheduler for wearable applications(Wearable-Application-optimized Energy-Aware Scheduler(WAEAS)).This scheme improves the accuracy of task workload prediction,the energy efficiency of central processing unit core selection,and the load balancing.The experimental results presented in this paper have verified the effectiveness of a WAEAS scheduler.
2021年01期 v.26 72-84页 [查看摘要][在线阅读][下载 1588K] [下载次数:20 ] |[网刊下载次数:0 ] |[引用频次:3 ] |[阅读次数:0 ] - Yiming Ouyang;Qi Wang;Zhe Li;Huaguo Liang;Jianhua Li;
There is a sharp decline in the network performance when the wireless link fails as a data path in the Wireless Network-on-Chip(WiNoC).To counteract this problem,we propose a fault-tolerance mechanism for the efficient retransmission of data in the WiNoC.When an error is detected in the data transmission process,this mechanism works to feed back the fault information to the source node in real time via fault signal lines.In the source node,the highest transmission priority is assigned to the backup retransmitted data,and the corresponding direct link is positioned to enable the data packet for its efficient retransmission to the destination node,thereby ensuring efficiency in fault tolerance.Additionally,we have improved the receiving port of the wireless router,added the corresponding redundant buffers and mux,and dynamically selected the retransmitted non-faulty data packets to be written to the local router in order to avoid the disorderly retransmission of the data packets.The evaluation results of this paper demonstrate that compared with the methods which are under different fault conditions,this fault-tolerant method drastically improves the data throughput rate,reduces the delay,effectively guarantees the reliability of the network,and improves the system performance.
2021年01期 v.26 85-94页 [查看摘要][在线阅读][下载 1395K] [下载次数:21 ] |[网刊下载次数:0 ] |[引用频次:2 ] |[阅读次数:0 ] - Wei Zhang;Xiao Chen;Jianhui Jiang;
Virtualization is the most important technology in the unified resource layer of cloud computing systems.Static placement and dynamic management are two types of Virtual Machine(VM) management methods.VM dynamic management is based on the structure of the initial VM placement,and this initial structure will affect the efficiency of VM dynamic management.When a VM fails,cloud applications deployed on the faulty VM will crash if fault tolerance is not considered.In this study,a model of initial VM fault-tolerant placement for star topological data centers of cloud systems is built on the basis of multiple factors,including the service-level agreement violation rate,resource remaining rate,power consumption rate,failure rate,and fault tolerance cost.Then,a heuristic ant colony algorithm is proposed to solve the model.The service-providing VMs are placed by the ant colony algorithms,and the redundant VMs are placed by the conventional heuristic algorithms.The experimental results obtained from the simulation,real cluster,and fault injection experiments show that the proposed method can achieve better VM fault-tolerant placement solution than that of the traditional first fit or best fit descending method.
2021年01期 v.26 95-111页 [查看摘要][在线阅读][下载 1993K] [下载次数:49 ] |[网刊下载次数:0 ] |[引用频次:9 ] |[阅读次数:1 ] - Weiwei Wang;Junxia Guo;Zheng Li;Ruilian Zhao;
Most of the behavior models with respect to Web applications focus on sequencing of events,without regard for the changes of parameters or elements and the relationship between trigger conditions of events and Web pages.As a result,these models are not sufficient to effectively represent the dynamic behavior of the Web2.0 application.Therefore,in this paper,to appropriately describe the dynamic behavior of the client side of Web applications,we define a novel Client-side Behavior Model(CBM) for Web applications and present a user behavior trace-based modeling method to automatically generate and optimize CBMs.To verify the effectiveness of our method,we conduct a series of experiments on six Web applications according to three types of user behavior traces.The experimental results show that our modeling method can construct CBMs automatically and effectively,and the CBMs built are more precise to represent the dynamic behavior of Web applications.
2021年01期 v.26 112-134页 [查看摘要][在线阅读][下载 2582K] [下载次数:252 ] |[网刊下载次数:0 ] |[引用频次:5 ] |[阅读次数:0 ] 下载本期数据