Keynote Speech

Transcription

Keynote Speech
The 9th International Symposium
on Embedded Technology
CONTENTS
1. ISET 2014 Committee. ......................................................... 5
2. ISET 2014 Program................................................................ 6
3. General Chairs’ Message..................................................... 8
4. Welcome Address.................................................................. 9
5. Keynote Speech Ⅰ............................................................ 11
6. Keynote Speech Ⅱ............................................................ 15
7. Keynote Speech Ⅲ............................................................ 19
8. Keynote Speech Ⅳ............................................................ 23
9. Keynote Speech Ⅴ............................................................ 27
10. Keynote Speech Ⅵ............................................................ 31
11. Theme Session A. ............................................................... 35
12. Theme Session B................................................................. 43
13. Academic Session.............................................................. 51
14. Interactive Session Ⅰ....................................................... 61
15. Interactive Session Ⅱ..................................................... 109
16. Invited Session A.............................................................. 159
17. Invited Session B. ............................................................. 171
18. Invited Session C.............................................................. 181
ISET 2014 Committee
■General Chairs
Chaedeok LIM, ETRI, Korea
Sam H. NOH, Hongik University, Korea
■Organizing Committee
Yang Yu KIL, DIP, Korea
Dong Ha LEE, DGIST, Korea
Byung-Hyun MOON, Daegu University, Korea
Yongwan PARK, Yeungnam University, Korea
Hyun-Kyu YU, ETRI, Korea
■Advisory Committee
Byoung-Chul AHN, Yeungnam University, Korea
Shik KIM, Semyung University, Korea
Jong KIM, POSTECH, Korea
Kichul KIM, FKII, Korea
Byoung Hee OH, Samsung Electronics Co., Ltd., Korea
Sang Hyuk SON, DGIST, Korea
Chuck YOO, Korea University, Korea
Yong-Kee JUN, Gyeongsang National University, Korea
■Program Committee
Chair : Minsuk LEE, NHN NEXT, Korea
Younghyun, BAE, NHN NEXT, Korea
Frank BELLOSA, Karlsruhe Institute of Technology, Germany
Jongmoo CHOI, Dankook University, Korea
Li-Pin CHANG, National Chiao-Tung University, Taiwan
Sung Woo CHUNG, Korea University, Korea
Nikil DUTT, UC Irvine, USA
Junyoung HEO, Hansung University, Korea
Hyun-Wook JIN, Konkuk University, Korea
Beobkyun KIM, ETRI, Korea
Kanghee Kim, Soongsil University, Korea
Insup LEE, University of Pennsylvania, USA
Deron LIANG, National Central University, Taiwan
Sung-Soo LIM, Kookmin University, Korea
Yuseung MA, ETRI, Korea
Daniel MOSSE’, University of Pittsburgh, USA
Moonju, PARK, Incheon University, Korea
Dong Ik, SHIN, Asan Medical Center, Korea
■Publication Committee
Jin-Suk MA, ETRI, Korea
■Publicity Committee
In-Geol CHUN , ETRI, Korea
Euiseong Seo, Sungkyunkwan University, Korea
5
The 9th International Symposium
on Embedded Technology
ISET 2014 Program
■May 22(THU), 2014
11:00­-13:00 Registration
[ Geumkang Hall ]
Chair : HyungJun Kim (ETRI, Managing Director)
Keynote SpeechⅠ
13:00-13:50
【IoT, Ubiquitous Computing, and Open Data for Smart Environments】
Noboru Koshizuka
University of Tokyo, Japan
Professor, Sakamura Lab
[ Geumkang Hall ]
Chair : Minsuk Lee (NHN NEXT, Dean)
Keynote Speech Ⅱ, Ⅲ
Keynote Speech Ⅱ
13:50-14:20
【An Embedded SW Policy of the Ministry of Trade, Industry & Energy】
GyuTaek Lee
KEIT, Korea
PD for Embedded Software
Keynote Speech Ⅲ
14:20-14:50
【SW R&D Policies in Creative Economy Era】
14:50-15:10
Doohyun Kim
KEIT, Korea
SW Infra & Computing CP
Coffee Break
[ Geumkang Hall ]
[ Hankang Hall ]
Theme Session A : Mobile Platform
Theme Session B : CPS & Safety Critical Platform
Chair : Sung-Soo Lim
Chair : Hyun-Wook JIN
(Konkuk Univ., Professor)
15:10-15:40
(Kookmin Univ., Professor)
Mozilla Firefox OS, Its Technical Platform and Future How to Approach Smart Factory on New Trends
Seokchan Yun
Bang-Ho Cho
(Daum Communications Corp., Technology Evangelist)
15:40-16:10
Wearable Technology - Trends and Forecasts
A Fault-tolerant OFP based on Partition Computing
Hyun-Tae Jeong
Jung-Guk Kim
(ETRI, Director)
16:10-16:40
(LG CNS, Principal Researcher)
(Hankuk Univ. of Foreign Studies, Professor)
Open Source Hardware and ICT DIY
Trends of Robot SW Platform Technologies and Applications
Hugh Hyung-uk Choi
Sang Hoon Ji
(Magic Eco, Chief maker & CEO)
Interactive Session : PosterⅠ
(KITECH, Principal Researcher)
[ Hankang Hall Corridor ]
Chair : Gyu Sang Choi (Yeungnam Univ., Professor)
16:40-17:30 Interactive Session
Keynote Speech Ⅳ
17:30-18:20
18:306
[ Geumkang Hall ]
Chair : Hyungshin Kim (Chungnam Nat’l Univ., Professor)
【 Bump Free: Real-time Warning for Distracted Pedestrians with Smartphones】
Kang G. Shin
University of Michigan, USA
Kevin and Nancy O’Connor Professor
Banquet
[ Hankang Hall ]
■May 23(FRI), 2014
08:00-­09:30 Registration
Academic Session :
Source Technology Trends
[ Geumkang Hall ]
[ Hankang Hall ]
Invited Session A : ETRI
Technology Trends of Scalable Open Platforms
Chair : YungJoon Jung
Chair : Euiseong Seo
(Sungkyunkwan Univ., Professor)
(ETRI, Director)
Embedded SW Platform Trends
Multicore/GPGPU for Cyber-Physical Systems
Chang-Gun Lee
(Seoul Nat'l Univ., Professor)
Smart OS-level Power Management Techniques for
Smartphones
Sung Woo Chung
AR Service Platform Technology Trends
Young-Chang You
(FALinux, CEO)
Chuwhan Kim
(Qualcomm Korea, Senior Director)
(Korea Univ., Professor) Open IoT Platform: Mobius
Jaeho Kim
(KETI, Team Manager)
09:30-10:50 Free Open Source Software(FOSS) - Can We
Prevent the Second OpenSSL Heartbleed Bug?
Data-centric Communication Middleware for CPS based
Sam Chung on OMG DDS
(Univ. of Washington, Professor)
Soo-Hyung Lee
(ETRI, Principal Researcher)
A Remote Power Analyzer based on Power
Modeling in Heterogeneous Embedded Linux
Trend of SW Platform for Heterogeneous Multi-core
Systems
system and OpenSEED Community Activity
Young-Joo Kim
Seung-hwa Song
(ETRI, Senior Researcher)
Interactive Session : Poster Ⅱ
(IDIS Co., Ltd, Open Project Leader)
[ Hankang Hall Corridor ]
Chairs : Won-Kee Hong(Daegu Univ., Professor) / Hyun Lee (Sunmoon Univ., Professor)
10:50-11:40 Interactive Session
[ Geumkang Hall ]
Chair : Kanghee Kim (Soongsil Univ., Professor)
Sang-bum Suh
Keynote Speech Ⅴ
11:40-12:30 【Tizen, OS for Smart Devices】
12:30-13:30
Samsung Electronics Co., Korea
Vice President
Luncheon
Keynote Speech Ⅵ
13:30-14:20 【Open Source based Commercial IVI Technology Trends】
14:20-14:40
[ Four Seasons ]
[ Geumkang Hall ]
Chair : Hee Bum Jung (ETRI, Vice President)
Carlos ChungSeob Ra
Infobank Corporation, Korea
Director, Smart Car Business Division
Coffee Break
Invited Session B : DGIST
CPS & Wellness
[ Geumkang Hall ]
[ Hankang Hall ]
Invited Session C : GNU & KAI
IMA Systems for Next Generation of Aircraft and Its Applications
Chair : Kyouho Lee
Chair : Yong-Kee Jun
(Inje Univ., Professor)
(Gyeongsang Nat'l Univ., Professor)
Noise induced Tracking Error in Systems with
Design of Software Configuration Tool for Integrated
Saturating Actuators
Modular Avionics
Yongsoon Eun
Eu-Teum Choi
(DGIST, Professor)
(Gyeongsang Nat'l Univ., Student)
Networking and Applications for Vehicular Cyber- Design of Development Environment to Support
Physical Systems
Detecting Races in Airborne Software
Jaehoon (Paul) Jeong
Sun-Sook Kim
14:40-16:00
(Sungkyunkwan Univ., Professor)
(Suresoft Technologies Inc., Researcher)
Recent Trends and Issues of Wellness Human-care Switching Video Technologies for Next Generation of IMA
System
Systems
Jae Sung Choi
Sang-cheul Lee
(DGIST, Senior Research Engineer)
Wearable Cyber-Physical Systems
(Intellics Inc., Department Manager)
A Study on Feasible Configuration of AFDX Networks in
Avionics Systems
Taejoon Park
Kyong Hoon Kim
(DGIST, Professor)
(Gyeongsang Nat'l Univ., Professor)
16:00-16:30
* This Program Subject to Change.
Prize Lottery
7
2014 International Symposium on Embedded Technology
General Chairs’ Message
Welcome to the 9th International Symposium on Embedded Technology!
We follow the tradition of successful symposia in previous years, but for
the very first time, the venue moves to Seoul, the heart of Korea. We are
expecting another exciting and successful symposium where exchange of
information on recent advances and developments in embedded systems
technology will abound.
This year the theme of the symposium is Globalization through Open
Source in the Embedded World. Open source has had a profound effect
on the development of software as a whole. Software is a key component
of embedded systems, and embedded systems is becoming ever more
prevalent and an integral part of our every day life. It is thus imperative
that we look in to the interactions of open source and embedded systems
to gain perspectives on how they may impact our future as the world
becomes ever so connected.
As in previous years, the technical program of this forum brings
together researchers and developers from academia and industry who
are leaders of the embedded systems field. We are especially delighted
to have the distinguished keynote speakers who are active members
of modern embedded systems developments that pertain to the open
source community. We are positive that their experience and insights will
help enlighten the views and perspectives of all participants of this year’s
symposium.
Finally, we would like to thank the members of the organizing committee,
advisory committee, program committee, publication and publicity
committee, and sponsors of this symposium for making this symposium
possible. We would like to especially thank the authors and you, the
participants, for joining us this year. It is only through your participation
that this forum can continue be a success. We are confident that you will
enjoy the high quality presentations and lively discussions with leading
researchers at the symposium.
Chaedeok Lim and Sam H. Noh, General Chairs
8
Seoul, Korea, 22-23 May, 2014
Welcome Address
On behalf of the organizing committee, I am pleased and honored
to welcome all of you to ninth International Symposium on Embedded
Technology (ISET 2014), held in Seoul in Korea.
Embedded systems have become an integral part of daily life. Embedded
systems combine computer hardware, software and other additional
mechanical or technical components in order to perform dedicated
functions. These systems have been touching and changing modern lives
as forms of smart devices, the electronics in an automobile, airplane or
vessel, a micro-sized RFID sensor to bio-chip.
In this symposium, we hope you have the opportunity to discuss
the ideas of advanced technologies and solutions for convergences
technologies of embedded system such as IoT Ubiquitous Computing, CPS
& Safety Critical Platform, Smart-Factory, Wearable Computing, and other
most upcoming technologies solutions.
Digital IT age has extensively progressed. IEMEK hopes to and will make
every effort to contribute to technology advancement in the embedded
systems, and everyone’s academic and intellectual achievement through
ISET 2014 international symposium.
We would like to thanks all authors, members of the organizing
committee, and sponsors of this symposium for making this symposium
successful. Particular thanks go to keynote speakers from various counties. I
am sure that they will make this symposium very fruitful.
Finally, Seoul is the most energetic cities in Korea. I know that many
foreign tourists visit this city for joining many cultural events. We wish all of
you to enjoy this city, the beautiful weather of May, friendship, so that you
will remember ISET 2014 for a long time.
Thank you very much.
Heung-Nam Kim, Ph.D.
President of IEMEK, Korea
9
The 9th
International Symposium
on Embedded Technology
Keynote Speech Ⅰ
IoT, Ubiquitous Computing, and Open Data for Smart
Environments
Noboru Koshizuka
University of Tokyo, Japan
Professor, Sakamura Lab
Seoul, Korea, 22-23 May, 2014
Noboru Koshizuka, Ph.D.
Talk
IoT, Ubiquitous Computing, and Open Data for Smart Environments
Affiliation
The University of Tokyo
Position
Professor, Interfaculty Initiative in Information Studies
Research
Ubiquitous Computing, IoT, Embedded Systems
13
2014 International Symposium on Embedded Technology
IoT, Ubiquitous Computing, and Open Data for Smart Environments
Noboru Koshizuka
Interfaculty Initiative in Information Studies, the University of Tokyo, Japan
YRP Ubiquitous Networking Laboratory, Japan
E-mail: koshizuka@sakamura-lab.org
Abstract
In this talk, we will briefly review the history of IoT (Internet of Things) and/or ubiquitous computing research.
Then, we will introduce the overview of current status of our IoT applications and services; Low-Energy Smart
House, Ubiquitous Emergency Medical Services, IoT Infrastructure Maintenance System, Tokyo Ubiquitous
Technology Project, and National Standard Geo-code Infrastructure.
In IoT system, embedded systems and cloud systems are the key technologies. T-Kernel is the globally open
standard real-time embedded kernel especially for IoT applications and services. In this talk, we will introduce
the latest version of T-Kernel (μT-Kernel 2.0) and its IoT network framework on the basis of 6LoWPAN.
On the other hands, IoT systems upload big data automatically to cloud systems. Open data is very important
paradigm in utilizing the big data. Lastly, we will suggest that we should start standardization activity of Open
Data for the next step of IoT
Keywords: IoT (Internet of Things), Ubiquitous Computing, M2M Communication, Open Data
TheISET
9th International
Symposium on Embedded Technology, Seoul, Korea
14
2014
1
The 9th
International Symposium
on Embedded Technology
Keynote Speech Ⅱ
An Embedded SW Policy of the Ministry of Trade,
Industry & Energy
GyuTaek Lee
KEIT, Korea
PD for Embedded Software
Seoul, Korea, 22-23 May, 2014
Gyu Taek Lee, Ph.D.
Talk
An Embedded SW Policy of the Ministry of Trade, Industry & Energy
Affiliation
Korea Evaluation Institute of Industrial Technology, Korea
Position
Program Director for Embedded Software
Research
Control, Instrumentation and Embedded Software
17
2014 International Symposium on Embedded Technology
An Embedded SW Policy of the Ministry of Trade, Industry & Energy
GyuTaek Lee
PD for Embedded SW, KEIT
Republic of Korea
E-mail: gtlee@keit.re.kr
Abstract
Recently Korea's R&D strategy has been changed to the first mover from the fast follower. This embedded SW
policy is made in order to jump to the advanced industrial nation. Legacy SW policy was concentrated on the
packaged SW and the maintenance SW. However as the first government policy in the field of the embedded SW,
this policy shows the Korean government's strong will which focuses on the embedded SW for the sake of the
high added-value to the existing industries. Based on the industries' needs, this policy covers 6 domains including
car, aviation, shipbuilding, electronics, machinery/robot and medical device industries. Furthermore this policy
contains creating new markets, developing highly qualified human resources and making fair trades.
In particular, this policy is connected to "SW Innovation Programme ('13.10, Ministry of Science, ICT and
Future Planning)" and "The 6th Industrial Technology Innovation Programme ('13.12, Ministry of Trade,
Industry and Energy)".
Keywords: Embedded SW, R&D, Policies, SW Innovation Programme
TheISET
9th International
Symposium on Embedded Technology, Seoul, Korea
18
2014
1
The 9th
International Symposium
on Embedded Technology
Keynote Speech Ⅲ
SW R&D Policies in Creative Economy Era
Doohyun Kim
KEIT, Korea
SW Infra & Computing CP
Seoul, Korea, 22-23 May, 2014
Doohyun Kim, Ph.D.
Talk
SW R&D Policies in Creative Economy Era
Affiliation
Korea Evaluation Institute of Industrial Technology, Korea
Position
SW Infra & Computing CP
Research
Distributed Embedded SW, Open Source SW
21
2014 International Symposium on Embedded Technology
SW R&D Policies in Creative Economy Era
Doohyun Kim
Software Infra & Computing CP, KEIT
Republic of Korea
E-mail: doohyun@keit.re.kr
Abstract
In this talk, the presenter will explain directions and plans for leading software technologies and industry in
creative economy era. The role of software is getting more important in building up new paradigms of industries
in the 21C. The annual growth rate of global software market is forecasted as high as 12.3% from 2013 to 2017.
It is also said that the software market in total including the game and contents is of size of the sum of mobile,
semi-conductor, and automobile market. In the last decade, software market was led by several global companies
at the leading edge in software domain. But, recently, the software is essentially utilized by non-IT industrial
domains such as military, shipbuilding, aviation, and etc. Thus, such dramatic expansions allow us to foresee the
coming new age of Software-oriented Society.
Meanwhile, although the software technologies and industry in Korea have been rapidly developed during past
20 years, the global market share of Korea software industry is only 2.8% in 2012. The amount of qualified
software engineers is under insufficiency. In order to make a monumental turning point by reversing such
deficient situations, the “Software R&D Leading Policies” has been prepared and announced. These policies
include Software Fundamental Research Center program, Software Grand-Challenge project, and Global
Creative Software package program. In this talk, those core polices will be explained in the view of the
backgrounds, structures, directions for action plans, and expectation effectiveness.
Keywords: Software, R&D, Policies, Creative Economy
TheISET
9th International
Symposium on Embedded Technology, Seoul, Korea
22
2014
1
The 9th
International Symposium
on Embedded Technology
Keynote Speech Ⅳ
BumpFree: Real-time Warning for Distracted Pedestrians
with Smartphones
Kang G. Shin
University of Michigan, USA
Kevin and Nancy O’Connor Professor
Seoul, Korea, 22-23 May, 2014
Kang G. Shin, Ph.D.
Talk
Bump Free: Real-time Warning for Distracted Pedestrians with
Smartphones
Affiliation
The University of Michigan
Position
Kevin & Nancy O’Connor Professor of Computer Science Department of
Electrical Engineering and Computer Science
Research
QoS-sensitive Networking and Computation, Networked Cyber-physical
Systems, Security and Privacy, Operating Systems
25
2014 International Symposium on Embedded Technology
BumpFree: Real-time Warning for Distracted Pedestrians
with Smartphones
Kang G. Shin
The University of Michigan
Ann Arbor, U.S.A
E-mail: Kgshin@umich.edu
Abstract
In this talk, I will present a new way of reducing the accident rate of pedestrians who make most of their
commute on foot while using smartphones. Studies have shown that using smartphones while walking – called
distracted walking –significantly increases the probability of pedestrians colliding with dangerous objects. Our
user study shows that 43% of participants have bumped into obstacles
when they walk and use their phones, and 86% of them have heard friends walking into obstacles due to
distracted walking.
A novel solution to this problem, called BumpFree, is developed as a mobile app, by using sensors commonly
available in smartphones to detect and warn users, in real time, of imminent collision with dangerous objects in
front of them via a series of vibrations on their phones. A generalized solution without any prior knowledge of
the user's environment is developed by estimating distances to nearby objects using the speakers and
microphones on the phone. This process is enhanced further by using images acquired from the phone's rear
camera, if necessary. BumpFree has been evaluated under a variety of scenarios ranging from an open lobby
and aisle to outdoor environments with walls, pillars, signboards, dustbins and people, etc., that can be commonly
found in our daily surroundings. Moreover, BumpFree consumes only a small fraction of computation and
energy resources, thus leaving the phone's intended functions and performance almost unaffected. Its
acceptability and usefulness are also demonstrated via a limited users study.
This is joint work with Yu-Chih Tung, Yaohui Li, Wenbo Wang
TheISET
9th International
Symposium on Embedded Technology, Seoul, Korea
26
2014
1
The 9th
International Symposium
on Embedded Technology
Keynote Speech Ⅴ
Tizen, OS for Smart Devices
Sang-bum Suh
Samsung Electronics Co., Korea
Vice President
Seoul, Korea, 22-23 May, 2014
Sang-bum Suh, Ph.D.
Talk
Tizen, OS for Smart Devices
Affiliation
Samsung Electronics Co.
Position
Vice President
Research
Embedded SW, Virtualization, Operating Systems
29
2014 International Symposium on Embedded Technology
Tizen, OS for Smart Devices
Sang-bum Suh
Vice President, Samsung Electronics Co
Abstract
Tizen (www.tizen.org) is a web-centric open-source, standards-based software platform for smart devices,
such as smartphones, smart TVs, IVI (In-Vehicle Infotainment) and other consumer devices like cameras,
printers, and more. Tizen is web-centric in that it directly supports web apps applications written in HTML5 and
Javascript. In this talk, we present Tizen offers an innovative operating system, applications, and a user
experience that consumers can take from various device
TheISET
9th International
Symposium on Embedded Technology, Seoul, Korea
30
2014
1
The 9th
International Symposium
on Embedded Technology
Keynote Speech Ⅵ
Open Source based Commercial IVI Technology Trends
Carlos ChungSeob Ra
Infobank Corporation, Korea
Director, Smart Car Business Division
Seoul, Korea, 22-23 May, 2014
Carlos ChungSeob Ra, Ph.D.
Talk
Open Source based Commercial IVI Technology Trends
Affiliation
Infobank Corporation
Position
Director, Smart Car Business Division
Research
Management of Technology
33
2014 International Symposium on Embedded Technology
Open Source based Commercial IVI Technology Trends
Carlos ChungSeob Ra
Infobank Corporation, Korea
Director, Smart Car Business Division
Abstract
Recently, standardization and research about Open-source based Car Infotainment platform are made process
actively in the world vehicle market. Especially, in European vehicle market, GENIVI is organized, GENIVI
standardize that requirements achieved from OEM insert to middle ware. On the other hand, in North
America/Asia, Open Automotive Alliance for Automotive android is organized. Some Car OEM’s are already
applying the commercialization of the android platform in progress. Google, Apple also provide with
connectivity solution based on Open-source platform. This paper provides an Open-source platform for
technology trends and status of commercialized present status.
Keywords: Open Source, Linux, Android, GENIVI.
TheISET
9th International
Symposium on Embedded Technology, Seoul, Korea
34
2014
1
The 9th
International Symposium
on Embedded Technology
Theme Session A
15:10-16:40, May 22, 2014
Mobile Platform
Chair : Hyun-Wook JIN (Konkuk Univ., Professor)
NO
1
2
3
Theme Session
Mozilla Firefox OS, Its Technical Platform and Future. .................................................................................................. 36
Seokchan Yun(Daum Communications Corp., Technology Evangelist)
Wearable Technology – Trends and Forecasts................................................................................................................. 38
Hyun-Tae Jeong(ETRI, Director)
Open Source Hardware and ICT DIY.................................................................................................................................. 40
Hugh Hyung-uk Choi(Magic Echo, Chief maker & CEO)
2014 International Symposium on Embedded Technology
Mozilla Firefox OS, Its Technical Platform and Future
Seokchan Yun
Daum Communications Corp.
Jeju-city, Republic of Korea
E-mail: channy@daumcorp.com
Abstract
The Firefox OS is the alternative mobile web operating system developed by Mozilla, non-profit global open
source community. This presentation explains why Mozilla developed Firefox OS as end-user product and its
innovated way of web technologies adopting embedded system. In fact, most of modern mobile devices are using
Apple's iOS and Google's Android with own native platforms and APIs, whereas Firefox OS has open standards
of Web APIs to connect between hardware as like cellular, Wi-Fi, Bluetooth and Gecko, web rendering engines.
It consists of Gonk, an embedded OS and Gaia, a web-based user interface. So web developers can make web
applications with HTML, CSS and JavaScript compared with developer's platforms of iOS's Object-C and
Android's Java application. Recent web technologies are evolved to a speed level of native applications, i.e.
asynchronous data process with Offline storage, Web Notifications API, Web Worker, Web Socket, IndexedDB
and WebRTC. It means over 8 million web developers can participate new mobile ecosystem, Firefox
Marketplace and get new opportunities to distribute fast and efficient web applications supporting multiple
devices including PCs and tablets. For this, Mozilla and its partners already released various devices as like ZTE
Open, Alcatel One Touch and LG Fireweb in 14 countries of Europe and South America in 2013. In this year,
Firefox 1.4 will be released with as like additional dual-core reference phones and $25 smartphone with ZRAMbased chipset design. Mozilla Korean community has localized Firefox OS Korean version and developed
Hangul keyboard as a voluntary based. In the future, Mozilla developed innovated technologies for low price
leadership extending global accessibility of mobile web.
Keywords: Mozilla Firefox OS, Mobile, Web API
TheISET
9th International
Symposium on Embedded Technology, Seoul, Korea
36
2014
1
Seoul, Korea, 22-23 May, 2014
Mozilla Firefox OS
its Technical Platform and
Future
Seokchan Yun
channy@gmail.com
Daum Communications Corp.
Agenda
• Introduction - The status of Mobile
• What’s Open Web App Platform?
– Mobile Web OS and Mozilla Web APIs
• The technical structure of Firefox OS
– Gonk, Gecko and Gaia
– Development process
• Firefox OS Developer’s platform
– How to develop Mobile Apps in HTML5?
– Firefox Marketplace and app review
• The status for Korean version
• Technical Demo with real devices
• Conclusion
37
2014 International Symposium on Embedded Technology
Wearable Technology – Trends and Forecasts
Hyun-Tae Jeong
Electronics and Telecommunications Research Institute
Daejeon, Republic of Korea
E-mail: htjeong@etri.re.kr
Abstract
Since Google has introduced the “Google Glass”, the interest in wearable devices is so hot. Through the
release of the Android Wear, Google has shown movement to preempt the wearable market such as an eyewear, a
watch and various wearable products. Samsung has unveiled the Galaxy Gear and Gear Fit, and many ICT
companies such as Sony, Pebble, and Apple are jumping into the market competition.
When accelerating competition in wearable product markets, it is very important to know what a key element
of wearable computers is. Also, it is important to consider which technology to be focused in order to settle
successfully the wearable computer market.
This talk will first present a brief history and definition of the wearable computer, and an overview of the core
technologies and applications. And then, the trend from the recently launched wearable products and
technologies will be shown. Finally, we will discuss about the forecasts of wearable industry.
Keywords: Wearable Computer/Device
TheISET
9th International
Symposium on Embedded Technology, Seoul, Korea
38
2014
1
Seoul, Korea, 22-23 May, 2014
Table of Contents
39
2014 International Symposium on Embedded Technology
Open Source Hardware and ICT DIY
Hugh Hyung-uk Choi
MagicEco
E-mail: huchoi@gmail.com
Abstract
Open source hardware is the phenomenon of new paradigm shift to makers era. Using open source hardware
with various open source softwares and tools, every single individual can be a maker. Based upon this trend, ICT
DIY(Do-It-Yourself) is becoming a totally new life style of indie makers. They create concepts, develop
prototypes in rapid, manufacture them in various open processes, and distribute through crowd sourcing
platforms to individual consumer directly. It is completely different way of new industry 2.0 revolution. It is all
about open innovation over open communities of makers. The focal point of this talk is the trend of open ICT
DIY of designers and developers how they can freely download, modify or launch prototypes. I cover several
case studies on open source hardware and their real potentials and applications. I also describe the trend of open
source communities and spaces where people are gathered in various purposes.
Keywords: ICT DIY, Open source Hardware
TheISET
9th International
Symposium on Embedded Technology, Seoul, Korea
40
2014
1
Seoul, Korea, 22-23 May, 2014
ISET2014 Program
Open Source Hardware
and ICT DIY
!
!
Hugh Hyung-uk Choi
1
Chief maker & CEO , MagicEco
Agenda
!
1.
2.
3.
4.
Why and what open source hardwares are
Use cases of ICT DIY
Trend of communities and spaces
Direction and future
41
The 9th
International Symposium
on Embedded Technology
Theme Session B
15:10-16:40, May 22, 2014
CPS & Safety Critical Platform
Chair : Sung-Soo Lim (Kookmin Univ., Professor)
NO
1
2
3
Theme Session
How to Approach Smart Factory on New Trends. .......................................................................................................... 44
Bang-Ho Cho(LG CNS, Principal Researcher)
A Fault-tolerant OFP based on Partition Computing. ................................................................................................... 46
Jung-Guk Kim(Hankuk Univ. of Foreign Studies, Professor)
Trends of Robot SW Platform Technologies and Applications.................................................................................... 48
Sang Hoon Ji(KITECH, Principal Researcher)
2014 International Symposium on Embedded Technology
How to Approach Smart Factory on New Trends
Bang-Ho Cho
Engineering Solution Unit
LG CNS, Seoul, Republic of Korea
E-mail: bhcho@lgcns.com
Abstract
Manufacturing industry is not only the key factor for one country’s overall development (economy, culture,
society), but also a criterion for the national competitive advantage. As mentioned at CPS, Industry 4.0,
manufacturing industry is facing both challenge and opportunity due to the technology development, change of
market and social trend. To overcome this situation, the mass customization production system is considered as
alternative. That system need to provide efficiency in cost, safety, environment as well. To realize that, overall
life cycle approach is required to meet customer's need dynamically in every manufacturing phase such as
product design, production, delivery, A/S. Also, for flexible manufacturing system, modular design is essential in
product, equipment, material and system. To realize that subject effectively, system model is designed under
customizing and considering in each industry properties as like business shape (B2B or B2C), industry
classification(Continuous or Discrete), the production methods and so on. Also, step-by-step approach is required
based on mid & long term road map and standardization should be utilized in ecosystem widely with
participation of economic agent which government, academia, industry.
Keywords: CPS, Industry 4.0, Manufacturing, Smart Factory, Individualized production.
TheISET
9th International
Symposium on Embedded Technology, Seoul, Korea
44
2014
1
Seoul, Korea, 22-23 May, 2014
How to Approach Smart Factory on new
trends
•
•
•
•
•
•
Agenda
Bang-Ho Cho
Engineering Solution Unit
LG CNS
bhcho@lgcns.com
2014. 5. 22
2014 International Symposium on Embedded Technology
1.
Importance and Meaning of Manufacturing
2.
Changing forces for Manufacturing
3.
Emerging Technology to apply as Alternative
4.
Future Framework of Smart Factory
5.
How to Approach to Develop
6.
Consideration and Homework
7.
Conclusions
45
2014 International Symposium on Embedded Technology
A Fault-tolerant OFP based on Partition Computing
Jung-Guk Kim
Department of Computer Engineering
Hankuk University of Foreign Studies, Kyunggi, Republic of Korea
E-mail: jgkim@hufs.ac.kr
Abstract
When developing a new Operational Flight Program (OFP), field tests with a new OFP include various hazards
such as S/W and H/W failures. To overcome this, a primary-shadow active replication system is commonly used.
In case that an UAV can cope with a heavy payload, dual H/W’s can be used so that the primary H/W executes a
new OFP while the shadow executing a stable legacy OFP. For an UAV with a small affordable payload, a dual
(two-version) S/W scheme on a single H/W can be used based on the partition computing. On a single H/W, an
under-development OFP is assigned to a primary partition and a stable OFP is assigned to the shadow partition.
This scheme is a S/W fault-tolerant system, however, it is not recoverable in the case of H/W faults. In this paper,
a new fault-tolerant OFP scheme called Double-Primary Double-Shadow (DPDS) system to cover both H/W and
S/W faults based on the TMO.p model is introduced. In this novel scheme, dual H/W platforms are used and each
of the hardware has a primary OFP under development and a stable-shadow OFP as non-overlapping partitions.
Keywords: OFP, UAV, TMO.p, Partition computing, DPDS, Fault-tolerant.
TheISET
9th International
Symposium on Embedded Technology, Seoul, Korea
46
2014
1
Seoul, Korea, 22-23 May, 2014
A Fault-tolerant OFP based on
Partition Computing
Prof. Jung-Guk Kim
Dept. of Computer Eng.
Hankuk University of Foreign Studies
jgkim@hufs.ac.kr
2014. 5. 22
2014 International Symposium on Embedded Technology
Real-time Operating system for Dependable Embedded Operation
http://www.rodeolab.org
Agenda
1. TMO model for real-time computing
2. TMO.p model for partition computing
3. RT-eCos.p; The RTOS platform for TMO.p
4. An OFP for an unmanned helicopter based on the TMO
model
5. PSTR (Primary-Shadow TMO.p Replication) for a S/W faulttolerant OFP system
6. DPDSTR (Double-Primary Double-Shadow TMO.p
Replication) for a H/W & S/W fault-tolerant OFP system
7. Conclusions
Real-time Operating System for Dependable Embedded Operation (http://www.rodeolab.org)
47
2014 International Symposium on Embedded Technology
Trends of Robot SW Platform Technologies and Applications
Sang Hoon Ji , Sang Moo Lee and Su Jeong You
Robot R&BD Group
Korea Institute of Industrial Technology, Gyeonggi, Republic of Korea
E-mail: {robot91, lsm, sjyou21}@kitech.re.kr
Abstract
Often when a robot application is created, some elements or parts of the devices on the robot are not available
because the particular hardware items are unavailable. Sometimes, before the items are arrived, it may needed to
begin the creation of the robot application. With the help of robot SW platform, it is possible to design an
application with a mixture of real devices and virtual devise and have experience with the robotic service in the
virtual environment. This is the one case of a number of advantages taken from robot SW platform.
Moreover, there are some distinguishable challenges in robotic services including a big data issue and cloud
services, safety, and the process standardization. This makes it more difficult to select the suitable robot SW
platform and build up our robot software for the requested robotic service. So, in this paper, we look into the
development of robot SW platform and how to build up our robot software on the robot software platform.
Especially, we introduce an open source robot SW platform, OPRoS, which is composed of a simulator, an IDE
and a communication protocol.
Keywords: Intelligent Robot, Open Robot SW Platform, OPRoS (Open Platform for Robotic Services).
TheISET
9th International
Symposium on Embedded Technology, Seoul, Korea
48
2014
1
Seoul, Korea, 22-23 May, 2014
2014 International Symposium on
Embedded Technology
JI SANG HOON
Robot R&BD Group
Korea Institute of Industrial Technology
robot91@kitech.re.kr
2014. 5. 22
Agenda
Introduction
Trends of Robot SW Platform
15
Development
Direction of
Conclusions
49
The 9th
International Symposium
on Embedded Technology
Academic Session
09:30-10:50, May 23, 2014
Source Technology Trends
Chair : Euiseong Seo(Sungkyunkwan Univ., Professor)
NO
1
2
3
4
Academic Session
Multicore/GPGPU for Cyber-Physical Systems................................................................................................................ 52
Chang-Gun Lee(Seoul Nat’l Univ., Professor)
Smart OS-level Power Management Techniques for Smartphones........................................................................... 54
Sung Woo Chung(Korea Univ., Professor)
Free Open Source Software(FOSS) - Can We Prevent the Second OpenSSL Heartbleed Bug?............................ 56
Sam Chung(Univ. of Washington, Professor)
A Remote Power Analyzer based on Power Modeling in Heterogeneous Embedded Linux Systems............... 59
Young-Joo Kim(ETRI, Senior Researcher)
2014 International Symposium on Embedded Technology
Multicore/GPGPU for Cyber-Physical Systems
Chang-Gun Lee
School of Computer Science and Engineering
Seoul National University, Seoul, Republic of Korea
E-mail: cglee@snu.ac.kr
Abstract
For future cyber-physical systems, massive sensor data processing and complex control computations are
needed in real-time, Regarding this, we discuss the possibility of using multicore/GPGPU. Major hurdles for this
are difficulty of using multicore/GPGPU parallelism under real-time constraints and difficulty of validating the
performance of multicore/GPGPU based cyber-physical systems. We present ideas to overcome these two
hurdles.
