Over the past decade, Graphics Processing Units (GPUs) have revolutionized high-performance computing, playing pivotal roles in advancing fields like IoT, autonomous vehicles, and exascale computing. Despite these adv...Over the past decade, Graphics Processing Units (GPUs) have revolutionized high-performance computing, playing pivotal roles in advancing fields like IoT, autonomous vehicles, and exascale computing. Despite these advancements, efficiently programming GPUs remains a daunting challenge, often relying on trial-and-error optimization methods. This paper introduces an optimization technique for CUDA programs through a novel Data Layout strategy, aimed at restructuring memory data arrangement to significantly enhance data access locality. Focusing on the dynamic programming algorithm for chained matrix multiplication—a critical operation across various domains including artificial intelligence (AI), high-performance computing (HPC), and the Internet of Things (IoT)—this technique facilitates more localized access. We specifically illustrate the importance of efficient matrix multiplication in these areas, underscoring the technique’s broader applicability and its potential to address some of the most pressing computational challenges in GPU-accelerated applications. Our findings reveal a remarkable reduction in memory consumption and a substantial 50% decrease in execution time for CUDA programs utilizing this technique, thereby setting a new benchmark for optimization in GPU computing.展开更多
Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current acce...Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current access control models. The model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM). Finally, an example of an e-commerce workflow access control model is discussed in detail.展开更多
Pattern division multiple access(PDMA),which is a novel non-orthogonal multiple access(NOMA),has been proposed to address the challenges of massive connectivity and higher spectral efficiency for fifth generation(5G) ...Pattern division multiple access(PDMA),which is a novel non-orthogonal multiple access(NOMA),has been proposed to address the challenges of massive connectivity and higher spectral efficiency for fifth generation(5G) mobile network.The performance of PDMA mainly depends on the design of PDMA pattern matrix.In this paper,pattern matrix design of PDMA for 5G uplink(UL) applications in massive machine type communication(mMTC) and enhanced mobile broadband(eMBB) deployment scenarios are studied.The design criteria and examples for application in UL mMTC and UL eMBB are investigated.The performance of the PDMA pattern matrix is analyzed with the discrete constellation constrained capacity(CC-Capacity),and verified by Monte Carlo simulation.The simulation results show that the preferred PDMA pattern matrix can achieve good performance with different overloading factors(OF).展开更多
This paper addresses the problem of fault detection(FD) for networked systems with access constraints and packet dropouts.Two independent Markov chains are used to describe the sequences of channels which are availa...This paper addresses the problem of fault detection(FD) for networked systems with access constraints and packet dropouts.Two independent Markov chains are used to describe the sequences of channels which are available for communication at an instant and the packet dropout process,respectively.Performance indexes H∞ and H_ are introduced to describe the robustness of residual against external disturbances and sensitivity of residual to faults,respectively.By using a mode-dependent fault detection filter(FDF) as residual generator,the addressed FD problem is converted into an auxiliary filter design problem with the above index constraints.A sufficient condition for the existence of the FDF is derived in terms of certain linear matrix inequalities(LMIs).When these LMIs are feasible,the explicit expression of the desired FDF can also be characterized.A numerical example is exploited to show the usefulness of the proposed results.展开更多
In cognitive radio networks, the spectrum utilization can be improved by cognitive users opportunistically using the idle channels licensed to the primary users. However, the new arrived cognitive users may not be abl...In cognitive radio networks, the spectrum utilization can be improved by cognitive users opportunistically using the idle channels licensed to the primary users. However, the new arrived cognitive users may not be able to use the channel immediately since the channel usage state is random. This will impose additional time delay for the cognitive users. Excessive waiting delay can make cognitive users miss the spectrum access chances. In this paper, a discrete-time Markov queuing model from a macro point of view is provided. Through the matrix-geometric solution theory, the average sojourn time for cognitive users in the steady state before accessing the spectrum is obtained. Given the tolerant delay of cognitive users, the macro-based throughput is derived and an access control mechanism is proposed. The numerical results show the effects of service completion probability on average sojourn time and throughput. It is confirmed that the throughput can be obviously improved by using the proposed access control mechanism. Finally, the performance evaluations based on users are compared to that based on data packets.展开更多
