Results 11 to 20 of about 1,552,847 (293)
Survey of Control-Flow Integrity Techniques for Embedded and Real-Time Embedded Systems [PDF]
Computing systems, including real-time embedded systems, are becoming increasingly connected to allow for more advanced and safer operation. Such embedded systems are resource-constrained, such as lower processing capabilities, as compared to general purpose computing systems like desktops or servers.
arxiv +1 more source
Differentiable Architecture Search Algorithm Based on Global Comparison
Manually building neural network models is a great test of researchers’ knowledge reserves, so using Neural Architecture Search (NAS) to automatically construct neural networks is becoming increasingly popular.
Xianglun Zeng, Hongxiang Xiao
doaj +1 more source
Modelica for Embedded Systems [PDF]
New language elements are introduced in Modelica 3.1 to facilitate use Modelica models in embedded systems, e.g., as controllers. Models can be conveniently configured by marking the borders of the respective controller parts and by defining the mapping of the marked parts to target processors and target tasks. This approach allows to define a “logical”
Elmqvist, Hilding+4 more
openaire +2 more sources
Location Prediction Model Based on the Internet of Vehicles for Assistance to Medical Vehicles
Along with the Internet of Vehicles, some intelligent systems can help the medical vehicles transport medical supplies and patients. In terms of emergency issues like catastrophic natural disasters or serious accidents, safe and timely transportation for
Jiujun Cheng+7 more
doaj +1 more source
Verifying the Correctness of Workflow Systems Based on Workflow Net With Data Constraints
The correctness verification is very important for workflow systems. It is closely related with both control-flows and data-flows. Workflow nets with data (WFD-nets) are a kind of formal model that can reflect some logical structures of workflow systems,
Yaqiong He+5 more
doaj +1 more source
A secure and efficient range query method for two‐layer wireless sensor networks
Traditional range query methods of work still have shortcomings in node energy consumption and privacy security, so a two‐layer secure and efficient range query method for wireless sensor networks is proposed.
Yun Deng, Yanping Kang
doaj +1 more source
A software radio platform based on ARM and FPGA
The rapid rise in computational performance offered by computer systems has greatly increased the number of practical software radio applications. A scheme presented in this paper is a software radio platform based on ARM and FPGA.
Yang Xin., Li Zhengxiang.
doaj +1 more source
Mobile Plant Disease Classifier, Trained with a Small Number of Images by the End User
Mobile applications that can be used for the training and classification of plant diseases are described in this paper. Professional agronomists can select the species and their diseases that are supported by the developed tool and follow an automatic ...
Nikos Petrellis+3 more
doaj +1 more source
CitiusSynapse: A Deep Learning Framework for Embedded Systems
As embedded systems, such as smartphones with limited resources, have become increasingly popular, active research has recently been conducted on performing on-device deep learning in such systems.
Seungtae Hong, Hyunwoo Cho, Jeong-Si Kim
doaj +1 more source
In this paper, an output capacitor-less low-dropout (LDO) regulator with 99.99% current efficiency using active feedforward compensation (AFFC) and reverse nested Miller compensation (RNMC) is implemented.
Gwang Sub Kim+3 more
doaj +1 more source