Keywords: Cyber-physical systems, Multicore/GPGPU
TheISET
9th International
Symposium on Embedded Technology, Seoul, Korea
52
2014
1
Seoul, Korea, 22-23 May, 2014
May 23, 2014
Multicore/GPGPU for
Cyber-Physical Systems
Chang-Gun Lee
Seoul National University
Real-Time Ubiquitous Systems Lab.
SIGCS 2014 Workshop
Contents
 Properties of Future CPS Applications
 Hurdles
 Solutions
 Simulation Results
 Conclusion
Real-Time Ubiquitous Systems Lab.
SIGCS 2014 Workshop
2
53
2014 International Symposium on Embedded Technology
Smart OS-level Power Management Techniques for Smartphones
Sung Woo Chung
Division of Computer and Communication Engineering
Korea University, Seoul, 136-713 Republic of Korea
E-mail: swchung@korea.ac.kr
Abstract
There have been numerous OS-level power management techniques, but most of them are not so realistic
unfortunately (eg. too complicated to adopt or potential gain is marginal). On the other hand, power management
techniques in off-the-shelf mobile devices are too simple such as changing frequency and voltage by looking at
core utilization. In this research, I introduce smart OS-level power management techniques, which are applicable
to real mobile devices, as follows: 1) user-aware display power management, 2) profile-based CPU power
management, 3) thermal-aware CPU power management, and 4) battery-aware power management. All the
results shown here are based on real measurement (not simulation).
Keywords: Power management, DVFS(Dynamic Voltage Frequency Scaling), Smartphone.
TheISET
9th International
Symposium on Embedded Technology, Seoul, Korea
54
2014
1
Seoul, Korea, 22-23 May, 2014
Smart OS-level Power Management
Techniques for Smartphones
Sung Woo Chung
Korea University
http://smrl.korea.ac.kr
SMRL |
SoC & Microprocessor
Research Laboratory
Sung Woo Chung | May 13, 2014 | 1
Contents
1. User-aware Display Power Management
2. Profile-based CPU Power Management
3. Thermal-aware CPU Power Management
4. Battery-aware Power Management
SMRL |
SoC & Microprocessor
Research Laboratory
Sung Woo Chung | May 13, 2014 | 2
55
2014 International Symposium on Embedded Technology
Free Open Source Software (FOSS)
- Can We Prevent the Second OpenSSL Heartbleed Bug?
Sam Chung*†, William Kim*, Barbara Endicott-Popovsky†
*
†
Institute of Technology, Univ. of WA, Tacoma, WA, USA
Center for Information Assurance & Cybersecurity, Univ. of WA, Seattle, WA, USA
E-mail: {chungsa, willkim, endicott}@uw.edu
Abstract
The purpose of this research is to propose software architecture driven Free Open Source Software (FOSS)
development to increase productivity of current contributors and to expedite participation of new ones. The
actual number of active participants in top FOSS projects is surprisingly very small compared to the number of
people who are using them. Also, the complexity of a popular FOSS grows over time and it prohibits
participation of new contributors. For this purpose, an architecture driven approach is proposed: software
architecture of an FOSS is re-documented from the given source code of the FOSS and is released in parallel
with the main version release of the FOSS. The architectural model is shared with FOSS contributors who need
to comprehend the FOSS.
Keywords: Free Open Source Software, FOSS, Software Architecture Re-documentation
1. Introduction
Recent news of „OpenSSL‟ Heartbleed bug exactly demonstrates how a small vulnerability of an FOSS can
affect around half a million “secure” web servers that were certified by trusted authorities. Although FOSS
projects welcome any developers to join their activities and distribute the software, the actual number of
participants is not large. Most effort depends upon the very small number of top contributors, which is shown in
Table 1. In Table 1, we chose top three most starred „GitHub‟ projects. Top contributors were measured by
number of code commits. By using statistics gathered by commits to master branch only on „GitHub‟ hosted
project (incomplete commit data may cause contributor percentages to be inaccurate), we attempted to discover
the percentage of top 3 contributors of commits in the FOSS projects.
Table 1. FOSS Project Contributors (Data gathered on April 15, 2014)
Project Name
twbs/bootstrap*
jquery/jquery*
joyent/node*
openssl/openssl
mitreid-connect/OpenID-ConnectJava-Spring-Server
Total # of
Contributors
523
191
505
21
Top Contributor
% of Commits
40.8%
28.5%
29.8%
<35.6%
Top 3 Contributors
% of Commits
56.1%
43.2%
58.7%
<36.6%
12
57.2%
81.8%
Also, since the complexity of a popular FOSS has been increased, it is not easy for new contributors to join
an active FOSS project. The general FOSS development pattern may not necessarily map directly to the stages of
traditional software development life cycle—requirements, design, implementation, testing, and maintenance. We
can see that the common lifecycle of a FOSS iteration—1) Report bug. 2a) Developer is tasked or 2b) code pull
request is submitted. 3) Change is committed to the code base—fits nice and tight to the highly iterative
implementation, testing, and maintenance loop. Currently, the vast majority of design and requirements manifest
in the form of developer documentation [1]. These take various forms such as like public wiki pages, gettingThe 9th International Symposium on Embedded Technology, Seoul, Korea
56 ISET 2014
1
Seoul, Korea, 22-23 May, 2014
started articles, reference documentations, engineering specifications, code comments, etc. At this point, we
would like to note that this documentation is essentially all textual information.
2. Architectural Visual Model as One of FOSS Resources
It is a foundational principle of software engineering that a good design is critical towards the success of a
complex and large software project. It is nearly a foregone conclusion that visual modeling of software
architecture as part of the design efforts can have significant benefits to the software maintenance process [2].
In this research, software architecture of a FOSS is re-documented from the given source code of the FOSS
and is released in parallel with the main version release of the FOSS, which is shown in Figure 1. The
architectural model is shared with FOSS contributors who need to comprehend the FOSS. As a case study, a free,
open Identity and Access Management (IAM) project‟s repository called MITREId, which is equipped with a
visual UML model link, is demonstrated. A UML visual model is created by the use of a re-documentation
methodology known as 5W1H Re-documentation, based loosely on the journalistic 5 W‟s and 1 H of Who, What,
When, Where, Why, and How [3].
(a) A link to its architectural model
(b) A visual model
Figure 1. A FOSS Project Site Equipped with an Architectural Visual Model
3. Discussion
We assert that having visual documentation in the form of UML models can have a positive impact on FOSS
development and maintenance. Architecture of a FOSS improves comprehension of developers and quality
assurance team of the FOSS so that productivity of FOSS developers can be increased and defects of the FOSS
can be decreased. At the very least, additional meaningful documentation may draw in more newcomers who
choose open source projects based strictly on the availability of good starter documentation to break into the
project.
References
[1] Dagenais, B. & Robillard, M. P., Creating and Evolving Developer Documentation: Understanding the
Decisions of Open Source Contributors. Proceedings of ACM SIGSOFT International Symposium on FSE,
2010, pp. 127-136.
[2] Dzidek, W. J., Arisholm, E., Briand, L. C., A Realistic Empirical Evaluation of the Costs and Benefits of
UML in Software Maintenance. IEEE TSE, Vol. 34, No. 3, 2008, pp. 407-432.
[3] Chung, S., Won, D., Baeg, S. H., & Park, S., Service-Oriented Reverse Reengineering: 5W1H ModelDriven Re-Documentation and Candidate Services Identification. Proceedings of IEEE International
Conference on SOCA, 2009, pp. 1-6.
The 9th International Symposium on Embedded Technology, Seoul, Korea
2
57
2014 International Symposium on Embedded Technology
Software Education and Research
at UW Tacoma
Sam Chung, Ph.D.
Smart & Secure Computing Research Group (SSCRG)
Institute of Technology
University of Washington, Tacoma
Center for Info. Assurance & Cybersecurity (CIAC)
University of Washington, Seattle
1/12/2014
SW Maestro 2014
1
Schedule
• 2:30 PM - 3:00 PM
•
•
•
•
•
•
•
Greetings,
About UW Tacoma & Speakers
3:00 PM - 3:30 PM Soon Bang
3:30 PM - 3:40 PM Break
3:40 PM - 4:00 PM William Km
4:00 PM - 4:20 PM Sky Moon
4:20 PM – 4:30 PM Break
4:30 PM - 5:10 PM Joowoo Choi, Sungbong Lee,
Yeonil Yoo, Joosung Park
5:10 PM - 6:00 PM SW Maestro Students
1/12/2014
58 ISET 2014
SW Maestro 2014
2
Seoul, Korea, 22-23 May, 2014
A Remote Power Analyzer based on Power Modeling in
Heterogeneous Embedded Linux Systems
Young-Joo Kim
Electronics and Telecommunications Research Institute
Daejeon, Republic of Korea
E-mail: kr.yjkim@etri.re.kr
Abstract
As a variety of powerful embedded systems with heterogeneous multi-cores are becoming more common,
power consumption has been positioning as one of the important issues in these systems. There are three
mechanisms which grasp power consumption of the systems and programs: simulation, estimation, and
measurement. These mechanisms have pros and cons respectively. In this talk, we focus on power estimation
based on power modeling. Power modeling extracts power coefficient for each HW component through power
measurement, and then power related to HW and SW components is estimated by the extracted coefficient. Also
we propose a remote power analyzer which uses power modeling. The analyzer estimates power for HW
components (such as CPU and GPU) and SW components (such as processes and programs) in real-time via USB
gadget as well as provides GUI environment based on eclipse to users. For this, three target agents must be
worked in embedded systems, and users executes and operates a host program in order to show estimated powers
as bar chart.
Keywords: Embedded systems, Heterogeneous, Power consumption, Estimation, Power modeling
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
59
2014 International Symposium on Embedded Technology
A Remote Power Analyzer Based on Power
Modeling in Heterogeneous Embedded
Linux Systems
2014. 05. 23
ETRI
김영주 (kr.yjkim@etri.re.kr)
Contents
60 ISET 2014
The 9th
International Symposium
on Embedded Technology
Interactive SessionⅠ
NO
1
2
3
4
5
6
7
8
9
10
11
12
13
16:40-17:30, May 22, 2014
Interactive Session
Performance Evaluation for an Inter Vehicle Communication System based on WAVE Technology ................. 63
Yoo-Seung Song, Hyun-Seo Oh (ETRI)
Design and Implementation of Fusion Map Provider for Autonomous Driving Systems .................................... 65
Kyounghwan An, Wooyong Han (ETRI)
Dynamic Duty-Cycle Scheduling Scheme for Wireless Sensor Networks in Greenhouse .................................... 67
Jinhong Kim, AekyungMoon, Sooin Lee (ETRI)
IoT-based Indoor Environmental Monitoring System using Open Source Physical Computing Platforms...... 69
YoungJin Choi, Dae-Young Kim, Cheol-Hee Kwon, Sang-Myung Lee (LIG Nex1)
A Design of Semantic IoT for Interoperability of Things............................................................................................... 71
Min-woo Ryu, Sang-Shin Lee, Il-Yeop Ahn, Kwang-Ho Won (KETI)
Smart Service Design using Internet of Things............................................................................................................... 74
Jaeseok Yun, Jaeho Kim, Il-Yeop Ahn, Kwang-Ho Won (KETI)
L-V-C Gateway Architecture based on DDS and HLA for L-V-C interoperability...................................................... 77
Hyung Kook Jun(Sungkyunkwan University), Kyeong Tae Kim, Woosuk Cha, Won Tae Kim (ETRI),
Young Ik Eom(Sungkyunkwan University)
Digital Controller Design for Aerial Robot Control. ....................................................................................................... 79
Youn-Ho Choi, Jung-Eun Joung, Dong-Ha Lee (DGIST)
MQTT Protocol Binding for the REST-based IoT Architecture...................................................................................... 82
Sung-Chan Choi, Kwang-Ho Won, Sang-Shin Lee, Il-Yeop Ahn (KETI)
Adaptive GUI Reconfiguration Mechanism for Mobile Learning Devices. ............................................................... 84
Choongbum Park, Jae-Guk Gwon (ETRI), Kyung-Min Park, Hoon Choi (Chungnam National University)
RTiK-MP: Real-Time implant Kernel for x86-based Multi-Processor Windows ........................................................ 89
Jae Guk Gwon (ETRI), Chang-In Song (ARA Networks Company)
Single Camera-based Positioning Method using Image Database............................................................................ 92
Jin Seon Song, Yongwan Park (Yeungnam University)
Evaluation of Cache Partitioning : ImprovingCPUUtilization of Multi-core Embedded Processors ................. 94
Eunji Pak (ETRI)
2014 International Symposium on Embedded Technology
NO
14
15
16
17
18
Interactive Session
The Memory Core in 3D Die-Stacked DRAM. .................................................................................................................. 96
Yongjoo Kim, Taeho Kim, Chaedeok Lim (ETRI)
A Dumb Battery Consumption Prediction Method of Mobile Device without Smart Battery............................. 98
Ho-Joon Park (ETRI)
Qplus-hyper : A Hypervisor for Safety-critical Systems. .............................................................................................102
Taeho Kim, Dongwook Kang, Soo-Young Kim, Jin-Ah Shin, Donghyouk Lim, Vicent Dupre (ETRI)
EcoVerifier : Tool Support for Formal Verification of ECML using SpaceEx.............................................................104
Jaeyeon Jo, InGeol Chun, WonTae Kim (ETRI)
Autonomic Computing Research Challenges for CPS.................................................................................................106
Prajakta Jadhav, Won-tae Kim, In-Geol Chun (ETRI)
62 ISET 2014
Seoul, Korea, 22-23 May, 2014
Performance Evaluation for an Inter Vehicle Communication System
based on WAVE Technology
Yoo-Seung Song, Hyun-Seo Oh
IT Convergence Technology Research Laboratory
Daejeon, Electronics and Telecommunication Research Institute
E-mail: {yssong, hsoh5}@etri.re.kr
Abstract
ITS technologies have been applied into transportation systems and played important roles for traffic safety
and convenient driving. A wireless communication technology named as WAVE for high speed vehicles has been
developed based on IEEE802.11p specifications. Lots of vendors and institutes have made the WAVE devices
and tested the performance. However, CSMA/CA based WAVE technology has a weak point when many service
devices exist at near space. In this paper, we introduce an implemented WAVE communication module for IVC
system and analyze the PER of WAVE by increasing the number of OBUs to observe the performance changes.
Keywords: WAVE, Inter Vehicle Communication (IVC), V2V, ITS.
1. Introduction
Recently, ITS (Intelligent Transportation System) technologies have been applied into personal vehicles as
well as public transportation systems and played important roles for traffic safety and convenient driving. One of
the key technologies in the ITS field is a wireless communication system for high speed vehicles, which is called
WAVE (Wireless Access in Vehicular Environments) based on IEEE802.11p specifications. Lots of companies
and research institutes have made OBUs (On Board Units) and the experimental results of PDR (Packet Delivery
Ratio) are compared under the real environments [1]. The performance of WAVE has been examined under V2X
environment in [2] and its application is verified for cooperative driving service in [3]. However, CSMA/CA
based WAVE technology has a weak point when many service devices exist at near space. In this paper, we
introduce an implemented WAVE communication module for IVC (Inter Vehicle Communication) system and
analyse the PER (packet error rate) of WAVE by increasing the number of OBUs to observe the performance
changes.
2. Implemented IVC System
We have implemented the IVC demonstration system as shown in Figure 1. It is composed of a MGU
(Message Generation Unit), a WCU (WAVE Communication Unit) and a monitor. The MGU generates BSM
(Basic Security Message) 80 ~ 320 byte packets every 10ms. The BSM packet is composed of the vehicle
information of speed, direction, acceleration, location, etc. The MGU is connected to the WCU with Ethernet
cable. The WCU transmits the generated packet in RF and communicates each other based on CSMA/CA MAC
protocols.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
63
2014 International Symposium on Embedded Technology
Figure 1. The implemented IVC demonstration system for cooperative driving services using WAVE
technology
3. Experimental Results
The implemented IVC demonstration system using WAVE technology is tested under an indoor environment
and the results are shown in Figure 2. The number of OBUs are changed from 2 to 4 with different size of packet
length. The BSM transmission rate is fixed to 10ms. The PER is measured by changing the modulation rate from
3 to 18Mbps. It is observed that 3 ~18Mbps modulation schemes can be supported under the condition of 3
OBUs with an 80 byte packet to meet less than 10% PER. But 18Mbps modulation scheme can’t meet 10% PER
when packet size is 320 bytes. 18Mbps modulation scheme shows more sensitive than others when the packet
size is increased.
Figure 2. PER results of the implemented IVC system using WAVE technology according to the number of
OBUs with different size of packet length
4. Conclusions
This paper have shown the implemented IVC demonstration system and tested the PER performance under an
indoor environment. The test was done by changing the number of OBUs with different size of packet length. It
is observed that 3 ~ 18Mbps modulation scheme can be established in stable when OBUs are less than 4 with
packet size of 80bytes in IVC communication systems.
References
[1] John B. Kenney at al., "Comparing Communication Performance of DSRC OBEs from Multiple Suppliers,"
19th ITS World Congress, Vienna, Austria, October 2012.
[2] Seungcheon Kim, "An Evaluation of the Performance of Wireless Network in Vehicle Communication
Environment," KICS, vol.36, No.10, 2011.
[3] Shin Kato et al., "Vehicle Control Algorithms for Cooperative Driving with Automated Vehicles and
Intervehicle Communications," IEEE Transactions on intelligent transportation systems, vol.3, pp.155-161,
September 2002.
The 9th International Symposium on Embedded Technology, Seoul, Korea
64 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
Design and Implementation of Fusion Map Provider for
Autonomous Driving Systems
Kyounghwan An, Wooyong Han
IT Convergence Technology Research Laboratory
ETRI, Daejeon, Republic of Korea
E-mail: {mobileguru, wyhan}@etri.re.kr
Abstract
ADAS (Advanced Driver Assistance System) and autonomous driving systems use sensors such as cameras,
radars, lidars to recognize driving situations. However, there have been several limitations due to the sensor
coverage, poor environments for sensing, inaccuracy of recognition results, and etc. To overcome previous
problems, map data can be used to enhance the results. The map data are also important resource for planning
path or deciding driving behavior in autonomous driving systems. The map data used for the ADAS and
autonomous driving systems have different requirements compared with those of CNS (Car Navigation System).
The map should include more detailed lane level geometries and need to be provided in soft real time to meet
control interval of the system. In this paper, we suggest requirements of the detailed map and necessary queries.
We also propose the system architecture of the map provider with implementation results.
Keywords: Autonomous driving, ADAS, Fusion map, CNS
1. Introduction
In ADAS (Advanced Driver Assistance System) and autonomous driving systems, map data are used for
enhancing recognition results, planning path or deciding driving behavior[1][2]. The map data used for the
systems have different requirements compared with those of CNS (Car Navigation System). The map (in this
paper, we call the map as fusion map) should include more accurate and more detailed lane level features. Also
the fusion map should be provided to the systems in soft real time to meet control interval of the system. In this
paper, we suggest the requirements of the fusion map and the system architecture in section 2. In section 3, we
explain the implementation result of the fusion map and conclude in section 4.
2. Fusion Map Provider
Since the fusion map are used for control purposes, they need more accurate and detailed lane level features.
The features includes lane center line points, lane numbers, divider types (solid/dash, double/single), lane colors
(white, yellow, blue), lane width, stop line, crosswalk, traffic signal, etc. In this paper, we also suggest fusion
map provider providing other systems with the fusion map periodically around ego vehicle as the vehicle moves.
To receive the map data at the right time, the systems registers queries which have time intervals and window
sizes as parameters. Once the queries are registered to the fusion map provider, the queries are executed and the
data are transmitted periodically like other sensors do.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
65
2014 International Symposium on Embedded Technology
Map
Matching
Continuous Fusion
Map Query Processor
Snapshot Fusion
Map Query Processor
Query Repository
Spatial database
Map Loader
Figure 1. Architecture of Fusion Map Provider
The architecture of the fusion map provider is shown in Figure 1. It consists of five modules: Map Loader,
Query Repository, Map Matching, Continuous Fusion Map Query Processor, and Snapshot Fusion Map Query
Processor. The Map Loader is for loading raw spatial data into database and the Query Repository is for
registering queries. The Map Matching module finds current position of the vehicle in the map to calculate query
windows of the registered queries. The Continuous Fusion Map Query Processor continuously evaluates
registered queries using the specified interval and newly calculated query windows. The Snapshot Fusion Map
Query Processor processes non periodic queries requested from other systems.
5. Implementation
Figure 2 shows the implementation result of the fusion map provider. The fusion map provider is implemented
on PC running Linux. In the figure, the box is query window which is dynamically calculated from the position of
ego vehicle. The query window size was 170m X 50m and the query interval was 100ms. Polygons are lane level
road segments. As the graph shows average processing time was about 1ms.
Figure 2. Implementation of Fusion Map Provider
6. Conclusions
In this paper, we explained the map contents of the fusion map and suggested the architecture of the fusion
map provider. We also explained implementation results satisfying our control interval (100ms). The suggested
system can be used various components of the intelligent car.
References
[1] SAFESPOT Core Architecture - LDM API and Usage Reference, http://www.safespot-eu.org/.
[2] Zott Christian, et al., "Safespot Local Dynamic Maps - Context-Dependent View Generation of a Platform's
State & Environment", 15th World Congress on ITS and ITS America's 2008 Annual Meeting, 2008.
Acknowledgement
This work was supported by the IT R&D program of MSIP/KEIT. [10041417, Development of Decision Making
/Control Technology of Vehicle/Driver Cooperative Autonomous Driving System(Co-Pilot) Based on ICT]
The 9th International Symposium on Embedded Technology, Seoul, Korea
66 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
Dynamic Duty-Cycle Scheduling Scheme for Wireless Sensor
Networks in Greenhouse
Jinhong Kim, Aekyung Moon, Sooin Lee
Embedded System Research Section
Daegu-Gyeongbuk Research Center
ETRI, Daegu, Republic of Korea
E-mail: {jinhong, akmoon, silee}@etri.re.kr
Abstract
There are increasing demands for the environment monitoring in the agriculture facilities such as greenhouse
using wireless sensor networks(WSNs). Due to each sensor node in WSNs operates with their limited energy,
power management is a critical problem. In this paper, we propose dynamic duty-cycle scheduling scheme for
WSNs in greenhouse environment in order to increase the energy efficiency considering the variation of
temperature and light intensity. Through NS-2 simulations, we have verified that our proposed scheme
outperforms existing scheme which has constant duty-cycle in terms of accumulate energy consumption.
Keywords: Duty-cycle scheduling, Wireless sensor networks, Greenhouse.
1. Introduction
Recently, plant cultivation through the artificial facilities such as plastic or glass greenhouse and plant factory
have increased. The greenhouse provide optimal conditions such as temperature, humidity and light intensity to
plant for increasing the quality and yields of plant product through the controlled greenhouse environments.
Among the various environmental factors which may influence to plant growth in greenhouse, one of the most
major thing is indoor temperature (hereinafter, called temperature). In the most of conventional greenhouse,
wired networks have been adopted to deliver these environmental information to the farmers. However, due to
the expansion of greenhouse and increased demands for the high control accuracy, the number of sensor nodes
deployed in greenhouse became increasing. Therefore, wireless sensor networks(WSNs) are emerging as a new
solution to decrease the cost of deployment of sensor nodes and to change the location of sensor nodes easily[1].
However, since each sensor node operates with their limited energy, power management is a critical problem in
WSNs. Therefore, the major factor of energy consumption of sensor nodes is caused by the wireless data
transmission, many researches have been studied to improve the energy efficiency. Among them, in the medium
access control (MAC) layer, especially duty-cycle scheme[2] is known as an appropriate method for WSNs.
In this paper, we propose dynamic duty-cycle scheduling scheme for WSNs in greenhouse environment to
increase the energy efficiency of sensor nodes. The proposed scheme allows each sensor node to calculate and
update their duty-cycle according to the variations of temperature and light intensity in greenhouse.
2. Proposed Scheme
In order to increase energy efficiency, the proposed scheme allows each sensor node i determines its duty) based on the variation of temperature and light intensity. Whenever node i wakes, it calculates the
cycle(
(=
) and
(
). Each
and
are variation of light intensity and temperature,
respectively. Also,
greater value between
greenhouse.
and
and
are system parameter. In Equation (1), node i chooses the
in order to make node i cope actively with the environmental changes in
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
67
2014 International Symposium on Embedded Technology
Equation 1.
Equation 2.
When, therefore, temperature and light intensity are increased/decreased more than their threshold, node i
according to Equation (2). In the proposed scheme, however,
should not be too large a
updates their
is
value to guarantee the minimum QoS requirement of the greenhouse applications. Therefore, the maximum
an application-specific parameter.
3. Performance Evaluation
Through the NS-2 simulator, we tested the feasibility of our proposed dynamic duty-cycle scheme. For the rest
of operation of MAC protocol, the RI-MAC[3] was employed in our simulation. To emulate real light intensity
and temperature for a day, we measured these information using our test and applied the light intensity and
temperature data (Figure 1.(a)).
(a)
(b)
Figure 1. (a) Measured data, (b) Accumulate energy consumption
Figure 1(b) shows the accumulate energy consumption of our proposed scheme scheduling and original RIMAC. In our proposed scheme, from 8 a.m. to 4 p.m., the accumulate energy consumption increases rapidly
since the short duty cycle is calculated. On the other hand, during the night, the accumulate energy consumption
is almost stationary since the light intensity and indoor temperature are invariable. However, the accumulate
energy consumption of the original RI-MAC is consistently increased because the each sensor nodes has the
constant duty-cycle schedule.
4. Conclusions
In this paper, we proposed dynamic duty-cycle scheduling scheme for wireless sensor nodes in greenhouse in
order to increase the energy efficiency. In the proposed scheme, each sensor node adjusts its duty-cycle
according to the variation of temperature and light intensity in greenhouse. Through NS-2 simulation, we
observed that our proposed scheme shows better performance in terms of accumulate energy consumption as
compared to the static duty-cycle scheduling scheme of RI-MAC.
References
[1] Qian Zhang, Xiang-long Yang, Yi-ming Zhou, Li-ren Wang, Xi-shan Guo, "A wireless solution for
greenhouse monitoring and control system based on ZigBee technology", Journal of Zhejiang University
SCIENCE A, Vol 8, No 10, pp. 1584-1587, 2007.
[2] W. Ye, J. Heidemann, and D. Estrin, “An Energy-Efficient MAC Protocol for Wireless Sensor
Networks,”Proc. IEEE INFOCOM, 2002, pp. 1567-76.
[3] Y. Sun, O. Gurewitz, and D. B. Johnson, "RI-MAC: A receiver initiated asynchronous duty cycle MAC
protocol for dynamic traffic load," in Proc. of ACM Sensys, Nov. 2009.
The 9th International Symposium on Embedded Technology, Seoul, Korea
68 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
IoT-based Indoor Environmental Monitoring System
using Open Source Physical Computing Platforms
YoungJin Choi, Dae-Young Kim, Cheol-Hee Kwon, Sang-Myung Lee
Software Research and Development Laboratory
LIG Nex1, Pangyu, Republic of Korea
E-mail: {youngjin.choi, dykim2010, kwoncheolhee369a, sangmyung.lee}@lignex1.com
Abstract
This paper presents the design and development of an indoor environmental monitoring system employing
Netduino Plus and Arduino Uno which are kind of open source physical computing platform. The system has
five sensors: temperature, humidity, light (CdS), gas and nuclear radiation sensors to monitor the indoor
environment. Our proposed system is connected to the Internet for Internet of Things (IoT). Moreover, our
system can send sensor data to Xively periodically. As a case study, an indoor environmental monitoring system
using physical computing devices such as Netduino and Arduino has been developed. From our experiment, we
found out that our approach provides cost-effectiveness and easiness when constructing this kind of system with
using physical computing platforms quickly.
Keywords: Monitoring, IoT, Arduino, Netduino, Xively
1. Introduction
Currently, indoor monitoring systems are becoming more and more important. The temperature and humidity
have a critical influence on large categories of physical, electronic, chemical, mechanical, biological systems and
so on. In order to avoid malfunction and damage of the systems, certain applications (in industries, laboratories,
commercial and residential buildings) need to measure temperature, humidity, light and gas [1]. Moreover,
nuclear radiation measurement is needed for safety. Earlier measurements had been done by manual methods
from analog instruments such as thermometers, hygrometers and the like. Such type of measurements cannot
satisfy the current requirements in terms of the time duration, accuracy and cost-effectiveness [2].
The good way to solve this problem is to develop a data logger and to control the physical parameters in
monitoring systems. Some researches solved the problem by using PC since PC became very common, cheap and
reliable. In addition to that, PC-Based monitoring systems were proposed in order to make use of graphical user
interface (GUI) based applications [1, 2, 3]. However, PCs consume more electricity than embedded systems as
to energy consumption. In terms of cost, generally, PCs are still expensive compared to embedded boards.
Mostly, PC-Based systems need to execute additional PC application to operate the system properly. In other
words, a PC side application must be always executed in order to operate the entire system.
In the proposed IoT-based indoor environmental monitoring system, open source physical computing devices
are used so that problems of PC-based monitoring systems can be solved. Physical computing has been
extensively researched these days. There are several physical computing devices such as Arduino and Netduino.
These open source platforms are flexible and easy-to-use hardware and software. The proposed system has
temperature, humidity, light, gas and nuclear radiation sensors to monitor the indoor environment. Additionally,
our system is connected to the Internet so that interested users can have access to sensor data through the Web
and Xively which is related to IoT Service Platform and an on-line database service allowing developers to
connect sensor-derived data to the Web.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
69
2014 International Symposium on Embedded Technology
2. Implementation and Results
Figure 1. Block diagram of the proposed system
As shown in Figure 1, the radiation sensor is integrated into Arduino Uno and the rest of sensors are connected
to Netduino Plus. For communicating the Netduino board with the Arduino board, a pair of Xbee modules is used.
In order to monitor several sensors through the Web, a lightweight web server is included in the Netduino Plus.
In addition to that, HTML, XML and Ajax are also used so that sensor data can be automatically updated every
five seconds in all web browsers. Through Xively, users can get five sensor values and graphs based on
accumulated sensor data [4].
Figure 2. Implemented hardware (Upper Left) and Experimental results (Lower Left and Right)
Figure 2 shows the implemented system and experimental results. Google Chart is also used to show gauges
and users can see some graphs of sensor data through Xively. The system has been running for over six months.
3. Conclusions
The proposed system will be useful in research and laboratories where acquisition for the monitoring and
analysis of the ambient temperature, humidity, light, gas and nuclear radiation is necessary. With open source
physical computing devices, our approach provides cost-effectiveness and easiness when constructing this kind of
the system quickly. In the future, we will conduct the large-scale experiments with multipoint monitoring systems
with using multiple sensors placed in different locations.
References
[1] Gabriel Gasparesc, “Development of a Low-Cost System for Temperature Monitoring”, Telecommunications
and Signal Processing (TSP), pp 340-343, 2013.
[2] Numgleppam Monoranjan Singh, Kanak Chandra Sarma, “Design and Development of Low Cost PC Based
Real Time Temperature and Humidity Monitoring System”, IJECSE, Vol. 1, No. 3, pp. 1588-1592, 2012
[3] I. Oghogho,“PC Based Temperature Monitoring and Alarm System”, Indian J.Sci.Res, Vol. 3, No. 2, pp. 17-20, 2012
[4] YoungJin Choi, “Implementation of an Indoor Environmental Monitoring System using Netduino”, Micro
Software Magazine, October 2013 ~ January 2014.
The 9th International Symposium on Embedded Technology, Seoul, Korea
70 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
A Design of Semantic IoT for Interoperability of Things
Min-woo Ryu, Sang-Shin Lee, Il-Yeop Ahn, Kwang-Ho Won
Embedded Software Convergence Reserach Center, Convergence Emerging Industries R&D Division,
Korea Electronics Technology Institute, Gyeonggi-do, Republic of Korea
E-mail: {minu, sslee, ilahn, khwon}@keti.re.kr
Abstract
Through numerous Internet technology advances, the world is moving towards an any time, any place, anyone
connected paradigm. According to this paradigm, a new idea has emerged taking into account these ideas, the
so-called Internet of Things (IoT). The IoT can connect between physical devices and virtual devices and derive
information through Internet. In addition, it can accommodate existing other technologies such as machine-tomachine (M2M) and wireless sensor network (WSN). Therefore the IoT is issued as next generation future
internet technology. However, for improving future internet technology via IoT, there are a couple of issue we
need to address. To do this we proposed a design of sematic IoT for interoperability of things.
Keywords: Semantic IoT, Internet of Things, Interoperability, Intelligence system.
1. Introduction
Through numerous Internet technology advances, the world is moving towards an any time, any place, anyone
connected paradigm. According to this paradigm, a new idea has emerged taking into account these ideas, the
so-called Internet of Things (IoT) [1]. The IoT can connect between physical devices and virtual devices and
derive information through Internet. In addition, it can accommodate existing other technologies such as
machine-to-machine (M2M) [2] and wireless sensor network (WSN) [3]. Theses characteristic of IoT, many
studies have been propose IoT system. However, for improving future internet technology via IoT, there are a
couple of issue we need to address. To do this, we propose a design of sematic IoT for interoperability of things.
The proposed design is used ontology and it can interact between things such as physical things and virtual things
via predefined expression. To do this, we were defined resource for IoT and relation between them.
2. Design of Ontology Model
In this section, we describe the design of sematic IoT for interoperability of things. In the IoT, various devices
has characteristic of them such as name, type and location. Therefore, to interact between Things, there is defined
common language for communicating with them. To do this, we were defined upper ontology model and
designed semantic based IoT system.
2.1 Design of Upper Ontology Model
This section was described our upper ontology model. The upper ontology model consist of five resource such
as profile, device, data, method, and storage. Figure 1 show upper ontology model
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
71
2014 International Symposium on Embedded Technology
Figure 1. Upper Ontology Model
In the figure 1, each resource is defined as super class and has “dis Joint” property. Each resource is
described as follow:
 Profile: this resource define attribute of device such as name, IP address and description
 Device: this resource define device type such as sensor or things
 Data: this resource define information
 Method: this resource define function of devices
 Storage: this resource define data storage such as database or text file.
Each resource has sub resource or attributes and they has relationship through expressions. The expressions is
defined as property. Figure 2 show our ontology model for interoperability Things.
2.2 Design of Ontology Model
In this section, ontology model was introduced. Figure 2 show our ontology model
Figure 2. Ontology Model for Interoperability Things.
