972 resultados para Manufacturing Execution Systems


Relevância:

30.00% 30.00%

Publicador:

Resumo:

We discuss from a practical point of view a number of issues involved in writing Internet and WWW applications using LP/CLP systems. We describe PiLLoW, an Internet and WWW programming library for LP/CLP systems which we arge significantly simplifies the process of writing such applications. PiLLoW provides facilities for generating HTML structured documents, producing HTML forms, writing form handlers, accessing and parsing WWW documents, and accessing code posted at HTTP addresses. We also describe the architecture of some application classes, using a high-level model of client-server interaction, active modules. Finally we describe an architecture for automatic LP/CLP code downloading for local execution, using generic browsers. The PiLLoW library has been developed in the context of the &-Prolog and CIAO systems, but it has been adapted to a number of popular LP/CLP systems, supporting most of its functionality.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Incorporating the possibility of attaching attributes to variables in a logic programming system has been shown to allow the addition of general constraint solving capabilities to it. This approach is very attractive in that by adding a few primitives any logic programming system can be turned into a generic constraint logic programming system in which constraint solving can be user defined, and at source level - an extreme example of the "glass box" approach. In this paper we propose a different and novel use for the concept of attributed variables: developing a generic parallel/concurrent (constraint) logic programming system, using the same "glass box" flavor. We arge that a system which implements attributed variables and a few additional primitives can be easily customized at source level to implement many of the languages and execution models of parallelism and concurrency currently proposed, in both shared memory and distributed systems. We illustrate this through examples.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article presents in an informal way some early results on the design of a series of paradigms for visualization of the parallel execution of logic programs. The results presented here refer to the visualization of or-parallelism, as in MUSE and Aurora, deterministic dependent and-parallelism, as in Andorra-I, and independent and-parallelism as in &-Prolog. A tool has been implemented for this purpose and has been interfaced with these systems. Results are presented showing the visualization of executions from these systems and the usefulness of the resulting tool is briefly discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The term "Logic Programming" refers to a variety of computer languages and execution models which are based on the traditional concept of Symbolic Logic. The expressive power of these languages offers promise to be of great assistance in facing the programming challenges of present and future symbolic processing applications in Artificial Intelligence, Knowledge-based systems, and many other areas of computing. The sequential execution speed of logic programs has been greatly improved since the advent of the first interpreters. However, higher inference speeds are still required in order to meet the demands of applications such as those contemplated for next generation computer systems. The execution of logic programs in parallel is currently considered a promising strategy for attaining such inference speeds. Logic Programming in turn appears as a suitable programming paradigm for parallel architectures because of the many opportunities for parallel execution present in the implementation of logic programs. This dissertation presents an efficient parallel execution model for logic programs. The model is described from the source language level down to an "Abstract Machine" level suitable for direct implementation on existing parallel systems or for the design of special purpose parallel architectures. Few assumptions are made at the source language level and therefore the techniques developed and the general Abstract Machine design are applicable to a variety of logic (and also functional) languages. These techniques offer efficient solutions to several areas of parallel Logic Programming implementation previously considered problematic or a source of considerable overhead, such as the detection and handling of variable binding conflicts in AND-Parallelism, the specification of control and management of the execution tree, the treatment of distributed backtracking, and goal scheduling and memory management issues, etc. A parallel Abstract Machine design is offered, specifying data areas, operation, and a suitable instruction set. This design is based on extending to a parallel environment the techniques introduced by the Warren Abstract Machine, which have already made very fast and space efficient sequential systems a reality. Therefore, the model herein presented is capable of retaining sequential execution speed similar to that of high performance sequential systems, while extracting additional gains in speed by efficiently implementing parallel execution. These claims are supported by simulations of the Abstract Machine on sample programs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Provenance plays a major role when understanding and reusing the methods applied in a scientic experiment, as it provides a record of inputs, the processes carried out and the use and generation of intermediate and nal results. In the specic case of in-silico scientic experiments, a large variety of scientic workflow systems (e.g., Wings, Taverna, Galaxy, Vistrails) have been created to support scientists. All of these systems produce some sort of provenance about the executions of the workflows that encode scientic experiments. However, provenance is normally recorded at a very low level of detail, which complicates the understanding of what happened during execution. In this paper we propose an approach to automatically obtain abstractions from low-level provenance data by finding common workflow fragments on workflow execution provenance and relating them to templates. We have tested our approach with a dataset of workflows published by the Wings workflow system. Our results show that by using these kinds of abstractions we can highlight the most common abstract methods used in the executions of a repository, relating different runs and workflow templates with each other.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article presents in an informal way some early results on the design of a series of paradigms for visualization of the parallel execution of logic programs. The results presented here refer to the visualization of or-parallelism, as in MUSE and Aurora, deterministic dependent and-parallelism, as in Andorra-I, and independent and-parallelism as in &-Prolog. A tool has been implemented for this purpose and has been interfaced with these systems. Results are presented showing the visualization of executions from these systems and the usefulness of the resulting tool is briefly discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we examine the issue of memory management in the parallel execution of logic programs. We concentrate on non-deterministic and-parallel schemes which we believe present a relatively general set of problems to be solved, including most of those encountered in the memory management of or-parallel systems. We present a distributed stack memory management model which allows flexible scheduling of goals. Previously proposed models (based on the "Marker model") are lacking in that they impose restrictions on the selection of goals to be executed or they may require consume a large amount of virtual memory. This paper first presents results which imply that the above mentioned shortcomings can have significant performance impacts. An extension of the Marker Model is then proposed which allows flexible scheduling of goals while keeping (virtual) memory consumption down. Measurements are presented which show the advantage of this solution. Methods for handling forward and backward execution, cut and roll back are discussed in the context of the proposed scheme. In addition, the paper shows how the same mechanism for flexible scheduling can be applied to allow the efficient handling of the very general form of suspension that can occur in systems which combine several types of and-parallelism and more sophisticated methods of executing logic programs. We believe that the results are applicable to many and- and or-parallel systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The previous publications (Miano et al, 2011) have shown that using a Spherical Geodesic Waveguide (SGW), it can be achieved the super-resolution up to ? /500 close to a set of discrete frequencies. These frequencies are directly connected with the well-known Schumann resonance frequencies of spherical symmetric systems. However, the Spherical Geodesic Waveguide (SGW) has been presented as an ideal system, in which the technological obstacles or manufacturing feasibility and their influence on final results were not taken into account. In order to prove the concept of superresolution experimentally, the Spherical Geodesic Waveguide is modified according to the manufacturing requirements and technological limitations. Each manufacturing process imposes some imperfections which can affect the experimental results. Here, we analyze the influence of the manufacturing limitations on the super-resolution properties of the SGW. Beside the theoretical work, herein, there has been presented the experimental results, as well.