Results 21 to 30 of about 1,969,689 (209)

Electromagnetic Security Vulnerabilities and Instruction Disassembly of Controller in Adaptive Controllers [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2021
A controller in adaptive control theory is a critical part in mission critical applications in military and computer-controlled systems. An ability to identify and follow the binary instruction execution in the controller part enables fault ...
Varghese Mathew Vaidyan, Akhilesh Tyagi
doaj  

An Overview of Machine Learning within Embedded and Mobile Devices–Optimizations and Applications

open access: yesSensors, 2021
Embedded systems technology is undergoing a phase of transformation owing to the novel advancements in computer architecture and the breakthroughs in machine learning applications.
Taiwo Samuel Ajani   +2 more
doaj   +1 more source

PLC-Integrated Sensing Technology in Mountain Regions for Drone Landing Sites: Focusing on Software Technology

open access: yesSensors, 2018
In the Republic of Korea, one of the most widely discussed subjects related to future logistics technology is the drone-based delivery (transportation) system. Much (around 75%) of Korea’s territory consists of mountainous areas; however, the costs
Jun-Ho Huh
doaj   +1 more source

The Future of Cybersecurity in the Age of Quantum Computers

open access: yesFuture Internet, 2022
The first week of August 2022 saw the world’s cryptographers grapple with the second shocker of the year. Another one of the four post-quantum cryptography (PQC) algorithms selected by the NIST (National Institute of Standards and Technology) in a ...
Fazal Raheman
doaj   +1 more source

Improving the Delay of Residue-to-Binary Converter for a Four-Moduli Set

open access: yesAdvances in Electrical and Computer Engineering, 2011
The residue number system (RNS) is an unconventional number system which can be used to achieve high-performance hardware implementations of special-purpose computation systems such as digital signal processors.
MOLAHOSSEINI, A. S.
doaj   +1 more source

Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment

open access: yesIEEE Access, 2020
The verifiable computation paradigm has been studied extensively as a means to verifying the result of outsourced computation. In said scheme, the verifier requests computation from the prover and verifies the result by checking the output and proof ...
Junghee Lee   +4 more
doaj   +1 more source

Thoughts on Architecture [PDF]

open access: yesarXiv, 2023
The term architecture has evolved considerably from its original Greek roots and its application to buildings and computers to its more recent manifestation for minds. This article considers lessons from this history, in terms of a set of relevant distinctions introduced at each of these stages and a definition of architecture that spans all three, and
arxiv  

A Study on Improvement of Blockchain Application to Overcome Vulnerability of IoT Multiplatform Security

open access: yesEnergies, 2019
IoT devices are widely used in the smart home, automobile, and aerospace areas. Note, however, that recent information on thefts and hacking have given rise to many problems.
Seong-Kyu Kim, Ung-Mo Kim, Jun-Ho Huh
doaj   +1 more source

Fast Hybrid Data Structure for a Large Alphabet K-Mers Indexing for Whole Genome Alignment

open access: yesIEEE Access, 2021
The most common index data structures used by whole genome aligners (WGA) are based on suffix trees (ST), suffix arrays, and FM-indexes. These data structures show good performance results as WGA works with sequences of letters over small alphabets; for ...
Rostislav Hrivnak   +2 more
doaj   +1 more source

NAAS: Neural Accelerator Architecture Search [PDF]

open access: yesarXiv, 2021
Data-driven, automatic design space exploration of neural accelerator architecture is desirable for specialization and productivity. Previous frameworks focus on sizing the numerical architectural hyper-parameters while neglect searching the PE connectivities and compiler mappings.
arxiv  

Home - About - Disclaimer - Privacy