In the figure 2, the PROFILE has relation with ID, NAME, and IP Address. Therefore, IoT devices can
identify profile of another IoT devices such as ID, NAME, and IP. And also, the profile resource has relation
with DEVICE and METHOD. In the DEVICE, it has attribute resource such as type, sub device. The type can
define device type such as sensor or electric device and the sub device can define number of sub device. In the
The 9th International Symposium on Embedded Technology, Seoul, Korea
72 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
METHOD can define functions of IoT device such as create, update, read, and delete. Therefore, the METHOD
is used to data handling.
3. Design of Semantic IoT System.
In this section, we are described architecture of semantic IoT system. The system is designed based on our
ontology model. Figure 3 show architecture of semantic IoT system.
Figure 3. Architecture of Semantic IoT System.
In the figure 3, the semantic IoT system consists of five components. Each component is introduced as follow:
 Ontology Model: this component consist of owl language. The detail description was section 2.
 Event Handler: this component was operated by input value, which can define from user of another
IoT devices. Event Handler define operations to Operation System based on Ontology Model and
saved data in Storage from user command of another IoT devices
 Data Coordinator: this component convert collected data from physical world to RDF format.
4. Conclusions
In this paper, we propose a design sematic IoT for interoperability Things. The proposed design was define
resource and relationship between resources on IoT environment. However, for interoperability of various IoT
devices, integrated resource must have defined. Therefore, future research will include integrated resource and
relationship.
5. Acknowledgment
This work was supported by the IT R&D program of MKE/KEIT. [10041262, Open IoT Software Platform
Development for Internet of Things Services and Global Ecosystem]
References
[1] M. W. Ryu, S. S. Lee, J. H. Kim, J. Y, “Survey of Internet of Things,” Smart Computing Review, Vol 1, No.
1, Oct 2011
[2] Chen, Kwang-Cheng. "Machine-to-Machine Communications for Healthcare." JCSE 6.2, 2012
[3] Yick, Jennifer, Biswanath Mukherjee, and Dipak Ghosal. "Wireless sensor network survey." Computer
networks 52.12, 2008
The 9th International Symposium on Embedded Technology, Seoul, Korea
3
73
2014 International Symposium on Embedded Technology
Smart Service Design using Internet of Things1
Jaeseok Yun, Jaeho Kim, Il-Yeop Ahn, Kwang-Ho Won
Embedded Software Convergence Research Center
Korea Electronics Technology Institute,
25 Saenari-ro, Bundang-gu, Seongnam, S. Korea
E-mail: {jaeseok, jhkim, iyahn, khwon}@keti.re.kr
Abstract
With the advent of the Internet of Things (IoT) technology, the world’s things are connected with people and
to one another in their home, work, and public places. The fully connected things can be aware of people and
environment, and then provide people with smart services accordingly. Although various smart services have
been widely developed over the past decades, IoT technology will offer limitless possibility to smart services,
and eventually change the design, development, and implementation of smart services in the near future. In this
paper, we present several important aspects of smart services that should be considered when designing smart
services using IoT technologies, and then shown a couple of examples.
Keywords: Internet of Things, Smart service, Service design, Human-computer interaction.
1. Introduction
Our dwelling places, work, and public places have been instrumented with a large number of sensors and actuators, in particular, connected each other due to ubiquitous computing and networking technology. For example,
by embedding a small, low-power, and low-cost wireless transceiver into the everyday objects we use such as a
pill bottle cap, we can realize a reminder system which can help patients adhere to their medication [1]. The
world’s objects are fully connected each other, and create a dynamic network of networks, called the Internet of
Things (IoT), and ready to offer smart services for people [2]. Providing smart services has been one of important research topics in the field of computing and engineering, and a myriad of smart services have been developed. However, the IoT technology allows everyday objects to connect with people and one another (even at a
low cost), and we can imagine new forms of smart services that can be offered in our home, work, and public
places. In 2006, researchers chose four key technologies for the Internet of Things: RFID (radio frequency identification), sensing technology, embedded intelligence, and nano technology [2]. In this paper, we present several
important aspects that should be considered when developing IoT-based smart services, including sensor & actuator, network, intelligence, and user interface, and show several examples we have proposed.
2. Smart Services using Internet of Things
The Internet of Things will have broad impact on our everyday lives, revolutionizing the way we live, the way
we interact, and the way we do business—offering smart services in home, work, and public places. Such smart
services should be designed, developed, and implemented by considering several important aspects: sensor &
actuator, platform, network, intelligence, and user interface.
1
This work was supported by the IT Research and Development Program of MKE/KEIT under Grant 10041262
through the Open IoT Software Platform Development for Internet of Things Services and Global Ecosystem
The 9th International Symposium on Embedded Technology, Seoul, Korea
74 ISET 2014
1
Seoul, Korea, 22-23 May, 2014
We first need to choose which information will be necessary to build a smart service, and pick corresponding
sensors, e.g., pyroelectric infrared (PIR) sensor in case of detecting human occupancy. Also, we need to choose
actuators corresponding to the service provided for users based on sensed information, e.g., light switch in case
of occupancy detection of PIR sensor. Because there may be hundreds of thousands of sensors and actuators from
a variety of manufacturers, and thus we need a hardware and software platform that can provide a common interface and network capabilities. Examples include Raspberry-Pi [3] and Arduino [4]. Using a combination of
Raspberry-Pi and Arduino, we will be able to construct an intelligent computing system that collect and analyze
data, and then control actuators accordingly, as shown in Figure 1.
Figure 1. An example of IoT system using Raspberry-Pi and LED circuit
Although a complicated algorithm based on machine learning and data mining could be implemented into service platforms, we also consider a combination of simple ‘if A, then B’ rules such as IFTTT [5]. For example, we
can imagine an energy-saving scenario as follows: if a heater consumes more than 1000 W of electricity, do blink
a light to alert users until they turn off or down temperature so that energy usage becomes back down to the
threshold. If a remote switch is pressed, its corresponding devices will be turned off. The scenario will be implemented with a combination of two rules: 1) if electricity usage of a heater > 1000 W, then blink a light, 2) if a
switch is pressed, then change the status of its corresponding device (i.e., heater). Finally, in order for users to
easily create new rules or delete existing rules, and start or stop using the rules, we should offer an intuitive and
interactive user interface. Since smartphones have been widely used everyday life, and provide people a userfriendly interface including microphones and touch screen. Figure 2-(a) shows an example of IoT smart service,
called iThing, a voice command-based home appliance control [6]. Figure 2-(b) shows another example, a smart
flower pot (Planty, nthing.net) that can be remotely controlled by a smartphone app, e.g., watering, lighting, and
self-growing [7].
(a)
(b)
Figure 2. Examples of smart services using IoT technologies (a) voice command-based home appliance control, (b) Planty, a smart plant pot that can be controlled using smartphone app
The 9th International Symposium on Embedded Technology, Seoul, Korea
2
75
2014 International Symposium on Embedded Technology
3. Conclusion and Future Works
In this paper, we have presented several important aspects that should be considered when developing smart
services based on Internet of Things technology. Once we have defined a service scenario in our home, work, or
public places, it should be considered which types of information will be used for the smart service, and then
select appropriate sensors and actuators. At the same time, we also need to consider device hardware and software platforms that can provide a common interface for collecting and transmitting data, e.g., Raspberry-Pi and
Arduino. In order for a service application or program to be smart, it should be able to aware of the current status
of the user and surroundings, and then control actuators appropriately based the user’s preferences—intelligence.
Finally, systems provide a simple and efficient way for users to monitor and interact with the smart service. For
examples of smart services based on the Internet of Things technology, we have shown a voice command-based
home appliance control and a smart flower pot that can be controlled by a smartphone app. We are also further
investigating a way of systematically developing various smart services using the Internet of Things technology.
References
[1] GlowCap, http://www.vitality.net/, Available: April 18, 2014.
[2] ITU Internet Reports 2005: The Internet of Things -- Executive Summary, 2005.
[3] Raspberry-Pi, http://www.raspberrypi.org/, Available: April 18, 2014.
[4] Arduino, http://www.arduino.cc/, Available: April 18, 2014.
[5] IFTTT, https://ifttt.com/, Available: April 18, 2014.
[6] iThing, http://www.youtube.com/watch?v=6pe1HdpUOnA, Available: April 18, 2014.
[7] Planty, http://www.nthing.net/, Available: April 18, 2014.
The 9th International Symposium on Embedded Technology, Seoul, Korea
76 ISET 2014
3
Seoul, Korea, 22-23 May, 2014
L-V-C Gateway Architecture based on DDS and HLA for L-V-C
interoperability
Hyung Kook Jun† *, Kyeong Tae Kim*, Woosuk Cha*, Won Tae Kim*, Young Ik Eom†
*
Embedded Software Research Department
Electronics and Telecommunications Research Institute, Daejeon 305-700, Korea
E-mail: {hkjun, ktkim, wscha, wtkim}@etri.re.kr
†
School of Information and Communication Engineering
Sungkyunkwan University, Suwon, Korea
E-mail: {junhk, yieom}@skku.edu
Abstract
Distributed simulation systems demand for interoperable simulation environment and communication
middleware such as DDS and HLA, as the growth in Live, Virtual, and Constructive interoperability and
requirements of real time communication. In this paper, we provide the design of L-V-C Gateway which
interconnects between DDS that is pub-sub based data-centric middleware and HLA that is high level
architecture simulation model to support communication for distributed Virtual and Constructive simulation
Keywords: DDS, HLA, L-V-C, Gateway
1. DDS and HLA
DDS(Data Distribution Serice) proposed by OMG(Object Manage Group) is a Data Centric, PublisherSubscriber based communication middleware that is adequate for real-time and massive data dissemination. It has
the advantages of providing of QoS(Quality of Service) such as reliability, data filtering, deadline, transport
priority, also it is suitable to transmit real time data among Live simulation systems to support real time and
highly reliable communication. Besides, as DDS includes features of reusability, ease of development, and
maintenance, we can reduce the development period. As HLA(High Level Architecture) is a simulation
architecture for distributed simulation systems, it enables a simulation systems to interact with other simulation
systems. HLA provides a set of simulation functionality that manages and coordinates its operations and data
exchange to support distributed simulation environment for virtual systems and constructive systems. Even
though HLA has a great deal of advantages for simulation communication, it has performance problems when
the scale of the system increase, so that we might consider to resolve scalability problems of L-V-C
interoperability.
2. L-V-C Gateway
The purpose of L-V-C Gateway is to interoperate DDS with HLA. DDS is suitable for Live real time systems
while HLA is adequate for virtual and constructive simulation systems. If we support interoperability between
DDS and HLA, we can get better flexible L-V-C simulation environments. But there are lots of problems to solve
such as time synchronization and federation management, and QoS support between DDS and HLA
interoperability. Therefore, we have focused on the design of L-V-C Gateway for data translation between them
and we will depict the architecture for more details in next chapter.
3. Structure of L-V-C Gateway
In this paper, we describe the design of L-V-C Gateway architecture based on DDS and HLA for LThe 9th International Symposium on Embedded Technology, Seoul, Korea
1
77
2014 International Symposium on Embedded Technology
V-C interoperability which enables L-V-C Gateway to support flexible distributed simulation environment. Fig. 1
illustrates the overall architecture of L-V-C Gateway. First, L-V-C Gateway parses FOM(Federation Object
Model) file. FOM file contains data object properties based on XML(Extensible Markup Language) describing
the information being used in distributed L-V-C simulation. FOM Parser parses FOM XML file using FOM DTD
and produces FOM information for HLA and Topic information for DDS, and then stores them into FOM/Topic
repository. FOM/Topic Information in FOM/Topic repository will be used (when Object/Entity Creator makes
out HLA object and interaction and DDS Entity to transmit data from HLA federation to DDS Domain). Here,
HLA object and DDS entity form a logical communication channel between HLA federation and DDS Domain
(Each of Object and Entity created registers in HLA Object Manager and DDS Entity Manger and will be
controlled by them). Object/Entity Mapping has a relationship between HLA object and DDS entity regarding the
same FOM/Topic information, so it relays data from HLA Federation to DDS Domain and vice versa. In order to
relay data we need to obtain event of data arrival from HLA Federation and DDS Domain, HLA Callback
handler and DDS Event Handler play a roll of event handler of data arrival respectively. As Object/Entity
Mapping observes data arrival through HLA Callback Handler and DDS Event Handler, it call Data Translation
to convert data with mapping information between them as soon as on arriavl.
Figure 1. The Structure of L-V-C Gateway for DDS and HLA interoperability.
4. Conclusion
Now, we have designed L-V-C Gateway for Live, Virtual, and Construtive distributed simulation systems
based on DDS and HLA. In this paper, we have presented the structure of L-V-C Gateway to deliver simulation
data and information between DDS Domain and HLA Federate In the future, we will investigate time and
federation management and then implement L-V-C Gateway.
Acknowledgment
This work was supported by Dual Use Technology Program through Civil Military Technology Cooperation
Center funded by MINISTRY OF TRADE, INDUSTRY & ENERGY and DEFENSE ACQUISITION
PROGRAM ADMINISTRATION.
References
[1] Object Management Group: Data Distribution Service for Real-time Systems Ver. 1.2, 2007,
http://www.omg.org/spec/DDS/1.2
[2] IEEE, IEEE standard for modeling and simulation high level architecture federate interface specification,
IEEE Std. 1516.1-2000, 2000.
The 9th International Symposium on Embedded Technology, Seoul, Korea
78 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
Digital Controller Design for Aerial Robot Control
Youn-Ho Choi, Jung-Eun Joung, Dong-Ha Lee
Wellness Convergence Research Center
Daegu Gyeong Institute of Science & Technology, Daegu, Republic of Korea
E-mail: {yhchoi, jin0110, dhlee}@dgist.ac.kr
Abstract
In everyday routine life, robots help daily human life ever more, and, for the development of such robots,
there are attempts to design robots which mimic a living organism's activities. Studies on analyzing and
investigating mechanism and behavior of living organisms, and developing a robot which runs under each
respective environment has been made. Further to the studies on biomimetic mechanisms, techniques on
designing and manufacturing of robots are also required. Furthermore, for the development of robots, it is
necessary to develop designing and manufacturing of electronic robots as well as the mechanical design, analysis,
and manufacturing. With the advancement of electronic devices, it is much easier and simpler than ever before to
implement such hardware configuration and digital control to manipulate robots. In the paper, we propose an
implementation for digitally controlling aerial robot, in which the implementation realizing a digital controller
for manipulating biomimetic robot, and which configured to analyze and establish each task processing phase,
and to build a stable performing period including the processing phases.
Keywords: Bio-inspired, Flapping, Robot.
1. Introduction
Biomimetics is gained much recognition in which it can mimic the form of a living organisms, and can raise
the efficiency by implement the activity of the living organisms. Still far to invent a flying machine, researches
are focused to the different power sources and materials which imitate shapes and actions of birds. Festo
introduced a robotic Smart bird which can fly while it imitates the biomimetics of a bird[1]. For such kind of
flapping robots, the wings are consist of outer wing and inner wing, and the robots can fly by the generated
thrust and lift by the motions of wings[2, 4]. In the paper, we describe the technique and characteristics of the
control program used in the design of aerial robot, Seagull, which mimics a bird.
2. Robot Design
In the paper, the aerial robot is configured to comprise a mechanical component of composite materials, an
electronic component based on the high performance DSP, and a communication component possible to remote
control and monitoring in real-time[3].
The main structures of the body and wing are formed with high density carbon fiber materials, and the outer
cloth is formed of polyurethane for the lightness. The electronic component has electronic control board part and
actuator part, and configured to have BLDC motor for the moving the main wing, and servo motors to control
the attack angle of outer wing and to change the direction of the robots. The electronic component uses small
form factor signal processing board. Moving speed and position of the wings are determined by the Hall sensor,
and the attack angle of the wings are controlled by the flapping motion of the wings. Three axis accelerator
sensor, gyro sensor, and compass sensor embedded in the signal processing board may determine the moving
direction and the attitude of the robot. The signal processing board is disposed in the front side of the breast
frame of the robot, in which the Hall sensors are configured in symmetry, and it can determine the position and
speed by sensing the Neodymium magnet which located in the moving part of respective wings. With the
communication component, sensed data, such as, motions, attitudes, and environments of the robots can be sent
to the monitoring system[3].
The 9th International Symposium on Embedded Technology, Seoul, Korea
11
79
2014 International Symposium on Embedded Technology
3. Timing of Processing Phase
Program for controlling the robot basically includes an acquisition of sensor information, input of control
command, processing of the control signal, and output of the motor control command. With configuring the
controller, it is also required to design control board for flight and driving program for the controller to control
the robot. Figure 1 depicts the basic configuration of the program applied to the motion of a robot.
For scheduled task in unit control cycle, we divided the task into 5 basic phases within the unit control cycle,
each phase can be performed separately. Data collection which does not affect the main control logic has been
assigned to have a longer execution cycle. Each of processing time and condition can be expressed as in equation
(1) and (2).
Tn0
Tn1
Tn2
Tn3
Tn4
R:read
W:write
Phase 0
Phase 1
Phase 2
Phase 3
Sensor read
Sensor filter
Motor out
Command
R
Tn+0
Control
W
Tx
Sensor read
R
Tn+1
R
Tx
Sensor filter
Tx
Motor out
Control
W
Tx
Sensor read
Tx
R
Tn+2
Ref.
Control
Tx
Command
W
Tx
Sensor read
Ref.
R
Tn+3
R
Tx
Sensor filter
Tx
Motor out
Control
W
Tx
CMD FIFO
push
Rx buffer
MSG FIFO
pop
Tx buffer
Tx
Command
Make data
Ref.
C
Tx
processing segment
Tx
Motor out
C
Tx
Tnk
R
Tx
Sensor filter
Data Ack. period
Command
C
Tx
C:calculation
pop
Ref.
C
Tx
Phase 4
push
W
R
Tx
Tx
Tx
Figure 1. Processing Map1
Equation 1. Control Period1
Tc ≥ ∑ Tpn , Tn : processing time of phase(n)
Equation 2. Unit phase processing time2
Tpn = ∑ Ttm + Trn , where Ttm : task processing time, Trn : redundancy of phase(n)
4. Conclusions
Using the proposed design scheme in this paper, it can be possible to divide each repeating task in unit control
cycle into separated phases, such that the time for performing each process can be precisely determined. And,
according to the paper, with a higher control performance, minimizing process time, and reassignment of phases
for optimization, it can be expected to implement advanced performance robot.
Acknowledgment
This work was supported by the DGIST R&D Program of the Ministry of Science, ICT and Future
Planning of Korea(14-BD-01).
The 9th International Symposium on Embedded Technology, Seoul, Korea
80 ISET 2014
32
Seoul, Korea, 22-23 May, 2014
References
[1] W.Send, M.Fischer, K.Jebens, R.Mugrauer, A.Nagarathinam, F. Scharstein, "Artificial hinged wing bird
with active torsion and partially linear kinematics", ICAS 2012-3.6.1, 28th ICAS Congress Brisbane, pp.2328 Sep. 2012.
[2] Youn-Ho Choi, Nae-Soo Cho, Jung-Eun Joung, Woo-Hyen Kwon, Dong-Ha Lee, "The wing structure
modeling of the bioinspired aerial robot", Jounal of the Korean Solar Energy Society, Vol. 32, No. 3, pp.269274, 2012.
[3] Jung-Eun Joung, Youn-Ho Choi, and Dong-Ha Lee, "Design of Biomimetic Robot for Efficiency Flight",
IEMEK Fall Symposium, pp.323-325, 2013.
[4] Youn-Ho Choi, Jung-Eun Joung, and Dong-Ha Lee, "A Wing Motion of Flapping Aerial Robot",
Proceedings of 2013 International Symposium on Embedded Technology, pp.144-145, 2013.
The 9th International Symposium on Embedded Technology, Seoul, Korea
33
81
2014 International Symposium on Embedded Technology
MQTT Protocol Binding for the REST-based IoT Architecture
Sung-Chan Choi, Kwang-Ho Won, Sang-Shin Lee, Il-Yeop Ahn
Embedded Software Convergence Research Center
Korea Electronics Technology Institute,
68 Yatap-dong, Bundang-gu, Seongnam, S. Korea
E-mail: {csc, khwon, sslee, iyahn}@keti.re.kr
Abstract
By 2020, we anticipate that there will be over 50billion devices connected to the Internet. In this Internet of
things environment, each device would produce tremendous data delivered to a server platform and the server
would save, process, and forward the data to the other devices when it receives the request. Under this
circumstance, we are facing a problem with decision making which architecture style or messaging protocol is
adequate for the IoT. In relation to this, REST and MQTT can be one of leading candidates for the IoT’s
architecture style and messaging protocol. In this paper, we will study MQTT protocol binding for the RESTbased IoT Architecture.
Keywords: REST Architecture, MQTT, Internet of Things
1. Introduction
REST stands for Representational State Transfer and is a type of software architecture for distributed hyper
media systems [1]. In REST, resource is a crucial abstraction and it is identified by a resource identifier.
Regarding to this, World Wide Web (WWW) is the largest REST-based architecture implementation. The
resource in the WWW is identified by an Uniform Resource Identifier (URI). MQTT represents Message
Queuing Telemetry Transport and is a lightweight broker-based publish/subscribe messaging protocol [2].
MQTT is also designed for constrained devices and low bandwidth so it is suitable for the constrained
environments such as devices with limited processor/memory and network with low bandwidth and no reliability.
MQTT supports three level of Quality of Service (QoS), in which characterize best effort, guaranteed delivery
with duplicates possible and guaranteed delivery with no duplicates. It is built over TCP/IP for basic network
connectivity. Comparing to Simple Object Access Protocol (SOAP) based on XML to provide messaging
services [3], REST uses simple and lightweight APIs consist of Create, Read, Update, and Delete called CRUD
operations and URI. So because of not heavyweight and easy to use, REST is more popular when used for the
Web service system. Furthermore, in IoT architecture, REST is increasingly popular. However, when we
combine MQTT protocol with REST, there are some obstacles to use MQTT protocol in the REST-based
architecture. In this paper, we study how MQTT could be bridged to the REST-based IoT Architecture.
2. MQTT Binding
As shown in Fig. 1, MQTT system architecture consists of MQTT clients and MQTT server. In initial setup
stage, each client in MQTT system architecture tries to connect to the server called broker. After establishing
connection, the client sends subscribe message including topic name to the server. The topic name in the
subscribe message is used to determine where the received message is delivered when the server receives a
publish message including topic names from a client. MQTT server compares the topic name in the publish
message with its subscribed topic name list and forwards the message to the matching clients which previously
The 9th International Symposium on Embedded Technology, Seoul, Korea
82 ISET 2014
1
Seoul, Korea, 22-23 May, 2014
subscribed to the server with the topic name. In view of the client’s role in the MQTT system architecture,
MQTT client can be classified as a gateway or a device. The MQTT gateway aggregates data from sensor nodes
and sends the data to the server. The MQTT device generates data and sends its data to the server.
Figure 1. MQTT System Architecture
Figure 2. Publish/Subscribe Message Flow
REST-based architecture conventionally consists of clients and servers. Clients create requests to servers and
servers process requests and get back the appropriate responses (Request/Response model). Each resource in the
REST-based architecture can be identified by URI and can be manipulated by CRUD operations. These
principles fit well in Hypertext Transfer Protocol (HTTP) since HTTP provides CRUD operations through GET,
PUT, POST, DELETE and a couple of other methods. In addition, it uses URIs to refer to identifiable resources.
However, MQTT is based on Publish/Subscribe model and CRUD operations are not supported. So, in order to
integrate MQTT to the REST-based architecture, we need to take some integration methods into consideration.
To this end, first of all, we assume that each client has its ID and can be identified by the ID among others. Each
client subscribes to the server using its ID to be able to receive the messages published to its ID. As shown in Fig.
2, MQTT clients subscribe to the MQTT server with its Resource ID. If MQTT client want to send the message
to other MQTT clients, it publishes the message with the intended MQTT client’s Ids. In addition, we define four
elements: Origin ID, Operation, MetaData, Contents. The Origin ID is the identifier of the client, which sends the
publish messages. Operation represents CRUD function corresponding to one of Create, Read, Update, and
Delete. MetaData is an optional parameter related with CRUD Operations. The last element, Content includes
resource URI and additional data.
3. Conclusions
REST have received plenty of attention as an IoT Architecture style lately since its characteristics are easy
implementation and lightweight approach comparing to SOAP. MQTT protocol is emerging as a representative
IoT protocol because it enables efficient and lightweight communication that is required in the IoT environments.
In this paper, we studied how the REST-based architecture can be supported using MQTT protocol. To this end,
we define four elements which would be contained in the MQTT message payload. For the future work, we will
implement our proposed MQTT binding with REST-based architecture and perform its feasibility test.
References
[1] R. T. Fielding. Architectural styles and the design of network-based software architectures. PhD thesis, 2000.
[2] Mqtt v3.1 protocol specification. http://public.dhe.ibm.com/software/dw/webservices/ws-mqtt/mqtt-v3r1.html.
[3] P. Cesare, O. Zimmermann, and F. Leymann. "REST vs. SOAP: making the right architectural decision."
Proceedings of the 17th international conference on World Wide Web. ACM, 2008.
The 9th International Symposium on Embedded Technology, Seoul, Korea
2
83
2014 International Symposium on Embedded Technology
Adaptive GUI Reconfiguration Mechanism for Mobile Learning
Devices
Choongbum Park*, Jae-Guk Gwon*, Kyung-Min Park†, Hoon Choi†
*
Department of Embedded Software
ETRI, Daejeon, Republic of Korea
E-mail: {here4you, jagugi}@etri.re.kr
†
Department of Computer Science and Engineering
Chungnam National University, Daejeon, Republic of Korea
E-mail: {mumeprunus, hc}@cnu.ac.kr
Abstract
This paper describes the smart GUI reconfiguration capability of the AIMOL middleware. According to the
user’s ability of handling the device and learning the educational contents, AIMOL dynamically reconfigures
GUI of the device.
Keywords: Mobile Learning, Mobile Computing, GUI Reconfiguration
1. Introduction
The advancement in mobile technology has introduced us various network-based information and business
services to the developed countries. However, major areas of the world still have little or no network
infrastructure, leaving the people in such areas without access to information, education, and public services
while excluding them from acquiring equal rights and securing their well-being. One possible way to help remedy
the deficiency in access to public services and empower the extremely underserved is to provide them with
mobile computing devices with essential applications and educational contents [1,2,3].
Such mobile computing devices need to be designed to function self-sufficiently and adaptively enough to
operate and sustain with minimal maintenance effort. For this purpose, we are working on a middleware, AIMOL
(Adaptive and Interactive Mobile Learning) system [4] for mobile learning devices. In a nutshell, the middleware
lets the mobile computing device discover educational content objects in neighbor mobile devices and exchange
the content objects in peer-to-peer manner. It generates and manages content tracking information associated with
the content objects. It also generates and regenerates an appropriate GUI of the device based on user’s usage
pattern.
In following, we describe how the middleware functions.
The 9th International Symposium on Embedded Technology, Seoul, Korea
84 ISET 2014
1
Seoul, Korea, 22-23 May, 2014
Figure 1. Functional Architecture of AIMOL Middleware
A simple human-computer interface with basic features may serve better for the user who is not familiar with
mobile computing devices or educational contents. However, it makes sense to introduce more features and
higher level contents as the user becomes familiarized with the overall UI experiences and progresses in the given
learning path. The key for the adaptive GUI design is to develop an algorithm to measure ultimate “cognitive
load” level and continue to maintain the level in an increasingly sophisticated and challenging fashion.
In order to achieve the highest usability for users with minimal access to support and least prior UI exposure,
the mobile computing devices need to dynamically reconfigure the GUI based on the users’ ability. The AIMOL
middleware has the following functional components for this purpose.
A.
AISE(Adaptive Interactive System Engine)
AISE is the core component of the AIMOL. It includes a lightweight inference engine suitable to mobile
computing devices[5,6].
B.
PMC(Profile Management Component)
Profiles contain the information for automated system operation. PMC extracts GUI related information,
such as the size and location of a GUI object, from the profile of a GUI package and passes the
information to the GMC.
C.
GMC(GUI Management Component)
GMC receives the GUI related information from the PMC and it deploys GUI objects accordingly on the
window (LCD panel) of the device.
The 9th International Symposium on Embedded Technology, Seoul, Korea
2
85
2014 International Symposium on Embedded Technology
2. GUI System Of The AIMOL
A.
GUI Package
Figure 2. Structure of a GUI Package
GUI Package consists of GUI objects and a profile. GUI objects are to be displayed on the window and the
profile contains XML type information about the GUI Package.
<?xml version="1.0" encoding="UTF-8"?>
<area>
<name>Basic</name>
<x>0</x>
<y>0</y>
<width>300</width>
<height>280</height>
<configuration>
<shortcut>
<image>short_img1</image>
<width>40</width>
<height>50</height>
<text>step1</text>
<app>Learning_App1</app>
</shortcut>
</configuration>
</area>
Figure 3. Part of a Profile
Area of the profile in Figure 3 is a group of GUI objects. The profile specifies the location and size of the area
as well as the location and size of the GUI objects along with the linked applications.
B.
GUI Package
GUI objects displayed on a window can be classified as follows.
1) BASE(Basic Application Shortcut Area)
Contains shortcuts of the mobile learning service applications.
The 9th International Symposium on Embedded Technology, Seoul, Korea
86 ISET 2014
3
Seoul, Korea, 22-23 May, 2014
2) EAA(Extend Application Area)
Contains shortcuts of auxiliary applications such as games and a media player.
3) SPA(System Programs Area)
Contains shortcuts of the system programs used for control of resource such as speaker volume or LCD
brightness.
Figure 4. Window Layout
3. GUI System Of The AIMOL
In the early stage of using the mobile learning service, the minimum of GUI objects are included in the BASA
area and therefore limited numbers of applications are shown to naïve users.
Figure 5. Structure of a GUI Package
As learning is being progressed, EAA or SPA area are added to the window and more GUI objects are
included in each area, based on the user’s ability. AISE monitors users ability and usage pattern in order to adapt
GUI to the user. Monitoring procedure is depicted in Figure 5.
AISE increases the usage counter associated with an application whenever a user clicks the shortcut to run the
application. It also accumulates the run time of the application to the usage timer of that application.
The 9th International Symposium on Embedded Technology, Seoul, Korea
4
87
2014 International Symposium on Embedded Technology
Figure 6. Restructuring the GUI Components
When the timer or the counter exceeds threshold values, AISE starts to build a new GUI package. AISE passes
the profile of the new GUI package to PMC. PMC passes the GUI related information to GMC as explained in
Section I. GMC registers GUI objects to the corresponding areas of the window and links them to the
corresponding applications.
5. Conclusions
As an approach to create an accessible education model for underserved populations with minimal technology
and HCI exposure, the AIMOL middleware can contribute to provide an intelligent and adaptive learning service
on mobile computing devices. This paper described the GUI reconfiguration capability of the AIMOL
middleware. According to the user’s ability of handling the device and learning the educational contents, AIMOL
dynamically reconfigures GUI of the device.
References
[1] Paul Kim, Talia Miranda and Claudia Olaciregui, “Pocket School: Exploring mobile technology as a
sustainable literacy education option for underserved indigenous children in Latin America.” International
Journal of Educational Development. Vol. 28. No. 4. pp. 435-445. 2008.
[2] One Laptop Per Child(OLPC), online http://laptop.org/, 2008.
[3] Yanhui Zhang, Wu Li, Yingzi Fu, “A Mobile Learning System Based on Bluetooth,” Third International
Conference on Natural Computation(ICNC 2007), pp. 768-771, 2007.
[4] C. Park, H. Choi, and P. Kim, "Adaptive Open Mobile Learning Device For the Underserved," The 26th
IEEE International Conference on Consumer Electronics, Jan. 13, 2009.
[5] Yong-Duck You, Choong-Bum Park and Hoon Choi, "The Lightweight Runtime Engine of the Wireless
Internet Platform for Mobile Devices," Lecture Notes in Computer Science: Yann-Hang Lee(Ed.), SpringerVerlag, Vol.4523, pp.25-36, May 2007.
[6] Yong-Duck You, Hoon Choi and Dongwon Han, "Autonomic System Management for the PDA," The 26th
IEEE International Conference on Consumer Electronics, Jan. 12, 200
The 9th International Symposium on Embedded Technology, Seoul, Korea
88 ISET 2014
5
Seoul, Korea, 22-23 May, 2014
RTiK-MP: Real-Time implant Kernel for x86-based Multi-Processor
Windows
Jae Guk Gwon*, Chang-In Song†
*
Electronics and Telecommunications Research
Institute, DaeJon, Republic of Korea
E-mail: jagugi@etri.re.kr
†
ARA Networks Company, Limited
, DaeJon, Republic of Korea
E-mail: jjami1234@naver.com
Abstract
This study addresses design and realization of RTiK-MP (Real-Time implant Kernel-Multi Processors) in
order to provide real-time capabilities to the user space of the x86-based multiprocessor Windows environment.
RTiK-MP utilizes x86 processor's Local APIC timer interrupt by implanting an extended kernel into Windows to
support real-time execution of user threads to irrespective of the current load of Windows. By sending signals to
corresponding user-space threads using the ISR(Interrupt Service Routine) and DPC(Deferred Procedure Call)
mechanisms in the kernel space, each user thread is guaranteed to execute in real-time. Experimental results show
that RTiK-MP guarantees real-time execution of periodic threads with up to 1ms period which is almost equal of
the performance of the commercial RTX products of IntervalZero. Therefore, we believe that RTiK-MP can
replace the expensive RTX products in many application domains.
Keywords: Real-Time, Windows, Implant Kernel
1. Introduction
Recently, processor clock speed of computers and portable electronic devices have reached the limit due to
various physical factors such as heat, power dissipation and power leakage. Thus, processor specifications tend to
change from single processor to multiprocessor. In particular, studies for the real-time support in multiprocessor
environment have been required along with changes in the embedded system processor requiring real-time to
multiprocessor-based processor. Although Windows is commonly used in order to provide convenience of
development in such an embedded system environment, there is a problem that the Windows operating system
cannot provide real-time. Costly third parties such as RTX and INtime must be used in order to provide real-time
to Windows in embedded environment. Therefore, this study suggests RTiK-MP for supporting real-time to
Windows that runs on x86-based multiprocessors. RTiK-MP causes periodic timer interrupts independently from
Windows through control of the processor's Local APIC (Advanced Programmable Interrupt Controller) timer
interrupt by having different implant kernel from Windows. The occurrence of the timer interrupt guarantees that
threads in user space operate with minimum period of 1ms by sending an event signal from inside Interrupt
Service Routine (ISR) to threads in user space.
2. RTiK-MP( Real Time implant Kernel-Multi Processors)
RTiK-MP is implanted in the form of device driver into Windows and supports real-time using the Local APIC
interrupts ox x86 processors. Figure 1 shows the whole operation process of RTiK-MP. As shown in Figure 1, in
case of dual-core, each core has a unique Local APIC, respectively. Between the two cores, RTiK-MP provides
real-time by using the Local APIC timer of the AP(Application Processor). When the Local APIC timer occurs in
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
89
2014 International Symposium on Embedded Technology
AP, the timer interrupt handler is executed using IDT(Interrupt Descriptor Table) of the AP. First, the interrupt
handler resisters a DPC(Deferred Procedure Call) to the DPC Queue of each processor. In addition, when the
IRQL(Interrupt Request Level) value reachs the level of the DPC Dispatch, the registered DPCs are processed by
the DPC routine[1-3].
