1.

Record Nr.

UNISA996464419403316

Autore

Guha Krishnendu

Titolo

Self aware security for real time task schedules in reconfigurable hardware platforms / / Krishnendu Guha, Sangeet Saha, Amlan Chakrabarti

Pubbl/distr/stampa

Cham, Switzerland : , : Springer, , [2021]

©2021

ISBN

3-030-79701-5

Descrizione fisica

1 online resource (195 pages)

Disciplina

006.22

Soggetti

Embedded computer systems - Security measures

Adaptive computing systems - Security measures

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Intro -- Preface -- Acknowledgements -- Contents -- About the Authors -- Part I Introduction -- 1 Introduction -- 1.1 Introduction -- 1.2 Real-Time Systems -- 1.2.1 Hard Versus Soft Real-Time -- 1.2.2 Important Features of Real-Time Systems -- 1.2.3 Real-Time Tasks and Its Classifications -- 1.3 Field Programmable Gate Arrays (FPGAs)-Its Evolution and Conceptual Background -- 1.3.1 Introduction to FPGAs -- 1.3.2 FPGA Technology: Evolution of Its Conceptual Path -- 1.3.3 FPGA Architectures -- 1.3.4 Heterogeneous FPGAs -- 1.3.5 Closer Look into CLBs -- 1.3.6 FPGA Design Flow -- 1.3.7 Processors Within Re-configurable Targets -- 1.3.8 Dynamic and Partial Reconfiguration -- 1.3.9 Real-Time Hardware Tasks -- 1.3.10 Spatio-temporal Management of Hardware Tasks -- 1.3.11 Various Task Placement Strategies for FPGAs -- 1.3.12 Fragmentations Control Based Placement Strategies -- 1.4 Conclusions -- References -- Part II Scheduling -- 2 Real-Time Scheduling: Background  and Trends -- 2.1 Introduction -- 2.2 A Background on Scheduling -- 2.2.1 Resource Constraint -- 2.2.2 Metrics for Scheduling Evaluation -- 2.3 Real-Time Scheduling -- 2.3.1 Offline Versus Online Scheduling -- 2.3.2 Real-Time Scheduling for Uniprocessor Systems -- 2.3.3 Processor Utilization -- 2.3.4 Real-Time Scheduling for Multiprocessor Systems -- 2.4 Fault Tolerance for Real-Time Scheduling -- 2.4.1 Fault Types



-- 2.4.2 Fault Detection -- 2.4.3 Fault Tolerance Techniques -- 2.4.4 Fault Tolerance Scheduling -- 2.5 Imprecise Computation Based Real-Time Task -- 2.6 Real-Time Scheduling on FPGA -- 2.6.1 Challenges for FPGA-Based Scheduling -- 2.6.2 Preemption of Hardware Tasks -- 2.6.3 Existing FPGA-based Real-Time Scheduling Techniques -- 2.6.4 Real-Time Preemptive Scheduling: Uniprocessors Versus Multiprocessors Versus FPGAs -- 2.7 Conclusions -- References.

3 Scheduling Algorithms  for Reconfigurable Systems -- 3.1 Introduction -- 3.2 Challenge for Devising Real-Time Scheduling Algorithm for FPGAs -- 3.3 System Model and Assumptions -- 3.4 Scheduling Strategies -- 3.4.1 Scheduling Algorithm for Full Reconfigurable Systems -- 3.4.2 Scheduling Algorithm for Partially Reconfigurable Systems -- 3.4.3 Handling Dynamic Tasks -- 3.4.4 For Fully Reconfigurable FPGAs -- 3.4.5 For Runtime Partially Reconfigurable Systems -- 3.5 Experiments and Results -- 3.5.1 Results and Analysis -- 3.6 Hardware Prototype for Multiple Tasks Processing  on FPGA -- 3.7 Conclusion -- References -- Part III Security -- 4 Introduction to Hardware Security for FPGA Based Systems -- 4.1 Introduction -- 4.2 Overview of Hardware Threats -- 4.2.1 Hardware Trojan Horses (HTHs) -- 4.2.2 Piracy and Overbuilding -- 4.2.3 Reverse Engineering -- 4.2.4 Counterfeiting -- 4.3 Hardware Trust and Hardware Security -- 4.3.1 Hardware Trust -- 4.3.2 Hardware Security -- 4.4 Life Cycle of FPGA Based System -- 4.4.1 Consumers -- 4.4.2 FPGA Based System Developer -- 4.4.3 Contract Manufacturer -- 4.4.4 FPGA Vendor -- 4.4.5 Off-Shore Foundry -- 4.4.6 Off-Shore Facility -- 4.4.7 Third Party Reconfigurable IP/Bitstream Developers -- 4.4.8 Value Added Reseller (VAR) -- 4.5 Overview of Threats Related to FPGA Based Systems -- 4.5.1 Attacks Related to Bitstreams -- 4.5.2 Attacks Related to FPGAs -- 4.6 Overview of Hardware Security Techniques for FPGA Based Systems -- 4.6.1 Test Time Detection Techniques -- 4.6.2 Protection via Authentication -- 4.6.3 Runtime Mitigation Mechanisms -- 4.7 Present Scope -- 4.8 Conclusion -- References -- 5 Bypassing Passive Attacks -- 5.1 Introduction -- 5.2 System Model -- 5.2.1 Fully Re-configurable Mode -- 5.2.2 Partially Re-configurable Mode -- 5.3 Threat Model -- 5.3.1 Vulnerability Present in Bitstreams.

