Professional Documents
Culture Documents
Qinmin Ma
School of Artificial Intelligence, Shenzhen Polytechnic, Shenzhen, Guangdong, 518055, China
Maqinminshenzhencn1211@gmail.com
Abstract— Design of the high-confidence embedded operating (2) Trusted execution environ ment refers to a trusted,
system based on artificial intelligence and smart chips is studied isolated and independent execution environ ment on the device
in this paper. The cooperative physical layer security system is independent of the untrusted operating system. It provides a
regarded as a state machine. Relay nodes with untrusted secure and confidential space for private data and sensitive
behavior will affect the physical layer security of the system, and computing in the untrusted environment. Its security is usually
the system tries to prevent the untrusted behavior of relay nodes. guaranteed by hardware related mechanisms.
While implementing public verification, it realizes the protection
of data privacy. The third party can directly verify the data The application of game theory to the research of physical
holding of the data stored in the cloud without verification by the layer security has been a research hotspot in recent years. The
user, and in the process of system expansion and growth, main application of game theory to the selection o f the relay
software can ensure vigorous vitality. For the verification, the nodes is that the behavior type of the node is known. In the
smart chips are combined for the systematic implementations. figure 1, the initial structure has been denoted.
The experimental results have shown the satisfactory results.
Authorized licensed use limited to: Indian Institute of Technology- Goa. Downloaded on September 16,2022 at 11:13:35 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Second International Conference on Artificial Intelligence and Smart Energy (ICAIS-2022)
IEEE Xplore Part Number: CFP22OAB-ART; ISBN: 978-1-6654-0052-7
II. T HE PROPOSED MET HODOLOGY which extends the public block The usefulness of the chain
allo ws interaction to occur when needed, but it can still be
A. The High-confidence Embedded System
traced back to a reliab le base layer. In real life, due to profit-
The scalability limitation caused by the consensus protocol driven, malicious users are real. Therefore, when verify ing the
of the blockchain makes the transaction throughput of the possession of data in the cloud, it is necessary to verify the
blockchain low. Whether the transaction throughput can be credibility of the cloud service provider and the cloud user at
then improved is the key issue whether the blockchain can be the same time. Although the existing studies have proposed
widely used. On the one hand, given a modification examp le, models based on public verificat ion, private verification, and
the method parses the code before and after modification into the hybrid verificat ion, they are all aimed at the cloud service
an abstract syntax tree, and finds the correspondence between providers for credib ility verification without considering the
its nodes. Based on the correspondence between nodes, the credibility o f the users. Hence, for the better understanding,
method uses graphs to represent the given core sample code the figure 3 shows the system model.
modification to then enhance the model's ability to captu re the
structural info rmation in the code modification; on the other
hand, the method is effective through the graph convolutional
network and Transformer architecture co mb ining with each
other to enhance the model's ability to capture the dependency
informat ion between codes, especially long-range dependency
relationship. In the figure 2, the structure is defined.
Authorized licensed use limited to: Indian Institute of Technology- Goa. Downloaded on September 16,2022 at 11:13:35 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Second International Conference on Artificial Intelligence and Smart Energy (ICAIS-2022)
IEEE Xplore Part Number: CFP22OAB-ART; ISBN: 978-1-6654-0052-7
embedded train ing system under the core condition that the the main control chip to co mplete the control operation of the
avionics system has been designed. This system uses the Wi- system, including data transfer p rocessing, control and general
Fi network and cellular network that have been fully deployed coordination of various modules to cooperate to complete the
in modern society to transmit the image data that embedded communicat ion work. In this article, the STM 32 main control
devices need to calculate to the cloud. The cloud uses the chip is specifically STM32103ZET6.
deployed server and workstation clusters to perform high - STM32103ZET6 has abundant peripheral resources, which
speed calculations and return results while making full use of greatly simplifies the circuit design work, and also has strong
embedded the features of co mpact equip ment are s mall and signal processing capabilities and anti-interference
suitable for deployment at the front end. In the figu re 4, the
capabilities.
systematic model is defined.
For embedded Ethernet data acquisition system hardware
design and control system respectively, and then based on the
SPI serial interface design imp lementation of the Ethernet data
acquisition system and control system integration, build ing
embedded Ethernet data acquisition and also control system
optimization function, co mp lete the design of the embedded
Ethernet data acquisition and control system. The figrue 6
gives the connection model.