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a testing methodology to apply Behaviour Driven Development (BDD) techniques while developing Multi-Agent Systems (MAS), so called BEhavioural Agent Simple Testing (BEAST) methodology. It is supported by the developed open source framework (BEAST Tool) which automatically generates test cases skeletons from BDD scenarios specifications. The developed framework allows testing MASs based on JADE or JADEX platforms and offers a set of configurable Mock Agents which allow the execution of tests while the system is under development. BEAST tool has been validated in the development of a MAS for fault diagnosis in FTTH (Fiber To The Home) networks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Resumen El diseo de sistemas pticos, entendido como un arte por algunos, como una ciencia por otros, se ha realizado durante siglos. Desde los egipcios hasta nuestros das los sistemas de formacin de imagen han ido evolucionando as como las tcnicas de diseo asociadas. Sin embargo ha sido en los ltimos 50 aos cuando las tcnicas de diseo han experimentado su mayor desarrollo y evolucin, debido, en parte, a la aparicin de nuevas tcnicas de fabricacin y al desarrollo de ordenadores cada vez ms potentes que han permitido el clculo y anlisis del trazado de rayos a travs de los sistemas pticos de forma rpida y eficiente. Esto ha propiciado que el diseo de sistemas pticos evolucione desde los diseos desarrollados nicamente a partir de la ptica paraxial hasta lo modernos diseos realizados mediante la utilizacin de diferentes tcnicas de optimizacin multiparamtrica. El principal problema con el que se encuentra el diseador es que las diferentes tcnicas de optimizacin necesitan partir de un diseo inicial el cual puede fijar las posibles soluciones. Dicho de otra forma, si el punto de inicio est lejos del mnimo global, o diseo ptimo para las condiciones establecidas, el diseo final puede ser un mnimo local cerca del punto de inicio y lejos del mnimo global. Este tipo de problemtica ha llevado al desarrollo de sistemas globales de optimizacin que cada vez sean menos sensibles al punto de inicio de la optimizacin. Aunque si bien es cierto que es posible obtener buenos diseos a partir de este tipo de tcnicas, se requiere de muchos intentos hasta llegar a la solucin deseada, habiendo un entorno de incertidumbre durante todo el proceso, puesto que no est asegurado el que se llegue a la solucin ptima. El mtodo de las Superficies Mltiples Simultaneas (SMS), que naci como una herramienta de clculo de concentradores anidlicos, se ha demostrado como una herramienta tambin capaz utilizarse para el diseo de sistemas pticos formadores de imagen, aunque hasta la fecha se ha utilizado para el diseo puntual de sistemas de formacin de imagen. Esta tesis tiene por objeto presentar el SMS como un mtodo que puede ser utilizado de forma general para el diseo de cualquier sistema ptico de focal fija o v afocal con un aumento definido as como una herramienta que puede industrializarse para ayudar al diseador a afrontar de forma sencilla el diseo de sistemas pticos complejos. Esta tesis est estructurada en cinco captulos: El captulo 1, es un captulo de fundamentos donde se presentan los conceptos fundamentales necesarios para que el lector, aunque no posea una gran base en ptica formadora de imagen, pueda entender los planteamientos y resultados que se presentan en el resto de captulos El capitulo 2 aborda el problema de la optimizacin de sistemas pticos, donde se presenta el mtodo SMS como una herramienta idnea para obtener un punto de partida para el proceso de optimizacin. Mediante un ejemplo aplicado se demuestra la importancia del punto de partida utilizado en la solucin final encontrada. Adems en este captulo se presentan diferentes tcnicas que permiten la interpolacin y optimizacin de las superficies obtenidas a partir de la aplicacin del SMS. Aunque en esta tesis se trabajar nicamente utilizando el SMS2D, se presenta adems un mtodo para la interpolacin y optimizacin de las nubes de puntos obtenidas a partir del SMS3D basado en funciones de base radial (RBF). En el captulo 3 se presenta el diseo, fabricacin y medidas de un objetivo catadiptrico panormico diseado para trabajar en la banda del infrarrojo lejano (8-12 m) para aplicaciones de vigilancia perimetral. El objetivo presentado se disea utilizando el mtodo SMS para tres frentes de onda de entrada utilizando cuatro superficies. La potencia del mtodo de diseo utilizado se hace evidente en la sencillez con la que este complejo sistema se disea. Las imgenes presentadas demuestran cmo el prototipo desarrollado cumple a la perfeccin su propsito. El captulo 4 aborda el problema del diseo de sistemas pticos ultra compactos, se introduce el concepto de sistemas multicanal, como aquellos sistemas pticos compuestos por una serie de canales que trabajan en paralelo. Este tipo de sistemas resultan particularmente idneos para l diseo de sistemas afocales. Se presentan estrategias de diseo para sistemas multicanal tanto monocromticos como policromticos. Utilizando la novedosa tcnica de diseo que en este captulo se presenta el diseo de un telescopio de seis aumentos y medio. En el captulo 5 se presenta una generalizacin del mtodo SMS para rayos meridianos. En este captulo se presenta el algoritmo que debe utilizarse para el diseo de cualquier sistema ptico de focal fija. La denominada optimizacin fase 1 se vi introduce en el algoritmo presentado de forma que mediante el cambio de las condiciones inciales del diseo SMS que, aunque el diseo se realice para rayos meridianos, los rayos skew tengan un comportamiento similar. Para probar la potencia del algoritmo desarrollado se presenta un conjunto de diseos con diferente nmero de superficies. La estabilidad y potencia del algoritmo se hace evidente al conseguirse por primera vez el diseo de un sistema de seis superficies diseado por SMS. vii Abstract The design of optical systems, considered an art by some and a science by others, has been developed for centuries. Imaging optical systems have been evolving since Ancient Egyptian times, as have design techniques. Nevertheless, the most important developments in design techniques have taken place over the past 50 years, in part due to the advances in manufacturing techniques and the development of increasingly powerful computers, which have enabled the fast and efficient calculation and analysis of ray tracing through optical systems. This has led to the design of optical systems evolving from designs developed solely from paraxial optics to modern designs created by using different multiparametric optimization techniques. The main problem the designer faces is that the different optimization techniques require an initial design which can set possible solutions as a starting point. In other words, if the starting point is far from the global minimum or optimal design for the set conditions, the final design may be a local minimum close to the starting point and far from the global minimum. This type of problem has led to the development of global optimization systems which are increasingly less sensitive to the starting point of the optimization process. Even though it is possible to obtain good designs from these types of techniques, many attempts are necessary to reach the desired solution. This is because of the uncertain environment due to the fact that there is no guarantee that the optimal solution will be obtained. The Simultaneous Multiple Surfaces (SMS) method, designed as a tool to calculate anidolic concentrators, has also proved useful for the design of image-forming optical systems, although until now it has occasionally been used for the design of imaging systems. This thesis aims to present the SMS method as a technique that can be used in general for the design of any optical system, whether with a fixed focal or an afocal with a defined magnification, and also as a tool that can be commercialized to help designers in the design of complex optical systems. The thesis is divided into five chapters. Chapter 1 establishes the basics by presenting the fundamental concepts which the reader needs to acquire, even if he/she doesnt have extensive knowledge in the field viii of image-forming optics, in order to understand the steps taken and the results obtained in the following chapters. Chapter 2 addresses the problem of optimizing optical systems. Here the SMS method is presented as an ideal tool to obtain a starting point for the optimization process. The importance of the starting point for the final solution is demonstrated through an example. Additionally, this chapter introduces various techniques for the interpolation and optimization of the surfaces obtained through the application of the SMS method. Even though in this thesis only the SMS2D method is used, we present a method for the interpolation and optimization of clouds of points obtained though the SMS3D method, based on radial basis functions (RBF). Chapter 3 presents the design, manufacturing and measurement processes