Internet of Things(IoT)enables devices to get connected to the internet.Once they are connected,they behave as smart devices thereby releasing sensitive data periodically.There is a necessity to preserve the confident...Internet of Things(IoT)enables devices to get connected to the internet.Once they are connected,they behave as smart devices thereby releasing sensitive data periodically.There is a necessity to preserve the confidentiality and integrity of this data during transmission in public communication channels and also permitting only legitimate users to access their data A key challenge of smart networks is to establish a secure end-to-end data communication architecture by addressing the security vulnerabilities of data users and smart devices.The objective of this research work is to create a framework encompassing Ciphertext policy Attribute-based Encryption scheme using block encryption and BLAKE hashing technique.An improved Pairing-Free-Ciphertext policy Attribute-based encryption algorithm has been developed to overcome the aforementioned challenges.Further,a comparative study has been performed between the proposed scheme and the different encryption algorithms.It is found that the proposed scheme scores well over the already existing schemes.The scheme is evaluated in terms of execution time and communication overhead.The robustness of the proposed scheme is also analyzed from the perspective of several security goals.展开更多
随着SoC的复杂度不断提高,通过集成IP核的设计方式能够加快芯片设计的周期,同时由于总线上主从设备的增加,有必要基于AHB总线设计一款高速互连的AHB总线矩阵,在AHB multi layer的基础上,将仲裁模块改为由内部寄存模块接收信息后,再由从...随着SoC的复杂度不断提高,通过集成IP核的设计方式能够加快芯片设计的周期,同时由于总线上主从设备的增加,有必要基于AHB总线设计一款高速互连的AHB总线矩阵,在AHB multi layer的基础上,将仲裁模块改为由内部寄存模块接收信息后,再由从机端完成对各个主机发送过来的信号信息进行仲裁。同时还加入了防死锁模块,从而实现了能够根据预设的计数阈值判断AHB是否发生死锁的功能;最后通过AHB总线接口的验证IP搭建UVM仿真测试环境,对所设计的总线系统基本功能进行了测试,实现了单master访问多个slave和多个master对多个slave并行访问的功能。展开更多
动态策略支持与授权粒度是访问控制的关键问题.现有的研究只关注安全策略的描述能力,却忽略了对策略结构与授权粒度的分析,从而无法全面满足动态策略支持与最小授权要求.指出Lampson访问矩阵模型是对最细粒度访问控制的抽象,普通安全策...动态策略支持与授权粒度是访问控制的关键问题.现有的研究只关注安全策略的描述能力,却忽略了对策略结构与授权粒度的分析,从而无法全面满足动态策略支持与最小授权要求.指出Lampson访问矩阵模型是对最细粒度访问控制的抽象,普通安全策略则根据应用安全需求对Lampson访问矩阵进行聚合.基于安全标签的聚合性描述框架(a descriptive framework of groupability basing on security labels,简称GroSeLa)可将普通安全策略映射为Lampson访问矩阵,该框架分为基本组件与扩展两部分:前者分析用于实现矩阵聚合的安全策略结构;后者则指出实现全面动态策略支持必须支持的7类管理性需求.在此基础上,提出5项聚合性指标:聚合因子、动态因子、策略规模、授权粒度与职责隔离支持.对4类经典安全策略ACL,BLP,DTE与RBAC的评估,是从矩阵聚合的角度分析不同的安全策略在表达性、可用性与授权粒度上的差异.展开更多
文摘Over the past decade, Graphics Processing Units (GPUs) have revolutionized high-performance computing, playing pivotal roles in advancing fields like IoT, autonomous vehicles, and exascale computing. Despite these advancements, efficiently programming GPUs remains a daunting challenge, often relying on trial-and-error optimization methods. This paper introduces an optimization technique for CUDA programs through a novel Data Layout strategy, aimed at restructuring memory data arrangement to significantly enhance data access locality. Focusing on the dynamic programming algorithm for chained matrix multiplication—a critical operation across various domains including artificial intelligence (AI), high-performance computing (HPC), and the Internet of Things (IoT)—this technique facilitates more localized access. We specifically illustrate the importance of efficient matrix multiplication in these areas, underscoring the technique’s broader applicability and its potential to address some of the most pressing computational challenges in GPU-accelerated applications. Our findings reveal a remarkable reduction in memory consumption and a substantial 50% decrease in execution time for CUDA programs utilizing this technique, thereby setting a new benchmark for optimization in GPU computing.
文摘Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current access control models. The model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM). Finally, an example of an e-commerce workflow access control model is discussed in detail.
基金supported by the National High Technology Research and Development Program of China(863 Program,No. 2015AA01A709)
文摘Pattern division multiple access(PDMA),which is a novel non-orthogonal multiple access(NOMA),has been proposed to address the challenges of massive connectivity and higher spectral efficiency for fifth generation(5G) mobile network.The performance of PDMA mainly depends on the design of PDMA pattern matrix.In this paper,pattern matrix design of PDMA for 5G uplink(UL) applications in massive machine type communication(mMTC) and enhanced mobile broadband(eMBB) deployment scenarios are studied.The design criteria and examples for application in UL mMTC and UL eMBB are investigated.The performance of the PDMA pattern matrix is analyzed with the discrete constellation constrained capacity(CC-Capacity),and verified by Monte Carlo simulation.The simulation results show that the preferred PDMA pattern matrix can achieve good performance with different overloading factors(OF).