Figure 1. Method of operation of RTiK-MP
Figure 2 shows the results of operation of RTiK-MP with the minimum period of 1ms, by displaying
level 0 and level 1 toggle at every timer interrupt.
Figure 2. 1ms operation of RTiK-MP in user space
Table 1 shows the performance results (average, minimum, and maximum values) of both RTiK-MP and
RTX after 1.8 million tests (for more than 30 minutes) using threads with periods of 1, 10, and 15ms,
respectively. With this table, we can see that the performances of the RTiK-MP and RTX are almost exact.
The 9th International Symposium on Embedded Technology, Seoul, Korea
90 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
Table 1. performance results
Period
1ms
10ms
15ms
RTiK-MP & RTX
Avg. (ms)
Min.(ms)
Max.(ms)
RTiK-MP
0.99438
0.97162
1.01594
RTX
1.00029
0.98131
1.01862
RTiK-MP
10.00112
9.99395
10.01050
RTX
10.00023
9.99856
10.00905
RTiK-MP
15.00163
14.99365
15.00527
RTX
15.00098
14.99968
15.00454
3. Conclusions
This study was conducted in order to provide real-time for x86-based multiprocessor Windows environment.
The proposed RTiK-MP is an extended implant kernel realized in the form of device driver, and can access and
control the multi-core based Windows kernel resources and x86 hardware resources. This enables RTiK-MP to
provide real-time capabilities to Windows by causing the timer interrupts independently from Windows through
the use of the Windows Local APICs. Furthermore, experimental results show that the minimum operational
period is at least 1ms by using the event signals between the kernel and user space in order to provide real-time to
the Windows user space. These results are comparable to them of RTX which is the most popular and expensive
commercial world-wide product. We believe that RTiK-MP can replace RTX in most application domains.
References
[1] Intel, “Intel 64 and IA-32 Architectures Software Developer's Manual Volume 1 : Basic Architecture",
September, 2009.
[2] Intel, “Intel 64 and IA-32 Architectures Software Developer’s Manual Vol.2 : Instruction Set Reference”,
Intel, 2009(9).
[3] Intel, “Intel 64 and IA-32 Architectures Software Developer's Manual Volume 3 : System Programming
Guide", 2009(9).
The 9th International Symposium on Embedded Technology, Seoul, Korea
3
91
2014 International Symposium on Embedded Technology
Single Camera-based Positioning Method using Image Database
Jin Seon Song, Yongwan Park
Dept. of Information and Communication
Yeungnam University
Gyeungsan Republic of Korea
E-mail: siegsong@ynu.ac.kr, ywpark@yu.ac.kr
Abstract
In this paper, we propose a method of estimating the distance to the desired object using a single camera only. .
In our scheme, we create a database of the images on the target object, which should be taken from different
locations. The database incorporates the distance to the object and the features points from the Speeded up
Robust Features (SURF) algorithm alongside each image. When we have an image from the arbitrary position,
we search the database for the most similar image and accept its distance as the real distance to our desired object.
We evaluate the similarity of images from the feature points. Our method can be applied to the indoor
environments as well as the outdoor and its accuracy improves with the size of the database.
Keywords: Database, Camera, SURF, Distance matching, Feature point, Estimation
1. Introduction
This paper proposes a positioning method based on feature comparison between the images stored in database,
which are acquired using camera sensor, and user’s input images. The proposed method takes advantage of both
the database-based fingerprint technique and the camera sensor-based image recognition technique. The
proposed technique does not require unique information about individual positions, such as the information about
WLAN and the geomagnetic field. In addition, it can overcome the weak point of infrastructure management,
which is demanded by the image recognition-based positioning technique utilizing marker
2. Proposed Method
The test is the complicated experiment unlike the test in the indoor environment using grid. It is the big task to
process bright data, height of image, angle in the work creating Database We could solve this problem through
SURF(Speeded Up Robust Features) algorithm. The One’s strength, extracting the feature point after a while, as
to SURF, angle and height of object was changed. So, it is the algorithm which surely is necessary in this
research. We created Database in advance and inputted real image and compared real image
A. The database construction
We created the total 10 database with 5M space in 50M section. Database is including feature point and
distance every ten each image data. Figure 1.
Figure 1. The test environment
The 9th International Symposium on Embedded Technology, Seoul, Korea
92 ISET 2014
1
Seoul, Korea, 22-23 May, 2014
B. The real image input
In order to find out distance value from image, We obtained an image in the arbitrary three spot 19M,
23M, 31M
C. The feature point extraction
We used SURF algorithm in order to evaluate similarity of other two image.
D. The similarity evaluation
Figure 2. Database image comparison of input image
We wished to confirm easily by the both eyes feature point of input image was how to be changed. So, I
expressed the total range of the feature point with the box and observed a change. When the box is smaller than
the image of Database, I could know being more near input image location than the image of database image. On
the contrary In the case of bigger than the image of database, I could know being more far input image location
than database image. Figure 2.
E. Distance assignment
I got distance data from adjacent database which I find through above test. And then, an assignment did the
corresponding distance value. TABLE 1.
Table 1. Database distance assignment result
DISTANCE OF INPUT IMAGE
19M
23M
31M
DISTANCE OF MATCHING IMAGE
20M
25M
30M
The 9th International Symposium on Embedded Technology, Seoul, Korea
2
93
2014 International Symposium on Embedded Technology
Evaluation of Cache Partitioning:
Improving CPU Utilization of Multi-core Embedded Processors
Eunji Pak
Embedded SW Research Department,
ETRI, Daejeon, Republic of Korea
E-mail: pakeunji@etri.re.kr
Abstract
In multi-core embedded processors, concurrently running tasks compete for the shared cache and cause interthread cache interference. That interference increases the WCET of real-time tasks, allocates excessive time and
resources to tasks, and negatively affects the system resource utilization. In this paper, we exploit the cache
partitioning capability of modern server processors and show the potential of cache partitioning technique to
alleviate the cache interference problem in modern embedded multi-core processors.
Keywords: Real-time embedded system, Multi-core processors, Cache partitioning
1. Introduction
Embedded processors are increasingly using multi-core processors to achieve better performance and energy
efficiently. In multi-core processors, different cores often share the cache to improve the efficiency of limited onchip cache resources. However, concurrently running tasks compete for the shared cache capacity and cause
inter-thread cache interference.
In real-time embedded systems with multi-core processors, because of the cache interference, accurate
estimation of the worst-case execution time (WCET) is difficult. Because developers must budget for WCETs,
tasks are allocated excessive and unnecessary resources and the CPU utilization is significantly degraded.
In this paper, to address this problem, we utilize the cache partitioning technique which is implemented in few
modern server processors. In those processors such as AMD bulldozer, developers can control the cache capacity
allocated for each core. We evaluate the performance of cache partitioning technique and suggest the way of
maximizing CPU utilization without compromising safety criticality of real-time embedded systems.
2. Cache Partitioning
For an evaluation of cache partitioning, we use AMD bulldozer processor designed for servers. System
consists of 4 cores with each of 2 cores share a 2MB L2 cache and all cores share 8MB L3 cache. L3 cache can
be divided into four 2MB sub-caches and developers can decide the allocated cache capacity for each core in
2MB granularity [1].
We use five applications from SPEC CPU 2006 benchmark [2] and measure the execution time with various
application-to-core mappings. In Figure 1, y-axis presents the performance of ‘bzip2’ application when it is coallocated and shares cache with other four applications and x-axis presents the co-allocated application. Note that
the value in the y-axis is normalized to the execution time of ‘bzip2’ without any cache interference. Figure 1
represents the performance without cache partitioning (w/o Cache Part.) and the performance when we exploit
The 9th International Symposium on Embedded Technology, Seoul, Korea
94 ISET 2014
1
Seoul, Korea, 22-23 May, 2014
the cache partitioning capability of bulldozer processor (w Cache Part.). In experiments, we allocate 6MB cache
for ‘bzip2’ application and 2MB cache for other application.
Figure 1. Performance of application 'bzip2'
As shown in the left graph in Figure 1, the performance of ‘bzip2’ is affected a lot with respect to the coallocated application. Performance gap is up to 14.8% which imposes that estimation of WCET in multi-core
environment is difficult due to the inter-thread cache interference.
Besides, as shown in the right graph, performance gap is decreased a lot when we exploit cache partitioning. It
indicates that the cache partitioning makes application execution time more deterministic by controlling the cache
allocation among applications and mitigating the cache interference. Developers can budget execution time more
tightly, thereby keeping system resource utilization high. Moreover, by controlling the cache interference,
performance is improved a lot. Results impose that cache partitioning technique may provide performance and
power efficiency of real-time embedded systems.
As a few modern server processors implement hardware cache partitioning and expose control to the developer,
controlling the interference via cache partitioning can be a practical way to improve the safety and CPU
utilization in real-time embedded systems with multi-core processors.
5. Conclusions
In this paper, we evaluate the performance of cache partitioning capability which is implemented in few
modern processors to present the potentials of cache partitioning technique in real-time, multi-core embedded
system.
We show that the cache partitioning provides an effective means of controlling the inter-thread cache
interference among applications, thus bounding the WCET much more tightly. It allows developers can set
WCET relatively tight and maximize CPU utilization without compromising the safety criticality.
References
[1] Bios and kernel developer's guild for AMD family 15h processors, March 2012.
[2] John L. Henning, Spec cpu2006 benchmark descriptions, SIGARCH Computer Architecture News 34 (2006),
no. 4, 1-17.
The 9th International Symposium on Embedded Technology, Seoul, Korea
2
95
2014 International Symposium on Embedded Technology
The Memory Core in 3D Die-Stacked DRAM
Yongjoo Kim, Taeho Kim, Chaedeok Lim
Electronics and Telecommunication Research Institute (ETRI)
218 Gajeongno, Yuseong-gu, Daejeon, 305-700, Republic of Korea
E-mail: {y.kim, taehokim, cdlim}@etri.re.kr
Abstract
With the growth of technology and the improvement of architecture, contemporary von Neumann computer
system can execute most of applications efficiently. Nevertheless, some memory intensive applications that
access memory irregularly and have large dataset expose the limitations of the von Neumann computer system on
the low cache efficiency. Therefore, these applications suffer from significant memory stall time in the
conventional computer system. In this paper, we proposed a computer system model that consists of conventional
system and 3D die-stacked memory containing co-processor within its logic layer to address the memory-wall
problem.
Keywords: Core, Memory, 3D.
1. Introduction
In this paper, we propose a computer system model that consists of a conventional CPU and a 3D die-stacked
memory containing co-processor within its logic layer to address the problem of a lot of cache miss. With the
emerged stacking technology and hybrid DRAM architecture such as HMC [1] comprised of some DRAM layers
and an additional logic layer, it become possible to integrate a small core (now refer as memory core) that
accesses whole memory banks equally within DRAM. Residing in memory, the core can exploit shorter latency
by avoiding off-chip transfer. For that reason, the core in DRAM can executes the parts of application, which is
bottlenecked by the data transfer between DRAM and CPU more efficiently. Accordingly, we can achieve the
improvements on performance and power efficiency when these parts are partitioned from the whole of
application and mapped to the core in memory.
2. 3D Die-Stacked DRAM Architecture With Separated Layers
Three dimensional die-stacked DRAM is emerging as a promising solution for future memory to satisfy the
demand of performance, power and cost [2]. Although there are several models for 3D die-stacked DRAM, the
DRAM architecture that has separate die types for DRAM core and peripheral circuits shows substantial
improvements in performance and power efficiency [1-2]. Fig.1 shows the DRAM architecture that has two types
of die. One is a conventional DRAM die type for DRAM core such as cells and sense amp, which require
integration density. The other is a logic die type for peripheral circuits such as DRAM internal bus and row
buffer, which needs fast operation speed. By arranging DRAM components to proper die, this hybrid memory
system can obtain substantial improvements in aspect of performance and power efficiency.
The 9th International Symposium on Embedded Technology, Seoul, Korea
96 ISET 2014
1
Seoul, Korea, 22-23 May, 2014
Figure 1 Hybrid layer stacking of HMC
In addition to the advantages, the DRAM architecture shows the possibility of further improvements for
overall system. Because peripheral circuits of DRAM do not require large area, a logic die in the DRAM
architecture remains considerable space unused so that this space can be utilized for other objectives. In [3], for
example, this unused space is used for row buffer cache to improve memory reuse in DRAM. We propose to use
the unused space for a memory core for memory intensive tasks.
3. 3D DIE-STACKED DRAM ARCHITECTURE WITH SEPARATED
LAYERS
Fig.2 depicts the overall system that we propose which consists of CPU and 3D die-stacked DRAM with a
memory core. In this system, the main CPU is a modern high-performance microprocessor but a memory core
located on a logic layer in DRAM is a small low-power core because of area constraints. Instead, a memory core
can access DRAM faster owing to its location. As a result, this system has two heterogeneous cores in respect of
computation power and accessibility to memory. It is very important to understand the heterogeneous
characteristic and apply it to the SW partition to maximize the benefit.
Figure 2 Block Diagram of Proposed System
4. Conclusions
In this paper, we propose a computer system model that consists of conventional CPU and 3D die-stacked
memory containing co-processor within its logic layer to address the problem of a lot of cache miss.
References
[1] J. T. Pawlowski. Hybrid Memory Cube: Breakthrough DRAM Performance with a Fundamentally ReArchitected DRAM Subsystem. In Proc. of the 23rd Hot Chips, Stanford, CA, August 2011..
[2] Ke Chen; Sheng Li; Muralimanohar, N.; Jung Ho Ahn; Brock-man, J.B.; Jouppi, N.P.; , "CACTI-3DD:
Architecture-level modeling for 3D die-stacked DRAM main memory," Design, Automation & Test in
Europe Conference & Exhibition (DATE), 2012 , vol., no., pp.33-38, 12-16 March 2012
[3] Gabriel H. Loh. 2011. A register-file approach for row buffer caches in die-stacked DRAMs. In Proceedings
of the 44th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-44 '11). ACM, New
York, NY, USA, 351-361.
The 9th International Symposium on Embedded Technology, Seoul, Korea
2
97
2014 International Symposium on Embedded Technology
A Dumb Battery Consumption Prediction Method of Mobile Device
without Smart Battery
Ho-Joon Park
Electronics and Telecommunications Research Institute, ETRI
Republic of Korea
E-mail: ho.joon.park@etri.re.kr
Abstract
It is very important that the battery consumption management with population of smartphone era. But Smart
Battery which needed by battery management only uses laptop and higher price products because of unit costs
and mass. In this paper, we propose a battery consumption prediction method based on power measurement,
which calculates a similar-consumption current capacity and measures power like to smart battery in Dumb
battery without BMS.
Keywords: Smart Battery, Dumb Battery, Power Measurement, DVFS, BMS
1. Introduction
Smartphone to the public, use of battery for a mobile device has increased explosively. Battery use is a major
smartphones, tablets, navigation, etc. vary. The battery management also is very important increasingly. The
management of the mobile device battery is efficient when BMS (Battery Management System) [1, 2] by
mounting the smart battery equipped.
BMS mounted on the smart battery is consist of various sensors through the voltage, current, temperature and
other information into the system informing the battery. And like lithium ion battery, the voltage is as shown, to
prevent dangerous power-off circuit has been built up.
The problem is price and size of smart battery. As for mobile devices, a unit price is very important at mobile
device market. Smart battery is the cause of poor price competitiveness. BMS is not equipped with extra
batteries place and only a very limited to provide the system[2]. Dumb battery is not equipped BMS and
provides very limited function to the system. It has power-cut circuit and measuring voltage. But it has
advantages than BMS(Smart battery). Dumb battery is smaller than smart battery and cheaper.
Dumb battery cannot measure its current originally itself [4]. Power which computes product of workload on
the device and current consumption is the key calculation point to predict battery consumption on mobile devices.
Because the system equipped in dumb battery cannot measure its power, like Smart phones and Tablet which
equipped in dumb battery also cannot measure power. However, measuring voltage between workloads, the
remaining power will be guess.
Thus, if the system can measure current its circuit even if they have dumb battery indirectly, it can calculate
power like laptops equipped in BMS with additional some calculation.
The 9th International Symposium on Embedded Technology, Seoul, Korea
98 ISET 2014
1
Seoul, Korea, 22-23 May, 2014
In this paper, the current measurement is not possible on a mobile device equipped with dumb battery in the
lab environment, equipment pre-measured for all the states of the pre-measured current value stored in the
database as a way to infer the value of current consumption, and the remaining power is calculated proposes a
method to predict the time.
2. Related Works
The power of the DC link voltage across the load (V) and current (A) in a closed circuit can be calculated by
the product of load and current. In general, because mobile devices have CPU and a set of devices, the CPU
workload increases, also increasing the amount of current consumption, CPU is in standby state, the amount of
current consumption is reduced [5].
Most of the batteries used in the mobile device is a lithium ion battery. This battery is the power per unit
volume can be increased compared with other cells, have little or no memory effect. In contrast, the
disadvantages of a lithium-ion battery voltage drops below a certain amount or a risk of battery explosion
protection circuit is needed to be sure. Most mobile devices based on the no-load by using 4.2V to 3.3V see [6].
The shape of the battery current provided by the direct current or the discharge the voltage across the load is
reduced the more. This voltage drop we used, depending on the amount of current consumption, as shown in
Figure 1 takes the form of a curve. The shape of the voltage drop of the battery temperature, the amount of
current consumption is shown in accordance with another form.
Figure 1. Curves for Voltage Drop.
3. Measurement of Power
A prediction method of power measurement, we proposed, is product of measured workload voltage and
pseudo current value along state of mobile device, because the system equipped in dumb battery cannot measure
actual current. To do for that, the following assumptions are needed.
(1) All devices in mobile device is impossible ever to put on and take off.
The 9th International Symposium on Embedded Technology, Seoul, Korea
2
99
2014 International Symposium on Embedded Technology
(2) All devices use unique power consumption value.
(3) The sum of current consumption of a mobile device in each module is same to the total of the
consumption current value.
To measure consumption power of mobile device equipped in dumb battery, it is necessary to measure current
value along the state of modules in mobile device. To do this, figure 3 shows an experiment in case.
In Figure 3, the current and voltage value are measured with DMM 4065 digital multi-meter of NI through the
LabView software in the host computer. For precise measurement, the experiment shown in figure 2 uses
precision power supply. And the equipment used to workload device is ODROID Q of hardkernel.
Figure 2. An environment of power measurement
Adjustable from mobile device side workload modules are CPU, WiFi, DMB, CDMA, etc. vary, but all other
modules for experiment to OFF, and only measurements of the CPU using only the DVFS capabilities. At this
time, the load of CPU is always set to be 100%.
Thus obtained value is similar to the mobile device power consumption at the moment is a certain amount of
current, as shown in Figure 3.
𝑃𝑃𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐 = 𝑉𝑉𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐 × 𝐴𝐴(𝐶𝐶𝐶𝐶𝐶𝐶𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠 )
𝑊𝑊𝑊𝑊𝑊𝑊𝑘𝑘𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐
=∫
𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐
𝑡𝑡=0
𝑉𝑉(𝑡𝑡) × 𝐴𝐴(𝑡𝑡)𝑑𝑑𝑑𝑑
Figure 3. Expressions of power consumption
At some point in the power value can obtained by product of the corresponding voltage and current. Because
mobile devices equipped in dumb battery cannot measure current directly, equipment on the basis of the current
state of each module is calculated with status of each module. The total power consumption of the battery of the
mobile device from the moment when power is applied to can be obtained.
The 9th International Symposium on Embedded Technology, Seoul, Korea
100 ISET 2014
3
Seoul, Korea, 22-23 May, 2014
4. Conclusions
It is difficult to use smart battery equipped in BMS to manage battery, because of higher unit price and weight.
However, unlike the past, a variety of smartphone applications and a variety of built-in modules are much higher
battery consumption than older devices. In other words, the battery management than before is needed.
Dumb battery using the battery itself, so that the voltage measurement is possible only by the value of current
necessary for the power measurement cannot be obtained. Of course, the required current can be measured when
the device is added, but it is also possible to affect the unit price. In addition, most of the products released so far
it is impossible to apply.
In this paper, the various functional elements of the battery are not covered for parts. Nevertheless, the
calculation is similar to the current consumption since the battery's life can help to calculate the total power
consumption can be obtained proved.
In addition, ACPI standard which power management specification of PC defines the battery device equipped
with BMS for sure that use a smart battery. For this reason, there is no mobile devices that satisfy definition of
ACPI compliant. Following ACPI specification are standardized, the internal power management and battery life
of more than one module to predict and can help you manage.
Mobile devices in the future to deal with the battery management is similar to current consumption and above
all, to match the actual current consumption of calibration. In addition, repeated charging and discharging of the
battery reduce capacity of the battery. This part is also needed for the calculation.
References
[1] Thomas Stuart and Fang Fang, "A Modular Battery Management System for HEVs“. Lecture Note in
Computer Science (PACS 2003)
[2] Battery management system, http://en.wikipedia.org/wiki/Battery_Management_System
[3] HP and Intel Corporation, “Advanced Configuration and Power Interface Specification”, Volume 3
[4] Linden, D., “Maintenance-free Batteryies”, 2nd Ed, Research Studies Press Ltd,. Somerset, England, 1997.
[5] Wonyoung Kim, Gupta, M.S, Gu-Yeon Wei and Brooks, D., “System level analysis of fast, per-core DVFS
using on-chip switching regulators”, High Performance Computer Architecture, 2008.
[6] “SLPB 654374 1S1P SP Battery Manual”, KOKAM
The 9th International Symposium on Embedded Technology, Seoul, Korea
4
101
2014 International Symposium on Embedded Technology
Qplus-hyper : A Hypervisor for Safety-critical Systems
Taeho Kim, Dongwook Kang, Soo-Young Kim,
Jin-Ah Shin, Donghyouk Lim, Vicent Dupre
Electronics and Telecommunication Research Institute
218 Gajeong-ro, Yuseong-gu, Daejeon, Republic of Korea
E-mail: {taehokim, dkang, sykim, jashin, befree, vdupre}@etri.re.kr
Abstract
In recent days, virtualization is one of most popular system software technologies. However, the embedded
system virtualization is not prevalent as others. The main barrier was performance degradation. Most of
embedded systems have low performance processor and less memory than other systems and no spare resource to
execute virtualization. However, the change is now starting. Since the performance of the embedded processors
gets improved, we can have high-performance embedded systems nearly similar as a laptop. In particular, ARM
processors include the virtualization extensions for hardware-based virtualization support. We expect that the
utilization of virtualization in embedded systems will grow rapidly.
Keywords: Virtualization, Hypervisor, ARM
1. Introduction
Our hypervisor, named Qplus-Hyper, targets safety-critical systems such as avionics and automotive vehicles.
Consolidation issues to reduce the SWaP(Size, Weight and Power) is a traditional research topic in this area. For
this issue, we think that the best solution for optimized SWaP system is hardware consolidation using
virtualization. Therefore, hypervisors for safety-critical systems should be developed with verification and safe
process for practical use.
2. Qplus-Hyper in detail
Qplus-hyper is a hypervisor based on micro-kernel architecture and currently in development. The number of
core in recent microprocessors is increasing and the scalability remains the main issue in recent system software.
Therefore, reducing the synchronisation cost is fundamental. For this purpose, we have implemented InterProcess Communication using message passing schemes as stated in previous studies such as Corey[2] and
Barrelfish[3].
Qplus-hyper targets a hybrid virtualization scheme in order to gain both advantages of full-virtualization and
para-virtualization. As latency in I/O systems is critical, we use para-virtualization while the other systems, fullvirtualization will be implemented with the ARM virtualization extensions. Currently, our I/O virtualization
framework is compatible with virt-IO so we can benefit from the legacy drivers implemented in open-source
operating systems. Following the micro-kernel approach, we split the I/O management from the kernel for
reliable and small hypervisor. For performance improvement, the direct interrupt handling mechanisms like
ELI[1] is in implementation for ARM architecture.
The 9th International Symposium on Embedded Technology, Seoul, Korea
102 ISET 2014
1
Seoul, Korea, 22-23 May, 2014
Real-time VM scheduling is one of the most important features of Qplus-hyper. As mentioned, our target is the
mixed criticality system like IVI and Controller systems. For controller system, real-time responsiveness is main
requirement. On the other hand, performance is more important in IVI. For this problem, we consider
hierarchical scheduling for VMs and process in VMs and study issue on it. For practical use, software
development process and quality assurance activities are most important parts. We are following the AutomotiveSPICE development process and consider the ISO-26262 certification for automotive systems. In addition, we
conduct a formal verification for memory manager and interrupt manager modules. After that, we will prepare a
plan for formal verification for all architecture independent modules.
Figure 1. Micro-kernel architecture & Hybrid Virtualization with Safe and reliable development process
5. Conclusions
In Qplus-hyper, safety and reliability are top priority by minimizing SWaP. To minimize SWaP, qplus-hyper
adopts the form of microkernel. However, to overcome the performance issue of microkernel, we apply ARM
virtualization extensions to our hypervisor. For safety and reliability, we perform formal verification and process
development to be certified automotive SPICE. We will run qplus-hyper with Autosar OS and avionics OS
complied with the ARINC653 interface as guest OS. Therefore, we can prove that our system model is suitable
for safe-critical system.
References
[1] A. Gordon et. al, ELI: Bare-Metal Performance for I/O Virtualization, In Proceedings of ASPLOS’12
[2] S. Boyd-Wickizer et. al, Corey: An Operating System for Many Cores, In Proceedings of OSDI’08
[3] The Multikernel: A new OS architecture for Scalable multicore systems, In Proceedings of SOSP’09
The 9th International Symposium on Embedded Technology, Seoul, Korea
2
103
2014 International Symposium on Embedded Technology
EcoVerifier : Tool Support for Formal Verification of ECML using
SpaceEx
Jaeyeon Jo, InGeol Chun, WonTae Kim
CPS Research Team, Embedded SW Research Dept
Electric and Telecommunications Research Institutes,
Daejeon, 305-700, Republic of Korea
E-mail: {jaeyeonjo, igchun, wtkim}@etri.re.kr
Abstract
Cyber-Physical Systems (CPS) are integration of computation and physical systems. Most of CPS are safetycritical systems such as avionic, vehicle, medical, etc. Formal verification finds faults of the safety-critical
systems model. We developed a connection tool EcoVerifier which is implemented as a plugin of CPS modeling
framework named EcoPOD. EcoVerifier provides input interface of properties and output interface of formal
verification result for connecting with a hybrid system verification tool named SpaceEx.
Keywords: Formal Verification, Hybrid System, Cyber-Physical Systems
1. Introduction
Cyber-Physical Systems (CPS) are combinations of computational systems and physical systems. As growing
complexity of embedded systems, CPS are important issue for controlling complicated systems. CPS are widely
used in the industry such as medical, avionic, military, or autonomous, etc. For improvement of CPS reliabilities,
ETRI(Electric Technology Research Institute) developed a CPS Modeling Framework ETRI CPS Open Platform
Developer (EcoPOD)[1]. The main modelling language of EcoPOD is ETRI CPS Modeling Language(ECML)
[2] which is specified to simulation. For improving assurance of safety of an ECML model, we need to develop a
safety verification method and integrates it into EcoPOD. Formal verification checks unpredictable behaviour of
a model, therefore it is used for a safety verification method. A formal verification tool of an ECML model is not
yet developed. However, previous researches [2] show that the formal verification of ECML model can be
available using model checking tools through the translation from ECML model into hybrid automata[3]. Our
concern is providing user interface for formal verification of ECML model. We implemented EcoVerifier which
is an EcoPOD plugin to use SpaceEx[4] indirectly through the translation tool. SpaceEx is an analysis tool for
non-linear hybrid automata which are widely used to research area. EcoVerifier provides input interface for
writing safety properties and environment and visualizing verification results. In the Section 2, we describe the
function of EcoVerifier and formal verification process using EcoVerifier, in the Section 3, we conclude our
discussion.
2. EcoVerifier
The process of formal verification of an ECML model is bellows: designing the model, writing properties such
as safety requirements, executing model checker and analysing execution results. Figure 1 shows overall process
of formal verification of an ECML model using EcoPOD and EcoVerifier. EcoPOD provides ECML model
designing method. For formal verification of the ECML model, the model needs to be translated to hybrid
automata which are input front-end of SpaceEx because the semantic of ECML model is different with the
The 9th International Symposium on Embedded Technology, Seoul, Korea
104 ISET 2014
1
Seoul, Korea, 22-23 May, 2014
semantic of hybrid automata. The translator is under-going developments and planned to be included in
EcoVerifier. In the translation phase, specification of the ECML model and translated hybrid automata are
different each other. Therefore, input properties of the ECML model and the hybrid automata are different. The
safety properties must be the form of formula because the model checker checks whether behaviour of model
meets safety requirements. EcoVerifier provides an input interface for writing safety properties for ECML model,
and then translates into input properties of SpaceEx. After the hybrid automata and properties are ready for
formal verification, SpaceEx starts analysing, and then generates result which describes whether model meets
properties or explored spaces of the hybrid automata. EcoVerifier visualizes the results for analysing an ECML
model by providing graphs or tables.
Figure 1 A Process of Formal Verification of an ECML Model
3. Conclusions
In this paper, we showed a translation approach to formal verification of an ECML model. EcoVerifier
provides a connection between the modelling framework named EcoPOD and hybrid system verification tool
named SpaceEx. It contributes to user convenience for formal verification as providing user interfaces. We are
not yet presented about translation rule and tool. Our future works are publishing about implementation of the
translator which translates from ECML model to Hybrid Automata.
Acknowledgment
This work was supported by Dual Use Technology Program through Civil Military Technology Cooperation
Center funded by MINISTRY OF TRADE, INDUSTRY & ENERGY and DEFENSE ACQUISITION
PROGRAM ADMINISTRATION.
References
[1] J. Jeon, I. Chun, W. Kim, "Metamodel-Based CPS Modeling Tool", Embedded and Multimedia Computing
Technology and Service, pp.285-291, 2012.
[2] J. Jo, J. Yoo, H. Choi, S. Cha, H. Y. Lee, W.T. Kim, "Translation from ECML to Linear Hybrid Automata",
Embedded and Multimedia Computing Technology and Service, pp.293-300, 2012.
[3] Alur, Rajeev, et al. Hybrid automata: An algorithmic approach to the specification and verification of hybrid
systems. Springer Berlin Heidelberg, 1993.
[4] Frehse, Goran, et al. "SpaceEx: Scalable verification of hybrid systems." Computer Aided Verification.
Springer Berlin Heidelberg, 2011.
The 9th International Symposium on Embedded Technology, Seoul, Korea
2
105
2014 International Symposium on Embedded Technology
Autonomic Computing Research Challenges for CPS
Prajakta Jadhav*†, Won-tae Kim†, In-Geol Chun*†
*
Korea University of Science and Technology
Daejeon, Republic of Korea
†
Cyber Physical Systems Research Lab
Electronics and Telecommunications Research Institute
Daejeon, Republic of Korea
E-mail: {prajakta65,wtkim,igchun}@etri.re.kr
Abstract
Cyber-Physical System (CPS) is a combination of physical and engineered systems whose operations are
controlled by using various computing and communication systems. As physical systems are the part of cyberphysical systems, it is very difficult to control and monitor the system because of its unpredictability and
uncontrollability. Hence an autonomic computing system helps to develop CPSs, which will have an ability of
self-managing, self-configuring, self-healing and self-protecting. To develop self-managing systems, analyses of
the data and planning the resources required to execute the policies are the crucial part of the system. This paper
describes challenges in analyses and planning of autonomic computing for cyber-physical system.
Keywords: Cyber-Physical Systems, Autonomic Computing, Artificial Intelligence, Machine Learning.
1. Introduction
A Cyber-physical system is combination of physical systems with computing and communication [1].
Examples of CPSs include aerospace systems, health care and medicine, automotive systems, advanced power
grids, smart cities etc. The size, complexity and dynamism of these systems are increasing. This necessitated the
investigation of alternative for system and application design and hence autonomic computing systems are
developed. Using an autonomic computing system in development of cyber-physical systems is beneficial for
seamless management. Its goal is to realize computer and software systems and applications that will not only
make decisions on its own using high level policies, but also adapt to unpredictable changes.
This paper will discuss about autonomic computing systems in section 2. And research challenges of
Autonomic computing in CPSs are covered in section 3. Conclusion is described in section 4.
2. Autonomic Computing System
In 2001, IBM introduced autonomic computing, which refers to self-managing characteristics of distributed
computing, adapting to unpredictable changes while hiding intrinsic complexities from users and operators [3].
The autonomic computing system is self-configuring, self-healing, self-optimizing, and self-protecting [4]. It is a
four step procedure to build autonomic computing applications. The four steps called MAPE loop are: Monitor
which will monitor the loops and collects the details from resources. Analyse function will observe and analyse
conditions to find out the reason for an issue. Plan function creates plan from the information collected by
analysing the system. Execute function will provide mechanism to control the execution of plan. Some of the
approaches like agent oriented or component based are used for developing autonomic systems. In order to
The 9th International Symposium on Embedded Technology, Seoul, Korea
106 ISET 2014
1
Seoul, Korea, 22-23 May, 2014
analyse the data artificial intelligence and machine learning techniques can help to make the decisions. These
decisions can be used to plan the task as well as resources. Next section covers the research challenges in
analyses and planning phase of autonomic computing.
3. Research Challenges in Autonomic Computing
The research challenges in autonomic computing include communication standardization, relationship among
autonomic element, robustness and analysis theory. As this system will be a combination of many systems, there
will be multitasking of various processes simultaneously; hence it requires monitoring, analysis, planning, and
execution. Various technologies are used for analysing monitored data and files to identify conditions of a system.
The challenge here is to determine a good set of rules that will describe the condition properly [3]. Artificial
intelligence and machine learning techniques can be used to analyse the input data [5]. Analyses phase gives
intelligence to the system. Therefore, designing robust learning procedure is one of the main research challenges
of autonomic computing system. Dynamic changes in the system must be adapted quickly. Based on the analysis,
planning phase assigns the task and the resources according to the predefined policies. Machine learning methods
enable the dynamic modification of the policies. These policies are forwarded for execution.
Some of the other challenges include self-configuration, if a new element is added to the system then seamless
integration of that new element into the system. Self-healing can face the problem of localization and
determination; the problem can be anywhere in the system or in website or in the connecting networks. It is
challenging to detect the problem and heal it. Co-ordination between autonomic elements is one of the main
problems in self-optimization. Finally for self-protection, the systems continuously monitor all the parts of the
system. The challenge in self-protection includes network threats and malfunction of the system.
4. Conclusion
Autonomic computing helps to overcome the limitations of cyber-physical systems. In this paper, we presented
challenges in autonomic computing technologies for cyber physical systems. In order to develop robust and
reliable system, all these challenges should be considered. This paper mainly concentrated on challenges of
analysis and planning phase. The future research will mainly focus on developing techniques for analysing and
planning phase in autonomic computing.
Acknowledgement
This work was supported by the IT R&D Program of MSIP/KEIT [10035708, "The Development of CPS (CyberPhysical Systems) Core Technologies for High Confidential Autonomic Control Software"]
References
[1] Shi Jianhua, Jiafu Wan, Hehua Yan, and Hui Suo. "A survey of cyber-physical systems." In Wireless
Communications and Signal Processing (WCSP), 2011 International Conference on, pp. 1-6. IEEE, 2011.
[2] Parashar, Manish, and Salim Hariri. "Autonomic computing: An overview." InUnconventional Programming
Paradigms, pp. 257-269. Springer Berlin Heidelberg, 2005.