of a catadioptric panoramic lens designed to work in the Long Wavelength Infrared (LWIR) (8-12 microns) for perimeter surveillance applications. The lens presented is designed by using the SMS method for three input wavefronts using four surfaces. The powerfulness of the design method used is revealed through the ease with which this complex system is designed. The images presented show how the prototype perfectly fulfills its purpose. Chapter 4 addresses the problem of designing ultra-compact optical systems. The concept of multi-channel systems, such as optical systems composed of a series of channels that work in parallel, is introduced. Such systems are especially suitable for the design of afocal systems. We present design strategies for multichannel systems, both monochromatic and polychromatic. A telescope designed with a magnification of six-and-a-half through the innovative technique exposed in this chapter is presented. Chapter 5 presents a generalization of the SMS method for meridian rays. The algorithm to be used for the design of any fixed focal optics is revealed. The optimization known as phase 1 optimization is inserted into the algorithm so that, by changing the initial conditions of the SMS design, the skew rays have a similar behavior, despite the design being carried out for meridian rays. To test the power of the developed algorithm, a set of designs with a different number of surfaces is presented. The stability and strength of the algorithm become apparent when the first design of a system with six surfaces if obtained through the SMS method.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

La ptica anidlica es una rama de la ptica cuyo desarrollo comenz a mediados de la dcada de 1960. Este relativamente nuevo campo de la ptica se centra en la transferencia eficiente de la luz, algo necesario en muchas aplicaciones, entre las que destacamos los concentradores solares y los sistemas de iluminacin. Las soluciones de la ptica clsica a los problemas de la transferencia de energa de la luz slo son adecuadas cuando los rayos de luz son paraxiales. La condicin paraxial no se cumple en la mayora de las aplicaciones para concentracin e iluminacin. Esta tesis contiene varios diseos free-form (aquellos que no presentan ninguna simetra, ni de rotacin ni lineal) cuyas aplicaciones van destinadas a estos dos campos. El trmino nonimaging viene del hecho de que estos sistemas pticos no necesitan formar una imagen del objeto, aunque no formar la imagen no es una condicin necesaria. Otra palabra que se utiliza a veces en lugar de nonimaging es la palabra anidlico, viene del griego "an+eidolon" y tiene el mismo significado. La mayora de los sistemas pticos diseados para aplicaciones anidlicas no presentan ninguna simetra, es decir, son free-form (anamrficos). Los sistemas pticos free-form estn siendo especialmente relevantes durante los ltimos aos gracias al desarrollo de las herramientas para su fabricacin como mquinas de moldeo por inyeccin y el mecanizado multieje. Sin embargo, solo recientemente se han desarrollado tcnicas de diseo anidlicas capaces de cumplir con estos grados de libertad. En aplicaciones de iluminacin el mtodo SMS3D permite disear dos superficies free-form para controlar las fuentes de luz extensas. En los casos en que se requiere una elevada asimetra de la fuente, el objeto o las restricciones volumtricos, las superficies free-form permiten obtener soluciones de mayor eficiencia, o disponer de menos elementos en comparacin con las soluciones de simetra de rotacin, dado que las superficies free-form tienen ms grados de libertad y pueden realizar mltiples funciones debido a su naturaleza anamrfica. Los concentradores anidlicos son muy adecuados para la captacin de energa solar, ya que el objetivo no es la reproduccin de una imagen exacta del sol, sino sencillamente la captura de su energa. En este momento, el campo de la concentracin fotovoltaica (CPV) tiende hacia sistemas de alta concentracin con el fin de compensar el gasto de las clulas solares multi-unin (MJ) utilizadas como receptores, reduciendo su rea. El inters en el uso de clulas MJ radica en su alta eficiencia de conversin. Para obtener sistemas competitivos en aplicaciones terrestres se recurre a sistemas fotovoltaicos de alta concentracin (HCPV), con factores de concentracin geomtrica por encima de 500x. Estos sistemas se componen de dos (o ms) elementos pticos (espejos y/o lentes). En los sistemas presentados a lo largo de este trabajo se presentan ejemplos de concentradores HCPV con elementos reflexivos como etapa primaria, as como concentradores con elementos refractivos (lente de Fresnel). Con la necesidad de aumentar la eficiencia de los sistemas HCPV reales y con el fin de proporcionar la divisin ms eficiente del espectro solar, clulas conteniendo cuatro o ms uniones (con un potencial de alcanzar eficiencias de ms del 45% a una concentracin de cientos de soles) se exploran hoy en da. En esta tesis se presenta una de las posibles arquitecturas de divisin del espectro (spectrum-splitting en la literatura anglosajona) que utilizan clulas de concentracin comercial. Otro campo de aplicacin de la ptica nonimaging es la iluminacin, donde es necesario proporcionar un patrn de distribucin de la iluminacin especfico. La iluminacin de estado slido (SSL), basada en la electroluminiscencia de materiales semiconductores, est proporcionando fuentes de luz para aplicaciones de iluminacin general. En la ltima dcada, los diodos emisores de luz (LED) de alto brillo han comenzado a reemplazar a las fuentes de luz convencionales debido a la superioridad en la calidad de la luz emitida, elevado tiempo de vida, compacidad y ahorro de energa. Los colimadores utilizados con LEDs deben cumplir con requisitos tales como tener una alta eficiencia, un alto control del haz de luz, una mezcla de color espacial y una gran compacidad. Presentamos un colimador de luz free-form con microestructuras capaz de conseguir buena colimacin y buena mezcla de colores con una fuente de LED RGGB. Una buena mezcla de luz es importante no slo para simplificar el diseo ptico de la luminaria sino tambin para evitar hacer binning de los chips. La mezcla de luz ptica puede reducir los costes al evitar la modulacin por ancho de pulso y otras soluciones electrnicas patentadas para regulacin y ajuste de color. Esta tesis consta de cuatro captulos. Los captulos que contienen la obra original de esta tesis son precedidos por un captulo introductorio donde se presentan los conceptos y definiciones bsicas de la ptica geomtrica y en el cual se engloba la ptica nonimaging. Contiene principios de la ptica no formadora de imagen junto con la descripcin de sus problemas y mtodos de diseo. Asimismo se describe el mtodo de Superficies Mltiples Simultneas (SMS), que destaca por su versatilidad y capacidad de controlar varios haces de rayos. Adicionalmente tambin se describe la integracin Khler y sus aplicaciones en el campo de la energa fotovoltaica. La concentracin fotovoltaica y la iluminacin de estado slido son introducidas junto con la revisin de su estado actual. El Segundo y Tercer Captulo contienen diseos pticos avanzados con aplicacin en la concentracin solar principalmente, mientras que el Cuarto Captulo describe el colimador free-form con surcos que presenta buena mezcla de colores para aplicaciones de iluminacin. El Segundo Captulo describe dos concentradores pticos HCPV diseados con el mtodo SMS en tres dimensiones (SMS3D) que llevan a cabo integracin Khler en dos direcciones con el fin de proporcionar una distribucin de irradiancia uniforme libre de aberraciones cromticas sobre la clula solar. Uno de los diseos es el concentrador XXR free-form diseado con el mtodo SMS3D, donde el espejo primario (X) y la lente secundaria (R) se dividen en cuatro sectores simtricos y llevan a cabo la integracin Khler (proporcionando cuatro unidades del array Khler), mientras que el espejo intermedio (X) presenta simetra rotacional. Otro concentrador HCPV presentado es el Fresnel-RXI (FRXI) con una lente de Fresnel funcionando como elemento primario (POE) y una lente RXI como elemento ptico secundario (SOE), que presenta configuracin 4-fold con el fin de realizar la integracin Khler. Las lentes RXI son dispositivos nonimaging conocidos, pero su aplicacin como elemento secundario es novedosa. Los concentradores XXR y FRXI Khler son ejemplos acadmicos de muy alta concentracin (ms de 2,000x, mientras que los sistemas convencionales hoy en da no suelen llegar a 1,000x) preparados para las clulas solares N-unin (con N>3), que probablemente requerirn una mayor concentracin y alta uniformidad espectral de irradiancia con el fin de obtener sistemas CPV terrestres eficientes y rentables. Ambos concentradores estn diseados maximizando funciones de mrito como la eficiencia ptica, el producto concentracin-aceptancia (CAP) y la uniformidad de irradiancia sobre la clula libre de la aberracin cromtica (integracin Khler). El Tercer Captulo presenta una arquitectura para la divisin del espectro solar basada en un mdulo HCPV con alta concentracin (500x) y ngulo de aceptancia alto (>1) que tiene por objeto reducir ambas fuentes de prdidas de las clulas triple unin (3J) comerciales: el uso eficiente del espectro solar y la luz reflejada de los contactos metlicos y de la superficie de semiconductor. El mdulo para la divisin del espectro utiliza el espectro solar ms eficiente