Spelling suggestions: "subject:"coc"" "subject:"ooc""
1 |
Low cost test for core-based system-on-a-chipGonciari, Paul Theo January 2003 (has links)
The availability of high level integration leads to building of millions of gates systemson- a-chip (SOC). Due to the high complexity of SOCs, testing them is becoming increasingly difficult. In addition, if the current test practises are maintained, the high cost of test will lead to a considerable production cost increase. To alleviate the test cost problem, this research investigates methods which lead to low-cost test of core-based systems-on-a-chip based on test resource partitioning and without changing the embedded cores. Analysing the factors which drive the continuous increase in test cost, this thesis identifies a number of factors which need to be addressed in order to reduce the cost of test. These include volume of test data, number of pins for test, bandwidth requirements and the cost of test equipment. The approaches proposed to alleviate the cost of test problem have been validated using academic and industrial benchmark cores. To reduce the volume of test data and the number of pins for test, the new Variablelength Input Huffman Coding (VIHC) test data compression method is proposed, which is capable of simultaneously reducing the volume of test data, the test application time and the on-chip area overhead, when compared to previously reported approaches. Due to the partitioning of resources among the SOC and the test equipment, various synchronisation issues arise. Synchronisation increases the cost of test equipment and hence limits the effectiveness of test resource partitioning schemes. Therefore, the synchronisation issues imposed by test data compression methods are analysed and an on-chip distribution architecture is proposed which in addition to accounting for the synchronisation issues also reduces the test application time. The cost of test equipment is related to the amount of test memory, and therefore efficient exploitation of this resource is of great importance. Analysing the memory requirements for core based SOCs, useless test data is identified as one contributor to the total amount of allocated memory, leading to inefficient memory usage. To address this problem a complementary approach to test data compression is proposed to reduce the test memory requirements through elimination of useless test data. Finally, a new test methodology is proposed which combines the approaches proposed in this thesis into an integrated solution for SOC test. The proposed solution leads to reduction in volume of test data, test pins, bandwidth requirements and cost of test equipment. Furthermore, the solution provides seamless integration with the design flow and refrains from changing the cores. Hence, it provides a low-cost test solution for corebased SOC using test resource partitioning.
|
2 |
Modeling a Security Operations Center / Modellering av ett Security Operations CenterTannous, Mario, Ayhan, Emre January 2022 (has links)
Security breaches caused by hackers are a significant issue for businesses. This illustrates the need for protection against these attacks. Using a Security Operations Center (SOC) solution to detect attacks against ones corporation is an essential step in doing that. How should businesses deploy their SOC? This thesis compares traditional and modern SOC both by means of a literature study and hands-on experimentation, to evaluate which approach is appropriate for the current situation. The SOC solutions were set up to monitor a simulated office environment, using only free, open-source software. This thesis sheds light on both subtle and significant differences betweenthe two solutions. This thesis also concludes that the time for establishing a traditional SOC has passed. The advantages of utilizing a virtual SOC and its accompanying tool sare too significant to ignore. / Dataintrång orsakade av hackare är ett stort problem för företag. Detta belyser vikten av att ha skydd mot attacker. Användning av en SOC (Security Operations Center) lösning för att upptäcka attacker är ett viktigt steg i denna process. Hur bör företag implementera sin SOC lösning? Denna rapport jämför traditionella och moderna lösningar genom delvis litteraturstudie och sedan ett laborativt moment, för att slutligen komma fram till vilken lösning som passar dagens företag. SOC lösningarna implementerades i syfte att övervaka en simulerad kontorsmiljö. Endast gratis programvara medöppen källkod användes. Rapporten belyser både subtila och större skillnader mellan de två lösningarna. I rapporten framgår slutsatsen att det traditionella sättet att ta fram en SOC lösning på är förlegat. Fördelarna med moderna lösningar och dess tillhörandeverktyg är för omfattande för att inte dra nytta av.