Authorized licensed use limited to: Indian Institute of Technology- Goa. Downloaded on September 16,2022 at 11:13:35 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Second International Conference on Artificial Intelligence and Smart Energy (ICAIS-2022)
IEEE Xplore Part Number: CFP22OAB-ART; ISBN: 978-1-6654-0052-7
[7] He, Jiaji, Haocheng Ma, Yanjiang Liu, and Yiqiang Zhao. "Golden Chip -
Free Trojan Detection Leveraging T rojan T rigger’s Side-Channel
Fingerprinting." ACM Transactions on Embedded Comput ing Systems
(T ECS) 20, no. 1 (2020): 1-18.
[8] Wang, Haoxiang, Zhihui Li, Yang Li, Brij B. Gupta, and Chang Choi.
"Visual saliency guided complex image retrieval." Pattern Recognition
Letters 130 (2020): 64-72.
[9] White, Allan L. "Verifying Autonomous Air Traffic Algorithms in the
Presence of Sensor Error and Flight Perturbations." In 2020 AIAA/IEEE
39th Digital Avionics Systems Conference (DASC), pp. 1-8. IEEE,
2020.
[10] Kadiyala, Sai Praveen, Manaar Alam, Yash Shrivastava, Sikhar
Patranabis, Muhamed Fauzi Bin Abbas, Arnab Kumar Biswas, Debdeep
Mukhopadhyay, and Thambipillai Srikanthan. "LAMBDA: Lightweight
assessment of malware for emBeddeD architectures." ACM
Transactions on Embedded Computing Systems (TECS) 19, no. 4
(2020): 1-31.
[11] Nicole, Olivier, Matthieu Lemerre, Sébastien Bardin, and Xavier Rival.
"Automatically Proving Microkernels Free from Privilege Escalation
from their Executable." arXiv preprint arXiv:2003.08915 (2020).
[12] Ho, Bo-Jhang, Bharathan Balaji, Mehmet Koseoglu, Sandeep Sandha,
Siyou Pei, and Mani Srivastava. "Quick Question: Interrupting Users for
Microtasks with Reinforcement Learning." arXiv preprint
arXiv:2007.09515 (2020).
[13] Hao, Yi, Jie Li, Nannan Wang, and Xinbo Gao. "Modality adversarial
neural network for visible-thermal person re-identification." Pattern
Recognition 107 (2020): 107533.
[14] Kim, Hakbin, and Dong-Wan Choi. "Pool of Experts: Realtime Querying
Fig. 7. T he System Performance Estimation Result Specialized Knowledge in Massive Neural Networks." In Proceedings of
the 2021 International Conference on Management of Data, pp. 2244-
IV. CONCLUSION AND SUMMARY 2252. 2021.
Design of the high-confidence embedded operating system [15] Zhang, Fengxiu, and Eric W. Welch. "More than just managerial self-
efficacy: conceptualizing and predicting top managers' means efficacy
based on artificial intelligence and smart ch ips is studied in about the organization under extreme events." Journal of Managerial
this paper. The embedded Ethernet data have been collected Psychology (2021).
and filtered, wh ich is conducive to its control. Th is paper uses [16] Zhu, Banghua, Jiantao Jiao, and Jacob Steinhardt. "Robust estimation via
fuzzy associative space theory to filter embedded Ethernet generalized quasi-gradients." arXiv preprint arXiv:2005.14073 (2020).
data. The cluster server manages all GPU workstations in the [17] Smys, S., Abul Basar, and Haoxiang Wang. "Hybrid intrusion detection
cluster. It will establish the communication server program, system for internet of Things (IoT)." Journal of ISMAC 2, no. 04 (2020):
and at the same time, the simu lations are conducted to validate 190-199.
the model. The future study will focus on how to imp lement [18] Li, Qian, Yong Qi, Qingyuan Hu, Saiyu Qi, Yun Lin, and Jin Song Dong.
the system with higher complexity. "Adversarial adaptive neighborhood with feature importance-aware
convex interpolation." IEEE Transactions on Information Forensics and
Security 16 (2020): 2447-2460.
REFERENCES
[19] Qiu, Zifeng, Yahan Wang, Feng Gao, Sha Liu, Junkai Zhang, Fuchen
[1] Varela, Carlos A. "Towards Provably Correct Probabilistic Flight Yang, and Yan Hu. "UAV Inspection Technology Based on Lightweight
Systems." In Dynamic Data Driven Applications Systems: Third Edge Computing Framework." In Journal of Physics: Conference Series,
International Conference, DDDAS 2020, Boston, MA, USA, October 2- vol. 2010, no. 1, p. 012155. IOP Publishing, 2021.