debido a la combinacin de una alta eficiencia de una clula de concentracin 3J (GaInP/GaInAs/Ge) y una de contacto posterior (BPC) de concentracin de silicio (Si), as como la tcnica de confinamiento externo para la recuperacin de la luz reflejada por la clula 3J con el fin de ser reabsorbida por la clula. En la arquitectura propuesta, la clula 3J opera con su ganancia de corriente optimizada (concentracin geomtrica de 500x), mientras que la clula de silicio trabaja cerca de su ptimo tambin (135x). El mdulo de spectrum-splitting consta de una lente de Fresnel plana como POE y un concentrador RXI free-form como SOE con un filtro paso-banda integrado en l. Tanto POE como SOE realizan la integracin Khler para producir homogeneizacin de luz sobre la clula. El filtro paso banda enva los fotones IR en la banda 900-1,150nm a la clula de silicio. Hay varios aspectos prcticos de la arquitectura del mdulo presentado que ayudan a reducir la complejidad de los sistemas spectrum-splitting (el filtro y el secundario forman una sola pieza slida, ambas clulas son coplanarias simplificndose el cableado y la disipacin de calor, etc.). Prototipos prueba-de-concepto han sido ensamblados y probados a fin de demostrar la fabricabilidad del filtro y su rendimiento cuando se combina con la tcnica de reciclaje de luz externa. Los resultados obtenidos se ajustan bastante bien a los modelos y a las simulaciones e invitan al desarrollo de una versin ms compleja de este prototipo en el futuro. Dos colimadores slidos con surcos free-form se presentan en el Cuarto Captulo. Ambos diseos pticos estn diseados originalmente usando el mtodo SMS3D. La segunda superficie pticamente activa est diseada a posteriori como una superficie con surcos. El diseo inicial de dos espejos (XX) est diseado como prueba de concepto. En segundo lugar, el diseo RXI free-form es comparable con los colimadores RXI existentes. Se trata de un diseo muy compacto y eficiente que proporciona una muy buena mezcla de colores cuando funciona con LEDs RGB fuera del eje ptico como en los RGB LEDs convencionales. Estos dos diseos son dispositivos free-form diseados con la intencin de mejorar las propiedades de mezcla de colores de los dispositivos no aplanticos RXI con simetra de revolucin y la eficiencia de los aplanticos, logrando una buena colimacin y una buena mezcla de colores. La capacidad de mezcla de colores del dispositivo no-aplantico mejora aadiendo caractersticas de un aplantico a su homlogo simtrico sin prdida de eficiencia. En el caso del diseo basado en RXI, su gran ventaja consiste en su menor coste de fabricacin ya que el proceso de metalizacin puede evitarse. Aunque algunos de los componentes presentan formas muy complejas, los costes de fabricacin son relativamente insensibles a la complejidad del molde, especialmente en el caso de la produccin en masa (tales como inyeccin de plstico), ya que el coste del molde se reparte entre todas las piezas fabricadas. Por ltimo, las ltimas dos secciones son las conclusiones y futuras lneas de investigacin. ABSTRACT Nonimaging optics is a branch of optics whose development began in the mid-1960s. This rather new field of optics focuses on the efficient light transfer necessary in many applications, among which we highlight solar concentrators and illumination systems. The classical optics solutions to the problems of light energy transfer are only appropriate when the light rays are paraxial. The paraxial condition is not met in most applications for the concentration and illumination. This thesis explores several free-form designs (with neither rotational nor linear symmetry) whose applications are intended to cover the above mentioned areas and more. The term nonimaging comes from the fact that these optical systems do not need to form an image of the object, although it is not a necessary condition not to form an image. Another word sometimes used instead of nonimaging is anidolic, and it comes from the Greek an+eidolon and has the same meaning. Most of the optical systems designed for nonimaging applications are without any symmetry, i.e. free-form. Free-form optical systems become especially relevant lately with the evolution of free-form tooling (injection molding machines, multi-axis machining techniques, etc.). Nevertheless, only recently there are nonimaging design techniques that are able to meet these degrees of freedom. In illumination applications, the SMS3D method allows designing two free-form surfaces to control very well extended sources. In cases when source, target or volumetric constrains have very asymmetric requirements free-form surfaces are offering solutions with higher efficiency or with fewer elements in comparison with rotationally symmetric solutions, as free-forms have more degrees of freedom and they can perform multiple functions due to their free-form nature. Anidolic concentrators are well suited for the collection of solar energy, because the goal is not the reproduction of an exact image of the sun, but instead the collection of its energy. At this time, Concentration Photovoltaics (CPV) field is turning to high concentration systems in order to compensate the expense of multi-junction (MJ) solar cells used as receivers by reducing its area. Interest in the use of MJ cells lies in their very high conversion efficiency. High Concentration Photovoltaic systems (HCPV) with geometric concentration of more than 500x are required in order to have competitive systems in terrestrial applications. These systems comprise two (or more) optical elements, mirrors and/or lenses. Systems presented in this thesis encompass both main types of HCPV architectures: concentrators with primary reflective element and concentrators with primary refractive element (Fresnel lens). Demand for the efficiency increase of the actual HCPV systems as well as feasible more efficient partitioning of the solar spectrum, leads to exploration of four or more junction solar cells or submodules. They have a potential of reaching over 45% efficiency at concentration of hundreds of suns. One possible architectures of spectrum splitting module using commercial concentration cells is presented in this thesis. Another field of application of nonimaging optics is illumination, where a specific illuminance distribution pattern is required. The Solid State Lighting (SSL) based on semiconductor electroluminescence provides light sources for general illumination applications. In the last decade high-brightness Light Emitting Diodes (LEDs) started replacing conventional light sources due to their superior output light quality, unsurpassed lifetime, compactness and energy savings. Collimators used with LEDs have to meet requirements like high efficiency, high beam control, color and position mixing, as well as a high compactness. We present a free-form collimator with microstructures that performs good collimation and good color mixing with RGGB LED source. Good light mixing is important not only for simplifying luminaire optical design but also for avoiding die binning. Optical light mixing may reduce costs by avoiding pulse-width modulation and other patented electronic solutions for dimming and color tuning. This thesis comprises four chapters. Chapters containing the original work of this thesis are preceded by the introductory chapter that addresses basic concepts and definitions of geometrical optics on which nonimaging is developed. It contains fundamentals of nonimaging optics together with the description of its design problems, principles and methods, and with the Simultaneous Multiple Surface (SMS) method standing out for its versatility and ability to control several bundles of rays. Khler integration and its applications in the field of photovoltaics are described as well. CPV and SSL fields are introduced together with the review on their background and their current status. Chapter 2 and Chapter 3 contain advanced optical designs with primarily application in solar concentration; meanwhile Chapter 4 portrays the free-form V-groove collimator with good color mixing property for illumination application. Chapter 2 describes two HCPV optical concentrators designed with the SMS method in three dimensions (SMS3D). Both concentrators represent Khler integrator arrays that provide uniform irradiance distribution free from chromatic aberrations on the solar cell. One of the systems is the XXR free-form concentrator designed with the SMS3D method. The primary mirror (X) of this concentrator and secondary lens (R) are divided in four symmetric sectors (folds) that perform Khler integration; meanwhile the intermediate mirror (X) is rotationally symmetric. Second HCPV concentrator is the Fresnel-RXI (FRXI) with flat Fresnel lens as the Primary Optical Element (POE) and an RXI lens as the Secondary Optical Element (SOE). This architecture manifests 4-fold configuration for performing Khler integration (4 array units), as well. The RXI lenses are well-known nonimaging devices, but their application as SOE is novel. Both XXR and FRXI Khler HCPV concentrators are academic examples of very high concentration (more than 2,000x meanwhile conventional systems nowadays have up to 1,000x) prepared for the near future N-junction (N>3) solar cells. In order to have efficient and cost-effective terrestrial CPV systems, those cells will probably require higher concentrations and high spectral irradiance uniformity. Both