|
3 |
Känsla av sammanhang : En studie kring äldre ensamboendes välmåendeSundeson, Lisa, Wilhelmsson, Sofia, Brard, Johanna January 2009 (has links)
<p>ABSTRACT Introduction: This study is based on Aantonovskys SOC-theory; Sense of Coherence. SOC can be described as a theory which describes how a person experience her existence and the theory is based on three key expressions; comprehensibility, manageability and meaningfulness. Aim: The aim of the study is to examine a group of elderly (>80 years) men and women who live alone to investigate how many percent of the group that estimate a high value of SOC. The study aims to investigate which factors contribute to the fact that a person achieve a high value of SOC and increase the understanding about how these factors concretely can appear in a persons life. Methods: Questionnaire (SOC scale) and Interviews. Results: Out of 59 questionnaires, 10 were answered completely. The 10 answers were represented equally of 50 % women and 50% men. Three persons out of ten (30%) estimated a high SOC (>160p). From the answered questionnaires, the 6 representatives with the highest estimated SOC were chosen for participating in interviews. The chosen people hade an estimated SOC-value between 132 and 177 points. The content from the interviews were analyzed and seven different subcategories were found consisting of common factors that had contributed to a high value of SOC. The subcategories were; relations, childhood, belief, conditions, career, occupation and experiences. Afterwards the subcategories were re-established to the three key-expressions; comprehensibility, manageability and meaningfulness. Conclusions: The number of answered questionnaires in the investigation was unexpected very low and therefore the result is only to be applied as an example of the meaning that the procedure have for the result. However the result from the interviews is to be considered as possible to transmit into the work with elderly in healthcare. The result shows how factors that contribute to good health can be expressed in elderly peoples life. This makes it easier for the nurse to take care of and illuminate these factors and to work from a salutogenetic perspective.</p>
|
4 |
Känsla av sammanhang : En studie kring äldre ensamboendes välmåendeSundeson, Lisa, Wilhelmsson, Sofia, Brard, Johanna January 2009 (has links)
ABSTRACT Introduction: This study is based on Aantonovskys SOC-theory; Sense of Coherence. SOC can be described as a theory which describes how a person experience her existence and the theory is based on three key expressions; comprehensibility, manageability and meaningfulness. Aim: The aim of the study is to examine a group of elderly (>80 years) men and women who live alone to investigate how many percent of the group that estimate a high value of SOC. The study aims to investigate which factors contribute to the fact that a person achieve a high value of SOC and increase the understanding about how these factors concretely can appear in a persons life. Methods: Questionnaire (SOC scale) and Interviews. Results: Out of 59 questionnaires, 10 were answered completely. The 10 answers were represented equally of 50 % women and 50% men. Three persons out of ten (30%) estimated a high SOC (>160p). From the answered questionnaires, the 6 representatives with the highest estimated SOC were chosen for participating in interviews. The chosen people hade an estimated SOC-value between 132 and 177 points. The content from the interviews were analyzed and seven different subcategories were found consisting of common factors that had contributed to a high value of SOC. The subcategories were; relations, childhood, belief, conditions, career, occupation and experiences. Afterwards the subcategories were re-established to the three key-expressions; comprehensibility, manageability and meaningfulness. Conclusions: The number of answered questionnaires in the investigation was unexpected very low and therefore the result is only to be applied as an example of the meaning that the procedure have for the result. However the result from the interviews is to be considered as possible to transmit into the work with elderly in healthcare. The result shows how factors that contribute to good health can be expressed in elderly peoples life. This makes it easier for the nurse to take care of and illuminate these factors and to work from a salutogenetic perspective.
|
5 |
Exploration of Multiple ICE¡¦s for Embedded Microprocessor Cores in an SOCKao, Chung-Fu 21 August 2000 (has links)
SOC (System-On-Chip) designs are more and more popular, concurrently, more and more new challenges system integrators will meet. One out of these challenges is testing problem. Our research is focus on how to testing and debugging the microprocessor cores that embedded in an SOC. Not only test the microprocessor cores but also test the interconnecting wire among these embedded microprocessor cores. This thesis explores architectural alternatives in the integration of embedded in-circuit emulation (ICE) into an SOC chip with multiple micro-controller/processor cores. The alternatives include distributed, centralized and hierarchical styles. Advantages and disadvantages of these alternatives are analyzed.
|
6 |
COMPARISON OF SINGLE-PORT AND MULTI-PORT NoCs WITH CONTEMPORARY BUSES ON FPGAsBHATTACHARYA, PRASUN 20 July 2006 (has links)
No description available.