[3] Computing, Autonomic. "An architectural blueprint for autonomic computing."IBM White Paper (2006).
[4] Chun Ingeol, Jeongmin Park, Wontae Kim, Woochun Kang, Haeyoung Lee, and Seungmin Park. "Autonomic
computing technologies for cyber-physical systems." In Advanced Communication Technology (ICACT),
2010 The 12th International Conference on, vol. 2, pp. 1009-1014. IEEE, 2010.
[5] Kephart, Jeffrey O. "Research challenges of autonomic computing." In Software Engineering, 2005. ICSE
2005. Proceedings. 27th International Conference on, pp. 15-22. IEEE, 2005.
The 9th International Symposium on Embedded Technology, Seoul, Korea
2
107
The 9th
International Symposium
on Embedded Technology
Interactive SessionⅡ
NO
1
2
3
4
5
6
7
8
9
10
11
12
13
10:50-11:40, May 23, 2014
Interactive Session
Write Performance Analysis with Buffered FUSE .........................................................................................................111
Chanhyun Park, Youjip Won (Hanyang University)
Design and Implementation of Broadcasting Content Authoring Tool based on HTML5 ................................113
Sungjoo Park, Chang-Mo Ynag, Chai-Jong Song (KETI)
Content Recommendation Algorithm based on Usage History Analysis ..............................................................116
Sungjoo Park, Chang-Mo Ynag, Chai-Jong Song (KETI)
New Memory Translation Layer for Fast and Effective use of New Memory as Storage......................................119
Hyun Sub Song, Young Je Moon, Tae Jin Kim, Sam H. Noh (Hongik University)
The Merge Chaining Hashing Scheme with NAND Flash Memory .........................................................................121
Woong-Kyu Park, Sung-Chul Kim, Gyu Sang Choi (Yeungnam University)
The GPGPU Virtualization Performance in Actual Network Environment .............................................................123
Geun-yeong Bak, ShinHyoung Lee, Chuck Yoo (Korea University)
A Research on Improving the Computational Overhead of SLAM with SmartPhone . .......................................125
Cheol-Won Lee, Daeyoung Na, Heung-Seok Jeon (Konkuk University)
Real-time Schedulability Analysis for Hardware Supported Virtual Machine on ARM Cortex-A15 Processor .......127
Tae Kyoung Kim, Se Won Kim, Chuck Yoo (Korea University)
Software based Virtual Router Platform as a Super-peer in Software-Defined Network . .................................129
Dae-Myeong Kang, Shin-Hyoung Lee, Sung-Won Ahn, Chuck Yoo (Korea University)
Explore “Decrease-All-By-One” on DDoS Packet Filtering using Counting Bloom Filter ....................................131
Suk-Young Oh, Shin-Hyung Lee, Chuck Yoo (Korea University)
Design of a Route Guidance System for the Visually Impaired . ...............................................................................133
Hyunho Yoo, Byung-Jae Choi (Daegu University), Jong-Hwan Song (Mine Corporation)
Barriers to Real-Time Network I/O Virtualization: Observations on a Legacy Hypervisor . ................................135
Sang-Hun Lee, Jong-Soo Seok, Hyun-Wook Jin (Konkuk University)
A Power Replay Attack in Electronic Door Locks .........................................................................................................138
Seongyeol Oh, Joon-sung Yang, Andrea Bianchi, Hyoungshick Kim (Sungkyunkwan University)
2014 International Symposium on Embedded Technology
NO
Interactive Session
User-level Memory Performance on a big.Little ARM Processor . ............................................................................140
Beomhee Lee, Jibum Kim, Moonju Park (Incheon National University)
15 API-Level Mapping Between HLA and DDS for the Interoperable Middleware System .....................................143
Minchul Shin, Seokjoon Hong, Kyungrak Lee, Ramesh Kumar, Jongsang Yi, Inwhee Joe (Hanyang University),
Kyeongtae Kim, Hyungkook Jun, Woosuk Cha, Wontae Kim (ETRI)
16 A Mechanism for Tracking Interactive Episodes in Mobile Devices . .......................................................................145
Nicolas Badano (Sungkyunkwan University), Jeaho Hwang (KAIST), Euiseong Seo (Sungkyunkwan University)
17 PA-Pfair: A New Pfair Scheduling Policy for Performance Asymmetric Multiprocessors ...................................151
Peng Wu, Minsoo Ryu (Hanyang Universit)
18 A Study on Storing Environmental Data on SEDRIS for Cyber Physical Systems . ................................................153
Hyun Seung Son (Hongik University), In-geol Chun, Jae Ho Jeon (ETRI),
Woo Yeol Kim (Daegu National University of Education), R. Young Chul Kim (Hongik University)
19 Zero-Copy Load Balancing for OpenCL Platforms on Mobile Systems with Unified Memory Architecture .......155
14
Jonghyun Park, Jaemin Hwang, Byeong-Gyu Nam (Chungnam National University)
110 ISET 2014
Seoul, Korea, 22-23 May, 2014
Write Performance Analysis with Buffered FUSE
Chanhyun Park, Youjip Won
Department of Computer and Software
Hanyang University, Seoul, Republic of Korea
E-mail: {parkch0708, yjwon}@hanyang.ac.kr
Abstract
With the development of technology, the size of files handled by smart devices is increasing. This phenomenon
can cause the storage to be the biggest bottleneck of smart devices. There is a study that presents a major factor
in this phenomenon is overhead in user level filesystem (FUSE). And it proposed buffered FUSE (bFUSE) and
increased size of FUSE I/O as a solution of this problem. In this paper, we reproduced it in ODROID-Q2 and
measured write performance. As a result, we can raise the write performance up to 96% compared to raw device
bandwidth with FUSE.
Keywords: Android, Storage, User level filesystem, Write buffer
1. Introduction
Penetration rate of smart devices is increasing every year. And with the development of technology, utilization
range of smart devices is widening. Latest smart devices can take and retouch a picture of 10 million pixels or
more, and record and playback video of ultra HD class. This means that the size of the file handled by smart
devices is increasing. According to Kim et al. [1], this phenomenon can cause the storage to be the biggest
bottleneck of Android-based smart devices.
The study of Jung et al. [2] proposed buffered FUSE to solve this problem. They analyzed I/O workload of
user partition on Samsung Galaxy S3, and discovered an overhead of user level filesystem (FUSE). For the
reasons of the overhead, they pointed out the fact that FUSE I/O’s unit of 4KB caused the I/O fragmentation and
excessive context switch. They proposed to use buffered FUSE (bFUSE) and increased size of FUSE I/O to solve
this problem and to raise the write performance up to 99% compared to raw device bandwidth with FUSE.
In this paper, we reproduced bFUSE environment on ODROID-Q2 that has lower performance than Samsung
Galaxy S3 and measured sequential buffered write performance. As a result, with the use of specific filesystem
and I/O scheduler, we can raise the write performance up to 96% ratio of raw device bandwidth with FUSE.
2. Evaluation Design
Table 1. Specifications of ODROID-Q2
Samsung Exynos4412 Prime Cortex-A9 Quad Core 1.6Ghz with 1MB L2 cache
Processor
2GB LP DDR2 880Mega data rate
Memory
16GB eMMC
Storage
Android 4.1 Jelly Bean (3.0.51 Kernel)
OS
Hardware specifications of ODROID-Q2 which are used in experiment are shown in Table 1. ODROID-Q2
uses Samsung Exynos4412 Prime as a processor. It has 4 cores and 1.6GHz clock speed. Memory of total 2GB is
installed. And 16GB eMMC was used for storage. OS was Android 4.1 Jelly Bean and Kernel is 3.0.51 Kernel.
To measure I/O performance, benchmark tool MobiBench [3] was used. During the measurement of
performance, the size of file was set to 100MB and the size of I/O was set to 512KB. We measure performance
of sequential buffered write for ten times, and calculate minimum, maximum and average value.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
111
2014 International Symposium on Embedded Technology
We use EXT4 and XFS filesystem. And the experiments were performed in six environments. The basic
environment of ODROID-Q2, BASE (FUSE with EXT4 filesystem, BFQ scheduler, 4KB FUSE I/O unit) and
environment capable of maximum performance, MAX (raw device, NOOP scheduler, without FUSE) was the
standard environment. We changed I/O scheduler to the Deadline, which was suggested as the most appropriate
scheduler from previous studies [2]. After changing size of FUSE I/O, we conducted the experiment with the
same workload in two different environments with EXT4 and XFS respectively – 512KB-EXT4 (FUSE with
EXT4, Deadline scheduler, 512KB FUSE I/O unit) and 512KB-XFS (FUSE with XFS, Deadline scheduler,
512KB FUSE I/O unit). Finally, we conducted an experiment in two different environments with 8MB FUSE
buffer applied to them – bFUSE-EXT4 and bFUSE-XFS.
3. Experiment
Figure 1. Result of sequential buffered write (100MB file, 512KB I/O size)
Figure 1 shows sequential buffered write performance in six environments which Chapter 2 presented. MAX
environment shows 35.5MB/sec throughput. BASE environment shows only 17% throughput of MAX
environment. When changing I/O scheduler to Deadline, and increasing size of FUSE I/O to 512KB, buffered
write performance showed 86% of performance compared to that of raw device in EXT4 filesystem. In XFS
filesystem, showed 90% of performance compared to that of raw device. And two environments with 8MB FUSE
– bFUSE-EXT4 and bFUSE-XFS environments show 90% and 96% of performance compared to that of raw
device.
4. Conclusions
As a result, changing I/O scheduler and size of FUSE I/O could increase performance more than five times.
And the use of buffered FUSE could show an additional performance improvement of 5%. Than we can raise the
buffered write performance up to 96% compared to that of of raw device bandwidth with FUSE. This technology
is expected to be able to minimize storage bottlenecks of Android-based Smart device in the future.
References
[1] H. Kim, N. Agrawal, and C. Ungureanu, “Revisiting storage for smartphones” In Proc. Of the 10th USENIX
Conference on File and Storage Technologies, San Jose, CA, USA, Feb. 2012
[2] S. Jeong, Y. Won, “Buffered FUSE: optimizing the Androi IO stack for user-level filesystem”, International
Journal of Embedded Systems (IJES), Special issue for Embedded and Ubiquitous Computing, IEEE EUC-13,
Zhangjiajie, China, November 13-15, 2013
[3] S. Jeong, K. Lee, J. Hwang, S. Lee, Y. Won, "Framework for Analyzing Android I/O Stack Behavior: from
Generating the Workload to Analyzing the Trace", Future Internet 2013, 5(4), Special Issue for "Mobile
Engineering², MDPI(ISSN 1999-5903), 591-610; doi:10.3390/fi5040591
The 9th International Symposium on Embedded Technology, Seoul, Korea
112 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
Design and Implementation of Broadcasting Content Authoring Tool
based on HTML5
Sungjoo Park, Chang-Mo Ynag, Chai-Jong Song
Smart Media Research Center, Broadcasting & ICT R&D Division
KETI, Gyeonggi Province, Republic of Korea
E-mail: {bpark, cmyang, jcsong}@keti.re.kr
Abstract
This paper proposes a broadcasting content authoring tool base on HTML5. The format of the edited content
in the proposed authoring tool is defined as User Edited Content (UEC). We also defined the specification of
UEC metadata based on TV-Anytime Forum and TTA standard. The main difference of the proposed authoring
tool is that edited broadcasting contents are scene or shot units, not title unit. So, user can easily search and create
UEC. For the performance evaluation, we implement the real broadcasting content authoring tool combined with
media player in HTML5 browser and the metadata generation method.
Keywords: Authoring tool, HTML5, UEC, Metadata
1. Introduction
Recently, with the proliferation of digital broadcasting content, the demand for making their own content using
combination of small broadcasting content units. In order to satisfy the needs of users, the authoring tool based on HTML5
which supports easily browsing and editing contents is need. And in order to create user content more conveniently, the
content that edited in the authoring tool should be small unit like scene or shot unit, not title unit. About content metadata, it
is required to define the new content metadata format for distribution of edited content to users.
2. HTML5
HTML5 is the essential web standard and technology for providing the convergence multimedia service in
various device environments [1]. HTML5 means the Hyper Text Markup Language 5 and it is proposed next
version of HTML. Whereas the existing HTML can only display the test and hyper-link, HTML5 can support
various presentations and multimedia services. The main advantage of HTML5 is compatibility. HTML5 is the
only cross-platform for both developer and consumer and supports the device independency in many platforms.
So, most of web browsers are compatible with HTML5 includes Chrome, Android web-view and Internet
explorer browser. New technologies of HTML5 are shown as Table 1.
Table 1. New technologies of HTML5
Function
Semantics
Styling effect
2D/3D graphics/effects
Video/Audio
Device Access
Application Cache
Web Sockets
Geolocation
Description
To be accurately and easily in retrieval engine and web documents parser
Support new input methods likes range, color, determine without script
support tags(canvas) and APIs for 2D/3D graphic in web environment
support tags and APIs for video/audio in web environment
Support bi-directional communication with server
Support offline application without network interface
Sopport APIs for bi-directional communication with server
Support APIs for using the geographic information
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
113
2014 International Symposium on Embedded Technology
3. Metadata for UEC
The metadata for UEC defined in this paper consists of UEC content metadata and UEC segmented list (edit
information) and the basic schema of metadata is refer to TV-Anytime Forum and TTA standard [2]. UEC
content metadata means additional information describe characteristic information of multimedia content. UEC
segmentation list is defined as edit information. Fields of proposed metadata for UEC are shown as Table 2.
Table 2. Fields of proposed content metadata for UEC
Number
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Field Name
content_ID
program_title
Subtitle
episode_sequence_number
production_date
product_duration
Storyline
program_genre_code
broadcast_person
name_korean
cast_name
image_URL
main_image_url
Essence
clip_type_code
Number
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Field Name
essence_ID
media_url
file_format
file_size
video_bitrate
file_name
video_codec
width
height
aspect_ratio
audio_codec
audio_bitrate
audio_channel
audio_sampling_rate
4. Framework of Authoring Tool
This paper proposes a broadcasting content authoring tool base on HTML5. Broadcasting contents edited in
the authoring tool are divided into scene or shot units, not title unit. So, users can retrieve broadcasting contents
which they want to edit easily. And these scene or shot units of broadcasting contents are provided from content
server with MP-QF interface. After creating UEC, authoring tool should generate new metadata includes edit
information and content metadata. Functional requirements of the proposed authoring tool are shown as Table 3.
It includes functions of authoring tool and user interface [3].
Table 3. Functional requirements of the proposed authoring tool
Required Function
User Registration
Login/Logout
Query input
List of Retrieval Results
Video Player
Time-line
Gathering of Edited Content
Preview
Content Registration
My Contents
Description
Support the registration of new user interface with user management server
Support the function for user login/logout
Support the text query input for the content retrieval
Support the viewer of content list about retrieval results includes thumbnail,
image, title and synopsis
Support the video playback for edited content and the result of content
retrieval
Support the time-line display for video playback and content editing
Support the content gathering about edited (cut, paste) content
Support the preview function of the edited content
Support the content registration to content management server after edition
Support the presentation of content list which edited by user
5. Result of Implementation
We have used both Chrome and Internet Explorer 9 browsers for the implementation of authoring tool. The
The 9th International Symposium on Embedded Technology, Seoul, Korea
114 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
proposed authoring tool not only supports to edit and create UEC and, but also provide the method for generating
UEC metadata. Fig.1 shows the result of the implemented authoring tool and Fig.2 shows the generation process
of UEC metadata respectively.
Figure 1. Result of the implemented authoring tool
Figure 2. Generation process of UEC metadata
5. Conclusions
The number of contents in the multimedia service is increasing rapidly. It causes the increase of consumers’
requests about convenient and efficient content creation services. From this perspective, the content authoring
tool including generation of metadata attracts attention. In this paper, we proposed the practical content authoring
tool for broadcasting contents based on HTML5. And we found that the proposed authoring tool can create UEC
easily and efficiently.
6. Acknowledgement
This work was supported by the IT R&D program of MSIP/KEIT. (10044615, Development of OpenPlatform/Social Media Production and Delivery System for Fused Creation, Editing, and Playing of Broadcasting
Media Contents on Cloud Environments)
References
[1] HTML5 Living Standard, http://www.whatwg.org/specs/web-apps/current-work/multipage/
[2] TV-Anytime Forum, “Specification series: S-3 on metadata,” SP003v13, 2002.
[3] Britta Meixner, Katarzyna Matusik, Christoph Grill and Harald Kosch, "Towards an easy to use authoring
tool for interactive non-linear video", Multimedia Tools and Applications, 2012
The 9th International Symposium on Embedded Technology, Seoul, Korea
3
115
2014 International Symposium on Embedded Technology
Content Recommendation Algorithm based on
Usage History Analysis
Sungjoo Park, Chang-Mo Ynag , Chai-Jong Song
Smart Media Research Center, Broadcasting & ICT R&D Division
KETI, Gyeonggi Province, Republic of Korea
E-mail: {bpark, cmyang, jcsong}@keti.re.kr
Abstract
This paper proposes a content recommendation algorithm based on the analysis of usage history information.
The proposed recommendation algorithm classifies usage history information which occurs in the consumption of
multimedia contents. And it analyzes the user preference from usage pattern information. The proposed algorithm
is designed to resolve the inaccuracy problem of content recommendation efficiently. For the performance
evaluation, we implement the real recommendation system and prove that the proposed recommendation
algorithm improves the accuracy of recommendation.
Keywords: Content recommendation, Usage history analysis, User preference
1. Introduction
As a useful application in multimedia content services, the recommendation algorithm has been studied to
improve user’s satisfaction. The content recommendation system is defined as a system to provide the best
content to users based on analysis and forecast techniques of user preferences. The content recommendation is
expanding its domain from documents to multimedia contents and goods [1, 2].
2. Usage History Analysis Algorithm
Recently, many recommendation algorithms have been adopted in various real service environments. Most of
them try to predict the user preference using the restricted user information like preference points. It is one cause
of the performance degradation in recommendation system. This paper proposes a new algorithm for
classification and analysis of implicit user’s information [3, 4]. The proposed algorithm predicts the user
preference based on the usage history pattern information analysis.
In order to predict the user preference, we collect usage history (usage patterns) from consumption information
of contents, such as play, stop, download, bookmark and etc. Usage patterns are stored in buffers and can be
classified based on the frequency of occurrence [5]. After classifying usage patterns, we predict user preference
about features of content. To do so, the proposed algorithm calculates the incidence of patterns and it can be
mathematically formulated as follows:
N pos
Equation 1.
f
preference _ user 
w
l 1
l
N neg
f l   wl  f l 
l  1
N
w
g
Where, l means the incidence of pattern l and l means the weight of pattern l . Features k mean
distinguishing feature information of content like genre, actor, director, title, keyword, and etc. N is defined as
the total number of patterns.
The 9th International Symposium on Embedded Technology, Seoul, Korea
116 ISET 2014
1
Seoul, Korea, 22-23 May, 2014
3. Preference Evaluation
Because the proposed algorithm uses the implicit user information which gathered from the consumption of
contents, the performance can not be exactly evaluated using the existing dataset for well-known
recommendation algorithm. So, we build our own quantified evaluation dataset for the performance evaluation.
The detailed information of our evaluation dataset is illustrated in Table 1. Usage information of total 70 users
are gathered for 2 months and this dataset is classified into training set and test set, 70% and 30% of whole
dataset, respectively. In this paper, we use the precision and recall as the index for the performance evaluation.
Table 1. Detailed information of dataset
Item of evaluation dataset
The number of contents
The number of total features
The sum of used contents
The average of used contents
The number of data
491
1,002
3,780
80.43
Table 2 and Table 3 shows the precision, recall, coverage and sensitivity performance of the proposed
recommendation algorithm which compared with existing approaches. This result explains that our algorithm is
designed to resolve the previous inaccuracy problem efficiently and improve the recommendation accuracy. In
our implementation, the proposed recommendation algorithm achieves the precision of 27.16, the recall of 16.51,
the coverage of 100 and the sensitivity of 67 respectively.
Table 2. Comparison of precision and recall performance
Recommendation algorithm
User-based CF algorithm
Item-based CF algorithm
Category-based algorithm
Proposed algorithm
Precision
22.38
22.14
17.70
27.16
Recall
12.20
12.18
8.72
16.51
Table 3. Comparison of coverage and sensitivity performance
Recommendation algorithm
User-based CF algorithm
Item-based CF algorithm
Hybrid Collaborative Filtering algorithm
Hybrid Recommendation algorithm
Proposed algorithm
Coverage
99.424
99.221
99.572
99.920
100.000
Sensitivity
40
38
43
55
67
4. Conclusion
In this paper, we proposed the efficient recommendation system for multimedia contents. To alleviate the
inaccuracy problem of recommendation in existing studies, we designed the recommendation algorithm using
usage pattern information and the performance was also investigated. To improve the performance of the
proposed system, a more accurate analysis of user information will be further studied.
5. Acknowledgement
This work was supported by the IT R&D program of MSIP/KEIT (10047058, Development of
Smart Media Asset Management Technology based on Service Component for Activating Multimedia
data Consumption/Distribution).
The 9th International Symposium on Embedded Technology, Seoul, Korea
2
117
2014 International Symposium on Embedded Technology
References
[1] G. Adomavicius and A. Tuzhilin, “Toward the next generation of recommender systems: a survey of the stateof-the-art and possible extensions”, IEEE Transactions on Knowledge and Data Engineering, Vol. 17, No. 6,
pp. 734-749, 2005
[2] K. Chorianopoulos, “Personalized and mobile digital TV applications”, Multimedia Tools and Applications,
Vol. 36, No. 10, pp. 1-10, 2008
[3] J. Wang, A. Vries, and M. Reinders, “A user-item relevance model for log based collaborative filtering”,
Proceedings of the 28th European Conference on Information Retrieval, pp. 37-48, 2006
[4] M. Ghazanfar and A. Prugel-Bennett, “A scalable, accurate hybrid recommender system”, Proceedings of the
3rd International Conference on Knowledge Discovery and Data Mining, pp. 94-99, 2010
[5] S. Jung, J. Hong, and T. Kim, “A formal model for user preference”, Proceedings of IEEE International
Conference on Data Mining, pp. 235-242, 2002
The 9th International Symposium on Embedded Technology, Seoul, Korea
118 ISET 2014
3
Seoul, Korea, 22-23 May, 2014
New memory Translation Layer for Fast and Effective use of New
Memory as Storage
Hyun Sub Song, Young Je Moon, Tae Jin Kim, Sam H. Noh
Department of Computer Engineering
Hongik University, Seoul, Republic of Korea
E-mail: thdgustjq@gmail.com, yjmoon@necsst.ce.hongik.ac.kr, tjkim@cs.hongik.ac.kr,
samhnoh@hongik.ac.kr
Abstract
New memory that has characteristics of both DRAM and storage is opening a new storage era. This paper
proposes a New memory Translation Layer (NTL) as a technology to make effective use of new memory as
storage. With the addition of the NTL layer, conventional I/O is left to be served with disk-based file systems
providing compatibility, while new memory I/O is serviced through the NTL to take advantage of the byte
addressability feature of new memory.
Keywords: New memory, File system, I/O, Storage
1. Introduction
Performance limitation due to the mechanical nature of HDDs (Hard Disk Drives) in conventional computing
systems has provoked the need for new storage media [1]. While flash memory is being accepted as a new and
effective supplement to HDDs, many in industry and academia are anticipating that new memory such as PCM,
RRAM, or STT-MRAM will also be excellent candidates as new storage media as they are non-volatile [2]. New
memory is byte-addressable and is expected to have access speed close to DRAM. This paper proposes a
software layer that we call NTL (New memory Translation Layer) that allows for high compatibility from the
users‟ perspective as it allows for existing file systems are used without modification, while providing high I/O
performance by providing a means to exploit the beneficial characteristics of new memory.
Previous research that considers using new memory as storage can be distinguished into two approaches. The
first approach is to provide a dedicated new memory aware file system [3, 4]. In particular, the file system is
developed to exploit the byte addressable characteristics of new memory. The downside of this approach is that
the time-tested traditional disk-based file systems have to be abandoned. The second approach is to simply
replace the storage media with new memory [5, 6]. This approach has a merit that the operating systems can
remain untouched. Unfortunately, this results in new memory being viewed only as a block device, not being able
to take advantage of the beneficial features of new memory, resulting in sub-maximum performance.
2. The New memory Translation Layer
This paper proposes the New memory Translation Layer (NTL) to provide compatibility, while at the same
time reaping the performance benefits of new memory. With NTL, minimum modification is done to the
operating system in order to provide compatibility. This allows conventional disk-oriented file systems such an
Ext4, Btrfs, ZFS, etc. to be used with new memory. Also, NTL allows a means to exploit the byte-addressable
feature of new memory to reap its best performance. This is done by bypassing the block software layer of the
operating system avoiding the overhead of converting byte unit data to block unit data, and vice versa.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
119
2014 International Symposium on Embedded Technology
Figure 1. Conceptual architecture of NTL.
Figure 1 illustrates the system architecture of the NTL approach. Here the Upper Layer refers to a specific file
system. Service requests to the file system follow either of two tracks. The first track, „(1)‟, is simply the
conventional block-oriented software architecture track, while the other track, „(2)‟, is the new software
architecture track where NTL resides and dedicated for new memory. Note that NTL is not a file system but a file
system independent module that exists under a specific file system. This allows users to use traditional diskoriented file systems alongside NTL and new memory providing high compatibility to users. Also note that NTL
does not pass through the block translation and buffering layers as is done in conventional systems when data is
transferred to slow storage. Bypassing this overhead allows users to retain the potential high I/O performance
offered by new memory.
Acknowledgement
This work was financially supported by Semiconductor Industry Collaborative Project between Hongik
University and Samsung Electronics Co. Ltd.
References
[1] M. H. Kryder and C. Kim. “After Hard Drives—What Comes Next?” IEEE Transactions on Magnetics, 2009.
[2] R. F. Freitas and W. W. Wilcke. "Storage-class memory: The next storage system technology." IBM Journal
of Research and Development, 2008.
[3] J. Condit, E. B. Nightingale, C. Frost, E. Ipek, B. Lee, D. Burger, and D. Coetzee, “Better I/O through byteaddressable, persistent memory,” Proc. ACM Symposium Operating Systems Principles (SOSP), 2009.
[4] X. Wu and A. L. Reddy. “SCMFS: a file system for storage class memory,” Proc. ACM International
Conference for High Performance Computing, Networking, Storage and Analysis (SC11), 2011.
[5] A. M. Caulfield, A. De, J. Coburn, T. I. Mollov, R. K. Gupta, and S. Swanson, “Moneta: A HighPerformance Storage Array Architecture for Next-Generation, Non-volatile Memories,” Proc. IEEE/ACM
Symposium Microarchitecture (Micro), 2010.
[6] A. Akel, A. M. Caulfield, T. I. Mollov, R. K. Gupta, and S. Swanson, “Onyx: a prototype phase change
memory storage array,” Proc. USENIX Hot topics in Storage and File systems (HotStorage), 2011.
The 9th International Symposium on Embedded Technology, Seoul, Korea
120 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
The Merge Chaining Hashing Scheme with NAND Flash Memory
Woong-Kyu Park*, Sung-Chul Kim*, Gyu Sang Choi†
*
The Department of Information and Communication Engineering
Yeungnam University, Gyeongbuk, Republic of Korea
E-mail: {pwkyu, borame30}@ynu.ac.kr
†
The Department of Information and Communication Engineering
Yeungnam University, Gyeongbuk, Republic of Korea
E-mail: castchoi@hankook.ac.kr
Abstract
Hashing is a well-known data structure which efficiently retrieves information in large data set and is well
optimized in HDD, while NAND Flash memory is quite difference characteristics compared to HDD. In this
paper, we revisit the separate chaining hash scheme in NAND Flash memory, and propose the new chaining hash
scheme. We measured the completion times between the proposed and original schemes in Flash-based SSD and
the proposed scheme shows 4.46 times better performance at insert operation, 1.20 times better performance at
Search Operation, 4.92 times better performance at modify operation with maximize buffer efficiency.
Keywords: NAND Flash memory, SSD, Separate chaining, Hash scheme;
1. Introduction
NAND Flash memory is widely used in embedded systems, laptops and even server computers nowadays.
However, the characteristic of NAND Flash memory is quite different from HDD [1]. Hashing is a well-known
data structure which easily maintains large data set and efficiently searches the certain key in the data set [2].
Hash schemes are divided into tore categories: closed and open hashes. The directory is not increased while the
number of records increases in closed hashing. In contrast, the directory size increases as the number of keys
increases in open hashing. Separate chaining [3] is one of popular closed hash schemes, and can maintain
multiple buckets in each directory entry using linked list. The separate chaining is also well-optimized on HDD
and could be show poor performance in NAND Flash memory. In this paper, we evaluate the performance of the
separate chaining hash scheme in HDD and NAND Flash memory and propose the new chaining hash scheme in
NAND Flash memory.
2. Merge Chaining
A bucket size is exactly matched with a page size in NAND Flash Memory. It means that when one bucket is
read from or written to NAND Flash Memory, it needs to access only one NAND Flash page. In our proposed
merge chaining scheme, a bucket maintains records of several hashes in a bucket in order to maximize efficiency
of buffer. A bucket is fully occupied soon and will generate another bucket that Amount of read operations is
increased but Efficiency of buffer is significantly increased compare to separate chaining that Amount of NAND
Flash Memory operations is declined that Merge chaining shows better performance compare to Separate
chaining.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
121
2014 International Symposium on Embedded Technology
Figure 1. Merge chaining.
Figure 2. Total elapsed time of insert operation.
Figure 3. Total elapsed time of search operation.
Figure 4. Total elapsed time of modify operation.
3. Conclusions
In this paper, we proposed merge chaining hash scheme which maintains several hashes in a bucket. It show
better performance at insert operations and modify operations because efficiency of a bucket is much higher than
separate chaining that efficiency of buffer is significantly increased. Even in search operation Merge chaining can
show better performance in case there are enough buffer space.
References
[1]
[2]
[3]
[4]
[5]
Eran Gal and Sivan Toledo. Algorithms and data structures for flash memories. ACM Comput. Surv.,
37(2):138.163, 2005.
J. Clerk Maxwell, A New Dynamic Hash Index for Flash-Based Storage, Proceedings of The Ninth
International Conference on Web-Age Information Management. Oxford: Clarendon, 2008, pp.93–98
Fagin, Ronald, et al. "Extendible hashing—a fast access method for dynamic files." ACM Transactions on
Database Systems (TODS) 4.3 (1979): 315-344
Min-hee Yoo, Bo-kyeong Kim and Dong-Ho Lee, Hybrid hash index for NAND flash memory-based storage
systems, Proceedings of the 6th International Conference on Ubiquitous Information Management and
Communication, 2012, pp. 55:1-55:5
Samsung Electronics , ―Samsung SSD 840 PRO Series. datasheet,‖
http://www.samsung.com/us/pdf/memory-storage/840PRO_25_SATA_III_Spec.pdf.
The 9th International Symposium on Embedded Technology, Seoul, Korea
122 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
The GPGPU Virtualization Performance in Actual Network
Environment
Geun-yeong Bak*, ShinHyoung Lee†, Chuck Yoo†
*
Graduate School of Convergence IT
Korea University, Seoul, Republic of Korea
E-mail: gypark@os.korea.ac.kr
†
Collage of Information and Communication
Korea University, Seoul, Republic of Korea
E-mail: { shlee, hxy }@os.korea.ac.kr
Abstract
Due to development of GPU, GPGPU attempts to use the GPU device for high-performance computing rise.
When apply the GPGPU attempts to virtualization environment, the inter-VM communication is inevitable
because of nature of the GPU virtualization technology that the virtualized GPU can be used independently in
only one VM. The inter-VM communication is significant overhead in virtualizing GPU. In this paper, we
verified how the trade-off between improving performance achieved by GPU virtualization and the inevitable
inter-VM overhead presents, implementing the GPGPU network routing structure of the relevant research in the
actual network communication environment.
Keywords: Savanna, GPU, GPGPU, Xen.
1. Introduction
Thanks to support for floating-point operations and the technology-intensive development, GPU becomes not
only simple graphics processing unit but operational accelerating device. These changes in the GPU raise
attempts to use the GPU device for high-performance computing. GPGPU[1] is a collective term for these
attempts.
There are the tendencies to apply GPGPU system performance improvement to virtualized environments as
well as general environments, and GPGPU performance improvement in the virtualized system can be realized by
way of GPU virtualization. For GPU virtualization, the intel’s VT-d hardware virtualization technology [2]
emulates the GPU hardware to make VM (Virtual Machine) use the GPU device directly and exclusively.
Due to the nature of the VT-d technology that the virtualized GPU can be used independently in only one VM,
a number of inter-VM communication is inevitable for multiple VM to share the GPU. That’s because the virtual
machine with virtualized GPU (DomG) must process all of the GPU-required tasks instead of other virtual
machines without authorization to access the virtualized GPU (DomU). As a result of the method, sharing GPU
with multiple VM could add the inter-VM communication overhead, and this overhead could act as a variable in
deciding the system performance. Thus, if the GPU is used by multiple VMs, we should check the trade-off
between VM performance improvements and overhead of inter-VM communication well.
In this paper, we verified how the trade-off presents implementing the GPGPU network routing structure of the
relevant research in the actual network communication environment.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
123
2014 International Symposium on Embedded Technology
2. Relevant Researches
Implementing module that route virtual packets using virtualized GPU and return the results to client VM, the
paper [3] shows measuring result of a trade-off between improved performance with GPGPU in a virtualized
environment and inter-VM communication overhead: In the case that GPGPU handles the routing process, the
routing rate is six times faster than in the otherwise case, but overhead occurring in the process of data
transmission among VMs exceeds the amount of improved performance, so the overall performance declined
greatly.
The paper [4], the subsequent paper of [3], suggests a structure for reducing inter-VM communication
overhead (Savanna). With Savanna which was suggested in the paper [4], the whole time of GPGPU routing
process including inter-VM communication could become lower than the general routing time.
3. Experiment
In this paper, with experiments using the forwarding module attached to Savanna, we verified how the system
performance appears in the actual environment in which packets are transmitted among a network. The combined
module (Savanna + original packet forwarding module) was operated in the same system as the one used in the
paper [4], and the network communication environment is as follows.
First, the packets forwarding through the combined module had 13075000 pps (packet per second) rate when
size of one packet was 64byte, and 820000 pps rate when one packet size was 1500byte (the maximum pps the
packet sending node can pour to other nodes). All incoming packets received by the experiment module were
sent to one node, and we used receiving pps rate of the node in which all packets come as a measure.The packet
forwarding module used to experiments batched the 448 packets, the number of packets the GPU can treat at a
time in parallel.
To see how the savanna affects in the performance in the actual network communication environment, the
original packet forwarding module (origin. Module) and combined module were compared each other. The result
of the comparison is presented in Table 1.
Table 1. Experiment Results
Packet size
64byte packet
1500byte packet
Module
Origin. Module
Combined Module
Origin. Module
Combined Module
Send rate
13075000 pps
13075000 pps
820000 pps
820000 pps
Receive rate
4901809 pps
29702 pps
565603 pps
65631 pps
4. Conclusion
As shown in the experimental results, savanna structure application to a real network environment makes
significant performance degradation. Considering that the original forwarding module attached to Savanna is a
forwarding-only version, the degradation of performance seems to be significant. Then, there are needs to
analysis more detailed factors in the performance degradation and to design the ways to reduce degradation in
performance.