concentrators are designed by maximizing merit functions: the optical efficiency, concentration-acceptance angle (CAP) and cell-irradiance uniformity free from chromatic aberrations (Khler integration). Chapter 3 presents the spectrum splitting architecture based on a HCPV module with high concentration (500x) and high acceptance angle (>1). This module aims to reduce both sources of losses of the actual commercial triple-junction (3J) solar cells with more efficient use of the solar spectrum and with recovering the light reflected from the 3J cells grid lines and semiconductor surface. The solar spectrum is used more efficiently due to the combination of a high efficiency 3J concentration cell (GaInP/GaInAs/Ge) and external Back-Point-Contact (BPC) concentration silicon (Si) cell. By employing external confinement techniques, the 3J cells reflections are recovered in order to be re-absorbed by the cell. In the proposed concentrator architecture, the 3J cell operates at its optimized current gain (at geometrical concentration of 500x), while the Si cell works near its optimum, as well (135x). The spectrum splitting module consists of a flat Fresnel lens (as the POE), and a free-form RXI-type concentrator with a band-pass filter embedded in it (as the SOE), both POE and SOE performing Khler integration to produce light homogenization. The band-pass filter sends the IR photons in the 900-1,150nm band to the Si cell. There are several practical aspects of presented module architecture that help reducing the added complexity of the beam splitting systems: the filter and secondary are forming a single solid piece, both cells are coplanar so the heat management and wiring is simplified, etc. Two proof-of-concept prototypes are assembled and tested in order to prove filter manufacturability and performance, as well as the potential of external light recycling technique. Obtained measurement results agree quite well with models and simulations, and show an opened path to manufacturing of the Fresnel RXI-type secondary concentrator with spectrum splitting strategy. Two free-form solid V-groove collimators are presented in Chapter 4. Both free-form collimators are originally designed with the SMS3D method. The second mirrored optically active surface is converted in a grooved surface a posteriori. Initial two mirror (XX) design is presented as a proof-of-concept. Second, RXI free-form design is comparable with existing RXI collimators as it is a highly compact and a highly efficient design. It performs very good color mixing of the RGGB LED sources placed off-axis like in conventional RGB LEDs. Collimators described here improve color mixing property of the prior art rotationally symmetric no-aplanatic RXI devices, and the efficiency of the aplanatic ones, accomplishing both good collimation and good color mixing. Free-form V-groove collimators enhance the no-aplanatic device's blending capabilities by adding aplanatic features to its symmetric counterpart with no loss in efficiency. Big advantage of the RXI design is its potentially lower manufacturing cost, since the process of metallization may be avoided. Although some components are very complicated for shaping, the manufacturing costs are relatively insensitive to the complexity of the mold especially in the case of mass production (such as plastic injection), as the cost of the mold is spread in many parts. Finally, last two sections are conclusions and future lines of investigation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Starting on June 2011, NGCPV is the first project funded jointly between the European Commission (EC) and the New Energy and Industrial Technology Development Organization (NEDO) of Japan to research on new generation concentration photovoltaics (CPV). The Project, through a collaborative research between seven European and nine Japanese leading research centers in the field of CPV, aims at lowering the cost of the CPVproduced photovoltaic kWh down to 5 ?cents. The main objective of the project is to improve the present concentrator cell, module and system efficiency, as well as developing advanced characterization tools for CPV components and systems. As particular targets, the project aims at achieving a cell efficiency of at least 45% and a CPV module with an efficiency greater than 35%. This paper describes the R&D activities that are being carried out within the NGCPV project and summarizes some of the most relevant results that have already been attained, for instance: the manufacturing of a 44.4% world record efficiency triple junction solar cell (by Sharp Corp.) and the installation of a 50 kWp experimental CPV plant in Spain, which will be used to obtain accurate forecasts of the energy produced at system level.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A membrane system is a massive parallel system, which is inspired by the living cells when processing information. As a part of unconventional computing, membrane systems are proven to be effective in solving complex problems. A new factor is introduced. This factor can decide whether a technique is worthwhile being used or not. The use of this factor provides the best chances for selecting the strategy for the rules application phase. Referring to the best is in reference to the one that reduces execution time within the membrane system. A pre-analysis of the membrane system determines the P-factor, which in return advises the optimal strategy to use. In particular, this paper compares the use of two strategies based on the P-factor and provides results upon the application of them. The paper concludes that the P-factor is an effective indicator for choosing the right strategy to implement the rules application phase in membrane systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Esta tesis doctoral se centra principalmente en tcnicas de ataque y contramedidas relacionadas con ataques de canal lateral (SCA por sus siglas en ingls), que han sido propuestas dentro del campo de investigacin acadmica desde hace 17 aos. Las investigaciones relacionadas han experimentado un notable crecimiento en las ltimas dcadas, mientras que los diseos enfocados en la proteccin slida y eficaz contra dichos ataques an se mantienen como un tema de investigacin abierto, en el que se necesitan iniciativas ms confiables para la proteccin de la informacin persona de empresa y de datos nacionales. El primer uso documentado de codificacin secreta se remonta a alrededor de 1700 B.C., cuando los jeroglficos del antiguo Egipto eran descritos en las inscripciones. La seguridad de la informacin siempre ha supuesto un factor clave en la transmisin de datos relacionados con inteligencia diplomtica o militar. Debido a la evolucin rpida de las tcnicas modernas de comunicacin, soluciones de cifrado se incorporaron por primera vez para garantizar la seguridad, integridad y confidencialidad de los contextos de transmisin a travs de cables sin seguridad o medios inalmbricos. Debido a las restricciones de potencia de clculo antes de la era del ordenador, la tcnica de cifrado simple era un mtodo ms que suficiente para ocultar la informacin. Sin embargo, algunas vulnerabilidades algortmicas pueden ser explotadas para restaurar la regla de codificacin sin mucho esfuerzo. Esto ha motivado nuevas investigaciones en el rea de la criptografa, con el fin de proteger el sistema de informacin ante sofisticados algoritmos. Con la invencin de los ordenadores se ha acelerado en gran medida la implementacin de criptografa segura, que ofrece resistencia eficiente encaminada a obtener mayores capacidades de computacin altamente reforzadas. Igualmente, sofisticados cripto-anlisis han impulsado las tecnologas de computacin. Hoy en da, el mundo de la informacin ha estado involucrado con el campo de la criptografa, enfocada a proteger cualquier campo a travs de diversas soluciones de cifrado. Estos enfoques se han fortalecido debido a la unificacin optimizada de teoras matemticas modernas y prcticas eficaces de hardware, siendo posible su implementacin en varias plataformas (microprocesador, ASIC, FPGA, etc.). Las necesidades y requisitos de seguridad en la industria son las principales mtricas de conduccin en el diseo electrnico, con el objetivo de promover la fabricacin de productos de gran alcance sin sacrificar la seguridad de los clientes. Sin embargo, una vulnerabilidad en la implementacin prctica encontrada por el Prof. Paul Kocher, et al en 1996 implica que un circuito digital es inherentemente vulnerable a un ataque no convencional, lo cual fue nombrado posteriormente como ataque de canal lateral, debido a su fuente de anlisis. Sin embargo, algunas crticas sobre los algoritmos criptogrficos tericamente seguros surgieron casi inmediatamente despus de este descubrimiento. En este sentido, los circuitos digitales consisten tpicamente en un gran nmero de celdas lgicas fundamentales (como MOS - Metal Oxide Semiconductor), construido sobre un sustrato de silicio durante la fabricacin. La lgica de los circuitos se realiza en funcin de las innumerables conmutaciones de estas clulas. Este mecanismo provoca inevitablemente cierta emanacin fsica especial que puede ser medida y correlacionada con el comportamiento interno del circuito. SCA se puede utilizar para revelar datos confidenciales (por ejemplo, la criptografa de claves), analizar la arquitectura lgica, el tiempo e incluso inyectar fallos