期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
面向基于x86处理器和AMBA的系统芯片的全系统模拟器PKUsim-86 被引量:2
1
作者 庞九凤 佟冬 +2 位作者 李皓 何浪 程旭 《电子学报》 EI CAS CSCD 北大核心 2011年第2期351-357,共7页
基于周期级全系统模拟器对微体系结构进行系统性能评估成为芯片设计必不可少的环节.虽然x86处理器是当前商业和科学计算领域最广泛采用的处理器,很少有开源的x86模拟器能够满足研究需要.本文面向基于Geode GX x86处理器和AMBA总线的PKUn... 基于周期级全系统模拟器对微体系结构进行系统性能评估成为芯片设计必不可少的环节.虽然x86处理器是当前商业和科学计算领域最广泛采用的处理器,很少有开源的x86模拟器能够满足研究需要.本文面向基于Geode GX x86处理器和AMBA总线的PKUnity-86系统芯片,设计并实现了周期级全系统模拟器PKUsim-86.它可以启动Microsoft DOS、Windows 98、Windows XP等操作系统,运行典型的x86应用程序.PKUsim-86支持功能模拟和性能模拟的在线切换,其指令模拟速度为0.86MIPS,与真实硬件的对比表明,PKUsim-86具有较高的相对准确度. 展开更多
关键词 全系统模拟 性能评估 系统芯片 X86处理器
在线阅读 下载PDF
基于全系统模拟的OP-TEE内核模糊测试方法 被引量:1
2
作者 王丽娜 谢辉华 +2 位作者 余荣威 张桐 赵敬昌 《信息安全学报》 CSCD 2023年第4期85-98,共14页
OP-TEE(Open Portable Trusted Execution Environment)是运行于基于TrustZone的可信执行环境(Trusted Execution Environment,TEE)中的开源可信操作系统。OP-TEE虽然运行于TEE侧,但仍存在漏洞从而遭受来自于富执行环境(Rich Execution ... OP-TEE(Open Portable Trusted Execution Environment)是运行于基于TrustZone的可信执行环境(Trusted Execution Environment,TEE)中的开源可信操作系统。OP-TEE虽然运行于TEE侧,但仍存在漏洞从而遭受来自于富执行环境(Rich Execution Environment,REE)的攻击。模糊测试是一种常用的漏洞发现方法,但由于TEE与REE的高度隔离,REE侧的模糊测试工具难以直接测试OP-TEE,且现有基于OP-TEE源码插桩的模糊测试方法存在依赖源码和专业领域知识且崩溃容忍度低的问题。本文基于全系统模拟,模拟OP-TEE依赖的环境,提出了对OP-TEE内核模糊测试的方法。该方法将OP-TEE托管在模拟环境中并追踪其执行过程,模糊测试工具在模拟环境外观测执行过程并以此生成测试用例。该方法通过设计实现模拟环境内外通信组件,将模拟环境内OP-TEE的系统调用暴露给模拟环境外的模糊测试工具,使得模糊测试工具能够对OP-TEE内核进行模糊测试。同时针对模糊测试过程中单个用例测试耗时较长的问题,设计实现了预翻译优化机制以减少测试过程中的耗时。实验验证了方案可行性,评测了预翻译优化的效果,并评估了方案的漏洞发现能力,同时对比现有方案OP-TEE Fuzzer进行了性能测试。实验结果表明,本文方案具有检出崩溃以及发现潜在漏洞的能力,预翻译优化机制能平均减少19.05%执行耗时,且实际性能优于OP-TEE Fuzzer,其中吞吐量与OP-TEE Fuzzer相比提高了104%。 展开更多
关键词 可信执行环境 OP-TEE 全系统模拟 模糊测试
在线阅读 下载PDF
全系统模拟中内存管理单元的模拟实现 被引量:2
3
作者 肖晖 龙翔 高小鹏 《微计算机信息》 2009年第26期37-39,共3页
内存管理单元是体系结构中少数与操作系统进行直接交互的接口之一,其模拟模型的执行效率和扩展能力在全系统模拟环境中尤为重要。本文介绍了SimSoc全系统模拟框架中内存管理单元的设计思路和基本实现,基于SystemC事务级建模技术设计并... 内存管理单元是体系结构中少数与操作系统进行直接交互的接口之一,其模拟模型的执行效率和扩展能力在全系统模拟环境中尤为重要。本文介绍了SimSoc全系统模拟框架中内存管理单元的设计思路和基本实现,基于SystemC事务级建模技术设计并实现了灵活的内存管理单元模拟框架,同时通过引入不同的优化策略实现了高效的访存模拟。 展开更多
关键词 全系统模拟 内存管理单元 事务级建模 SYSTEMC
在线阅读 下载PDF
Surface Mine System Simulation and Safety Risk Management 被引量:5
4
作者 ZHANG Rui-xin YU Dong-fang +2 位作者 LI Xin-wang YAO Xin-gang LIU Yu 《Journal of China University of Mining and Technology》 EI 2006年第4期413-415,共3页
Modem surface mines, either mono-system or multi-systems, need a large fleet of equipment consisting of excavators, loaders, haulers and auxiliary machines. Presently, the complexity of the system, the interference be... Modem surface mines, either mono-system or multi-systems, need a large fleet of equipment consisting of excavators, loaders, haulers and auxiliary machines. Presently, the complexity of the system, the interference between sub-systems and the lag in management skills has been a bottle neck for improving productivity of the system. Based on the fact that the traditional tools for safety analysis have been insufficient to evaluate systematically and dynamically the safety risks, this paper tries to create a virtual reality tool consisting of human, machine and mines, using Pro/E and the 3D MAX software in order to evaluate visually the operations of typical mining equipment, such as the bucket wheel excavator (BWE), the shovel, the truck and the dragline. Within this virtual world, the behavior of the system, such as interaction, interference and potential risk can be replayed and reviewed visually. The objective of the study is to identify the critical safety issues of the system and to provide a convenient and powerful tool for safety training and safety management. 展开更多
关键词 surface mine virtual reality mining system risk identification
在线阅读 下载PDF
Science Letters:Visual odometry for road vehicles—feasibility analysis 被引量:2
5
作者 SOTELO Miguel-angel GARCíA Roberto +4 位作者 PARRA Ignacio FERNNDEZ David GAVILN Miguel LVAREZ Sergio NARANJO José-eugenio 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第12期2017-2020,共4页
Estimating the global position of a road vehicle without using GPS is a challenge that many scientists look forward to solving in the near future. Normally, inertial and odometry sensors are used to complement GPS mea... Estimating the global position of a road vehicle without using GPS is a challenge that many scientists look forward to solving in the near future. Normally, inertial and odometry sensors are used to complement GPS measures in an attempt to provide a means for maintaining vehicle odometry during GPS outage. Nonetheless, recent experiments have demonstrated that computer vision can also be used as a valuable source to provide what can be denoted as visual odometry. For this purpose, vehicle motion can be estimated using a non-linear, photogrametric approach based on RAndom SAmple Consensus (RANSAC). The results prove that the detection and selection of relevant feature points is a crucial factor in the global performance of the visual odometry algorithm. The key issues for further improvement are discussed in this letter. 展开更多