Acknowledgement
This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea
government(MEST) (No.2010-0029180) with KREONET.
References
[1] GPGPU, http://en.wikipedia.org/wiki/General-purpose_computing_on_graphics_processing_units
[2] VT-d, https://software.intel.com/en-us/articles/intel-virtualization-technology-for-directed-io-vt-d-enhancingintel-platforms-for-efficient-virtualization-of-io-devices
[3] Yoo-kyung Uh, Chi-Young Lee, Chuck Yoo. 2013. "Communication Performance Evaluation in GPU
Virtualized Environments." Korea Computer Congress, 63-65.
[4] Yoo-kyung Uh, Chuck Yoo, 2014. “Savanna: Xen 기반의 최소 통신을 이용한 GPGPU 가상화 기법”.
Korea university master's thesis. http://www.riss.kr/link?id=T13383400
The 9th International Symposium on Embedded Technology, Seoul, Korea
124 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
A Research on Improving the Computational Overhead of SLAM
with SmartPhone
Cheol-Won Lee, Daeyoung Na, Heung-Seok Jeon
Department of Computer Engineering
Konkuk University, Chungju, Republic of Korea
E-mail: e10000won@gmail.com
Abstract
This paper presents a new framework for enhancing the SLAM performance by utilizing idle resource of
smartphone. In the new framework, the smartphone computes SLAM process using the sensor data wirelessly
transferred from the robot and takes the results back to the robot. According to the our experimental results, the
limit of maximal robot speed for valid SLAM results has increased 0.036m/s to 0.058m/s .
Keywords: Robot, SLAM, Computational overhead, Smartphone
1. Introduction
Simultaneous Localization And Mapping(SLAM) is the process by which a mobile robot can build a map of
the environment and, at the same time, use this map to compute its location[1]. Many solutions for SLAM
problem have been developed such as EKF-SLAM[2], FastSLAM[3], DP-SLAM[4]. However, most of the
SLAM solutions are hard to be used in practical situation because of computational overhead. Therefore, in this
paper, we propose a new framework that could utilize the resource of idle smartphone. In the new framework, the
SLAM process is divided into three modules, One of the divided SLAM modules is computed in smartphone. As
a result, the new framework shows better SLAM results than when the robot only does.
2. A new framework for SLAM with smartphone and experiment
2.1. A new framework for SLAM with smartphone
In this paper, we propose a new framework for SLAM enhancement. For reducing the overhead of SLAM
computation in robot system with the help of smartphone, we divide existing SLAM solution into three modules
such as Sensing module, Making Task module and Navigation module. Sensing module collects environment
data from sensor. Making Task module calculates SLAM information(map, robot pose) on the basis of sensing
data. Navigation module makes path of the robot on calculated SLAM information. In addition to the existing
SLAM modules, we added State-check and Communication modules. State-check module checks state of
smartphone. And, Communication module sends sensing data to smartphone and receives SLAM information.
The new framework starts at Sensing module and flows by yellow arrows as shown in Figure 1.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
125
2014 International Symposium on Embedded Technology
Figure 1. A new framework for SLAM with smartphone
2.2. Experiment
Table 1. The number of SLAM cycle
robot speed
(m/sec)
0.036
0.047
0.058
number of SLAM cycles
DP-SLAM
cycle
84
72
58
new framework
SLAM cycle
90
87
76
Figure 2. Result of DP-SLAM and a new
framework PMC(Robot speed 0.047, 0.058m/s)
Experiment environment for new framework evaluation is 13.8×3.9 meters polygon in a WiFi zone. The robot
with CPU Intel Pentium M processor 1.5 GHz, RAM 740MB and Laser sensor and the smartphone iPhone4S are
used for the experiments. For evaluating the quality of the maps generated by SLAM, we proposed a new idea,
which we called as PMC value. The PMC value represents the similarity between the map from SLAM and map
of the original real map. We used the DP-SLAM for this experiment.
Table 1 shows the number of SLAM cycles. The 0.036m/s case in robot speed, DP-SLAM calculated 84 cycles,
the new framework calculated 90 cycles. The new framework shows improvement about 16.3 percent in average.
Figure 2 shows the maps generated by the experiments. When robot speed is 0.047 m/s, the PMC value of DPSLAM is 83.1%. But the PMC value of the new framework is 88.6%. And the cases of 0.036m/s and 0.058m/s
also showed improved PMC value as 4.2% and 5.6%.
3. Conclusions
HIn this paper, we proposed a new framework for increasing the limit of robot speed to get valid result of SLAM
with the help of idle smartphone. From the experiments, we showed the new framework could extends the
maximal robot speed limit from 0.036m/s to 0.058m/s.
Extending the framework to platform of multiple smartphones is the future works.
References
[1] Hugh Durrant-Whyte and Tim Bailey, “Simultaneous Localization And Mapping: Part 2”, IEEE Robotics & Automation
Magazine, pp. 108-117, 2006.
[2] G. Dissanayake, P. Newman, H.F. Durrant-Whyte, S. Clark, and M. Csobra, “A Solution to the Simultaneous
Localization And Mapping (SLAM) Problem”, IEEE Transactions of Robotics and Automation, vol. 17, no. 3, pp. 229241, 2001.
[3] Montemerlo, M. and Thrun, S. and Koller, D. and Wegbreit, B, “FastSLAM: A Factored Solution to the Simultaneous
Localization and Mapping Problem”, AAAI National Conference on Artificial Intelligence, 2002.
[4] Austin Eliazar, Ronald Parr, “DP-SLAM: Fast, Robust Simultainous Localization and Mapping Without Predetermined
Landmarks”, International Joint Conferences on Artificial Intelligence, 2003.
The 9th International Symposium on Embedded Technology, Seoul, Korea
126 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
Real-time Schedulability Analysis for Hardware Supported Virtual
Machine on ARM Cortex-A15 Processor
Tae Kyoung Kim*, Se Won Kim†, Chuck Yoo†
*
Department of Convergence Software
Korea University, Seoul, Republic of Korea
E-mail: tkkim84@os.korea.ac.kr
†
Department of Computer Science and Engineering
Korea University, Seoul, Republic of Korea
E-mail: {swkim, hxy}@os.korea.ac.kr
Abstract
The researches applying virtualization techniques to mobile environment have been studied. Previous mobile
virtualization researches needed to modify its guest OSes. Newly published processor, ARM Cortex-A15,
provides hardware support for a virtualization (HVM) and it is no more necessary to modify the guest OSes.
Thus, we investigated real-time schedulability and bottleneck of performance for the virtualized mobile system
with this processor. In our performance analysis, we found that hardware supported virtual machine was hard to
guarantee the real-time support and the bottleneck of performance was guest OS, not the hypervisor.
Keywords: Mobile virtualization, Hardware supported virtual machine, Real-time support.
1. Introduction
The technology of virtualization has been developed through decades, and recently, this techniques flow into
the mobile environment. Applying virtualization techniques to mobile derives benefits as following: providing
multiple OSes[1] and security through isolation[2]. The researches to accommodate virtualization into mobile
have been studied. The one of the main obstacles of mobile virtualization is real-time support. In [3], the author
suggested ‘SH-quantization’ algorithm to support real-time scheduling in Xen-ARM virtual machine.
Nevertheless, previous researches have limitation that their guest OSes need to be modified called as Paravirtualization. Newly published processor, ARM Cortex-A15, provides hardware support for a virtualization.
Therefore, in this paper, we show whether virtualization with this processor guarantees real-time support, and
investigate the bottleneck of performance in the virtualized mobile system through the performance analysis.
2. Implementation
The hardware platform we used in our experiments was Arndale Board which applied ARM Cortex-A15
processor. The board had an Exynos 5250 CPU with 1.7GHz core frequency, dual cores, and 2GB memory size.
For software platforms, we used Xen 4.4(arch/arm) as a hypervisor and linux kernel 3.9 as the Domain0 and
DomainU guest OSes. The memory size of the Domain0 was 256MB as a default and 128MB for the DomainU.
Scheduling policy for Xen, we followed the default policy, credit scheduling, and for Domains we followed
default linux scheduler.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
127
2014 International Symposium on Embedded Technology
3. Performance analysis
To determine whether real-time schedulability was guaranteed in HVM, we did performance analysis in two
different perspectives. First, we used benchmark, called ‘Cyclictest’, to confirm the deadline of the interrupt
handling was guaranteed. The table 1 shows result of benchmark executing. The interrupts were occurred by
POSIX interval timer with 10ms interval and 10000 loops. This result showed that the deadline of XenARM(HVM) could not guaranteed because of its maximum latency value, about 7ms, instead the native linux
system satisfied deadline within maximum value of 0.4ms. In real-time schedulability perspective, it is more
significant that finishing tasks within deadline than lower average latency.
Table 1. Interrupt latency on the native linux and the virtualized system.
Target
Native Linux
Xen-ARM(HVM) - Domain0
Min
12
20
Interrupt latency (us)
Max
482
7187
Avg
83
167
The other performance analysis was that calculating interrupt handling time to define where the bottleneck of
performance was in virtualized mobile system. It was measured section by section using a performance
monitoring unit (PMU). Figure 1 illustrates the measurement boundary of interrupt handling either the native
linux and Xen-ARM(HVM). In the native linux system, we counted the CPU cycles from vector table to
__irq_svc(), and calculated the execution time by dividing cycle by CPU clock speed (actual survey clock speed
was 1GHz). The average interrupt handling time of the native linux was 17us. On the other hand, in case of XenARM(HVM), there was the hypervisor vector table that determined which domain should be delivered the
interrupt. Therefore, there was one more stage than the native linux’s case. The average time of interrupt
handling in the hypervisor only took 0.25us, but in domain0 kernel it took 24.78us until the interrupt handling
was finished.
Figure 1. Measurement boundary of interrupt handling with PMU.
4. Conclusions
The performance experiments we had done in section 3 indicated two essential phenomena. First, the XenARM hypervisor with hardware support is hard to guarantee a real-time schedulability because of its maximum
interrupt latency. The other feature is that the bottleneck of performance during the interrupt handling comes out
Domain0 not the hypervisor. In the future, we will demonstrate cause of overhead in the Domain0, and will
measure performance in DomainU with a real-time operating system such as a uC/OS-II.
Acknowledgement
This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea
government(MEST) (No.2010-0029180) with KREONET.
References
[1] Heiser, Gernot. "Hypervisors for consumer electronics." Consumer Communications and Networking
Conference, 2009.
[2] Brakensiek, Jörg, et al. "Virtualization as an enabler for security in mobile devices." Proceedings of the 1st
workshop on Isolation and integration in embedded systems. ACM, 2008.
[3] Yoo, Seehwan, and Chuck Yoo. "Real-time Scheduling for Xen-ARM Virtual Machines." IEEE Transactions
on Mobile Computing, 2013
The 9th International Symposium on Embedded Technology, Seoul, Korea
128 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
Software based Virtual Router Platform as a Super-peer
in Software-Defined Network
Dae-Myeong Kang, Shin-Hyoung Lee, Sung-Won Ahn, Chuck Yoo
College of Information and Communications
Korea University, Seoul, Republic of Korea
E-mail: {dmkang, shlee, swahn, hxy}@os.korea.ac.kr
Abstract
SDN is a future-oriented network for efficient network management, which decouples the control plane and the
data plane. A typical example is OpenFlow. OpenFlow is a standard protocol that operates between the controller
and switches, which is a new method for controlling flows in a network. But, OpenFlow has a big challenge about
some overheads between the controller and switches. In this paper, we discuss the challenge of OpenFlow based
on the overheads between the controller and switches. We also show that software based virtual router platform
that named XEBRA can address this challenge.
Keywords: Xen Hypervisor, OpenFlow, SDN, Super-Peers
1. Introduction
SDN(Software-Defined Network) is a new approach to designing, building and managing networks. The basic
concept is that SDN separates the network’s control as Control Plane and forwarding as Data Plane to make it
easier to optimize each. A typical example is OpenFlow[1]. OpenFlow is a standard protocol that operates
between the controller and switches, which is a new method for controlling flows in a network. OpenFlow defines
a standard for sending flow rules to network devices so the control plane can add them to the forwarding table for
the data plane. OpenFlow is one of the most suitable methods for implementing SDN, but there is still a challenge
like reducing the centralized overheads. SDN controller performs all of control plane functions, including
running the control plane protocols that connect with the outside world[2]. When the OpenFlow switch receives
unknown packets in the flow table, the switch requests the policy for the packet from the controller via OpenFlow
control message using TCP/IP Communication. If massive packets arrive because of the requirements of a Cloud
service, the switch frequently contacts the controller to request the policies for each packet so there are major
overheads for the controller and the network[3]. Our software based virtual router platform that named
XEBRA(Xen hypervisor based Router Architecture)[4][5] can support these challenges as a new hybrid switch
and controller with OpenFlow standard and IP routing, or even by using other protocols simultaneously. In this
paper, we discuss the challenges of OpenFlow based on the overheads between the controller and switches. We
also show that XEBRA can address these challenges.
2. XEBRA with SDN Architecture
The positions of the XEBRA platform in the SDN are represented as a switch or as a controller with a gateway.
The XEBRA is open source so it can provide flexibility and portability. Figure 1 shows the XEBRA gateway
with multiple controllers. We implemented a Floodlight[6] controller, which is a well-known OpenFlow
controller in the XEBRA platform. In addition, the XEBRA platform can support any type of controller. The
XEBRA platform also has a virtual router to operate generic routing protocol.
The XEBRA platform can act as super-peers in a large-scale network, as shown in Figure 1. Centralized
control is definitely a big advantage of SDN in terms of virtual network manageability. However, a distributed
system has better performance than a centralized system. The reason why the IP protocol used by routers has
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
129
2014 International Symposium on Embedded Technology
been employed for the past 30 years on the global Internet and this routing process works on distributed nodes[3].
Therefore, it is necessary to reduce the overheads.
The super-peer architecture can counteract the deficiencies of centralized system. In Figure 1, the XEBRA
platforms are super-peers, which represent SDNs. The SDN controllers that is shown at the top of the figure
control these super-peers. The super-peers have a flow table for each SDN. When a controller orders a network
policy from the super-peers, the super-peers have the policy and they execute their roles during flow switches. A
super-peer manages its own switches. In this architecture, the switches send requests to the XEBRA platform as a
super-peer to process unknown packets. This method can reduce the communication overheads. This effect will
increase if the network becomes too large. The super-peer architecture is also beneficial for managing large-scale
SDNs.
Figure 1. SDN implementation with XEBRA platform as super-peers
3. Conclusions
This paper presented XEBRA with the SDN Architecture for solving the well-known challenge of SDN such
as overhead for processing new arrived packets in large-scale SDNs. To show that, we implemented well-known
SDN switch and controller in XEBRA. We also introduced the XEBRA platform as a super-peer in large-scale
SDNs and explained that the architecture is beneficial for managing large-scale SDNs.
Acknowledgement
This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea
government(MEST) (No.2010-0029180) with KREONET.
References
[1] McKeown, Nick, et al. "OpenFlow: enabling innovation in campus networks, "ACM SIGCOMM Computer
Communication Review 38.2 (2008): 69-74.
[2] Openflow/sdn is not a silver bullet for network scalability, http://highscalability.com/blog/2012/6/4/
openflowsdn-is-not-a-silverbullet-for-network-scalability.html, 2011. 79, 80
[3] J.H. Yoo. Et al. A technical trend and prospect of software defined network and openflow. KNOM Review, 15. 80,
84
[4] The Xen Project, http://www.xenproject.org
[5] Shin-Hyoung Lee, et al. “Network Virtualization Techniques for Future Internet” Telecommunications
Review 21.3 (2010): 413-424.
[6] Floodlight, http://www.projectfloodlight.org/floodlight/
The 9th International Symposium on Embedded Technology, Seoul, Korea
130 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
Explore "Decrease-All-By-One" on DDoS packet Filtering using
Counting Bloom Filter
Suk-Young Oh, Shin-Hyung Lee, Chuck Yoo
College o f Information and Communication, Korea University, Seoul, Republic of Korea
E-mail: {syoh, shlee, chuckyoo }@os.korea.ac.kr
Abstract
This paper explores a method which can improve bot IP detection rate and reduce false positive rate in DDoS
attack packet filtering using counting Bloom filter. False positive occurs due to inherent characteristic of Bloom
filter. We examine a technique, "decrease-all-by-one", that can improve bot detection performance without false
positive rate increase and we prove a optimized condition in which "decrease-all-by-one" operation should be
performed through simulation experiments.
Keywords: DDoS, Counting Bloom Filter, Packet Filtering, False Positive.
1. Introduction
There have been many DDoS attack packet filtering method using a traditional counting Bloom filter(CBF)[1].
the most widely known problem that Bloom filter(BF) inherently has is a presence of false positive(FP). In the
view of DDoS security, FP means a fault in which a packet sent from normal user is determined as bot packet.
Ji Hun Ha el al. [2] present a "decrease-all-by-one" technique which can reduce FP rate. It decreases all field
of Bloom filter array by 1 at a specific condition in which the probability of FP occurrence become increased.
they defined the pre-mentioned condition depend on the following mathematical formula.
In this formula, k is the number of hash functions, m is BF array size and n is the number of inserted packets.
they explain that if the non-zero portion exceeds the 50%(1/2) of the total BF array, the probability of FP become
increased over 50%. It, however, is difficult for this premise to be applied into CBF because the non-zero portion
doesn't directly affect FP rate in CBF. In fact, a factor affecting FP rate in CBF is the ratio of fields counted up to
a count threshold.
In this paper, we experiment on the specific point of time when "decrease-all-by-one" is performed in DDoS
attack packet filtering using CBF. After experiments, we analyze a result data so that we estimate a optimized
condition.
2. Simulation "Decrease-All-By-One".
We assume a fixed DDoS attack situation for the experiment on bot IP detection performance and FP. Each
randomly generated 100,000 bot source IP and 2M normal source IP are added into CBF at 100pps rate and
2000pps rate individually. The size of BF array is 32768byte and the count threshold of each field of array is four.
In addition, four hash functions are used. A IP address is hashed by 4 hash functions, each result value from hash
functions passes an modulo 32768B operation so that the count values of field of index corresponding with the
result value are increased by one. If count values of four corresponding fields exceed threshold(we use 4), the
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
131
2014 International Symposium on Embedded Technology
packet is determined as attacking packet.
we examine results following each condition performing "decrease-all-by-one" operation (non-zero portion of
total array is 10%, 20%, 30%, ..., 90% ratio). This experiment is performed 10 times with randomly differently
generated IP address set while 10000ms. Finally, the average value of ten results is used to analyze these
experiments.
Figure 1. the performance of bot detection
Figure 2. the ratio of false positive per 1 bot
detection
In case of 10%, 20%, 30% "decrease-all-by-one", the CBF cannot catch any bot IP. This is because "decreaseall-by-one" is too frequently performed to detect bot IP in which most of the field in CBF cannot reach minimum
threshold(we use 4). So, we only examine result from 40% to 90%.
In the Figure 1, in case of performing "decrease-all-by-one" when non-zero portions of total array are 90%
and 80%(both are being shown overlapped in Fig. 1), the Bot detection performance is noticeably better than
others.
The Figure 2. shows the ratio of FP per one bot IP detection in each "decrease-all-by-one" experiment. we
focus on a difference between 90% and 80%. In the Fig. 1, Both 80% and 90% have shown almost same
performance. In case of condition that non-zero portion of total array is 80%, FP rate is dramatically more
reduced than any other experiments. We conclude that in this pre-assumed situation(array size is 32768B, and the
number of bot IP and normal IP, etc.), rather than a fixed "decrease-all-by-one" operation as 50%(1/2),
performing "decrease-all-by-one" under the condition that non-zero portions of total array is 80% is more
optimistic. Therefore we can choose 0.8(80%) enable to obtain higher performance and low FP.
3. Conclusions
we think that a"decrease-all-by-one" operation is critical method to accomplish high bot IP detect performance
and low FP rate. However, if a "decrease-all-by-one" operation occur much frequently, CBF cannot have a
enough bot information so that cannot distinguish bot IP among surged traffics. On the other hand, if a "decreaseall-by-one" operation occur too slowly, normal packets cannot pass through CBF(false positive). we prove that
there exists a appropriate condition to improve a "decrease-all-by-one" operation. In the future work, we will find
a normalized mathematical formula with variety variable in real network system for DDoS attack filtering using
the CBF.
Acknowledgement
This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea
government(MEST) (No.2010-0029180) with KREONET.
References
[1] L. Fan, , P. Cao, J. Almeida, and A. Z. Broder. “Summary cache: a scalable wide-area web cache sharing protocol”. IEEE
Trans on Networking, 8(3), 281–293, 2000.
[2] Ji Hun Ha, Hyo Gon Kim, "Identifying and Blocking Botnet-based DDoS Attacks Using Counting Bloom Filter". The
Korean Institute of Communications and Information Sciences, 2012.
The 9th International Symposium on Embedded Technology, Seoul, Korea
132 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
Design of a Route Guidance System for the Visually Impaired
Hyunho Yoo*, Byung-Jae Choi*, Jong-Hwan Song †
*
Department of Electronic Engineering
Daegu University, Gyeongbuk, Republic of Korea
E-mail: gusghyoo@naver.com, bjchoi@daegu.ac.kr
†
Mine Corporation
Beomeo-dong Suseong-gu Daegu, Republic of Korea
E-mail: mine1502@hanmail.com
Abstract
Nowadays, many assistive devices for the visually impaired have been studied. In this paper, we propose a
few devices that help route guidance for a visually impaired person. It is composed of a smart phone, cane, and
hands-free device. The smart phone helps a route guidance. The cane detects an obstacle and transmits it to the
hands-free device. The hands-free device communicates with a visually impaired person. We here present their
architecture, signal flow, and configuration.
Keywords: Visually impaired person, White cane, Hands-free device, Route guidance system.
1. Introduction
During walking to the destination, the visually impaired person has many difficulties and is exposed to the
dangerous situations. Even many studies and systems have been made to eliminate them. However, the visually
impaired person still feels difficult. They also think that commercial products are concentrated in ICT
convergence without considerations for the visually impaired person.
In this paper we propose a route guidance system for a visually impaired person. It is composed of a smart
phone with a navigation application, cane, and hands-free device. It assists a route guidance and obstacle
avoidance as a subsidiary walking device for the visually impaired. In order to implement this whole system, this
is divided into three parts. The first part is a stick functioned obstacle recognition and it is a kind of white cane.
The second part is the smart phone implemented a navigation application. The last is the hands-free part that
communicates among a smart phone with navigation system, stick, and the user.
2. Design of Subsidiary Walking Device for the Visually Impaired
The overall system is composed of three parts. The design of walking stick part consists of a few switches for
operating each function, ultrasonic sensors for obstacle detection (MB1220), SoC(CC2540) with integrated
Bluetooth function, vibration motor for judgment the obstacle presence/absence and others. As the major
components for this system, the CC2540 processor which is SoC chip based on 8051 Core for Bluetooth 4.0
configuration is used for the low-power design because of low-power process with 2~3.6[V] operation power
supplies.
The hands-free part consists of SoC(CC2540) such as the design of walking stick, Micro SD card stored MP3
sound source data, Cortex M3 (STM32F103), codec chip (VS1003B) and others. This is designed to transmit the
audio information by itself as voice processing. MP3 sound data is stored into the Micro SD card. The
STM32F103 chip that is embedded by Cotex-M3 core plays MP3 files using VS1003B codec chip.
The GPS sensor, gyro sensor and other diverse sensors are embedded in smart phones. These sensors make
possible to implement a navigation algorithm in the smart phone. We realize the route guidance system using the
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
133
2014 International Symposium on Embedded Technology
navigation app. program in the existing smart phone.
For the development of a subsidiary walking device for the visually impaired person, one of the system
operation diagrams is shown in Figure 1.
Figure 1. Signal flow diagram of the cane part.
3. Conclusions
We proposed a subsidiary walking assist device that supports safe walking of the visually impaired. It was
composed of a smart phone based navigation system, hands-free system, and a smart cane of environment
recognition. These were linked to each other for supporting a safe walking of the visually impaired. This may
lead to a significant contribution to ensuring the rights movement of the visually impaired.
The 9th International Symposium on Embedded Technology, Seoul, Korea
134 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
References
[1] J. H. Bang and B. J. Choi, "Development of Smart Phone based White Cane for Visually Impaired Persons,"
IEMEK, 2013.
[2] I. H. Kim, J. U. Cha, C. H. Kim and Y. J. Gwon "A Study on a Destination Guide Cane for Visual
Disturbance Person," Korea Multimedia Society, no.78, pp.317-320, 2008.
[3] S.Y. Kim, et. al. “Electronic Cane for Visually Impaired Persons: Empirical Examination of Its Usability and
Effectiveness,” Lecture Note in Electrical Eng., vol.182, 2012.
[4] Y. Wei, X. Kou, and M. Lee “Development of a Guide-dog Robot System for the Visually Impaired by
Using Fuzzy Logic Based Human-robot Interaction Approach ,” ICCAS 2013, no.10, 2013.
The 9th International Symposium on Embedded Technology, Seoul, Korea
3
135
2014 International Symposium on Embedded Technology
Barriers to Real-Time Network I/O Virtualization: Observations on a
Legacy Hypervisor
Sang-Hun Lee, Jong-Soo Seok, Hyun-Wook Jin
Department of Computer Science and Engineering, Konkuk University
Seoul, Republic of Korea
E-mail: {mir1004,bluz, jinh}@konkuk.ac.kr
Abstract
Virtualization is considered as one of promising technologies to provide an efficient run-time environment for
real-time embedded systems with respect to easy consolidation and safety. However, there are still several issues
have to be addressed for real-time network I/O virtualization. In this paper, we briefly discuss about the clock
synchronization, the jitter of I/O latency, and the tradeoff between latency and bandwidth.
Keywords: Real-Time, Virtualization, Network I/O, VirtualBox.
1. Introduction
As the complexity of real-time embedded software increases drastically, providing an efficient run-time
environment especially in terms of consolidation and safety is becoming more important. The virtualization
technology is considered as an authentic solution to provide an isolated run-time environment for real-time
applications. Thus, there have been several researches to extend existing hypervisors to consider real-time
constraints [1-2]. However, due to the high overheads of legacy hypervisors, it is not easy to exploit widely
these on various embedded systems. To overcome such limitations, lightweight hypervisors originally targeting
embedded systems are recently introduced [3-4]. However, we believe that there are still several additional
issues have to be addressed to provide a “real” real-time network I/O virtualization. In this paper, we try to
briefly discuss some of those issues.
2. Observations on a Legacy Hypervisor
There should be many design issues for real-time hypervisor in terms of network I/O, but in this paper, we
selectively discuss three issues: i) clock synchronization, ii) jitter of I/O latency and iii) tradeoff between latency
and bandwidth. Our discussions are based on observations with VirtualBox [5], an open-source type-II full
virtualization hypervisor.
Clock Synchronization: In real-time embedded systems, the clock synchronization between guest domains is
highly desirable for various application domains [6]. However, it is very tricky in virtualized environments
because the hypervisor provides a virtual timer to the guest domain and keeps adjusting it based on the real (i.e.,
physical) timer. For example, VirtualBox inspects the virtual timer every 10 seconds and tries to adjust it
gradually by changing the speed of the timer. That is, the virtual timer is basically not accurate, and its speed
keeps changing. Such inaccuracy results in discrepancy between virtual timers in different guest domains. In
order to mitigate the inaccuracy, we apply IEEE 1588, a time synchronization protocol, to guest domains running
on the same node and measure its performance. Figure 1(a) shows the time differences between two guest
domains, but the results still show the time difference larger than 100ms even with IEEE 1588.
The 9th International Symposium on Embedded Technology, Seoul, Korea
136 ISET 2014
1
Seoul, Korea, 22-23 May, 2014
Jitter of I/O Latency: The hypervisor (or back-end driver) handles many kinds of I/O events generated by the
guest domains. The I/O event handling is hardly parallelized until these events are finally passed to the physical
I/O devices. This increases I/O overheads but also induces significant jitters of I/O latency. For example, Figure
1(b) shows cumulative probability of virtualized Controller Area Network (CAN) I/O latency [7]. As we can see,
the virtualized CAN has a very high jitter. The VirtualBox creates various threads for each virtual machine to
handle different classes of I/O events. These threads compete against each other for processor resources and
dominantly cause the jitter of I/O latency.
Tradeoff between Latency and Bandwidth: Real-time networks, such as Audio Video Bridging (AVB) [8],
estimates the worst case latency between two end nodes, which is utilized importantly in providing QoS.
However, the worst case latency can be under or over estimated in virtualized environments because of the I/O
buffering of hypervisor. For example, the virtio [9] implemented in VirtualBox checks transmission requests of
guest domains every 250us. Thus, in the worst case, a message of a guest domain can be delayed up to 250us.
Figure 1(c) shows the increased latency due to the I/O buffering. However, we cannot blindly remove the
buffering for low latency because this degrades the network bandwidth.
3. Conclusion
In this paper, we have briefly observed three issues; clock synchronization, jitter of I/O latency and
tradeoff between latency and bandwidth. As on-going work, we are trying to overcome these issues.
Figure 1. (a) Time difference between guest domains, (b) Cumulative probability of CAN latency, (c) Impact of
buffering on TCP/IP latency
4. Acknowledgement
This work was supported by the Dual Use Technology Program (UM13018RD1).
References
[1] Han, S. and Jin, H.-W., Resource Partitioning for Integrated Modular Avionics: Comparative Study of
Implementation Alternatives. Software: Practice and Experience, DOI: 10.1002/spe.2210, 2013.
[2] Xi, S., Wilson, J., Lu, C. and Gill, C.D., RT-Xen: Towards Real-time Hypervisor Scheduling in Xen. In Proc.
of EMSOFT'11, 2011.
[3] XtratuM, http://www.xtratum.org/.
[4] Hypervisor for ARMv7 Virtualization Extensions, https://github.com/kesl/khypervisor.
[5] VirtualBox, https://www.virtualbox.org/
[6] Lee, S.-H., Jin, H.-W. and Kim, K., A Simulation Tool for Optimal Phasing of Nodes Distributed over
Industrial Real-Time Networks. In Proc. of WATERS, 2013
[7] Kim, J.-S., Lee, S.-H. and Jin, H.-W., Fieldbus Virtualization for Integrated Modular Avionics. In Proc. of
ETFA, 2011.
[8] IEEE 802.1 TG. The Audio/Video Bridging Task Group. http://ieee802.org/1/pages/avbridges.html.
The 9th International Symposium on Embedded Technology, Seoul, Korea
2
137
2014 International Symposium on Embedded Technology
A Power Replay Attack in Electronic Door Locks
Seongyeol Oh, Joon-sung Yang, Andrea Bianchi, Hyoungshick Kim
College of Information and Communication Engineering
Sungkyunkwan University, Gyeonggi, Republic of Korea
E-mail: {seongyeol, js.yang, abianchi, hyoung}@skku.edu
Abstract
Electronic door locks should be designed to prevent various attacks on the locks themselves for their original purpose.
However, manufacturers have only focused on one particular type of adversary – a stranger who tries to open doors from
outside – but ignores an insider attacker with temporal access to the inside of a lock. We found that the most popular
electronic door locks are vulnerable to the insider attacker. A malicious hardware component can be covertly inserted in an
electronic door lock to implement a hidden backdoor for an unauthorized use of the lock. Attackers can replay a valid DC
voltage pulse to open the door since the door lock solenoid can be controlled with a DC voltage alone.
Keywords: Electronic door lock, Power replay attack, Backdoor
1. Introduction
Electronic door locks have recently become popular since they have many benefits compared with traditional
mechanical locks. For example, in the case of keyless locks which are the most popular types of electronic door
locks, a physical key is not needed anymore. They might also be invulnerable to the existing physical attacks
against mechanical door locks [1]. Despite these known benefits of electronic door locks, we question whether
electronic door locks are really secure enough against any possible intrusion and alterations. Manufacturers often
claim that their electronic door locks are secure and against a wide range of attacks despite the fact that several
flaws have been recently discovered (e.g, [2] and [3]), but the current focus was only directed to one particular
type of adversary attacks by a stranger who tries to open doors from outside - ignoring an insider attacker with
temporal access to the inside of a lock. However, the second type of adversary models can also be found in many
real life scenarios. For example, a thief who sojourns in a hotel room protected by an electronic door, obtains
complete physical access for a prolonged period of time to the electronic door lock. Hence, the thief would have
plenty of time to modify some parts of the lock in the room or implement a hidden backdoor switch that could be
used to steal the belongings of future guests who will stay later in the same hotel room. We found that the most
popular and commercially endorsed electronic door locks cannot cope with this type of threats. An insider
attacker can covertly insert malicious hardware components into an electronic door lock to replay a valid DC
voltage pulse to illegally open the door. We name this attack the “Power Replay'' attack since the inserted
component replays a power supplement irrespective of the central processing unit in the target door lock. Our
experiments with the four electronic door locks showed the feasibility of power replay attacks: all door locks that
we investigated were vulnerable to power replay attacks.
2. Power Replay Attack
We experimentally investigated the possibility of power replay attacks with the four most popular electronic
door locks made by Gateman, Samsung, Mille and Hyegang, which account for over 65% of the total Korea
market share in 2013. These electronic door locks follow a common architecture. An electronic door lock
consists of three functional units: a keypad for the user input, a central processing unit which detects the input
and denies or grants authentication, an actuator (a solenoid) which is used to open or close the lock, and batteries
for power supply.
All electronic door locks that we observed use the same procedure to open the lock. When a user provides
valid credential (e.g., PIN), the credential information is transformed to a coded signal at the keypad part and
The 9th International Symposium on Embedded Technology, Seoul, Korea
138 ISET 2014
1
Seoul, Korea, 22-23 May, 2014
then the coded signal is delivered to a central processing unit that controls a solenoid to actuate the lock by
supplying a positive (or negative) DC voltage. Here there are two communication channels that attackers might
be interested in: (1) the data channel between keypad and central processing unit for coded signal transfers and
(2) the power line between central processing unit and solenoid for the delivery of DC voltages.
Figure 1. The overview of power replay attacks: Dotted lines represent a malicious operation by attacker while
solid lines represent a normal operation of door lock.
Although these communication channels are not physically exposed to the outside of an electronic door lock
device, we found that the communication channels do not remain protected in the inside of the lock device. Thus
an insider attacker who has accessed to the inside of a lock can intercept, might manipulate, fabricate, or interrupt
the transmitted data and/or power over these channels. In this paper, we have focused on replay attacks for the
power line, which is a simple but powerful attack to which most electronic door locks are susceptible.
Figure 1 shows the overview of a power replay attack. The core idea is to insert some malicious hardware
components inside the door lock (a backdoor) which can remotely supply voltage to the lock actuator and
therefore control the lock itself. The backdoor circuit is installed as a spurious parallel circuit to the original
circuit, which does not substitute but choosiest with the original. From the user perspective, no changes of the
hardware can be noticed during the regular usage of the device. However, if an attacker sends a triggering
message through a communication module, then the backdoor supplies an adequate voltage to the solenoid
resulting in a door open or close from the outside. We implemented a power replay attack with Arduino and
Bluetooth module. An Arduino provides voltage to solenoid when receives triggering message via Bluetooth.
3. Conclusion and Future work
We found that the current electronic door locks are susceptible to a hardware backdoor by insiders with
temporal access to the inside of a lock. We implemented a prototype to show the feasibility of such attacks - the
prototype can be covertly inserted to the electronic door lock without any modification in the appearance or in
the standard functionalities. We also focus on logging PIN information between keypad and central processing
unit as a future work.