malintencionados a los circuitos que se implementan en sistemas embebidos, como FPGAs, ASICs, o tarjetas inteligentes. Mediante el uso de la comparacin de correlacin entre la cantidad de fuga estimada y las fugas medidas de forma real, informacin confidencial puede ser reconstruida en mucho menos tiempo y computacin. Para ser precisos, SCA bsicamente cubre una amplia gama de tipos de ataques, como los anlisis de consumo de energa y radiacin ElectroMagntica (EM). Ambos se basan en anlisis estadstico y, por lo tanto, requieren numerosas muestras. Los algoritmos de cifrado no estn intrnsecamente preparados para ser resistentes ante SCA. Es por ello que se hace necesario durante la implementacin de circuitos integrar medidas que permitan camuflar las fugas a travs de "canales laterales". Las medidas contra SCA estn evolucionando junto con el desarrollo de nuevas tcnicas de ataque, as como la continua mejora de los dispositivos electrnicos. Las caractersticas fsicas requieren contramedidas sobre la capa fsica, que generalmente se pueden clasificar en soluciones intrnsecas y extrnsecas. Contramedidas extrnsecas se ejecutan para confundir la fuente de ataque mediante la integracin de ruido o mala alineacin de la actividad interna. Comparativamente, las contramedidas intrnsecas estn integradas en el propio algoritmo, para modificar la aplicacin con el fin de minimizar las fugas medibles, o incluso hacer que dichas fugas no puedan ser medibles. Ocultacin y Enmascaramiento son dos tcnicas tpicas incluidas en esta categora. Concretamente, el enmascaramiento se aplica a nivel algortmico, para alterar los datos intermedios sensibles con una mscara de manera reversible. A diferencia del enmascaramiento lineal, las operaciones no lineales que ampliamente existen en criptografas modernas son difciles de enmascarar. Dicho mtodo de ocultacin, que ha sido verificado como una solucin efectiva, comprende principalmente la codificacin en doble carril, que est ideado especialmente para aplanar o eliminar la fuga dependiente de dato en potencia o en EM. En esta tesis doctoral, adems de la descripcin de las metodologas de ataque, se han dedicado grandes esfuerzos sobre la estructura del prototipo de la lgica propuesta, con el fin de realizar investigaciones enfocadas a la seguridad sobre contramedidas de arquitectura a nivel lgico. Una caracterstica de SCA reside en el formato de las fuentes de fugas. Un tpico ataque de canal lateral se refiere al anlisis basado en la potencia, donde la capacidad fundamental del transistor MOS y otras capacidades parsitas son las fuentes esenciales de fugas. Por lo tanto, una lgica robusta resistente a SCA debe eliminar o mitigar las fugas de estas micro-unidades, como las puertas lgicas bsicas, los puertos I/O y las rutas. Las herramientas EDA proporcionadas por los vendedores manipulan la lgica desde un nivel ms alto, en lugar de realizarlo desde el nivel de puerta, donde las fugas de canal lateral se manifiestan. Por lo tanto, las implementaciones clsicas apenas satisfacen estas necesidades e inevitablemente atrofian el prototipo. Por todo ello, la implementacin de un esquema de diseo personalizado y flexible ha de ser tomado en cuenta. En esta tesis se presenta el diseo y la implementacin de una lgica innovadora para contrarrestar SCA, en la que se abordan 3 aspectos fundamentales: I. Se basa en ocultar la estrategia sobre el circuito en doble carril a nivel de puerta para obtener dinmicamente el equilibrio de las fugas en las capas inferiores; II. Esta lgica explota las caractersticas de la arquitectura de las FPGAs, para reducir al mnimo el gasto de recursos en la implementacin; III. Se apoya en un conjunto de herramientas asistentes personalizadas, incorporadas al flujo genrico de diseo sobre FPGAs, con el fin de manipular los circuitos de forma automtica. El kit de herramientas de diseo automtico es compatible con la lgica de doble carril propuesta, para facilitar la aplicacin prctica sobre la familia de FPGA del fabricante Xilinx. En este sentido, la metodologa y las herramientas son flexibles para ser extendido a una amplia gama de aplicaciones en las que se desean obtener restricciones mucho ms rgidas y sofisticadas a nivel de puerta o rutado. En esta tesis se realiza un gran esfuerzo para facilitar el proceso de implementacin y reparacin de lgica de doble carril genrica. La viabilidad de las soluciones propuestas es validada mediante la seleccin de algoritmos criptogrficos ampliamente utilizados, y su evaluacin exhaustiva en comparacin con soluciones anteriores. Todas las propuestas estn respaldadas eficazmente a travs de ataques experimentales con el fin de validar las ventajas de seguridad del sistema. El presente trabajo de investigacin tiene la intencin de cerrar la brecha entre las barreras de implementacin y la aplicacin efectiva de lgica de doble carril. En esencia, a lo largo de esta tesis se describir un conjunto de herramientas de implementacin para FPGAs que se han desarrollado para trabajar junto con el flujo de diseo genrico de las mismas, con el fin de lograr crear de forma innovadora la lgica de doble carril. Un nuevo enfoque en el mbito de la seguridad en el cifrado se propone para obtener personalizacin, automatizacin y flexibilidad en el prototipo de circuito de bajo nivel con granularidad fina. Las principales contribuciones del presente trabajo de investigacin se resumen brevemente a continuacin: Lgica de Precharge Absorbed-DPL logic: El uso de la conversin de netlist para reservar LUTs libres para ejecutar la seal de precharge y Ex en una lgica DPL. Posicionamiento entrelazado Row-crossed con pares idnticos de rutado en redes de doble carril, lo que ayuda a aumentar la resistencia frente a la medicin EM selectiva y mitigar los impactos de las variaciones de proceso. Ejecucin personalizada y herramientas de conversin automtica para la generacin de redes idnticas para la lgica de doble carril propuesta. (a) Para detectar y reparar conflictos en las conexiones; (b) Detectar y reparar las rutas asimtricas. (c) Para ser utilizado en otras lgicas donde se requiere un control estricto de las interconexiones en aplicaciones basadas en Xilinx. Plataforma CPA de pruebas personalizadas para el anlisis de EM y potencia, incluyendo la construccin de dicha plataforma, el mtodo de medicin y anlisis de los ataques. Anlisis de tiempos para cuantificar los niveles de seguridad. Divisin de Seguridad en la conversin parcial de un sistema de cifrado complejo para reducir los costes de la proteccin. Prueba de concepto de un sistema de calefaccin auto-adaptativo para mitigar los impactos elctricos debido a la variacin del proceso de silicio de manera dinmica. La presente tesis doctoral se encuentra organizada tal y como se detalla a continuacin: En el captulo 1 se abordan los fundamentos de los ataques de canal lateral, que abarca desde conceptos bsicos de teora de modelos de anlisis, adems de la implementacin de la plataforma y la ejecucin de los ataques. En el captulo 2 se incluyen las estrategias de resistencia SCA contra los ataques de potencia diferencial y de EM. Adems de ello, en este captulo se propone una lgica en doble carril compacta y segura como contribucin de gran relevancia, as como tambin se presentar la transformacin lgica basada en un diseo a nivel de puerta. Por otra parte, en el Captulo 3 se abordan los desafos relacionados con la implementacin de lgica en doble carril genrica. As mismo, se describir un flujo de diseo personalizado para resolver los problemas de aplicacin junto con una herramienta de desarrollo automtico de aplicaciones propuesta, para mitigar las barreras de diseo y facilitar los procesos. En el captulo 4 se describe de forma detallada la elaboracin e implementacin de las herramientas propuestas. Por otra parte, la verificacin y validaciones de seguridad de la lgica propuesta, as como un sofisticado experimento de verificacin de la seguridad del rutado, se describen en el captulo 5. Por ltimo, un resumen de las conclusiones de la tesis y las perspectivas como lneas futuras se incluyen en el captulo 6. Con el fin de profundizar en el contenido de la tesis doctoral, cada captulo se describe de forma ms detallada a continuacin: En el captulo 1 se introduce plataforma de implementacin hardware adems las teoras bsicas de ataque de canal lateral, y contiene principalmente: (a) La arquitectura genrica y las caractersticas de la FPGA a utilizar, en particular la Xilinx Virtex-5; (b) El algoritmo de cifrado seleccionado (un mdulo comercial Advanced Encryption Standard (AES)); (c) Los elementos esenciales de los mtodos de canal lateral, que permiten revelar las fugas de disipacin correlacionadas con los comportamientos internos; y el mtodo para recuperar esta relacin entre las fluctuaciones fsicas en los rastros de canal lateral y los datos internos procesados; (d) Las configuraciones de las plataformas de pruebas de potencia / EM abarcadas dentro de la presente tesis. El contenido de esta tesis se amplia y profundiza a partir del captulo 2, en el cual se abordan varios aspectos claves. En primer lugar, el principio de proteccin de la compensacin dinmica de la lgica genrica de precarga de doble carril (Dual-rail Precharge Logic-DPL) se explica mediante la descripcin de los elementos compensados a nivel de puerta. En segundo lugar, la lgica PA-DPL es propuesta como aportacin original, detallando el protocolo de la lgica y un caso de