5.3.2 Vulnerability in FPGA Device -- 5.4 Self Aware Security to Bypass Passive Threats -- 5.4.1 Existing Strategies and Limitations -- 5.4.2 Security Mechanism -- 5.4.3 Working of Self Aware Agent (SAA) -- 5.4.4 Algorithm and Explanation of Proposed Mechanism -- 5.4.5 Demonstration -- 5.5 Experimentation and Results -- 5.5.1 Experimentation -- 5.5.2 Result Analysis -- 5.6 Conclusion -- References -- 6 Counteracting Active Attacks -- 6.1 Introduction -- 6.2 System Model -- 6.2.1 Single FPGA Based System -- 6.2.2 Multi FPGA Based System -- 6.3 Threat Scenario -- 6.3.1 Vulnerability in RIPs/Bitstreams -- 6.3.2 Vulnerability in FPGAs -- 6.4 Redundancy Based Mechanism and Application  to Current Context -- 6.4.1 Application for Single FPGA Based Platform -- 6.4.2 Application for Multi FPGA Based Platform -- 6.5 Self Aware Mechanism -- 6.5.1 Offline Phase -- 6.5.2 Online Phase -- 6.5.3 Handling Non-periodic Tasks -- 6.5.4 Fault Handling -- 6.5.5 Demonstration -- 6.6 Experimentation and Results -- 6.6.1 Experimentation -- 6.6.2 Result Analysis -- 6.7 Conclusion -- References -- 7 Handling Power Draining Attacks -- 7.1 Introduction -- 7.2 System Model -- 7.2.1 Working of System Components -- 7.2.2 Nature of Tasks -- 7.3 Threat Model -- 7.3.1 Illustrative Example -- 7.4 Limitations of Existing Techniques -- 7.5 Self Aware Strategy to Handle Power Draining Attacks -- 7.5.1 Periodic Task Handling -- 7.5.2 Determination of Reference Power



Dissipation Values of Schedules -- 7.5.3 Mechanism for Detection of Affected Resources -- 7.5.4 Action on Detection of Vulnerability -- 7.5.5 Handling of Non-periodic Tasks -- 7.6 Experimentation and Result Analysis -- 7.6.1 Experimentation -- 7.6.2 Result Analysis for Periodic Tasks -- 7.6.3 Result Analysis for Non-periodic Tasks -- 7.7 Conclusion -- References.

Correction to: Scheduling Algorithms for Reconfigurable Systems -- Correction to:  Chapter 3 in: K. Guha et al., Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms, https://doi.org/10.1007/978-3-030-79701-03.

2.

Record Nr.

UNISA996418944703316

Autore

Amatore Christian

Titolo

Hormones, santé publique et environnement

Pubbl/distr/stampa

EDP SCIENCES, 2008

[Place of publication not identified], : EDP Sciences, 2008

Descrizione fisica

1 online resource (352 p.)

Collana

Académie des sciences

Soggetti

Hormones, Hormone Substitutes, and Hormone Antagonists

Diseases

Anatomy

Pharmaceutical Preparations

Physiological Effects of Drugs

Pharmacologic Actions

Chemical Actions and Uses

Neoplasms

Hormones

Endocrine System

Lingua di pubblicazione

Francese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di contenuto

Frontmatter -- Rapport Science et Technologie -- Composition du Comité RST -- Avant-propos -- Composition du groupe de travail --