References
[1] Matt Blaze. Cryptology and Physical Security : Rights Amplification in Master-Keyed Mechanical Locks. In
IEEE Security and Privacy, April 2003
[2] Cody Brocious. My arduino can beat up your hotel room lock. In Black Hat USA 2012, July 2012
[3] Andy Greenberg. Hotel Lock Hack Still Being Used In Burglaries, Months After Lock Firm’s Fix. In Forbes,
Available: http://www.forbes.com/sites/andygreenberg/2013/05/15/hotel-lock-hack-still-being-used-in-burglariesmonths-after-lock-firms-fix/,[Last accessed: 15 August 2013], May 2013
The 9th International Symposium on Embedded Technology, Seoul, Korea
2
139
2014 International Symposium on Embedded Technology
User-level Memory Performance on a big.Little ARM Processor
Beomhee Lee, Jibum Kim, Moonju Park
School of Computer Science and Engineering
Incheon National University, Incheon, Republic of Korea
E-mail: leebh6889@gmail.com, {jibumkim,mpark}@incheon.ac.kr
Abstract
Balancing power consumption and performance is an important issue in embedded systems. To this end, ARM
developed a new architecture called a big.Little architecture. In this paper, we measured user-level memory
performance on the big.Little architecture and analyzed the energy efficiency. The energy efficiency is closely
related to the clock frequency of the memory and the parallelism in the program.
Keywords: big.Little, Memory performance, Energy efficiency
1. Introduction
Multicore processors are employed for many high-performance embedded systems such as smartphones and
tablets. Parallel processing on a multicore processor is able to improve performance, but more power is required
for increased number of processing units. Various kinds of low power processors have been introduced, since it
is important to balance the performance and the energy consumption for embedded systems with limited power
sources like battery. Recently, ARM developed the big.Little architecture [1], which combines high performance
cores and low power cores. The big.Little processing technique provides a way to trade-off between performance
and power consumption [2, 3]. However, standard techniques for efficient use of the new architecture have not
been established yet.
In this paper, we focus on a user-level memory I/O performance on an embedded system with the big.Little
multicore processor. Memory I/O has been considered as a main performance bottleneck on multi-processor
systems. Thus, optimizing memory performance is an important issue in designing and implementing an
application, especially when we are using a processor based on newly developed architecture. By running a
memory benchmark, we found that the energy efficiency of big.Little processing is closely related with the clock
frequency of the main memory, and affected more by the parallelism in the program than the CPU frequency.
This paper is organized as follows. Section 2 describes experimental environments such as the embedded
board and the processor used in this paper. The experimental results are presented in Section 3 and analysed.
Finally, Section 4 concludes our work.
2. Experimental Environments
Hardkernel’s Odroid-XU embedded board [4] was used for our experiments. The processor is Samsung
Exynos5410, which has 4 ARM Cortex-A15 cores and 4 ARM Cortex-A7 cores. Cortex-A15 cores are used as
high-performance (big) cores and Cortex-A7 cores are low-power (Little) cores. It has 32/32 KB I/D cache and 2
MB L2 cache. The target board has 2 GB LPDDR3 DRAM with 800 MHz clock frequency. A 16 GB micro
SDHC memory is used as a persistent storage. Ubuntu 3.3.84 is used for the operating system.
The 9th International Symposium on Embedded Technology, Seoul, Korea
140 ISET 2014
1
Seoul, Korea, 22-23 May, 2014
The processor supports a DVFS (Dynamic Voltage and Frequency Scaling) technique, with which we can
change the operating frequency from 0.25 GHz to 1.6 GHz. But the processor does not allow us to use all 8 cores
simultaneously; instead, by adjusting the operating frequency (which can be done by the operating system
interface), we can switch between big and Little cores. If we set the operating frequency lower than or equal to
0.6 GHz, Little cores are activated while big cores are off. On the other hand, if we set the operating systems
higher than or equal to 0.8 GHz, big cores are made online while Little cores go off. Migration of processes
between cores is automatically done by the dedicated hardware in the processor. So the operating system sees
only 4 processors at maximum, and do not know whether these are the same cores or not.
For measuring the user-level memory performance, a memory-intensive benchmark, RAMspeed/SMP [5], is
used. In our experiments, memory operations (copy, addition, multiplication, and multiplication with addition)
are performed on 1 GB memory for each operation type, with a 32 MB buffer. We have measured performance
for 1, 2, and 4 threads. Each thread is pinned to one core and utilizes it 100%.
3. Experimental Results
Figure 1 shows the average memory performance measured in MB/s for each CPU frequency. Note that under
0.7 GHz, only Little cores are activated. Big cores are activated when the frequency is over 0.7 GHz. As shown
in Figure 1, there are drastic performance changes between Little and big cores. It is interesting to note that the
clock frequency of the DRAM is 0.8 GHz. When the CPU clock is slower than the DRAM clock, the processor
could not use all the bandwidth the DRAM supports. We also observe that the performance gain from parallel
execution (up to 3.36 times with 4 threads) is greater than the gain from the CPU frequency increase (up to 1.45
times).
Figure 1. Average memory performance on big.Little architecture
For big cores, increasing threads also gives more performance gain than increasing the processor speed, but
the gain is smaller comparing to Little cores. Memory performance goes up to 1.82 times with 4 threads than 1
thread. On the other hand, performance improves with increased speed up to 1.52 times with single thread and up
to 1.23 times with multiple threads on big cores.
To see the energy efficiency during memory operations, we measure the power consumption during the
benchmark tests. The target board supports monitoring of power consumption for the entire board. By combining
the power consumption data with benchmark results, we calculated the energy efficiency of the user-level
operations as processed data per energy (Mb/J). Figure 2 shows the experimental results.
The 9th International Symposium on Embedded Technology, Seoul, Korea
2
141
2014 International Symposium on Embedded Technology
Figure 2. Energy efficiency of memory I/O
As shown in Figure 2, the maximum energy efficiency is at 0.9 GHz with 4 threads (996.7 Mb/J), which is
slightly higher than the memory clock frequency. With 2 threads, the highest energy efficiency is obtained with
1.1 GHz (977.7 Mb/J), because DRAM bandwidth is not fully utilized yet. Little cores are expected to be used
with low power consumption. However, we observe that Little cores are not energy efficient, if their clock speed
is not fast enough to utilize the memory bandwidth.
4. Conclusion
In this paper, we investigated both the memory performance and the energy efficiency of user-level processes
on the big.Little processor. We observed that both the memory performance and the energy efficiency are lower
than expected, when Little processor’s clock speed is not fast enough to exploit the memory’s bandwidth. Our
experiments show that when Little cores are used, increasing parallelism results in better memory performance
and energy efficiency than increasing the CPU frequency. We also observed that for memory intensive
applications, energy efficiency is closely related with the memory clock speed.
Acknowledgement
This work was supported by the Industrial Convergence Source Technology Development Program (NO.
10041332) through the Ministry of Science, ICT and Future Planning, Korea.
References
[1] Peter Greenhalgh, “big.LITTLE Processing with ARM Cortex-A15 & Cortex-A7(Improving Energy
Efficiency in High-Performance Mobile Platforms)”, White Paper released by ARM, Sep. 2011.
[2] Brian Jeff, “Advances in big.LITTLE Technology for Power and Energy Savings”, White Paper released by
ARM, Sep. 2012.
[3] Hyun-Duk Cho, Ki-suk Chung, Tae-hoon Kim, “Benefits of the big.LITTLE Architecture”, White Paper
released by Samsung, Feb. 2012.
[4] http://www.hardkernel.com
[5] M. R. Hollander and P. V. Bolotoff, "RAMspeed, a cache and memory benchmarking tool," [Online].
Available: http://alasir.com/software/ramspeed/ (retrieved 2014, Apr. 10).
The 9th International Symposium on Embedded Technology, Seoul, Korea
142 ISET 2014
3
Seoul, Korea, 22-23 May, 2014
API-Level Mapping Between HLA and DDS for the Interoperable
Middleware System
Minchul Shin*, Seokjoon Hong*, Kyungrak Lee*, Ramesh Kumar*, Jongsang Yi*,
Inwhee Joe*, Kyeongtae Kim†, Hyungkook Jun†, Woosuk Cha†, Wontae Kim†
*
Department of Electronics and Computer Engineering, Hanyang University, Korea
E-mail: {smc516, daniel379, esilote82, rameshkumar, yjs20104, iwjoe}@hanyang.ac.kr
†
ETRI (Electronics and Telecommunications Research Institute), Korea
E-mail: {ktkim, hkjun, wscha, wtkim}@etri.re.kr
Abstract
In this paper, we present prominent mappings between HLA (High Level Architecture) and DDS (Data
Distribution System) APIs for the interoperable middleware using ontology concept. For this purpose, we have
studied and analyzed HLA and DDS specifications in detail at the API level. After that, we have mapped the
similar functions and APIs of both HLA and DDS.
Keywords: HLA, DDS, Middleware, API, Mapping
1. Introduction
There are several research works which compared and mapped between HLA and DDS [1]. Those have
described the equivalent terminology, concepts and highlight the key similarities and differences between those
standards. In this paper, we present the prominent mappings between HLA management APIs and DDS APIs,
which can be used for the design of the interoperable middleware using ontology concepts.
2. Mapping between HLA and DDS
HLA uses the Federation concept to define and share the data among the various federates/simulations. In
order to share the data, the federate needs to be part of some federation. Federates can be connected/disconnected
with RTI using connect/disconnect services of the HLA federation management. If federate that was connected
with RTI is disconnected, RTI checks the federate status using connection lost service. Federate uses create
federation execution/destroy federation execution services to create/destroy federation, and also utilizes the
joined/resigned services to enter/leave the federation. Likewise, DDS provides the domain based concept to share
the data among all of the joined participants. DDS doesn’t have connect/disconnect, create/destroy join/resign
concept. However create_participnat/destroy_participant DCPS API can be similar with HLA functions and also,
to determine whether an entity is active, liveliness QoS Policy can be used. HLA has synchronization service, but
DDS doesn’t have this kind of service due to real-time based system nature.
In HLA, federates employ the Declaration Management Service to specify what the information to be
generated and shared in the federation. The federate uses Publish/Subscribe Object class attributes or Interaction
classes Services to declare the object class attributes and interactions class. After declaring the classes, RTI shall
notify the joined federates to register new object instance of specified class by using Start Registration for object
class service or interactions by using Turn Interactions On service. Similarly, in DDS, participants can publish or
subscribe the topics using DCPS APIs such as create_publisher/create_writer and create_subscriber/create_reader.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
143
2014 International Symposium on Embedded Technology
After the data declaration phase in HLA, federates are ready to exchange the data with the help of Object
Management Services. Before the data exchange, federates need to register and discover the object instances of
the object class attributes through which they can send or receive data through Update/Reflect Attribute Values
Service for the Object Classes, and they can also share through Interaction parameters with the help of Send
Interaction/Receive Interaction Services. In the same way, DDS participants create data_writer in publisher and
data_reader in the subscriber to send and receive the Topic through write and read operation.
In HLA, the data sharing is restricted to specific regions of attribute/interaction using the Data Distribution
Management Services is possible. Federates can define the routing spaces for exchanging the updated attributes
values and interaction parameters. Federates create/destroy region of attribute using create region/delete region
service. DDS provides the same kind of functionality using content filtering options. DDS participants can
create/delete contentfilteredtopic using create_contentfilteredtopic/delete_contentfilteredtopic functions. These
two kinds of service are similar, but it has difference in terms of mechanism that determining region range and
contentfilteredtopic.
HLA provides the synchronization of data exchange among federates by invoking the Time management
services. Federates receive the data either as Time Stamp Order (TSO) or Receive order; TSO is used to ensure
that the data must be delivered in the consistent order and RO doesn’t provide the ordering consistency. If any
federates want to send or/and receive TSO messages, they should be either time regulating federates or/and time
constrained federates by using Enable Time Regulation Service/Enable Time Constrained Service respectively.
In DDS, there is a QoS Policy for sending and receiving TSO messages. The name of QoS Policy is
DESTINATION_ORDER and it can be set as either Receive Order or Time Stamp Order. But there is no
restriction for data_writer or data_reader to send or receive TSO messages. And when data_writer is going to
send TSO message, it should use write_w_stamp.
HLA provides ownership management to assign owner to each object instance. Similarly, DDS depicts this
feature using the OWNERSHIP QoS Policy. OWNERSHIP QoS Policy consists of two kinds of ownership. One
is SHARED kind, it means shared ownership each instance. The other is EXCLUSIVE kind which means each
instance can only be owned by one DataWriter. EXCLUSIVE ownership kind is similar to the HLA ownership
management, but SHARED kind is different because ownership management of HLA can assign only one owner
to the object instances.
3. Conclusions
In this paper, we present prominent mappings between HLA and DDS for the interoperable middleware using
ontology concept. We need more studies about Synchronization and Time Management.
Acknowledgements
This work was supported by Dual Use Technology Program through Civil Military Technology Cooperation
Center funded by MINISTRY OF TRADE, INDUSTRY & ENERGY and DEFENSE ACQUISITION
PROGRAM ADMINISTRATION.
References
[1] Rajive Joshi, Grrardo-Pardo Castellote, "A Comparison and Mapping of Data Distribution Service and HighLevel Architecture", Real-Time Innovations, 2006.
The 9th International Symposium on Embedded Technology, Seoul, Korea
144 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
A Mechanism for Tracking Interactive Episodes in Mobile Devices
Nicolas Badano*, Jeaho Hwang†, Euiseong Seo*
*
Computer System Laboratory
College of Information and Communication Engineering
Sungkyunkwan University (SKKU), Suwon, Republic of Korea
E-mail: {nicolas, euiseong}@skku.edu
†
Computer Architecture Laboratory
Department of Computer Science
KAIST, Daejeon, Republic of Korea
E-mail: jhhwang@calab.kaist.ac.kr
Abstract
Dynamic thermal and power management is a current trend in mobile systems design. However, current low
power policies such as DVFS don’t consider interactiveness. This affects user perception of the system and
overall experience. In this paper we describe the design for a mechanism to identify and gather episode data of
interactive operations at runtime. The episode of an interactive operation refers to the time it takes for a user
input event to come back to the user as visual feedback. We also show experimental results that validate the
correctness of our mechanism. With this episode data, smarter thermal and power policies that consider
interactiveness can be implemented. This will result in a better user experience while still coping with thermal
and power dynamic constraints.
Keywords: Mobile systems, Interactiveness, Thermal and power management.
1. Introduction
More than ever before mobile platform users expect and demand longer battery life and higher computing
power from their devices. Better performing processors with higher clock speed come with a drawback, they
drain battery life and raise the chip's temperature very quickly. To overcome this issues power management
strategies come into play. Some of this strategies include novel microarchitectures such as heterogeneous
multicores or well known policies such as DVFS (Dynamic Voltage and Frequency Scaling). Commonly this
strategies apply power policies based on CPU load.
Operations handled by a processor can be classified into two categories: background and interactive.
Interactive are those that are initiated by user input, namely a touch on the touchscreen, a mouse click, or a
keyboard press. Because this kind of operations are latency-sensitive, any delay on the feedback will make the
system be perceived as clumsy or slow [1]. Power management strategies mentioned above apply low power
policies to all operations carelessly due to the fact that they can not pinpoint the interactive ones, which leads to
unresponsive GUIs [4].
Our first motivation is to detect interactive operations on the fly and classify them as such. Once we know that
the operation is interactive we can further analyze it and make an informed decision on wether or not apply a
power management policy to it. This further analysis implies knowing the episode of the interactive operation.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
145
2014 International Symposium on Embedded Technology
An episode refers to the time it takes for a user input stimuli to go all the way though processing and back to the
user as screen feedback [2].
This brings us to our second motivation, to construct a mechanism to measure the episode of an interactive
operation. The gathered episode data can then be used to improve existing power and thermal policies, which is
our ongoing research topic. In addition, this tracking mechanism can serve as a tool for other research interests
such as thread to core mapping policies or GUI interactivity. Our main contributions are:
1) A way to classify interactive operations. This allows the OS to treat them differently from
background threads improving GUI responsiveness.
2) A mechanism to measure and gather interactive episodes. With this data smarter power and
thermal policies can be created to be applied to interactive episodes.
3) A tool that can be used for other research interests.
This paper is organized as follows: section two will describe the interactive episode measurement mechanism
in a platform agnostic way. In this manner the reader can become familiar with the concepts in section three
where we describe our implementation for the Android mobile platform. In section four we show micro
benchmarking results that validate our work. Finally in section five we give concluding remarks for our work.
2. Interactive Episode Tracking
In this section, we describe the design of our episode tracking mechanism. As we mentioned before, the
episode of an interactive operation begins with a user input event. This can be tracked by intercepting the Input
Framework of the implementing platform. On the other hand, the end of an episode is not as straightforward,
there is no place in the OS or system where we can observe an event or change in state that might imply the end
of an interactive operation [2]. Because of this, we must keep track of all tasks involved in serving a specific user
input stimuli. Then mark the end of the episode when all the tasks finish processing their work. For the rest of
this paper we will refer to as the episode’s task set to the group of tasks involved in serving the same single
interactive operation.
The challenge lies on how to construct the episode task set for a given interactive operation. This can be done
as follows: when the input event is detected at the Input Framework, the task responsible for handling the event
will become the first task in the set. Secondly, if this task communicates with any other task in the system, namely
another application or service, the second task will be added to the set. In the same manner, if any task in the set
communicates with any task that is not in the set, then the tasks that do not belong to the set will be included in it.
To accomplish this, the IPC (Inter Process Communication) mechanism of the implementing platform has to be
intervened with tracking code. Finally, once the task set is built, to mark the end of the episode all task in the task
set need to finish processing all their work. This can be detected when a task relinquishes the CPU voluntarily
and not when it gets preempted. To oversee this, the scheduler code of the implementing platform needs to be
extended.
The 9th International Symposium on Embedded Technology, Seoul, Korea
146 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
Figure 1. Execution trace of an interactive operation
Figure 1 depicts the basic flow of interactive episode monitoring, showing the places where task
tracking takes place. Next follows the description of the steps illustrated in Figure 1:
1) The input hardware generates an input event.
2) The OS input framework gets the “raw” input event and “forwards” a processed event to all
applications or services subscribed to handle the event. At this point the beginning of the
episode is marked and those handlers are flagged as being part of the episode task set.
3) The corresponding application handles the event and does some work.
4) The application communicates via IPC with other applications or services. Any task involved
in the communication, that is not part of the episode task set, is added to it.
5) (6) and (7) The episode does not finalize until all tasks in the episode task set finish
communicating and processing pertinent work. In other words until all of them voluntarily
relinquish the CPU.
Our mechanism places monitoring code at the OS level, namely at the input framework, IPC framework and
scheduler. Therefore third party apps do not need to be modified.
3. Implementation
In this section we describe our implementation for the mechanism described in the previous section. The
implementation is based on the Android 4.2 Jelly Bean mobile operating system. All modifications are done
within the Android kernel except for one custom system call placed at the Android framework level.
First thing to be done is to detect user inputs. This requires a simple modification to the Android Input
Framework. Inside the Input Framework two important threads of execution exist: the InputReader and the
InputDispatcher. The InputReader thread collects “raw” input event data generated by the input devices. Then it
passes the “processed” input event data to the InputDispatcher who is responsible of forwarding the event to all
subscribed applications or services that have interest in handling the event. Looking at the Input Dispatcher we
can recognize that an input event was generated and who is the responsible task for handling it. We made a
The 9th International Symposium on Embedded Technology, Seoul, Korea
3
147
2014 International Symposium on Embedded Technology
simple custom system call to send this information into the kernel. On the kernel side the first task is added to the
episode’s task set. Also the process descriptor (task_struct structure) for this task is flagged as being part of an
episode and starts to be under the “watching eye” of the monitoring mechanism.
As explained in the previous section we need to monitor all the IPCs of tasks that are inside the episode’s task
set with those outside the set. This needs to be done to include in the episode all involved tasks that serve the
same interactive operation. All IPCs in Android are done via the kernel’s Binder module. Therefore we track
only Binder and not other IPC mechanisms in Linux such as sockets, shared memory, pipes or signals.
Figure 2. Binder Driver transaction sequence diagram
Every time a process wants to communicate with another process, a Binder Transaction is created (see Figure
2). Basically what binder does is behave as an intermediary between the two communicating processes. It
manages two thread pools, one for the the caller and one for the callee process. When the caller process initiates
a Binder Transaction it uses one of the threads in it’s thread pool (BC_TRANSACTION). Binder gets message
arguments form this thread and passes them to an available thread in the callee thread pool
(BR_TRANSACTION). Once the callee thread finishes processing the data it will send it back to Binder
(BC_REPLY) and Binder will wake up the original caller thread with the results of the IPC (BR_REPLY). Our
mechanism tracks the involved threads from the thread pools and adds them to the episode’s task set.
When all communications are done and all the tasks in the task set finished processing, we can consider the
episode as completed. To know when each of the tasks finishes working we modified the schedule function in the
CFS Scheduler. The modification calls into our mechanism when a flagged task yields the CPU voluntarily
implying that the task finished it’s work. At this point we unset the flag in the task descriptor and the task is no
longer under the observation of our mechanism. When all tasks in the task set have done this the episode is
considered finished.
Currently our mechanism has a limitation, it can only track single threaded interactive episodes. If a
multithreaded interactive operation is initiated, and the handling task decides to fork at some point, our
mechanism looses track of the episode. We are currently working to enhance our mechanism to support this
feature.
The 9th International Symposium on Embedded Technology, Seoul, Korea
148 ISET 2014
4
Seoul, Korea, 22-23 May, 2014
4. Validation
To validate our mechanism we first conducted an experiment with a simple Android application that consists
of a single GUI button. The handler function for the onClick event for the mentioned button will keep the thread
busy by sleeping or looping for a fixed amount of time, say 50ms. We clicked on the button ten times and our
mechanism logged nine episodes of 55ms of duration and one of 50ms.
Our mechanism has a measurement granularity of 5ms. This granularity is equal to the time between system
ticks, which is defined by the frequency of the clock interrupt of the executing hardware. Therefore a 50ms
episode measurement means the episode duration falls in the range of 50ms to 55ms. Similarly the measurement
for the 55ms episode actually means the episode duration falls in the range of 55ms to 60ms.
Still we can observe an overhead of 10ms in the worst case. Our mechanism traces indicate the overhead is
caused by two factors: the time consumed in the IPC between the test application and Android’s SurfaceFlinger,
plus the processing done by the latter service. SurfaceFlinger is an Android service responsible for preparing a
frame buffer with the screen’s content before the display hardware performs the next render.
Table 1. Experimental environment configuration
Hardware
Board
Processor
Memory
ODROID-XU+E
Samsung Exynos5 Octa: Cortex™-A15 and Cortex™-A7 big.LITTLE
2GByte LPDDR3 RAM
Software
OS
Kernel
Android 4.2 Jelly Bean
Modified 3.4.5 kernel
The previous experiment validates that our mechanism measures interactive episodes correctly. Then we did an
experiment to further test our mechanism and gain some preliminary insight into the potential for improving
power policies. The experimental environment is described in Table 1. The experiment consist of three simulated
scenarios:
1)
2)
3)
No power policy applied, simulated by setting the clock speed to 1600MHz.
Power policy applied, simulated by setting the clock speed to 400MHz.
Power policy applied, simulated by setting the clock speed to 400MHz. Plus a background
workload executing concurrently.
For this preliminary experiment, we executed the benchmarks on the built-in Calculator application that ships
with Android. For the background job, we used a cross-compiled version of the 444.namd workload from the
SPEC CPU2006 benchmarking suite.
Table 2. Experimental results
Scenario
High performance
Low power
Low power + background work
# episodes (1ms - 5ms)
59
50
18
# episodes (5ms - 50ms)
63
70
34
The 9th International Symposium on Embedded Technology, Seoul, Korea
# episodes (50ms - inf)
0
1
68
total # episodes
122
121
120
5
149
2014 International Symposium on Embedded Technology
In each scenario the benchmark was executed by hand with a mouse input device. Each run consisted of 20
clicks. Even though is very difficult to replicate all clicks exactly in every run, we believe that clicking at a steady
pace and over the same GUI elements is fair enough for this experiment. Each of the 20 clicks generates more
than one input event corresponding to the mouse up, mouse down, and mouse hovering events. It´s observable in
our mechanism traces that episodes with short duration, less than 5ms, belong to the pointer updating its position
(hovering events). The relevant episodes are the ones with longer duration, they belong to the mouse down event.
Table 2 shows the results grouped in three categories according to their episode duration. What´s important to
note here is how the distribution of the episodes tend to accumulate in the column on the right (50ms - inf.) when
the simulated power policy is applied, even more so when there is background work present. This directly
translates into deteriorated system responsiveness because any episode larger than 50ms won´t be perceived as
instant to the human eye [3].
Even though the experiment is a very simplified scenario we can foresee potential for improvement. Even
worse slowdowns are expected in more complex scenarios such as in multimedia applications. Improving the
treatment of interactive operations in this type of scenario by applying smarter power policies is the focus of our
ongoing research.
5. Conclusions
Enforcing low power policies on interactive operations as if they were no different from background
operations leads to uncomfortable user experiences. We bring forward a mechanism that identifies interactive
operations on runtime and gathers episode duration information from them. Looking at the collected episode data
we gain some insight of the potential for improving user interactiveness when low power policies are applied.
Our future plan is to extend our episode measurement mechanism to include the monitoring of multithreaded
applications. Then we plan to use this tool for our ongoing research that is to implement smarter power and
thermal policies for heterogeneous multicores.
References
[1] Zheng, H., & Nieh, J. (2010, June). RSIO: automatic user interaction detection and scheduling. In ACM
SIGMETRICS Performance Evaluation Review (Vol. 38, No. 1, pp. 263-274). ACM.
[2] Flautner, K., Uhlig, R., Reinhardt, S., & Mudge, T. (2000). Thread-level parallelism and interactive
performance of desktop applications. ACM SIGOPS Operating Systems Review, 34(5), 129-138.
[3] Flautner, K., & Mudge, T. (2002). Vertigo: Automatic performance-setting for linux. ACM SIGOPS
Operating Systems Review, 36(SI), 105-116.
[4] Huh, S., Yoo, J., & Hong, S. (2012, August). Improving Interactivity via VT-CFS and Framework-Assisted
Task Characterization for Linux/Android Smartphones. In Embedded and Real-Time Computing Systems and
Applications (RTCSA), 2012 IEEE 18th International Conference on (pp. 250-259). IEEE.
The 9th International Symposium on Embedded Technology, Seoul, Korea
150 ISET 2014
6
Seoul, Korea, 22-23 May, 2014
PA-Pfair: A New Pfair Scheduling Policy for Performance
Asymmetric Multiprocessors
Peng Wu, Minsoo Ryu
Hanyang University, Seoul, Republic of Korea
E-mail: {wupeng, msryu}@rtcc.hanyang.ac.kr
Abstract
We propose a PA-Pfair (Performance Asymmetric Pfair) scheduling policy for performance asymmetric
multiprocessors that have identical instruction sets but different processing speeds. PA-Pfair differs from
the original Pfair scheduling in that PA-Pfair is aware of performance asymmetry of underlying processors
during the selection of scheduling parameters such as pseudo-deadlines for subtasks and the choice of
processors for running the highest priority subtasks.
Keywords: Performance Asymmetric Pfair, Scheduling, Multiprocessors.
1. Introduction
Heterogeneous multiprocessor architectures are getting increasingly important since they enable better
performance and energy efficiency. The ARM big.LITTLE architecture is a good example that can
maximize performance at the cost of minimal increase of energy consumption in embedded systems.
In this paper, we propose a PA-Pfair (Performance Asymmetric Pfair) scheduling policy for performance
asymmetric multiprocessors that have identical instruction sets but different processing speeds. PA-Pfair
differs from the original Pfair scheduling in that PA-Pfair is aware of performance asymmetry of underlying
processors during the selection of scheduling parameters such as pseudo-deadlines for subtasks and the
choice of processors for running the highest priority subtasks.
2. System Models and Definitions
Let   {1 ,..., n } be a set of n sporadic tasks. A sporadic task i is defined by (Ci , Di , Ti ) such that
Ci  Di  Ti , where Ci is the worst-case execution time, Di is the relative deadline, and Ti is the minimum interrelease time based on the slowest processor speed. We use  i , j to denote the j th request of task  i . We use Ai , j to
denote the arrival time of  i , j . We refer to the ratio of Ci and Ti as the weight of task denoted by wt ( i ) .
Consider m performance asymmetric multiprocessors and use   {P1 ,..., Pm } to denote a set of such
processors. The processors are labelled in non-decreasing order of processing speed, i.e., Pi is no slower
than Pi 1 .We use si to represent the processing speed of each processor Pi . For national convenience, we
use 1 for the slowest processors speed. Let Yp be the cumulative speed of the first p fastest processors. It
p
is denoted as: Yp   k 1 sk
3. PA-Pfair Scheduling and Schedulability Analysis
The proposed PA-Pfair scheduling divides each task into unit-sized subtasks. PA-Pfair associates each
subtask with a new release time and deadline, called pseudo-release time and pseudo-deadline. At runtime,
it chooses the highest priority subtask and executes it on the fastest processor. Specifically, the PA-Pfair
scheduling algorithm works as follows.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
151
2014 International Symposium on Embedded Technology
Subtask size. The length of subtask, i.e., size of scheduling quantum, is defined by
GCD (
L 
s1
s2
 x,
s1
s3
 x , ...,
s1
sm
 x , C1  x , C 2  x , ..., C n  x )
.
(1)
x
th
Execution windows. We denote the j subtask of task  i as  j , where j  1 . Each task can execute
within the execution window specified by its pseudo-release time and deadlines denoted by r (  j ) and
d (  j ) , respectively.
 i

(2)
 wt ( ) * L 
 i

Successor bit. We use b(  j ) to represent whether  j ’s execution window overlaps  j 1 ’s execution
window or not. The successor bit is an important parameter that is used for tie breaking of priority
assignment in case subtasks have the same pseudo-deadlines.
 i 1

*L 
 wt ( i ) 
r (u j )  
b(  ) 
j
and
d (u j ) 
 i
  i

 wt ( ) * L   wt ( ) * L
 i   i 
(3)
Priority assignment and subtask allocation. We assign priorities to subtasks based on EDF (earliest
deadline first). When subtasks have the same deadlines, we compare the successor bits and assign high
priorities to tasks with large successor bit values. If two subtasks have equal deadlines and successor bits,
then their successor subtasks are recursively checked. When allocating subtasks to processors, we always
execute high priority subtasks on fast processors.
Now we describe a sufficient schedulability test for our Pfair scheduling.
Theorem 1: A period task system   {1 ,... n } , is schedulable by fair scheduling on performance
asymmetric multiprocessor platform   {P1 , P2 ,..., Pm } with corresponding processing speed si (0  i  m) ,
if there is no task  i hold the following condition.
Ym Di   ( )Ci  LOAD() Di  Rc
(4)
 ( ) , LOAD() and Rc are defined as following equations:
LOAD()  max t (
  DBF ( i , t )
i
)
t
 t  Di 
  1)Ci )
 Ti 
DBF ( i , t )  max(0, (
Rc  c1  ...ci 1  ci 1 , ...  cn
 ( )  max 0i m
m
j i 1 s j
si
Conclusions
In this paper, we proposed a fair scheduling on performance asymmetric multiprocessors. Also we
develop a sufficient schedulability test for fair scheduling on performance asymmetric multiprocessors.
However, there still remain many issues about fair scheduling upon performance asymmetric
multiprocessors. Our assumption is pessimistic when we obtain our fair schedulability test. In the future
work , we can obtain a more accurate schedulability test for fair scheduling.
Acknowledgement
This work was supported partly by the National Research Foundation of Korea (NRF) grant funded by the Korea
government (MEST) (NRF-2011-0015997), partly by the IT R&D Program of MKE/KEIT [10035708, “The
Development of CPS (Cyber-Physical Systems) Core Technologies for High Confidential Autonomic Control
Software”], and partly by Seoul Creative Human Development Program (HM120006).
References
[1] J. Anderson, Philip Holman and Anand Srinivasan, " Fair Scheduling of Real-time Tasks on
Multiprocessors", Handbook of Scheduling, 2005.
[2] Sanjoy Baruah and Joël Goossens, "The EDF Scheduling of Sporadic Task Systems on Uniform
Multiprocessors", Real-Time Systems Symposium, pp. 367-374, 2008.
The 9th International Symposium on Embedded Technology, Seoul, Korea
152 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
A Study on Storing Environmental Data on SEDRIS
for Cyber Physical Systems
Hyun Seung Son*, In-geol Chun†, Jae Ho Jeon† , Woo Yeol Kim††, R. Young Chul Kim*
*
†
SE Lab., Deptartment of CIC(Computer and Information Communication)
Hongik University, Sejong, Republic of Korea
E-mail: {son, bob}@selab.hongik.ac.kr
CPS research team, Electronics and Telecommunications Research Institute
Deajeon, Republic of Korea
E-mail: {igchun, jeonjaeho11}@etri.re.kr
††
Department of Computer Education
Daegu National University of Education, Daegu, Republic of Korea
john@dnue.ac.kr
Abstract
To save the data used in simulation of Cyber Physical Systems (CPS), SEDRIS is required. But, SEDRIS
need to define the format of saving environmental data because it supports only the basic data structure to save
environmental data. In this paper, we define the right formats that have 4 types of environmental variables such
as friction wind direction, wind speed, and pressure to save environmental data in simulation of CPS. And we
also confirm the result of environmental data input in SEDRIS. Through this, we can expect to possibly simulate
environmental data in CPS.
Keywords: SEDRIS, Cyber Physical Systems, Modelling & Simulation, Environmental data.
1. Introduction
The existing environment of simulation simulates the one system. But the simulation in Cyber Physical
Systems (CPS) is performed by the combination of factors such as several embedded systems, the physical
condition, and controlled real-time computing. Therefore the CPS requires the integrated management of various
data in simulation and the expression for the synthetic environments. The Sharing Environmental Data
Responsibly with an Interface Specification (SEDRIS) provides the cost-effective technology for the unified
representation and interchange of environmental data, eliminates the expensive and recurrent costs compatible
across domain boundaries, and covers multiple product formats [1]. SEDRIS can also save and manage all
environmental data using in simulation. But SEDRIS need to define a format of inputting the environmental data
because it supports a basic method to save in the database management system. In this paper, we define the
format that have types of environmental variables such as friction wind direction, wind speed, and pressure to
save environmental data in simulation of CPS. In addition, we confirm the result of environmental data input in
SEDRIS.
2. Our defined metrics and input of environmental data in CPS
We define metrics as shown table 1 in order to save 4 types of environmental variables such as friction wind
direction, wind speed, and pressure in the internal SEDRIS, which consists of time and data. The time part
separates the absolute time and relative time. In data part, 4 types of the environmental variables are matched by
the coordinates x, y, h.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
153
2014 International Symposium on Embedded Technology
Table 1. The metrics for representation of environmental data in CPS
N
o
Absolute time
(M-D/Y)
Relative time
(D–H:M–S)
x
y
h
1
2
3
4
4-5/2014
4-5/2014
4-5/2014
0-0:0-0
0-1:0-0
0-2:0-0
0
0
0
0
0
0
0
0
0
Environmental data
Friction
Wind direction Wind speed
(Type)
(Radian)
(m/s)
GROUND
1.57
10
GROUND
1.57
10
GROUND
1.74
20
...