关键词 3D visual odometry Ego-motion estimation RAndom SAmple Consensus (RANSAC) Photogrametric approach
在线阅读 下载PDF
A Mandatory Access Control Framework in Virtual Machine System with Respect to Multi-level Security I: Theory 被引量:1
6
作者 LIU Qian WANG Guanhai WENG Chuliang LUO Yuan LI Minglu 《China Communications》 SCIE CSCD 2010年第4期137-143,共7页
At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access con... At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access control (MAC) and MLS in virtual machine system,this paper designs Virt-BLP model,which is based on BLP model.For the distinction between virtual machine system and non-virtualized system,we build elements and security axioms of Virt-BLP model by modifying those of BLP.Moreover,comparing with BLP,the number of state transition rules of Virt-BLP is reduced accordingly and some rules can only be enforced by trusted subject.As a result,Virt-BLP model supports MAC and partial discretionary access control (DAC),well satisfying the requirement of MLS in virtual machine system.As space is limited,the implementation of our MAC framework will be shown in a continuation. 展开更多
关键词 Virtual Machine System Mandatory Access Control Multi-level Security Virt-BLP
在线阅读 下载PDF
Simulator of GNSS signals for testing of space objects receivers in the earth conditions
7
作者 Yu Khomenko V F Kravchenko +3 位作者 A G Laush V I Lutsenko I V Lutsenkoa DO Popova 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2018年第3期249-256,共8页
A technique for testing space object receivers using global navigation satellite system (GNSS) signal simulator of the navigation field is proposed. Its structure consists of two blocks which allow synthesizing the ... A technique for testing space object receivers using global navigation satellite system (GNSS) signal simulator of the navigation field is proposed. Its structure consists of two blocks which allow synthesizing the scenario of reciprocal displacement of the receiver relative to navigation satellites and their signals. In the first block, according to the known coordinates of the receiver which are specified in tabular form or analytically, the distances between the receiver and the navigation satellites are calculated as well as their relative velocities. According to these data, the second block synthesizes the signals of navigational travelers with the specified characteristics which are transmitted via the air or cable with a given attenuation to the receiver. This allows testing on the earth receivers for airplanes and space objects under different scenarios of their movement, which not only reduces the risk of problems during the flight, but also avoids significant economic costs. Based on real data obtained by approaching two spacecraft using a simulator, the receiver was tested, which shows the promise of the proposed technology. 展开更多
关键词 global positioning system GPS) global navigation satellite system (GLONASS) global navigation satellite system (GNSS) simulator satellite navigation systems (SNS)
在线阅读 下载PDF
SATVPC:Secure-agent-based trustworthy virtual private cloud model in open computing environments 被引量:2
8
作者 徐小龙 涂群 +2 位作者 BESSIS Nik 杨庚 王新珩 《Journal of Central South University》 SCIE EI CAS 2014年第8期3186-3196,共11页
Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and soft... Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and software resources sufficiently,but also bring a series of security,reliability and credibility problems.To solve these problems,a novel secure-agent-based trustworthy virtual private cloud model named SATVPC was proposed for the integrated and open cloud computing environment.Through the introduction of secure-agent technology,SATVPC provides an independent,safe and trustworthy computing virtual private platform for multi-tenant systems.In order to meet the needs of the credibility of SATVPC and mandate the trust relationship between each task execution agent and task executor node suitable for their security policies,a new dynamic composite credibility evaluation mechanism was presented,including the credit index computing algorithm and the credibility differentiation strategy.The experimental system shows that SATVPC and the credibility evaluation mechanism can ensure the security of open computing environments with feasibility.Experimental results and performance analysis also show that the credit indexes computing algorithm can evaluate the credibilities of task execution agents and task executor nodes quantitatively,correctly and operationally. 展开更多