|
7 |
Tecnologias system on chip e CAN em sistemas de controle distribuído / System on chip and CAN technologies into distributed control systemsYabarrena, Jean Mimar Santa Cruz 23 May 2006 (has links)
Sistemas de controle precisam trabalhar com restrições temporais rigorosas para garantir seu correto funcionamento, sendo por isso considerados sistemas de tempo-real. Quando tais sistemas são distribuídos, as redes de sensores, atuadores e controladores estão interligados em geral, por redes de campo. Nesse contexto, as redes de campo desempenham um papel extremamente importante no comportamento global do sistema. O presente trabalho de pesquisa apresenta a descrição do processo de desenvolvimento de um system on-chip (SoC) para um sistema de controle. Diferentemente das abordagens clássicas, o trabalho está focado em implementar o sistema baseado em um paradigma diferenciado, baseado em lógica reprogramável. Apresenta-se o projeto e construção dos IP cores necessários para controlar um motor DC, utilizando o barramento control area network (CAN) para obter uma plataforma distribuída. A arquitetura on chip utilizada está baseada na especificação CoreConnect da IBM. São expostos, ainda, trabalhos de simulação tanto dos componentes isolados, como do sistema integrado, de forma a realizar uma comparação qualitativa do processo de desenvolvimento / Control systems require strict time constraints to work properly, being therefore considered real-time systems. When such systems are distributed, controllers, sensors, and actuators are generally interconnected by fieldbuses. In this context the fieldbuses play an important role in the system global behavior. This research presents the description of the development process of a system-on-chip SoC. Differentiated from the classical approaches, this work focus the implementation of a reprogrammable logic based system. This work explain the necessary IP cores implementation, allowing a DC motor control, using a control area network (CAN) bus to reach a distributed platform. The on-chip architecture used is based on the IBM CoreConnect specification. Moreover it shows isolated components and integral system simulations, in such a way to obtain a qualitative comparison of development processes
|
8 |
Une démarche de conception et d'implémentation de la protection de la vie privée basée sur le contrôle d'accès appliquée aux compositions de services / Design and Implementation of privacy in service compositionsFaravelon, Aurélien 02 December 2013 (has links)
La vie privée et sa protection sont aujourd'hui largement discutées. Membres de la société civile, juristes ou encore techniciens, nous sommes tous appelés à nous emparer d'une notion que l'on nous présente à la fois comme menacée, désuète ou appartenant à nos libertés fondamentales. Aujourd'hui, les controverses autour de la protection de la vie privée ont pour origine des usages techniques. L'informatisation des fichiers étatiques et les possibilités accrues de surveillance issues des innovations en informatique et, plus récemment, les « usages sociaux » des outils numériques comme les « réseaux sociaux », provoquent de vives réactions. Pourtant, le recours à cette notion, notamment pour protéger les libertés individuelles, est-il complètement satisfaisant alors que, d'une part, les outils à l'origine de sa mise en question suscitent un large engouement, et que, d'autre part, ses contours sont mal définis? Nous adoptons, pour répondre à cette question, une position interdisciplinaire. D'une part, nous enquêtons d'un point de vue philosophique sur la « condition numérique » contemporaine afin d'en saisir les enjeux. Ce faisant, nous établissons que les outils numériques remettent en cause la notion de « frontiére ». Nous montrons simultanément que la possibilité d'une existence séparée est nécessaire pour constituer une subjectivité propre. Se pose alors la question de la mise en pratique d'une telle existence. Nous nous éloignons des approches déontologiques et utilitaristes qui guident actuellement la conception et l'évaluation des outils numériques pour leur préférer une approche fondée sur « l'éthique du souci de soi ». Cette approche nous conduit à établir que le code informatique constitue la structure de la condition numérique et qu'il s'agit de prendre en compte, dés la conception d'une application un ensemble de propriétés, comme la protection de la vie privée. Nous cherchons dans un second temps à aider les concepteurs d'applications à concevoir au mieux et à réaliser des applications qui permettent de protéger la vie privée des utilisateurs et des possesseurs des données. Notre domaine d'application est l'approche orientée services qui est aujourd'hui un largement utilisée. Nous nous concentrons sur son utilisation pour la réalisation d'applications à partir de compositions de services dynamiques et hétérogènes. Nous cherchons à protéger la vie privée à l'aide du contrôle d'accès. Pour ce faire, nous proposons de configurer les propriétés de contrôle d'accès des services au moyen d'une démarche dirigée par les modèles divisée en deux étapes. Au niveau conception, la composition et la politique de contrôle d'accès à un niveau abstrait sont spécifiées par des experts dédiés. Nous estimons que le contrôle d'accès doit être pris en compte dés la conception de l'application afin d'éviter le recours à la programmation manuelle. En rester à un niveau abstrait permet de s'adapter à l'état de la composition et à l'hétérogénéité et au dynamisme des services. Au niveau exécution, notre