Results 21 to 30 of about 1,969,689 (209)
Electromagnetic Security Vulnerabilities and Instruction Disassembly of Controller in Adaptive Controllers [PDF]
A controller in adaptive control theory is a critical part in mission critical applications in military and computer-controlled systems. An ability to identify and follow the binary instruction execution in the controller part enables fault ...
Varghese Mathew Vaidyan, Akhilesh Tyagi
doaj
An Overview of Machine Learning within Embedded and Mobile Devices–Optimizations and Applications
Embedded systems technology is undergoing a phase of transformation owing to the novel advancements in computer architecture and the breakthroughs in machine learning applications.
Taiwo Samuel Ajani+2 more
doaj +1 more source
In the Republic of Korea, one of the most widely discussed subjects related to future logistics technology is the drone-based delivery (transportation) system. Much (around 75%) of Korea’s territory consists of mountainous areas; however, the costs
Jun-Ho Huh
doaj +1 more source
The Future of Cybersecurity in the Age of Quantum Computers
The first week of August 2022 saw the world’s cryptographers grapple with the second shocker of the year. Another one of the four post-quantum cryptography (PQC) algorithms selected by the NIST (National Institute of Standards and Technology) in a ...
Fazal Raheman
doaj +1 more source
Improving the Delay of Residue-to-Binary Converter for a Four-Moduli Set
The residue number system (RNS) is an unconventional number system which can be used to achieve high-performance hardware implementations of special-purpose computation systems such as digital signal processors.
MOLAHOSSEINI, A. S.
doaj +1 more source
Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment
The verifiable computation paradigm has been studied extensively as a means to verifying the result of outsourced computation. In said scheme, the verifier requests computation from the prover and verifies the result by checking the output and proof ...
Junghee Lee+4 more
doaj +1 more source
Thoughts on Architecture [PDF]
The term architecture has evolved considerably from its original Greek roots and its application to buildings and computers to its more recent manifestation for minds. This article considers lessons from this history, in terms of a set of relevant distinctions introduced at each of these stages and a definition of architecture that spans all three, and
arxiv
IoT devices are widely used in the smart home, automobile, and aerospace areas. Note, however, that recent information on thefts and hacking have given rise to many problems.
Seong-Kyu Kim, Ung-Mo Kim, Jun-Ho Huh
doaj +1 more source
Fast Hybrid Data Structure for a Large Alphabet K-Mers Indexing for Whole Genome Alignment
The most common index data structures used by whole genome aligners (WGA) are based on suffix trees (ST), suffix arrays, and FM-indexes. These data structures show good performance results as WGA works with sequences of letters over small alphabets; for ...
Rostislav Hrivnak+2 more
doaj +1 more source
NAAS: Neural Accelerator Architecture Search [PDF]
Data-driven, automatic design space exploration of neural accelerator architecture is desirable for specialization and productivity. Previous frameworks focus on sizing the numerical architectural hyper-parameters while neglect searching the PE connectivities and compiler mappings.
arxiv