关键词 cloud computing trustworthy computing VIRTUALIZATION agent
在线阅读 下载PDF
Improved Circular Correlation Methods for Acquisition in Software GPS Receiver
9
作者 Vandana Patel Pankaj Shukla Mithilesh Kumar 《Computer Technology and Application》 2011年第5期389-395,共7页
In this paper the authors explore the Global Positioning System (GPS) signal acquisition and tracking algorithms used in software GPS receiver. Acquisition time is the most important parameter in evaluating the perf... In this paper the authors explore the Global Positioning System (GPS) signal acquisition and tracking algorithms used in software GPS receiver. Acquisition time is the most important parameter in evaluating the performance of a software GPS receiver in terms of its speed. A trade-off study is done to seek a good balance between the acquisition accuracy and the processing time. The frequency-domain acquisition method by circular correlation, used in a software GPS receiver, has been improved by studying the power spectrum of the Coarse Acquisition (C/A) code alone. The analysis of C/A code reveals that its power spectrum is symmetrical; hence only half the points are required to perform circular correlation. Besides, either half of the spectrum is asymmetrical where a larger amount of power is concentrated in almost one-quarter of the spectrum on its either sides. This further reduces the number of points used to perform correlation. Comparative results of MATLAB simulation of full-size, half-size and quarter-size circular correlation done on actual data stored on hard disk are provided, and they agree with those obtained using GPS receiver. Further reduction in acquisition time has been achieved by investigating the effect of length of the noncoherent pre-integration period. The improved acquisition methods pave way for further development of new algorithms to enhance software GPS receiver performance. 展开更多
关键词 Global positioning system (GPS) software GPS receiver coarse acquisition (C/A) code signal acquisition circular correlation signal power spectrum.
在线阅读 下载PDF
Critical Contingencies Ranking for Dynamic Security Assessment Using Neural Networks
10
作者 Gustavo Schweickardt Juan Manuel Gimenez-Alvarez 《Journal of Energy and Power Engineering》 2012年第10期1663-1672,共10页
A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the se... A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the set of contingencies to be simulated in the security assessment would achieve a significant reduction in computation time. This paper defines a critical contingencies selection method for on-line dynamic security assessment. The selection method results from an off-line dynamical analysis, which covers typical scenarios and also covers various related aspects like frequency, voltage, and angle analyses among others. Indexes measured over these typical scenarios are used to train neural networks, capable of performing on-line estimation of a critical contingencies list according to the system state. 展开更多
关键词 Critical contingencies dynamic security assessment neural networks.
在线阅读 下载PDF
Model of GPS IF Signal and Its Simulation
11
作者 郭际明 汪伟 巢佰崇 《Geo-Spatial Information Science》 2009年第2期100-103,共4页
A GPS IF signal computer simulation method is proposed in this article. The carrier Doppler frequency and the total propagation and delay time can be modeled or calculated with the input GPS satellite ephemeris file. ... A GPS IF signal computer simulation method is proposed in this article. The carrier Doppler frequency and the total propagation and delay time can be modeled or calculated with the input GPS satellite ephemeris file. The simulated GPS IF signal outputs to a text file for post-processing and analysis. The simulation signal spectrum is compared with the received real GPS IF signal spectrum, and the correctness of the simulation result is verified. 展开更多
关键词 GPS intermediate frequency (IF) SIMULATION
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部