4, 2020, Proceedings, vol. 12312, p. 236. Springer Nature, 2020. [20] Zheng, Xiaoming. "Data Collection in Quantitative Research." In
[2] Sun, Chen, and En-Hui Yang. "A Watermarking-Based Framework for Research Methods for Student Radiographers, pp. 79-92. CRC Press,
Protecting Deep Image Classifiers Against Adversarial Attacks." In 2021.
Proceedings of the IEEE/CVF Conference on Computer Vision and [21] Haoxiang, Wang, and S. Smys. "MC-SVM Based Workflow Preparation
Pattern Recognition, pp. 3329-3338. 2021. in Cloud with Named Entity Identification." Journal of Soft Computing
[3] Han, Yanjun, Jiantao Jiao, T sachy Weissman, and Yihong Wu. "Optimal Paradigm (JSCP) 2, no. 02 (2020): 130-139.
rates of entropy estimation over Lipschitz balls." The Annals of [22] Zhong, Boxuan, Rafael Luiz da Silva, Michael Tran, He Huang, and
Statistics 48, no. 6 (2020): 3228-3250. Edgar Lobaton. "Efficient Environmental Context Prediction for Lo wer
[4] Zhang, Kai, Martin Danelljan, Yawei Li, Radu T imofte, Jie Liu, Jie Tang, Limb Prostheses." IEEE Transactions on Systems, Man, and
Gangshan Wu et al. "AIM 2020 challenge on efficient super-resolution: Cybernetics: Systems (2021).
Methods and results." In European Conference on Computer Vision, pp. [23] Qingqing, Li, Jussi T aipalmaa, Jorge Pena Queralta, T uan Nguyen Gia,
5-40. Springer, Cham, 2020. Moncef Gabbouj, Hannu Tenhunen, Jenni Raitoharju, and Tomi
[5] Thomas, Sam L., Jan Van den Herrewegen, Georgios Vasilakis, Zitai Westerlund. "Towards active vision with UAVs in marine search and
Chen, Mihai Ordean, and Flavio D. Garcia. "Cutting Through the rescue: Analyzing human detection at variable altitudes." In 2020 IEEE
Complexity of Reverse Engineering Embedded Devices." IACR International Symposium on Safety, Security, and Rescue Robotics
Transactions on Cryptographic Hardware and Embedded Systems (SSRR), pp. 65-70. IEEE, 2020.
(2021): 360-389. [24] Chiang, Yi-Shyuan, Ruei-Che Chang, Yi-Lin Chuang, Shih-Ya Chou,
[6] Lee, Hyunhoon, Young-Seok Kim, Mijung Kim, and Youngjoo Leeb. Hao-Ping Lee, I-Ju Lin, Jian-Hua Jiang Chen, and Yung-Ju Chang.
"Low-Cost Network Scheduling of 3D-CNN Processing for Embedded "Exploring the design space of user-system communication for smart-
Action Recognition." IEEE Access (2021). home routine assistants." In Proceedings of the 2020 CHI Conference on
Human Factors in Computing Systems, pp. 1-14. 2020.
Authorized licensed use limited to: Indian Institute of Technology- Goa. Downloaded on September 16,2022 at 11:13:35 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Second International Conference on Artificial Intelligence and Smart Energy (ICAIS-2022)
IEEE Xplore Part Number: CFP22OAB-ART; ISBN: 978-1-6654-0052-7
[25] Garg, Mamta, Ajatshatru Arora, and Savita Gupta. "An Efficient Human chest x-rays using Confidence-Aware anomaly detection." IEEE
Identification Through Iris Recognition System." Journal of Signal transactions on medical imaging 40, no. 3 (2020): 879-890.
Processing Systems (2021): 1-8. [27] Zeufack, Vannel, Donghyun Kim, Daehee Seo, and Ahyoung Lee. "An
[26] Zhang, Jianpeng, Yutong Xie, Guansong Pang, Zhibin Liao, Johan unsupervised anomaly detect ion framework for detecting anomalies in
Verjans, Wenxing Li, Zongji Sun et al. "Viral pneumonia screening on real time through network system’s log files analysis." High-Confidence
Computing 1, no. 2 (2021): 100030.
Authorized licensed use limited to: Indian Institute of Technology- Goa. Downloaded on September 16,2022 at 11:13:35 UTC from IEEE Xplore. Restrictions apply.