TABLE DES MATIÈRES -- Résumé -- Summary -- Recommandations générales -- Introduction -- CHAPITRE 1. Les cancers hormonodépendants -- CHAPITRE 2. Le traitement substitutif de la ménopause - La contraception -- CHAPITRE 3. Obésité et diabète de type 2 -- CHAPITRE 4. Hormones, longévité et vieillissement humain -- CHAPITRE 5. Perturbateurs hormonaux -- CHAPITRE 6. L'utilisation des hormones en élevage : les développements zootechniques et les préoccupations de santé publique -- Groupe de lecture critique -- Présentation à l'Académie des sciences, par Michel Le Moal

Sommario/riassunto

La recherche en endocrinologie a été un des points forts de la biologie française au cours des dernières décennies. Elle joue un rôle majeur sur le plan fondamental où, en dehors de son intérêt propre, elle sert de modèle à la compréhension des mécanismes généraux de signalisation. En outre, elle débouche sur certains des problèmes les plus préoccupants de santé publique, donnant lieu à de très importantes approches pharmacologiques et thérapeutiques. L'objet de ce rapport est d'évoquer les plus importants de ces problèmes, situés à l'interface des sciences médicales et des sciences de la société. du point de vue strictement médical, quatre questions se posent avec une acuité croissante : les relations entre hormones et cancers, le traitement substitutif de la ménopause, la contraception hormonale au long terme et l'influence de certaines hormones sur le développement de l'obésité et du diabète de type 2. Un autre sujet important concerne le vieillissement, conçu comme un ensemble complexe de facteurs biologiques, cognitifs, sociaux et finalement sociétaux. Un aspect, plus technique mais également de grande importance, concerne les perturbateurs hormonaux, des produits chimiques qui peuvent modifier de façon indésirable la production de certaines hormones. Un dernier aspect concerne l'utilisation des hormones hors de la médecine, notamment chez les animaux comestibles. L'ambition de ce rapport est de donner l'arrière-plan scientifique permettant de comprendre les mécanismes biologiques impliqués dans ce groupe de problèmes majeurs de santé publique. Les voies de recherches actuelles sont résumées, les voies futures sont indiquées et des recommandations sont présentées. Les principaux partenaires institutionnels intervenant dans chaque cas sont cités. Lorsqu'elles existent, les controverses scientifiques et quelquefois politico-médiatiques sont explicitées. L'ouvrage traite les questions suivantes: 1-Les cancers hormonodépendants: Les mécanismes de base, les cancers du sein, les cancers de la prostate. 2-Le traitement substitutif de la ménopause. 3-L'obésité, les diabète de type 2. 4-Les hormones et le vieillissement. 5-Les perturbateurs hormonaux 6-Les hormones en Zootechnie.



3.

Record Nr.

UNINA9910437579303321

Autore

Treiber Marco Alexander

Titolo

Optimization for computer vision : an introduction to core concepts and methods / / Marco Alexander Treiber

Pubbl/distr/stampa

New York, : Springer, 2013

ISBN

1-4471-5283-2

Edizione

[1st ed. 2013.]

Descrizione fisica

1 online resource (xi, 257 pages) : illustrations (some color)

Collana

Advances in computer vision and pattern recognition

Disciplina

006.37

Soggetti

Computer vision - Mathematics

Mathematical optimization

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

"ISSN: 2191-6586."

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Introduction -- Continuous Optimization -- Linear Programming and the Simplex Method -- Variational Methods -- Correspondence Problems -- Graph Cuts -- Dynamic Programming.

Sommario/riassunto

Optimization plays an invaluable role in the exciting and rapidly developing field of computer vision, yet this importance is often overlooked in the literature. This practical and authoritative text/reference presents a broad introduction to the optimization methods used specifically in computer vision. In order to facilitate understanding, the presentation of the methods is supplemented by simple flow charts, followed by pseudocode implementations that reveal deeper insights into their mode of operation. These discussions are further supported by examples taken from important applications in computer vision. Topics and features: Provides a comprehensive overview of computer vision-related optimization Covers a range of techniques from classical iterative multidimensional optimization to cutting-edge topics of graph cuts and GPU-suited total variation-based optimization Describes in detail the optimization methods employed in computer vision applications Illuminates key concepts with clearly written and step-by-step explanations Presents detailed information on implementation, including pseudocode for most methods This easy-to-follow and applications-focused book is an essential resource for researchers and practitioners seeking guidance on implementing specific methods in computer vision. Marco Alexander Treiber is a



software developer at ASM Assembly Systems, Munich, Germany, where he is Technical Lead in Image Processing for the Vision System of SiPlace placement machines, used in SMT assembly. Among his other publications is the successful Springer title An Introduction to Object Recognition.