architecture permet de configurer les services concrets au moyen de proxies responsables de l'exécution du contrôle d'accès. Des transformations de modèles vers textes automatisées permettent de passer d'un niveau à l'autre afin de s'abstraire de la programmation manuelle et de garantir la protection des services concrets par les proxies. Notre approche a été validée par la réalisation d'un prototype et son utilisation sur un cas d'application. / Privacy is hot topic. Lawyers, technicians and plain people are all concerned by this notion. Nowadays, most discussions focus on the effects of digital tools, such as social media or surveillance software. However, privacy is still ill-defined. Moreover, digital tools which endanger privacy are widely used. Should not we leave privacy aside and accept that we are, maybe more than ever, visible ?In this doctoral thesis, I address this question from a twofold viewpoint. I first inquire into the nature of our digital condition from a philosophical standpoint. I claim that digital artifacts rework the implementation of our frontiers, be them geographical or social. However, I contend that such frontiers are necessary. As I show that code defines the structure and the effects of digital tools, I point out that properties such as privacy management should be addressed right from the conception of software applications.Helping out designers to address such properties is the second issue I tackle. I focus on Service-Oriented Computing as it is a widely used paradigm. Most speci- fically, I deal with the composition of heterogenous and dynamic services. I define access control as an efficient mechanism to protect privacy and I propose a twofold generative approach to secure services compositions. The composition and its access control policies are separately defined at an abstract level. An expert is responsible for each of them. As we promote an abstract description of the application, we free the designer from technical complexity. At runtime, we propose an architecture which selects and protects the actual services by hiding them behind proxies which run the access control policy. Automated model transformations permit to generate the application from its specification. We thus bypass manual programming. We have implemented a modeling and execution environment and applied our approach to a use case in order to validate our work.
|
9 |
Tecnologias system on chip e CAN em sistemas de controle distribuído / System on chip and CAN technologies into distributed control systemsJean Mimar Santa Cruz Yabarrena 23 May 2006 (has links)
Sistemas de controle precisam trabalhar com restrições temporais rigorosas para garantir seu correto funcionamento, sendo por isso considerados sistemas de tempo-real. Quando tais sistemas são distribuídos, as redes de sensores, atuadores e controladores estão interligados em geral, por redes de campo. Nesse contexto, as redes de campo desempenham um papel extremamente importante no comportamento global do sistema. O presente trabalho de pesquisa apresenta a descrição do processo de desenvolvimento de um system on-chip (SoC) para um sistema de controle. Diferentemente das abordagens clássicas, o trabalho está focado em implementar o sistema baseado em um paradigma diferenciado, baseado em lógica reprogramável. Apresenta-se o projeto e construção dos IP cores necessários para controlar um motor DC, utilizando o barramento control area network (CAN) para obter uma plataforma distribuída. A arquitetura on chip utilizada está baseada na especificação CoreConnect da IBM. São expostos, ainda, trabalhos de simulação tanto dos componentes isolados, como do sistema integrado, de forma a realizar uma comparação qualitativa do processo de desenvolvimento / Control systems require strict time constraints to work properly, being therefore considered real-time systems. When such systems are distributed, controllers, sensors, and actuators are generally interconnected by fieldbuses. In this context the fieldbuses play an important role in the system global behavior. This research presents the description of the development process of a system-on-chip SoC. Differentiated from the classical approaches, this work focus the implementation of a reprogrammable logic based system. This work explain the necessary IP cores implementation, allowing a DC motor control, using a control area network (CAN) bus to reach a distributed platform. The on-chip architecture used is based on the IBM CoreConnect specification. Moreover it shows isolated components and integral system simulations, in such a way to obtain a qualitative comparison of development processes
|
10 |
Framework for Reconfigurable Systems on the Altera Chips / Framework for Reconfigurable Systems on the Altera ChipsKremel, Bruno January 2015 (has links)
This work reviews the development frameworks available for the Altera System-On-Chip solutions. These solutions are then compared to solutions available on the Xilinx platform. The RSoC Framework is then presented as an advantageous alternative for the vendor's solutions. This framework is currently available for the Xilinx Zynq platform. Furthermore the work assess the key differences between Xilinx Zynq and Altera Cyclone V SoC platforms and proposes the solution to port the framework to Altera platform. The design and implementation of then RSoC Framework port to Altera Cyclone V SoC is then discussed. Finally the work evaluates the performance of the ported system on the new platform.
|
Page generated in 0.0245 seconds