This paper studies the intelligent aided decision making based on Web and building information modeling. Then, based on the network global information network and functional components, this paper builds a network BIM...
详细信息
Modern computing systems involve huge data exchange across various sections of the processing system. To facilitate this, network-on-chip (NoC) serves as a crucial infrastructure that connects the processing cores to ...
详细信息
Modern computing systems involve huge data exchange across various sections of the processing system. To facilitate this, network-on-chip (NoC) serves as a crucial infrastructure that connects the processing cores to memory, peripherals, etc. The system could be put at great risk should the NoC system become compromised. The NoCs are used in multi/manycore processors;this domain is experiencing increased threats because of hardware Trojan (HT) embedded in the multicore processing systems due to the presence of third-party entities in the system-on-chip (SoC) design pipeline. Protecting user and system level privacy becomes important in such multi core systems to enable trust. By embedding an HT in an NoC, the adversary can snoop on important insights regarding the applications executing on the system or the user profile information. An attack of such calibre can compromise privacy, thereby enabling more advanced attack on the entire system. This work demonstrates the capability of a traffic analysis attack when a few HTs are embedded in the NoC switches of a multi/many-core processor. The attack is capable of exposing sensitive information to an external malicious attacker who can then analyze the payload data with sophisticated machine learning (ML) techniques to infer the applications executing on the system. We also evaluate the performance of a generative adversarial network (GAN) strengthened attacker model that offers more robustness for data paucity scenarios. We propose a simulated annealing-based randomized routing algorithm based defense for NoCs, thus thwarting the attack. The results demonstrate that the proposed randomized routing algorithm could reduce the accuracy of identifying user profiles by the attacker from >98% to <15% in multi/many-core systems.
The Posit number system presents a more flexible and precise alternative to the traditional ieee 754 floating-point format, but its inherent complexity, particularly in multiplication, can lead to high power consumpti...
详细信息
Circuit design constitutes a pillar of electronics, essential for both educational and research purposes. design of system's analog emulator is specially crucial in the field of nonlinear dynamics and chaos, as it...
详细信息
This paper proposes an alternative way of designing multiple power system stabilizers (PSSs) for damping electromechanical modes. The approach is based on a system identification method that allows the computation of ...
详细信息
An approximate dynamic programming optimization scheduling strategy combining independent microgrid day-ahead scheduling system and adaptive weighted sum algorithm is proposed. The strategy aims to minimize energy con...
详细信息
This work develops real time model and associate control for a grid-tied battery energy storage system (BESS), based on the real industrial system specifications, 362kW/1499kWh lithium-ion BESS. An active and reactive...
详细信息
The aim of this study is the design and implementation of an automated lighting system to compensate the necessary illumination of a hydroponic indoor-greenhouse in spaces with low illumination. The proposed system im...
详细信息
ISBN:
(数字)9781665490429
ISBN:
(纸本)9781665490429
The aim of this study is the design and implementation of an automated lighting system to compensate the necessary illumination of a hydroponic indoor-greenhouse in spaces with low illumination. The proposed system implements the Kalman Filter for noise reduction and an anti-windup PID tuned with PSO to reach a desired value of illumination in face of illuminance changes. In addition, an IoT web interface for monitoring the current illumination on plants is implemented, which shows a plot of the illumination throughout the day.
Operation and maintenance system is an important platform to support the deployment, operation and evaluation of distributed simulation system. The operation monitoring tool is to manage the simulation node, control t...
详细信息
The proceedings contain 228 papers. The topics discussed include: network security threat prevention and controlsystem for wind farm power monitoring system;analysis of electrical automation transformation model base...
ISBN:
(纸本)9798350378917
The proceedings contain 228 papers. The topics discussed include: network security threat prevention and controlsystem for wind farm power monitoring system;analysis of electrical automation transformation model based on Matra offset algorithm;digital design of power supply based on three-level regulation;power system visualization enhancement technology guided by force-oriented algorithms;design and implementation of a green supply chain management system for the power industry;discussion on computer-aided automatic generation of distribution network dispatching operation tickets for load transfer, power outage, and power restoration in power dispatch;research on application of digital twin technology in optimal control of distributed new energy system;and application analysis of clustering improvement algorithm in cost evaluation of power engineering.
暂无评论