aplicacin. En tercer lugar, dos flujos de diseo personalizados se muestran para realizar la conversin de doble carril. Junto con ello, se aclaran las definiciones tcnicas relacionadas con la manipulacin por encima de la netlist a nivel de LUT. Finalmente, una breve discusin sobre el proceso global se aborda en la parte final del captulo. El Captulo 3 estudia los principales retos durante la implementacin de DPLs en FPGAs. El nivel de seguridad de las soluciones de resistencia a SCA encontradas en el estado del arte se ha degenerado debido a las barreras de implantacin a travs de herramientas EDA convencionales. En el escenario de la arquitectura FPGA estudiada, se discuten los problemas de los formatos de doble carril, impactos parsitos, sesgo tecnolgico y la viabilidad de implementacin. De acuerdo con estas elaboraciones, se plantean dos problemas: Cmo implementar la lgica propuesta sin penalizar los niveles de seguridad, y cmo manipular un gran nmero de celdas y automatizar el proceso. El PA-DPL propuesto en el captulo 2 se valida con una serie de iniciativas, desde caractersticas estructurales como doble carril entrelazado o redes de rutado clonadas, hasta los mtodos de aplicacin tales como las herramientas de personalizacin y automatizacin de EDA. Por otra parte, un sistema de calefaccin auto-adaptativo es representado y aplicado a una lgica de doble ncleo, con el fin de ajustar alternativamente la temperatura local para equilibrar los impactos negativos de la variacin del proceso durante la operacin en tiempo real. El captulo 4 se centra en los detalles de la implementacin del kit de herramientas. Desarrollado sobre una API third-party, el kit de herramientas personalizado es capaz de manipular los elementos de la lgica de circuito post P&R ncd (una versin binaria ilegible del xdl) convertido al formato XDL Xilinx. El mecanismo y razn de ser del conjunto de instrumentos propuestos son cuidadosamente descritos, que cubre la deteccin de enrutamiento y los enfoques para la reparacin. El conjunto de herramientas desarrollado tiene como objetivo lograr redes de enrutamiento estrictamente idnticos para la lgica de doble carril, tanto para posicionamiento separado como para el entrelazado. Este captulo particularmente especifica las bases tcnicas para apoyar las implementaciones en los dispositivos de Xilinx y su flexibilidad para ser utilizado sobre otras aplicaciones. El captulo 5 se enfoca en la aplicacin de los casos de estudio para la validacin de los grados de seguridad de la lgica propuesta. Se discuten los problemas tcnicos detallados durante la ejecucin y algunas nuevas tcnicas de implementacin. (a) Se discute el impacto en el proceso de posicionamiento de la lgica utilizando el kit de herramientas propuesto. Diferentes esquemas de implementacin, tomando en cuenta la optimizacin global en seguridad y coste, se verifican con los experimentos con el fin de encontrar los planes de posicionamiento y reparacin optimizados; (b) las validaciones de seguridad se realizan con los mtodos de correlacin y anlisis de tiempo; (c) Una tctica asinttica se aplica a un ncleo AES sobre BCDL estructurado para validar de forma sofisticada el impacto de enrutamiento sobre mtricas de seguridad; (d) Los resultados preliminares utilizando el sistema de calefaccin auto-adaptativa sobre la variacin del proceso son mostrados; (e) Se introduce una aplicacin prctica de las herramientas para un diseo de cifrado completa. Captulo 6 incluye el resumen general del trabajo presentado dentro de esta tesis doctoral. Por ltimo, una breve perspectiva del trabajo futuro se expone, lo que puede ampliar el potencial de utilizacin de las contribuciones de esta tesis a un alcance ms all de los dominios de la criptografa en FPGAs. ABSTRACT This PhD thesis mainly concentrates on countermeasure techniques related to the Side Channel Attack (SCA), which has been put forward to academic exploitations since 17 years ago. The related research has seen a remarkable growth in the past decades, while the design of solid and efficient protection still curiously remain as an open research topic where more reliable initiatives are required for personal information privacy, enterprise and national data protections. The earliest documented usage of secret code can be traced back to around 1700 B.C., when the hieroglyphs in ancient Egypt are scribed in inscriptions. Information security always gained serious attention from diplomatic or military intelligence transmission. Due to the rapid evolvement of modern communication technique, crypto solution was first incorporated by electronic signal to ensure the confidentiality, integrity, availability, authenticity and non-repudiation of the transmitted contexts over unsecure cable or wireless channels. Restricted to the computation power before computer era, simple encryption tricks were practically sufficient to conceal information. However, algorithmic vulnerabilities can be excavated to restore the encoding rules with affordable efforts. This fact motivated the development of modern cryptography, aiming at guarding information system by complex and advanced algorithms. The appearance of computers has greatly pushed forward the invention of robust cryptographies, which efficiently offers resistance relying on highly strengthened computing capabilities. Likewise, advanced cryptanalysis has greatly driven the computing technologies in turn. Nowadays, the information world has been involved into a crypto world, protecting any fields by pervasive crypto solutions. These approaches are strong because of the optimized mergence between modern mathematical theories and effective hardware practices, being capable of implement crypto theories into various platforms (microprocessor, ASIC, FPGA, etc). Security needs from industries are actually the major driving metrics in electronic design, aiming at promoting the construction of systems with high performance without sacrificing security. Yet a vulnerability in practical implementation found by Prof. Paul Kocher, et al in 1996 implies that modern digital circuits are inherently vulnerable to an unconventional attack approach, which was named as side-channel attack since then from its analysis source. Critical suspicions to theoretically sound modern crypto algorithms surfaced almost immediately after this discovery. To be specifically, digital circuits typically consist of a great number of essential logic elements (as MOS - Metal Oxide Semiconductor), built upon a silicon substrate during the fabrication. Circuit logic is realized relying on the countless switch actions of these cells. This mechanism inevitably results in featured physical emanation that can be properly measured and correlated with internal circuit behaviors. SCAs can be used to reveal the confidential data (e.g. crypto-key), analyze the logic architecture, timing and even inject malicious faults to the circuits that are implemented in hardware system, like FPGA, ASIC, smart Card. Using various comparison solutions between the predicted leakage quantity and the measured leakage, secrets can be reconstructed at much less expense of time and computation. To be precisely, SCA basically encloses a wide range of attack types, typically as the analyses of power consumption or electromagnetic (EM) radiation. Both of them rely on statistical analyses, and hence require a number of samples. The crypto algorithms are not intrinsically fortified with SCA-resistance. Because of the severity, much attention has to be taken into the implementation so as to assemble countermeasures to camouflage the leakages via "side channels". Countermeasures against SCA are evolving along with the development of attack techniques. The physical characteristics requires countermeasures over physical layer, which can be generally classified into intrinsic and extrinsic vectors. Extrinsic countermeasures are executed to confuse the attacker by integrating noise, misalignment to the intra activities. Comparatively, intrinsic countermeasures are built into the algorithm itself, to modify the implementation for minimizing the measurable leakage, or making them not sensitive any more. Hiding and Masking are two typical techniques in this category. Concretely, masking applies to the algorithmic level, to alter the sensitive intermediate values with a mask in reversible ways. Unlike the linear masking, non-linear operations that widely exist in modern cryptographies are difficult to be masked. Approved to be an effective counter solution, hiding method mainly mentions dual-rail logic, which is specially devised for flattening or removing the data-dependent leakage in power or EM signatures. In this thesis, apart from the context describing the attack methodologies, efforts have also been dedicated to logic prototype, to mount extensive security investigations to countermeasures on logic-level. A characteristic of SCA resides on the format of leak sources. Typical side-channel attack concerns the power based analysis, where the fundamental capacitance from MOS transistors and other parasitic capacitances are the essential leak sources. Hence, a robust SCA-resistant logic must eliminate or mitigate the leakages from these micro units, such as basic logic gates, I/O ports and routings. The vendor provided EDA tools manipulate the logic from a higher behavioral-level, rather than the lower gate-level where side-channel leakage