Pressure
(Bar)
0.001
0.001
0.001
To save internally data in SEDRIS, it is possible to use the Application Programing Interface (API) of
SEDIRIS Software Development Kit (SDK) [2]. But developers not easily use the low level APIs without
understanding the structures of DRM, SRM, and EDCS. To solve this problem, we propose the SEDRIS Highlevel API (SHA) [3]. In this SHA, we add API for saving environmental data. And we confirm input result using
the additional API as shown figure 1.
Figure 1. The input result of environmental data in SEDRIS
3. Conclusions
SEDRIS require defining a right format to save environmental data because it supports a basic method to save
such as the database management system. Also, developers not easily use the low level APIs without
understanding the structures of DRM, SRM, and EDCS. To solve this problem, we define metrics and add API
for saving environmental data in SEDRIS. We actually input the environmental data with additional API. As a
result, we confirm the inserted data in SEDRIS. Through this, we can expect to be possible the simulation of
environmental data in CPS. Further research will be focused on terrain map of the complex format for additional
environment data such as temperature, and humidity, so on.
Acknowledgments. This work was supported by the IT R&D Program of MKE/KEIT [10035708, "The
Development of CPS(Cyber-Physical Systems) Core Technologies for High Confidential Autonomic Control
Software"]
References
[1] F. Mamaghani, "An Introduction to SEDRIS", 2008, http://www.sedris.org
[2] SEDRIS SDKs, http://www.sedris.org/hdr1trpl.htm
[3] H.S. Son, R. Y.C. Kim, I.G. Chun, J.H. Jeon, W.Y. Kim, "API Development for Efficiently Mapping between
SEDRIS and Simulation Systems", Next Generation Computer and IT Applications, ASTL 27, pp.172-176, 2013.
The 9th International Symposium on Embedded Technology, Seoul, Korea
154 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
Zero-Copy Load Balancing for OpenCL Platforms on Mobile
Systems with Unified Memory Architecture
Jonghyun Park , Jaemin Hwang, Byeong-Gyu Nam
Dept. of Computer Science and Engineering
Chungnam National University, Daejeon, Republic of Korea
E-mail: {jh.park, jmhwang, bgnam}@cnu.ac.kr
Abstract
A zero-copy load balancing scheme is proposed for OpenCL platforms on mobile systems with unified
memory architecture. Conventional OpenCL load balancing involved memory copy overheads between graphics
memory and system memory due to the separate memories for CPU and GPU. However, it incurs unnecessary
memory copy overheads in mobile systems such as accelerated processing units (APUs) and application
processors (APs) which incorporate the unified memory architecture. In this work, we eliminate the memory
copies associated with the data transfers between CPU and GPU by exploiting the shared memory between them.
Experimental results show 15% performance improvements through the zero-copy scheme.
Keywords: Load balancing, Zero-copy, Unified memory architecture, OpenCL, Heterogeneous computing
1. Introduction
Recently, OpenCL load balancers have been developed to redistribute the workloads between CPU and GPU
on their availabilities to improve the performance of mobile heterogeneous systems [1], [2]. The OpenCL load
balancing requires sharing of OpenCL data between CPU and GPU and therefore, conventional load balancing
schemes used memory copies between CPU and GPU through the bandwidth limited PCI-Express I/O bus,
resulting in performance overhead [1-3]. This approach involves unnecessary memory copies if adopted in the
mobile systems like accelerated processing units (APUs) and application processors (APs) due to the unified
memory architecture (UMA) of CPU and GPU in these systems. In this paper, we eliminate the memory copy
overhead in the load balancing on mobile systems with the UMA by adopting the zero-copy method [4] that uses
the shared system memory between CPU and GPU to transfer OpenCL data to each other. As a result, we achieve
15% performance improvement compared with the prior OpenCL load balancers [1].
2. Zero Memory Copy in OpenCL Load Balancer
Fig. 1 compares non-uniform memory architecture (NUMA) of conventional desktop system and unified
memory architecture (UMA) of APUs and APs. Desktop system has separate graphics and system memories for
GPU and CPU, respectively, and thus conventional OpenCL load balancers involve memory copy overhead
between CPU and GPU to transfer data to each other, as shown in Fig. 1(a). However, in mobile systems with
UMA, this overhead is unnecessary due to the shared memory between CPU and GPU. Hence, we propose a
zero-copy OpenCL load balancing scheme for mobile systems with UMA that share OpenCL data between CPU
and GPU via the shared memory, as illustrated in Fig. 1(b). In conventional load balancers, CPU creates an
OpenCL memory object in the graphics memory using the clCreateBuffer() to transfer OpenCL data to the GPU,
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
155
2014 International Symposium on Embedded Technology
CPU
Memory
Controller
GPU
PCI-E
CPU
GPU
Memory
GPU
Memory Controller
Copy
System
Memory
Data sharing region
System Memory
(a) Conventional load balancer on NUMA
(b) Zero-copy load balancer on UMA
Figure 1. Comparison of memory architectures between NUMA of desktop systems and UMA of APUs / APs
and GPU accesses the graphics memory to get the OpenCL data sent from the CPU. This process involves data
copy overheads from CPU to GPU through the bandwidth limited PCI-Express I/O bus. However, in our
proposed zero-copy scheme, CPU creates an OpenCL memory object in the system memory by setting the
CL_MEM_USE_HOST_PTR flag in the clCreateBuffer() and sends the memory pointer to GPU so that the
GPU can directly access the CPU memory region using the pointer without incurring any data copy overheads.
3. Evaluation Result
Execution time (ms)
We used the AMD A10-4600M APU that integrates CPU and GPU in a single chip and adopts the unified
memory architecture [5]. Measurement result for dot multiplication shows a 120ms improvement through the
zero-copy method adopted in our load balancer, which converts to a 15% performance improvement from
conventional load balancer as shown in Fig. 2.
800
600
759
15%
639
400
200
0
Conventional
load balancer
Zero-copy
load balancer
Figure 2. Performance comparison
4. Conclusion
A zero-copy load balancing scheme is proposed for the OpenCL platforms on mobile systems with unified
memory architecture. The scheme eliminates data copy overhead by sharing the OpenCL data through the shared
system memory between CPU and GPU. As a result, we achieve a 15% performance improvement compared to
prior OpenCL load balancers.
The 9th International Symposium on Embedded Technology, Seoul, Korea
156 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
Acknowledgement
This work was supported by the Industrial Convergence Source Technology Development Program (NO.
10041332) through the Ministry of Science, ICT and Future Planning, Korea.
References
[1] M. Boyer et al. "Automatic intra-application load balancing for heterogeneous systems," AMD Fusion R
Developer Summit, 2011.
[2] C.S. de La Lama., et al. "Static multi-device load balancing for opencl," IEEE 10th International
Symposium on Parallel and Distributed Processing with Applications (ISPA), pp. 675-682, 2012.
[3] T. Komoda et al. "Power capping of CPU-GPU heterogeneous systems through coordinating DVFS and
task mapping," IEEE 31st International Conference on Computer Design (ICCD), pp. 349-356, 2013.
[4] P. Boudier and G. Sellers, "Memory system on fusion APUs," AMD Fusion developer summit, 2011.
[5] A. Branover, D. Foley, and M. Steinman, "AMD Fusion APU:Llano," IEEE Micro, vol. 32, no. 2, pp. 28-37,
Mar-Apr. 2012.
The 9th International Symposium on Embedded Technology, Seoul, Korea
3
157
The 9th
International Symposium
on Embedded Technology
Invited Session A: ETRI
09:30-10:50, May 23, 2014
Technology Trends of Scalable Open Platforms
Chair : YungJoon Jung (ETRI, Director)
NO
1
2
3
4
5
Invited Session
Embedded SW Platform Trends........................................................................................................................................161
Young-Chang You(FALinux, CEO)
AR Service Platform Technology Trends.........................................................................................................................163
Chuwhan Kim(Qualcomm Korea, Senior Director)
Open IoT Platform: Mobius................................................................................................................................................165
Jaeho Kim(KETI, Team Manager)
Data-centric Communication Middleware for CPS based on OMG DDS.................................................................167
Soo-Hyung Lee(ETRI, Principal Researcher)
Trend of SW Platform for Heterogeneous Multi-core system and OpenSEED Community Activity ................169
Seung-hwa Song(IDIS Co., Ltd, Open Project Leader)
Seoul, Korea, 22-23 May, 2014
Embedded SW Platform Trends
Young-Chang You
Falinux Co., Ltd., Seoul, Republic of Korea
E-mail: frog@falinux.com
Abstract
The appearance of IT devices like wearable device and smart phone has increased the complexity of
embedded software. Plenty of specialized software platforms have been developed and improved to solve the
such complexity. There're also IT trends such as 'cloud', 'Internet of Thing' that had impact on those platforms.
With the advent of HTML5 technology, the embedded devices connected to cloud-based service have been
transplanted and developed on the Web OS platform such as Tizen, Chrome, and Firefox mobile.
The embedded device platforms are laregely classified according to whether they support embedded OS or just
have firmware. The linux kernel is widely used and recognized as de facto standard in the area of embedded
systems apart from aviation, railload, and military industries.
The linux kernel has been actively developed to back up mobile devices. The development of linux embedded
kernel led by communities is now done by the developers of chip vendors. While the ARM processors are mostly
used in the embedded systems, the uses of them have been increasing in the PC-based systems in these days.
The developments of software platforms have necessitated the technologies related to 64-bit, multicores, and
GPU architecture. The 'Open IT' trend spreads drastically in the embedded industry and the most typical area for
it is that of the software platforms for developers. While the traditional developments of embedded tools are
rapidly decreasing, it's a tendency to coalesce into 'Open Source Group'.
As the number of operating devices rapidly increases, the quality control for them is required. A party of
traditional software platforms to address it have been introduced in developemnts of embedded systems. Now the
embedded software platforms aren't only specialized in embedded systems, but being developed with them
intimately connected to other IT areas.
Keywords: Embedded, Software, Platform,Trend
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
161
2014 International Symposium on Embedded Technology
Embedded
SW Platform Trends
Youngchang You(CEO FALINUX Co., Ltd.)
ISET 2014
Embedded Operating System
 Linux Kernel
 Leading By Chip Vendor
 Big Vs Small
 Real Time Vs General
 Power Of Open Source Group
162 ISET 2014
Seoul, Korea, 22-23 May, 2014
AR Service Platform Technology Trend
Chuwhan Kim
QUALCOMM KOREA, Inc.
Sr. Director, Business Development
chkim@qti.qualcomm.com
Abstract
Augmented reality (AR) allows computer-generated content to be superimposed over a live camera view of
the real world. In the early days of mobile devices, there were many reasons for the fading interest in AR.
Industry quoted numerous technical challenges with limited computing power for recognition, 3D generation, and
lack of compelling use cases.
However, with wide spread of smart mobile devices, AR is becoming an integral part of new digital
environment where users experience digital contents in more intuitive and interactive way. Especially, visionbased AR provides a greatly enhanced user experience by allowing computer graphics to be tightly aligned with
real world objects. It enables developers to build games, extend print and TV media with interactive 3D content,
and create educational applications that bridge the digital and real worlds.
Embracing the next evolutionary computer vision technologies such as off-target tracking, 3D mapping, 3D
object recognition, and even deep learning, AR is creating unprecedented uses cases in various fields of digital
environment.
QUALCOMM’s Vuforia is an AR software platform for Android and iOS that enables users to see images
from a Vuforia target database on the device or in the cloud. When a target is recognized, the app generates
augmented reality experiences, unlocks new functionality and contents.
Table of Contents:
AR platform & technology trend
Global developer adoption
Commercial app growth trend
Vuforia platform overview
AR app Example
What’s coming next
Keywords: Augmented Reality, Image Classification, Service, Platform, Devices
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
163
2014 International Symposium on Embedded Technology
AR Service Platform Trend
Chuwhan Kim (김주한)
QUALCOMM
2014. 5. 23
1
2
164 ISET 2014
Seoul, Korea, 22-23 May, 2014
Open IoT Platform: Mobius
Jaeho Kim
Convergence Emerging Industries R&D Division,
Korea Electronics Technology Institute, Seongnam-si, Republic of Korea
E-mail: jhkim@keti.re.kr
Abstract
The Internet of Things (IoT) is gaining ground in various vertical domains such as healthcare, home
automation and public services. Since IoT connects all smart objects and enables them to communicate with each
other, the intelligent services introduced by IoT will provide a huge impact on our everyday life. Additionally,
IoT is expected to create a new ecosystem involving a wide array of players such as device developers, service
providers, software developers, network operators, and service users. This requires an open platform satisfying
all different needs from various stakeholders and providing standardized mechanisms for managing IoT devices.
In this presentation, we introduce an open service framework for the Internet of Things called Mobius1.0. The
Mobius platform is an open IoT implementation realizing true IoT mass market and establishing a global IoT
ecosystem with the worldwide use of IoT devices and softwares. We believe that the Mobius framework will play
a key role in the widespread adoption of the Internet of Things in our everyday life. We also hope that Mobius
opens up endless opportunities to all related stakeholders as well as various vertical domains in the world of
information and communication technologies.
Keywords: Machine-to-Machine communications, Internet of Things, Open platform.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
165
2014 International Symposium on Embedded Technology
ISET 2014
Open IoT Platform: Mobius 1.0
Open IoT Platform: Mobius
2014. 5. 23
Jaeho Kim (jhkim@keti.re.kr)
Korea Electronics Technology Institute
ISET 2014
Open IoT Platform: Mobius 1.0
Agenda
1
Open IoT Platform Overview
2
Open IoT Platform Ecosystem
3
Open IoT Platform (Mobius, &CUBE) Architecture
4
Open IoT Platform Pilot Services
5
Conclusion
1
166 ISET 2014
Seoul, Korea, 22-23 May, 2014
Data-Centric Communication Middleware for CPS based on OMG
DDS
Soo-Hyung Lee
Embedded SW Research Department
ETRI, Daejeon, Republic of Korea
E-mail: soohyung@etri.re.kr
Abstract
Cyber-Physical System (CPS) is a system of integrating cyber computational elements controlling complex
physical elements. Many example of cyber-physical systems can be found in areas of diverse converging domain
such as defense system, intelligent transportation, energy and future manufacturing system. To make CPS system
work successfully, its reliable and continuous communication capability between the elements is essential. But
the operational environment of CPS is heterogeneous, large-scale because CPS system can be a system of
systems. Date-centric communication middleware based on OMG Data Distribution Service (DDS) can be a
alternative for CPS communication platform. In this presentation, CPS characteristics from the viewpoint of data
exchange will be given. A brief overview of DDS will be presented. Finally we present the current development
status of CPS middleware as a conclusion
Keywords: CPS, DDS, Data-centric, Communication, Middleware
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
167
2014 International Symposium on Embedded Technology
Contents
Ⅰ
The Introduction to CPS Middleware
Ⅱ
The Overview of DDS Technology
Ⅲ
Current Status of CPS Middleware
2
168 ISET 2014
Seoul, Korea, 22-23 May, 2014
Trend of SW Platform for Heterogeneous Multi-core system and
OpenSEED Community Activities
Seung-hwa Song
IDIS Co., Ltd
E-mail: sshtel@gmail.com
Abstract
Heterogeneous system architecture today is not early technology trend anymore. This architecture is already
accepted widely in various computer industries such as personal computer and mobile device.
Typical single-core architecture faced to limitation of performance growth in the past and multi-core
architecture era had come decades ago. Early multi-core architecture were basically based on homogeneous
system architecture that gain performance by just adding cores. However, even though each core shows high
performance and it is usable for general purpose, many-core architecture is not easily accepted for many domains
except server clustering industry because of its price. Furthermore, end-user devices like PC or mobile phone
require more various particular tasks rather than a few performance-oriented tasks. One of the needs is graphic
processing which drives development of GPU. Many heterogeneous systems utilize CPU and GPU usually on the
same silicon chip.
Multi-core era also saw some interesting developments with advances of GPU. Since GPUs have parallel
vector processing capabilities that enable them to compute large sets of data, people tried to utilize them for
general purpose computation beyond graphic processing. And even parallel processing consumed much lower
power relative to similar works on CPUs. Although GPUs have definite advantages above, vector processing is
not always good answer. CPUs are still better for certain problems and we cannot dump typical abundant
software libraries and solutions. This is because CPU-GPU coupled architecture trend has been risen up.
Heterogeneous system is very sophisticated. Thus software industry faced a truly hard portability issue that
programmers cannot support all different platforms by re-writing code. To overcome this issue, the HSA
Foundation which is open industry standard organization for heterogeneous system was formed. The goal of HSA
is to help system designers integrate different architecture easily and provide advanced approaches and standard
software infrastructure such as compiler and language.
In this presentation, today’s trend of heterogeneous system and its software platform technologies will be
introduced such as CPU-GPU offloading and OpenCL. By these trend changes, there have been many efforts to
improve software platform for heterogeneous system in Korea. Researches driven by the Korean Electronics and
Telecommunications Research Institute, the ETRI, will be introduced. Research works are not only included but
an open source community to try and evaluate software technologies developed by the ETRI also organized and
its activities will be introduced too.
Keywords: Heterogeneous system architecture, CPU-GPU offloading, OpenCL, OpenSEED
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
169
2014 International Symposium on Embedded Technology
Trend of SW Platform for
Heterogeneous Multi-core system and
OpenSEED Community Activities
Seung-hwa Song
Content
• Era of multi-core system and its advances
• Software platform trend for heterogeneous
system
• CPU-GPU offloading issues and related
researches by ETRI
• OpenSEED activities
170 ISET 2014
The 9th
International Symposium
on Embedded Technology
Invited Session B: DGIST
14:40-16:00, May 23, 2014
CPS & Wellness
Chair : Kyouho Lee (Inje Univ., Professor)
NO
1
2
3
4
Invited Session
Noise induced Tracking Error in Systems with Saturating Actuators. .....................................................................173
Yongsoon Eun(DGIST, Professor)
Networking and Applications for Vehicular Cyber-Physical Systems......................................................................175
Jaehoon (Paul) Jeong(Sungkyunkwan Univ., Professor)
Recent Trends and Issues of Wellness Human-care System.......................................................................................177
Jae Sung Choi(DGIST, Senior Research Engineer)
Wearable Cyber-Physical Systems. ..................................................................................................................................179
Taejoon Park(DGIST, Professor)
Seoul, Korea, 22-23 May, 2014
Noise Induced Tracking Error in Systems with Saturating Actuators
Yongsoon Eun
Information and Communication Engineering
Daegu Gyeongbuk Institute of Science and Technology
Daegu, Republic of Korea
E-mail: yeun@dgist.ac.kr
Abstract
This paper is devoted to a recently discovered phenomenon that takes place in feedback systems with
saturating actuators, proportional-integral control, and anti-windup. Namely, in such systems, measurement noise
induces steady state error in step tracking, which is incompatible with the standard error coefficients. We
quantify this phenomenon using stochastic averaging theory and show that the noise induced loss of tracking
occurs only if anti-windup is present. An indicator that predicts this phenomenon is derived, and a rule-of-thumb,
based on this indicator, is formulated. An illustration using a digital printing device is provided. As control
systems constitute a substantial part of cyber physical systems, the results are expected to benefit analysis and
synthesis of cyber physical systems.
Keywords: control systems, saturating actuators, measurement noise, anti-windup.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
173
2014 International Symposium on Embedded Technology
2014 International Symposium on
Embedded Technology (ISET)
Noise Induced Tracking Error in Systems with
Saturating Actuators
2014. 05. 23
Yongsoon Eun
DGIST
Outline
1. Introduction
2. Problem Formulation
3. Analysis
3.1 Application of stochastic averaging
3.2 Analysis of Noise Induced Tracking Errors
4. Indicators for Noise Induced Tracking Error
5. Control Systems Design using Noise Induced Tracking Error Indicator
5.1 Xerographic toner concentration control
5.2 CPU Temperature control
6. Conclusions
2
174 ISET 2014
Seoul, Korea, 22-23 May, 2014
Networking and Applications for Vehicular Cyber-Physical Systems
Jaehoon (Paul) Jeong
Department of Software
Sungkyunkwan University, Suwon, Republic of Korea
E-mail: pauljeong@skku.edu
Abstract
This paper introduces networking and applications for Vehicular Cyber-Physical Systems (VCPS) for smart
road services. First, this paper defines VCPS as systems that are integrated by Physical Systems in road networks
and Cyber Systems in vehicular cloud via wireless and wired communications. This VCPS can provide drivers
and pedestrians with the following smart road services: (i) Driving safety (e.g., accident avoidance and pedestrian
detection), (ii) Driving efficiency (e.g., intelligent navigation and road condition sharing), and (iii) Data services
(e.g., location-based services and entertainment). Second, this paper introduces mobile applications for VCPS
smart services: (i) Road condition monitoring, (ii) Participatory crowd monitoring, (iii) Smart road-screen service,
(iv) Green vehicle speed control, and (v) Safe-driving assistant. Third, this paper explains mobile networking in
vehicular networks, consisting of Infrastructure-to-Vehicle (I2V) and Vehicle-to-Infrastructure (V2I)
communications. This paper articulates VCPS characteristics for vehicular networking design, such as
predictable vehicle mobility, road network layout, vehicular traffic statistics, and vehicle trajectory. It then
explains research topics in vehicular networks, such as unicast, multicast, and infrastructure deployment. Last,
this paper introduces ongoing VCPS research projects at SKKU CPS laboratory, such as smart navigation system
(i.e., Self-Adaptive Interactive Navigation Tool, SAINT) and vehicular MAC protocol (i.e., Trajectory-based
Media Access Control, TMAC) for the driving efficiency and safety in road networks, respectively.
Keywords: Vehicular Cyber-Physical Systems, Vehicular Networks, Smart Road, Trajectory, Navigation.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
175
2014 International Symposium on Embedded Technology
Networking and Applications for
Vehicular Cyber-Physical Systems
Jaehoon (Paul) Jeong
pauljeong@skku.edu
CPS Lab: http://cpslab.skku.edu/
Contents
Vehicular Cyber-Physical Systems (VCPS)
 Mobile Applications for VCPS
 Mobile Networking in Vehicular Networks
 VCPS Research Projects at SKKU CPS Lab
 Conclusion

176 ISET 2014
Seoul, Korea, 22-23 May, 2014
Recent Trends and Issues of Wellness Human-care System
Jae Sung Choi
DGIST
Wellness Convergence Research Center
E-mail: jschoi@dgist.ac.kr
Abstract
Wellness is a continuous process to keep individuals’ physical, spiritual, environmental, occupational, and
emotional health. It is a method of life towards health optimization and optimized well-being status. For better
life for human being, wellness human care monitoring system using wired/wireless sensors is a shapely growing
research application in recent years. Recent technologies already offer the possibility and efficiency in smart
healthcare systems to autonomous monitoring feature of patient’s activity and body signal measurement. This
presentation will address recent trends of Wellness and Healthcare system in EU, North-America, and Korea.
Also I discuss about the necessity and possibility of wellness human care system with several expected issues.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
177
2014 International Symposium on Embedded Technology
Recents Trends and Issues of Wellness Human-care System
Daegu Gyeongbuk Institue of Science and Technology
Wellness Convergence Research Center
Jae Sung Choi, Ph.D
2015.05.23
Contents
Vehicular Cyber-Physical Systems (VCPS)
 Mobile Applications for VCPS
 Mobile Networking in Vehicular Networks
 VCPS Research Projects at SKKU CPS Lab
 Conclusion

178 ISET 2014
Seoul, Korea, 22-23 May, 2014
Wearable Cyber-Physical Systems
Taejoon Park
DGIST
Associate Professor, Associate Director of CPS Global Center
Department of Information and Communication Engineering
E-mail: tjpark@dgist.ac.kr
Abstract
Cyber-physical systems (CPS), often referred to as 21st century embedded systems, are emerging as a new
research field that will play a key role in the creative convergence of computer and network science with such
diverse industries as consumer electronics, communications, healthcare, automotive, transportation systems,
aerospace, energy, manufacturing, national infrastructure, and so on. In this talk, after making a brief introduction
to CPS, we present our ongoing research on wearable CPS, which focuses on how to minimize the energy
consumption for wearable and mobile devices with negligible negative impact on smartness, accuracy, reliability
and safety. We explain what we have done so far and what we are planning to do for the development of, e.g.,
energy-efficient body area networking, approximate computing supporting energy-accuracy tradeoffs, and
wearable applications such as mobile point-of-care testing.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
179
2014 International Symposium on Embedded Technology
ISET 2014
Wearable Cyber-Physical
Systems
2014. 5. 23
Taejoon Park
Dept. of Information and Communication Engineering
Contents
1
CPS Overview
2
CPS for Wearable Smart Devices
3
Our Approaches
4
Summary
2
180 ISET 2014
The 9th
International Symposium
on Embedded Technology
Invited Session C: GNU & KAI
14:40-16:00, May 23, 2014
IMA Systems for Next Generation of Aircraft and Its
Applications
NO
Chair : Yong-Kee Jun (Gyeongsang Nat’l Univ., Professor)
Invited Session
1
2
3
4
Design of Software Configuration Tool for Integrated Modular Avionics. .............................................................185
Eu-Teum Choi(Gyeongsang Nat’l Univ., Student)
Design of Development Environment to Support Detecting Races in Airborne Software. ...............................185
Sun-Sook Kim(Suresoft Technologies Inc., Researcher)
Switching Video Technologies for Next Generation of IMA Systems.......................................................................187
Sang-cheul Lee(Intellics Inc., Department Manager)
A Study on Feasible Configuration of AFDX Networks in Avionics Systems..........................................................189
Kyong Hoon Kim(Gyeongsang Nat’l Univ., Professor)
Seoul, Korea, 22-23 May, 2014
Design of Software Configuration Tool for Integrated Modular
Avionics
Eu-Teum Choi*, OK-Kyoon Ha†, Young-Kee Jun*
*
Department of Informatics
Gyeongsang National University, Republic of Korea
E-mail: slateblue33@naver.com, jun@gnu.ac.kr
†
Engineering Research Institute
Gyeongsang National University, Republic of Korea
E-mail: jassmin@gnu.ac.kr
Abstract
ARINC 653 specification has been developed as a standardized interface definition of real-time operating
system to simplify the development of Integrated Modular Avionics (IMA). The ARINC 653 provides a strict
and robust time and space partitioning to guarantee the reliability of avionics by isolating the failures of the
system. Configuration data for the time and space partitions in ARINC 653 can be defined as the XML
configuration file(s) that can be accessed only by system OS. Requirements for an IMA system are integrated to
the configuration data which bases on XML schema of the ARINC 653 standard. However, it is quite tedious
activity to check the syntax errors of XML and the integrity of partition scheduling during the integrating tasks.
Moreover, existing configuration tools, which employ general purpose editing tool, do not provide any function
to verify the static errors of XML and the integrity of input data for partitioning such as the allocation of
resources and the scheduling of applications. In this paper, we present a configuration tool that provides
generating the basic configuration data for IMA based on XML Scheme of the ARINC 653 standard. Our tool
also provides Partition Editor which verifies the integrity of partitioning with graphic user interface (GUI) by
analyzing the input data of partitions.
Keywords: Integrated Modular Avionics, Integrated Development Environment, ARINC 653,
configuration data, verification
References
[1] Airlines electronic engineering committee (AEEC), Avionics Application Software Standard Interface –
ARINC 653-part 1 (Supplement 2 – Required Services), ARINC Inc., 2006.
[2] J. Rufino, S. Filipe, M. Coutinho, S. Santos, and J. Windsor, “ARINC 653 Interface in RTEMS”, In
proceedings of the Data Systems In Aerospace, June, 2007.
[3] P. J. Prisaznuk, “ARINC 653 role in Integrated Modular Avionics (IMA)”, In proceedings of the 27th Digital
Avionics Systems Conference (DASC), pp. 1.E.5-1 - 1.E.5-10, October, 2008.
[4] O.-K. Ha, G. M. Tchamgoue, J. Suh, and Y. Jun, “On-the-fly Healing of Race Conditions in ARINC 653
Flight Software”, In proceedings of the 29th Digital Avionics Conference (DASC), pp. 5.A.6-1 - 5.A.6-11,
October, 2010.
[5] G. M. Tchamgoue, L. Gan, O.-K. Ha, S. Yang, and Y. Jun, “ Visualizing concurrency faults in ARINC 653
Real Time Applications”, In proceedings of the 31st Digital Avionics Systems Conference(DASC), pp. 9E6-1
– 9E6-9, October, 2012.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
183
2014 International Symposium on Embedded Technology
•
Federated and Integrated Modular Avionics
Federated
IMA
Advantages
Advantages
• High performance
• Independence of design and
certification
• Well-understood methodology
• Established supply chain
•
•
•
•
Lower SWaP requirements
Better software reuse, refresh
Better portability, modularity
More efficient platform
certification
Challenges
Challenges
• Greater size, weight, and power
(SWaP) requirements
• Less software reuse
• Less portability, less modularity
• Cannot scale into larger platforms
Flight
Control
Radar
Display
Avionics Bus
(MIL STD 1553, ARINC 429, TTEternet…)
• Greater complexity of system
integration
• Greater complexity of design and
certification
• Less experienced supply chain
Flight
Control
Radar
Display
Time and space partitioning
ARINC 653 Operating System
2
184 ISET 2014
Seoul, Korea, 22-23 May, 2014
Design of Development Environment to Support Detecting Races in
Airborne Software
Sun-Sook Kim*, OK-Kyoon Ha†, Young-Kee Jun‡
*
Suresoft Technologies Inc.
E-mail: sun@suresofttech.com
†
Engineering Research Institute
Gyeongsang National University, Republic of Korea
E-mail: jassmin@gnu.ac.kr
‡
Department of Informatics
Gyeongsang National University, Republic of Korea
E-mail: jun@gnu.ac.kr
Abstract
There is increasingly need to concurrency programs to improve the performance of software for airborne
systems and equipment, since the high-performance IMA (Integrated Modular Avionics) based on multi-core
architectures was introduced. Data races which are most notorious class of concurrency bugs in parallel programs,
may occur unintended results of applications, and they cause unintended system behavior or system fault.
Therefore, we must verify data races to certify the parallel programs for airborne software which requires the
strict safety and the reliability. Unfortunately, existing IDEs (Integrated Development Environments) does not
verify where the existence of data races ran with an execution of parallel programs. It means that we need
additional tools to verify credibility of a data race free from an execution of parallel programs. This paper
presents an analysis tool that supports detecting data race based on existing IDE for airborne software. We
designed the tool using UML (Unified Modeling Language) as a plug-in for Eclipse IDE which is widely used for
developing airborne software. We verified our design by analyzing four important properties for each state,
termination, precision, effectiveness and I/O. Empirical results show that the run-time overhead of our dynamic
tool is moderate enough for practical use by IDE user.
Keywords: Integrated Modular Avionics, Integrated Development Environment, data races, verification
References
[1] S. Kim, O. Ha, Y. Jun, "Parallel Programming for Multi-core Avionics", In Proceedings of the 2010
International Conference on Advanced Aircraft Technologies (ICAAT 2010), pp. 81-82, 2010.
[2] O. Ha, G. Tchamqoue, J. Suh, and Y. Jun, “On-the-fly Healing of Race Conditions in ARINC-653 Flight
Software”, In Proceedings of Digital Avionics Systems Conference (DASC 2010), pp. 238-246, 2010.
[3] Wind River, Workbench http://www.windriver.com/products/workbench/, 2013.
[4] Green Hills, Multi http://www.ghs.com/products/MULTI_IDE.html/, 2013.
[5] Lynux Works, Luminosity http://www.lynuxworks.com/products/eclipse/luminosity.php/, 2013.
[6] MDS Technology, NEOS IDE http://www.mdstec.com/, 2013.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
185
2014 International Symposium on Embedded Technology
Contents
I. Background
I.
Airborne Software and Development Environment
II. Data Races in Airborne Software
III. Problem of Existing IDEs
II.Substance of Research
I. Data Races Detection Environment : SUN-RACE
II. Verification of Design
III. Result of Research
I. Implementation and Experimentation
II. Conclusion
Sun Sook Kim
186 ISET 2014
2
2014-04-28
Seoul, Korea, 22-23 May, 2014
Switching Video Technologies for Next Generation of IMA System
Sang-cheul Lee
R&D team, Intellics,Inc.
E-mail: brad@intellics.co.kr
Abstract
The contribution of this paper is to describe switching video technologies in IMA system. Because of growth
up the MFD ability, there is no analog primary indicator. This means that mission computers may connect to
MFD with Level A rather than Level B. Therefore, we have to consider the system safety, such as redundancy,
for any Level A mission computer. This paper gives how to configure the video switching and safety for IMA
systems.
Keywords: IMA, Video switching
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
187
2014 International Symposium on Embedded Technology
Switching Video Technologies for
Next Generation of IMA System
2014. 05. 23
Contents
•
•
•
•
Traditional Mission Computer
Federated vs. IMA
Switching Video Display Computer
Conclusion
188 ISET 2014
Seoul, Korea, 22-23 May, 2014
A Study on Feasible Configuration of AFDX Networks in Avionics
Systems
Dongha An, Kyung-Chul Choi, Kyong Hoon Kim, Ki-Il Kim
Department of Informatics
Gyeongsang National University, Jinju, Republic of Korea
E-mail: {dhan, blank, khkim, kikim}@gnu.ac.kr
Abstract
As recent aircrafts consist of a lot of components or units due to increased requirements and functionalities,
high-speed network systems are also required in aircraft systems. In order to meet both real-time and highbandwidth network capabilities, AFDX (Avionics Full Duplex Switched Ethernet) networks have been proposed
as a Part 7 in ARINC 664 standard. Much recent work has focused on the system analysis of AFDX networks
including end-to-end delays and worst-case latencies by using queuing networks, network calculus, or model
checking. However, only a few studies have been done on the problem of AFDX configuration such as BAG
(Bandwidth Allocation Gap) and MTU (Maximum Transmission Unit). In this work, we define a problem of
feasible configuration of BAG and MTU in a single AFDX switch and provide an algorithm to solve the problem.
The proposed problem can be extended to a problem of configurations of multiple AFDX switches in avionics
systems.
Keywords: Avionics, AFDX, Real-time, Optimal configuration.
The 9th International Symposium on Embedded Technology, Seoul, Korea
1
189
2014 International Symposium on Embedded Technology
2014 International Symposium on Embedded
Technology (ISET 2014)
A Study on Feasible
Configuration of AFDX Networks
for in Avionics Systems
Dongha An, Kyung-Chul Choi, Kyong Hoon Kim, Ki-Il Kim
Department of Informatics
Gyeongsang National University
South Korea
Real-Time Systems Laboratory
@
Contents
 Introduction
 Avionics, IMA, AFDX
 Virtual Link in AFDX
 System Model
 Virtual Link Model
 Parameters and Constraints of VLs
 Problem Definition
 The Proposed Solution
 Part 1: Schedulable BAG and MTU Pairs of a VL
 Part 2: Feasible BAG and MTU of VLs
 Performance Evaluation
 Conclusions
A Study on Feasible Configuration of AFDX Networks in Avionics Systems
190 ISET 2014
2
Seoul, Korea, 22-23 May, 2014
Memo
191
2014 International Symposium on Embedded Technology
Memo
192 ISET 2014
Seoul, Korea, 22-23 May, 2014
Memo
193
2014 International Symposium on Embedded Technology
Memo
194 ISET 2014