Results 61 to 70 of about 132,994 (259)

Self‐Powered Bearing Sensing and Real‐Time Fault Diagnosis Enabled by Non‐Invasive Triboelectric Sensors and Edge AI Acceleration

open access: yesAdvanced Science, EarlyView.
This study achieves the synergistic integration of self‐powered sensing and edge AI acceleration to establish a real‐time fault diagnosis system. The proposed TENG‐based self‐powered bearing sensor (NSE‐TBS) and FPGA‐accelerated edge AI framework fundamentally break through the inherent limitations of conventional monitoring systems, including complex ...
Kehui Zhu   +7 more
wiley   +1 more source

Reliability Analysis of the LEON3 Memory Subsystem Under Single-Event Upsets: Cache, AHB Interface, and Memory Controller Vulnerability

open access: yesInformation
This paper presents a register-transfer-level (RTL) fault injection study of the LEON3 processor’s internal memory subsystem under single-event upsets (SEUs). The analysis targets four key components: the instruction cache (I-cache), data cache (D-cache),
Afef Kchaou, Sehmi Saad, Hatem Garrab
doaj   +1 more source

Assessing the Impact of Promotions on Consumer Purchasing Behavior During Crises

open access: yesAgribusiness, EarlyView.
ABSTRACT Understanding how households modify their food expenditure decisions during times of crisis is essential because consumer purchasing behavior frequently changes during these times. This study looks at these behavioral shifts during the COVID‐19 pandemic, concentrating on how price sensitivity and response to sales promotions changed over the ...
Wafa Mehaba, José María Gil
wiley   +1 more source

Impact of Memory Hierarchy on Memory Encryption Performance

open access: yesIEEE Access
Memory encryption with authentication protects critical applications from attackers with physical access. Memory encryption introduces memory access latency overhead due to the cryptographic computations and metadata accesses in DRAM.
Viktor V. Prutyanov   +4 more
doaj   +1 more source

A Study on Performance and Power Efficiency of Dense Non-Volatile Caches in Multi-Core Systems

open access: yes, 2017
In this paper, we present a novel cache design based on Multi-Level Cell Spin-Transfer Torque RAM (MLC STTRAM) that can dynamically adapt the set capacity and associativity to use efficiently the full potential of MLC STTRAM.
Arjomand, Mohammad   +3 more
core   +1 more source

An Autonomous Large Language Model‐Agent Framework for Transparent and Local Time Series Forecasting

open access: yesAdvanced Intelligent Discovery, EarlyView.
Architecture of the proposed large language model (LLM)‐based agent framework for autonomous time series forecasting in thermal power generation systems. The framework operates through a vertical pipeline initiated by natural language queries from users, which are processed by the LLM Agent Core powered by Llama.cpp and a ReAct loop with persistent ...
William Gouvêa Buratto   +5 more
wiley   +1 more source

The International Classification of Cognitive Disorders in Epilepsy (IC‐CoDE) Portal: An open source resource for neuropsychological research in epilepsy

open access: yesEpilepsia, EarlyView.
Abstract Objective The International Classification of Cognitive Disorders in Epilepsy (IC‐CoDE) is a consensus‐based, empirically‐driven approach to standardize cognitive phenotyping in epilepsy research that has quickly garnered interest within the epilepsy community. However, manually generating IC‐CoDE phenotypes in group data is laborious and time‐
Robyn M. Busch   +11 more
wiley   +1 more source

Performance Assessment of the Immersed Boundary Method in the Framework of the Moment Representation Lattice Boltzmann Method

open access: yesInternational Journal for Numerical Methods in Fluids, EarlyView.
The immersed boundary method (IBM) was coupled with the moment representation lattice Boltzmann method (MR‐LBM), reducing bandwidth requirements compared to population‐based LBM formulations. A systematic assessment of IBM parameters was conducted to quantify their effect on computational performance.
Marco A. Ferrari   +2 more
wiley   +1 more source

A Sampling Algorithm for Software Prefetching Using Memory Access Traces [PDF]

open access: yesJisuanji gongcheng
Software prefetching, an important technology for improving data access performance, has received widespread attention and has been used in several applications.
LIU Daxing, GU Naijie, HUANG Zhangjin, SU Junjie, QI Dongsheng
doaj   +1 more source

On the Incomparability of Cache Algorithms in Terms of Timing Leakage [PDF]

open access: yesLogical Methods in Computer Science, 2019
Modern computer architectures rely on caches to reduce the latency gap between the CPU and main memory. While indispensable for performance, caches pose a serious threat to security because they leak information about memory access patterns of programs ...
Pablo Cañones, Boris Köpf, Jan Reineke
doaj   +1 more source

Home - About - Disclaimer - Privacy