基金supported by the National Natural Science Foundation of China (6057408860874053)
文摘This paper addresses the problem of fault detection(FD) for networked systems with access constraints and packet dropouts.Two independent Markov chains are used to describe the sequences of channels which are available for communication at an instant and the packet dropout process,respectively.Performance indexes H∞ and H_ are introduced to describe the robustness of residual against external disturbances and sensitivity of residual to faults,respectively.By using a mode-dependent fault detection filter(FDF) as residual generator,the addressed FD problem is converted into an auxiliary filter design problem with the above index constraints.A sufficient condition for the existence of the FDF is derived in terms of certain linear matrix inequalities(LMIs).When these LMIs are feasible,the explicit expression of the desired FDF can also be characterized.A numerical example is exploited to show the usefulness of the proposed results.
文摘In cognitive radio networks, the spectrum utilization can be improved by cognitive users opportunistically using the idle channels licensed to the primary users. However, the new arrived cognitive users may not be able to use the channel immediately since the channel usage state is random. This will impose additional time delay for the cognitive users. Excessive waiting delay can make cognitive users miss the spectrum access chances. In this paper, a discrete-time Markov queuing model from a macro point of view is provided. Through the matrix-geometric solution theory, the average sojourn time for cognitive users in the steady state before accessing the spectrum is obtained. Given the tolerant delay of cognitive users, the macro-based throughput is derived and an access control mechanism is proposed. The numerical results show the effects of service completion probability on average sojourn time and throughput. It is confirmed that the throughput can be obviously improved by using the proposed access control mechanism. Finally, the performance evaluations based on users are compared to that based on data packets.
文摘Internet of Things(IoT)enables devices to get connected to the internet.Once they are connected,they behave as smart devices thereby releasing sensitive data periodically.There is a necessity to preserve the confidentiality and integrity of this data during transmission in public communication channels and also permitting only legitimate users to access their data A key challenge of smart networks is to establish a secure end-to-end data communication architecture by addressing the security vulnerabilities of data users and smart devices.The objective of this research work is to create a framework encompassing Ciphertext policy Attribute-based Encryption scheme using block encryption and BLAKE hashing technique.An improved Pairing-Free-Ciphertext policy Attribute-based encryption algorithm has been developed to overcome the aforementioned challenges.Further,a comparative study has been performed between the proposed scheme and the different encryption algorithms.It is found that the proposed scheme scores well over the already existing schemes.The scheme is evaluated in terms of execution time and communication overhead.The robustness of the proposed scheme is also analyzed from the perspective of several security goals.
文摘随着SoC的复杂度不断提高,通过集成IP核的设计方式能够加快芯片设计的周期,同时由于总线上主从设备的增加,有必要基于AHB总线设计一款高速互连的AHB总线矩阵,在AHB multi layer的基础上,将仲裁模块改为由内部寄存模块接收信息后,再由从机端完成对各个主机发送过来的信号信息进行仲裁。同时还加入了防死锁模块,从而实现了能够根据预设的计数阈值判断AHB是否发生死锁的功能;最后通过AHB总线接口的验证IP搭建UVM仿真测试环境,对所设计的总线系统基本功能进行了测试,实现了单master访问多个slave和多个master对多个slave并行访问的功能。
文摘动态策略支持与授权粒度是访问控制的关键问题.现有的研究只关注安全策略的描述能力,却忽略了对策略结构与授权粒度的分析,从而无法全面满足动态策略支持与最小授权要求.指出Lampson访问矩阵模型是对最细粒度访问控制的抽象,普通安全策略则根据应用安全需求对Lampson访问矩阵进行聚合.基于安全标签的聚合性描述框架(a descriptive framework of groupability basing on security labels,简称GroSeLa)可将普通安全策略映射为Lampson访问矩阵,该框架分为基本组件与扩展两部分:前者分析用于实现矩阵聚合的安全策略结构;后者则指出实现全面动态策略支持必须支持的7类管理性需求.在此基础上,提出5项聚合性指标:聚合因子、动态因子、策略规模、授权粒度与职责隔离支持.对4类经典安全策略ACL,BLP,DTE与RBAC的评估,是从矩阵聚合的角度分析不同的安全策略在表达性、可用性与授权粒度上的差异.