is generated. So, the classical implementations barely satisfy these needs and inevitably stunt the prototype. In this case, a customized and flexible design scheme is appealing to be devised. This thesis profiles an innovative logic style to counter SCA, which mainly addresses three major aspects: I. The proposed logic is based on the hiding strategy over gate-level dual-rail style to dynamically overbalance side-channel leakage from lower circuit layer; II. This logic exploits architectural features of modern FPGAs, to minimize the implementation expenses; III. It is supported by a set of assistant custom tools, incorporated by the generic FPGA design flow, to have circuit manipulations in an automatic manner. The automatic design toolkit supports the proposed dual-rail logic, facilitating the practical implementation on Xilinx FPGA families. While the methodologies and the tools are flexible to be expanded to a wide range of applications where rigid and sophisticated gate- or routing- constraints are desired. In this thesis a great effort is done to streamline the implementation workflow of generic dual-rail logic. The feasibility of the proposed solutions is validated by selected and widely used crypto algorithm, for thorough and fair evaluation w.r.t. prior solutions. All the proposals are effectively verified by security experiments. The presented research work attempts to solve the implementation troubles. The essence that will be formalized along this thesis is that a customized execution toolkit for modern FPGA systems is developed to work together with the generic FPGA design flow for creating innovative dual-rail logic. A method in crypto security area is constructed to obtain customization, automation and flexibility in low-level circuit prototype with fine-granularity in intractable routings. Main contributions of the presented work are summarized next: Precharge Absorbed-DPL logic: Using the netlist conversion to reserve free LUT inputs to execute the Precharge and Ex signal in a dual-rail logic style. A row-crossed interleaved placement method with identical routing pairs in dual-rail networks, which helps to increase the resistance against selective EM measurement and mitigate the impacts from process variations. Customized execution and automatic transformation tools for producing identical networks for the proposed dual-rail logic. (a) To detect and repair the conflict nets; (b) To detect and repair the asymmetric nets. (c) To be used in other logics where strict network control is required in Xilinx scenario. Customized correlation analysis testbed for EM and power attacks, including the platform construction, measurement method and attack analysis. A timing analysis based method for quantifying the security grades. A methodology of security partitions of complex crypto systems for reducing the protection cost. A proof-of-concept self-adaptive heating system to mitigate electrical impacts over process variations in dynamic dual-rail compensation manner. The thesis chapters are organized as follows: Chapter 1 discusses the side-channel attack fundamentals, which covers from theoretic basics to analysis models, and further to platform setup and attack execution. Chapter 2 centers to SCA-resistant strategies against generic power and EM attacks. In this chapter, a major contribution, a compact and secure dual-rail logic style, will be originally proposed. The logic transformation based on bottom-layer design will be presented. Chapter 3 is scheduled to elaborate the implementation challenges of generic dual-rail styles. A customized design flow to solve the implementation problems will be described along with a self-developed automatic implementation toolkit, for mitigating the design barriers and facilitating the processes. Chapter 4 will originally elaborate the tool specifics and construction details. The implementation case studies and security validations for the proposed logic style, as well as a sophisticated routing verification experiment, will be described in Chapter 5. Finally, a summary of thesis conclusions and perspectives for future work are included in Chapter 5. To better exhibit the thesis contents, each chapter is further described next: Chapter 1 provides the introduction of hardware implementation testbed and side-channel attack fundamentals, and mainly contains: (a) The FPGA generic architecture and device features, particularly of Virtex-5 FPGA; (b) The selected crypto algorithm - a commercially and extensively used Advanced Encryption Standard (AES) module - is detailed; (c) The essentials of Side-Channel methods are profiled. It reveals the correlated dissipation leakage to the internal behaviors, and the method to recover this relationship between the physical fluctuations in side-channel traces and the intra processed data; (d) The setups of the power/EM testing platforms enclosed inside the thesis work are given. The content of this thesis is expanded and deepened from chapter 2, which is divided into several aspects. First, the protection principle of dynamic compensation of the generic dual-rail precharge logic is explained by describing the compensated gate-level elements. Second, the novel DPL is originally proposed by detailing the logic protocol and an implementation case study. Third, a couple of custom workflows are shown next for realizing the rail conversion. Meanwhile, the technical definitions that are about to be manipulated above LUT-level netlist are clarified. A brief discussion about the batched process is given in the final part. Chapter 3 studies the implementation challenges of DPLs in FPGAs. The security level of state-of-the-art SCA-resistant solutions are decreased due to the implementation barriers using conventional EDA tools. In the studied FPGA scenario, problems are discussed from dual-rail format, parasitic impact, technological bias and implementation feasibility. According to these elaborations, two problems arise: How to implement the proposed logic without crippling the security level; and How to manipulate a large number of cells and automate the transformation. The proposed PA-DPL in chapter 2 is legalized with a series of initiatives, from structures to implementation methods. Furthermore, a self-adaptive heating system is depicted and implemented to a dual-core logic, assumed to alternatively adjust local temperature for balancing the negative impacts from silicon technological biases on real-time. Chapter 4 centers to the toolkit system. Built upon a third-party Application Program Interface (API) library, the customized toolkit is able to manipulate the logic elements from post P&R circuit (an unreadable binary version of the xdl one) converted to Xilinx xdl format. The mechanism and rationale of the proposed toolkit are carefully convoyed, covering the routing detection and repairing approaches. The developed toolkit aims to achieve very strictly identical routing networks for dual-rail logic both for separate and interleaved placement. This chapter particularly specifies the technical essentials to support the implementations in Xilinx devices and the flexibility to be expanded to other applications. Chapter 5 focuses on the implementation of the case studies for validating the security grades of the proposed logic style from the proposed toolkit. Comprehensive implementation techniques are discussed. (a) The placement impacts using the proposed toolkit are discussed. Different execution schemes, considering the global optimization in security and cost, are verified with experiments so as to find the optimized placement and repair schemes; (b) Security validations are realized with correlation, timing methods; (c) A systematic method is applied to a BCDL structured module to validate the routing impact over security metric; (d) The preliminary results using the self-adaptive heating system over process variation is given; (e) A practical implementation of the proposed toolkit to a large design is introduced. Chapter 6 includes the general summary of the complete work presented inside this thesis. Finally, a brief perspective for the future work is drawn which might expand the potential utilization of the thesis contributions to a wider range of implementation domains beyond cryptography on FPGAs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The implementation of Internet technologies has led to e-Manufacturing technologies becoming more widely used and to the development of tools for compiling, transforming and synchronising manufacturing data through the Web. In this context, a potential area for development is the extension of virtual manufacturing to performance measurement (PM) processes, a critical area for decision making and implementing improvement actions in manufacturing. This paper proposes a PM information framework to integrate decision support systems in e-Manufacturing. Specifically, the proposed framework offers a homogeneous PM information exchange model that can be applied through decision support in e-Manufacturing environment. Its application improves the necessary interoperability in decision-making data processing tasks. It comprises three sub-systems: a data model, a PM information platform and PM-Web services architecture. A practical example of data exchange for measurement processes in the area of equipment maintenance is shown to demonstrate the utility of the model.