schedule algorithm
Recently Published Documents


TOTAL DOCUMENTS

60
(FIVE YEARS 18)

H-INDEX

3
(FIVE YEARS 1)

2021 ◽  
Vol 18 (3) ◽  
pp. 172988142110158
Author(s):  
Jingtao Zhang ◽  
Jun Zheng ◽  
Xiaodong Zhang ◽  
Kun Zhang ◽  
Pengjie Xu ◽  
...  

Due to generally limited computing capability of an individual robot, cloud-based robotic systems are increasingly used. However, applications in large-scale multi-robot systems will be hindered by communication congestion and consequent lack of computing resources. In this study, an intern-sufficient cloud is investigated to alleviate the burden of communication and thus support more robots. At the same time, it enables heterogeneously idle computing resources of robots inside the system to be shared on demand, instead of relying on cloud servers and communication infrastructures, to make the scope of application wider. To this end, a hierarchical communication mechanism and a resource schedule algorithm are proposed. In the mechanism, the transmission power, signal-to-noise ratio, available bandwidth, and other relevant features are taken into account to estimate link quality for data transmission. Then, the constrained communication conditions and heterogeneous computing resources are balanced by the resource scheduling algorithm, so that the most appropriate computing resources of the robots are contributed to the mobile cloud. Furthermore, a multitarget navigation task is applied on the cloud to validate the work. Thereby, simulations and experiments are performed. The results show that the proposed intern-sufficient cloud can provide stable resources of communication and computation for a multi-robot system with 20 physical robots while achieving more effective multitarget navigation.


Author(s):  
Wei Guang Hui

In cloud computing environment, how to reasonably carry out the resource scheduling and reduce the task execution time and task execution energy consumption has become a hot issue in the researches. In this paper, the task processing time and energy consumption were used as the optimization objectives, and a Double-Objective Particle Swarm Optimization (DOPSO) was used to perform the optimal scheduling of task completion time and energy consumption. Finally, the results obtained in DOPSO were simulated in CloudSim, and results showed that compared with existing scheduling algorithms, the proposed algorithm (DOPSO) had obvious advantages in the integrated scheduling performance.


Author(s):  
Abdul Alif Zakaria ◽  
A. H. Azni ◽  
Farida Ridzuan ◽  
Nur Hafiza Zakaria ◽  
Maslina Daud

Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2077
Author(s):  
Kai Huang ◽  
Ming Jing ◽  
Xiaowen Jiang ◽  
Siheng Chen ◽  
Xiaobo Li ◽  
...  

Minimizing the schedule length of parallel applications, which run on a heterogeneous multi-core system and are subject to energy consumption constraints, has recently attracted much attention. The key point of this problem is the strategy to pre-allocate the energy consumption of unscheduled tasks. Previous articles used the minimum value, average value or a power consumption weight value as the pre-allocation energy consumption of tasks. However, they all ignored the different levels of tasks. The tasks in different task levels have different impact on the overall schedule length when they are allocated the same energy consumption. Considering the task levels, we designed a novel task energy consumption pre-allocation strategy that is conducive to minimizing the scheduling time and developed a novel task schedule algorithm based on it. After getting the preliminary scheduling results, we also proposed a task execution frequency re-adjustment mechanism that can re-adjust the execution frequency of tasks, to further reduce the overall schedule length. We carried out a considerable number of experiments with practical parallel application models. The results of the experiments show that our method can reach better performance compared with the existing algorithms.


Author(s):  
Hao Guo ◽  
Siwei Sun ◽  
Danping Shi ◽  
Ling Sun ◽  
Yao Sun ◽  
...  

CRAFT is a lightweight tweakable block cipher proposed at FSE 2019, which allows countermeasures against Differential Fault Attacks to be integrated into the cipher at the algorithmic level with ease. CRAFT employs a lightweight and involutory S-box and linear layer, such that the encryption function can be turned into decryption at a low cost. Besides, the tweakey schedule algorithm of CRAFT is extremely simple, where four 64-bit round tweakeys are generated and repeatedly used. Due to a combination of these features which makes CRAFT exceedingly lightweight, we find that some input difference at a particular position can be preserved through any number of rounds if the input pair follows certain truncated differential trails. Interestingly, in contrast to traditional differential analysis, the validity of this invariant property is affected by the positions where the constant additions take place. We use this property to construct “weak-tweakey” truncated differential distinguishers of CRAFT in the single-key model. Subsequently, we show how the tweak additions allow us to convert these weak-tweakey distinguishers into ordinary secret-key distinguishers based on which key-recovery attacks can be performed. Moreover, we show how to construct MILP models to search for truncated differential distinguishers exploiting this invariant property. As a result, we find a 15-round truncated differential distinguisher of CRAFT and extend it to a 19-round key-recovery attack with 260.99 data, 268 memory, 294.59 time complexity, and success probability 80.66%. Also, we find a 14-round distinguisher with probability 2−43 (experimentally verified), a 16-round distinguisher with probability 2−55, and a 20-round weak-key distinguisher (2118 weak keys) with probability 2−63. Experiments on round-reduced versions of the distinguishers show that the experimental probabilities are sometimes higher than predicted. Finally, we note that our result is far from threatening the security of the full CRAFT.


2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Shazia Afzal ◽  
Muhammad Yousaf ◽  
Humaira Afzal ◽  
Nawaf Alharbe ◽  
Muhammad Rafiq Mufti

Key schedule algorithms play an important role in modern encryption algorithms, and their security is as crucial as the security of the encryption algorithms themselves. Many studies have been performed on the cryptographic strength evaluation of the encryption algorithms; however, strength evaluation of the key schedule algorithms often obtains less attention that can lead towards the possible loophole in the overall encryption process. In this paper, a criterion is proposed to evaluate the cryptographic strength of the key schedule algorithms. This criterion includes different methods of data generation from subkeys and a suitable set of statistical tests. The statistical tests are used to explore the cryptographic properties such as diffusion, confusion, independence, and randomness in the subkeys generated by the key schedule algorithm. The proposed criterion has been applied to some of the key schedule algorithms of different block ciphers. The results confirm that the proposed criterion can effectively differentiate between strong- and weak-key schedule algorithms.


Author(s):  
Marco Calderini

The algebraic structure of the group generated by the encryption functions of a block cipher depends on the key schedule algorithm used for generating the round keys. For such a reason, in general, studying this group does not appear to be an easy task. Previous works, focusing on the algebraic properties of groups associated to a cipher, have studied the group generated by the round functions of the cipher considering independent round keys. In this paper, we want to study the more realistic group generated by the encryption functions, where the key schedule satisfies certain requirements. In this context, we are able to identify sufficient conditions that permit to guarantee the primitivity of this group and the security of the cipher with respect to the partition-based trapdoor. This type of trapdoor has been recently introduced by Bannier et al. in 2016 and it is a generalization of that introduced by Paterson in 1999.


Author(s):  
Wei Hu ◽  
Yu Gan ◽  
Yuan Wen ◽  
Xiangyu Lv ◽  
Yonghao Wang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document