In the research paper titled "design and Implementation of Biometric Blockchain Authentication for VANET Security,"the authors propose a comprehensive solution to enhance the security of Vehicular Ad Hoc Net...
详细信息
Aiming at the coordinated control problem of grid-connected inverters in distributed generation systems, a control strategy based on distributed algorithms is designed. A 50kW experimental platform consisting of 12 in...
详细信息
In this paper, the computer image visual communication system is designed and the function of this system is analyzed. Then, based on the hardware design, this paper re-confirms the position, proportion and Angle info...
详细信息
In order to meet the control requirements of key matrix in different human-computer interaction scenarios, realize the hardware universal design of key matrix, improve key response time, and enhance the efficiency of ...
详细信息
The SODA Synthesizer is an open-source, modular, end-to-end hardware compiler framework. The SODA frontend, developed in MLIR, performs system-level design, code partitioning, and high-level optimizations to prepare t...
详细信息
ISBN:
(纸本)9781450392174
The SODA Synthesizer is an open-source, modular, end-to-end hardware compiler framework. The SODA frontend, developed in MLIR, performs system-level design, code partitioning, and high-level optimizations to prepare the specifications for the hardware synthesis. The backend is based on a state-of-the-art high-level synthesis tool and generates the final hardware design. The backend can interface with logic synthesis tools for field programmable gate arrays or with commercial and open-source logic synthesis tools for application-specific integrated circuits. We discuss the opportunities and challenges in integrating with commercial and open-source tools both at the frontend and backend, and highlight the role that an end-to-end compiler framework like SODA can play in an open-source hardware design ecosystem.
This paper presents a control strategy for a multivariable system of an interacting Coupled Tank system (CTS). A conventional Proportional Integral Derivative (PID) controller technique is used, to maintain the water ...
详细信息
This paper investigates the joint active transceiver and passive beamforming design to maximize the weighted sum-rate (WSR) of an IRS-aided multi-streams multiuser multiple-input multiple-output broadcast channel (MIM...
详细信息
This paper investigates the joint active transceiver and passive beamforming design to maximize the weighted sum-rate (WSR) of an IRS-aided multi-streams multiuser multiple-input multiple-output broadcast channel (MIMO-BC) downlink transmission system. Due to the coupling of the transceiver parameters, the considered WSR optimization problem is highly non-convex and thus challenging to solve. Different from the normally used methods, such as the weighted minimum mean-square error (WMMSE), we rely on the matrix fractional programming (MFP) theory to derive an effective algorithm to the WSR problem. Specifically, we reformulate the original problem into a tractable one by exploiting the special structure of the objective function, i.e., a MFP which involves a matrix ratio inside a logarithm in the objective function. An alternating optimization (AO) framework is then devised to decompose the reformulated problem into four subproblems, which optimize the introduced auxiliary variable, the transmit beamforming matrix, the receive matrix, and the reflecting beamforming matrix by fixing other variables respectively. Through the matrix quadratic transform, we reformulate the MFP problem as a convex one, and thus obtain the optimal transmit beamforming matrix. By leveraging the optimality conditions for unconstrained optimization problems, the optimal receive beamforming matrix and the introduced auxiliary variable are derived in closed form. For solving the passive beamforming subproblem, we propose an iterative algorithm based on successive convex approximation (SCA). Since the computational complexity of SCA is relatively high, we propose a computationally efficient method based on manifold optimization (MO) to optimize the passive beamforming matrix. Finally, we also consider the robust beamforming design when the system suffers from imperfect CSI. Simulation results demonstrate the effectiveness of the proposed methods.
In view of the actual characteristics of conceptual design and artistic modeling design, this paper proposes a modeling idea for handicraft design carving design based on Polygon modeling. This article introduces the ...
详细信息
With the development of science and technology, artificial intelligence technology has gradually matured and has been widely used in the field of computer-aideddesign. Based on artificial intelligence, a comprehensiv...
详细信息
To help prevent hardware security vulnerabilities from propagating to later design stages where fixes are costly, it is crucial to identify security concerns as early as possible, such as in RTL designs. In this work,...
详细信息
ISBN:
(纸本)9781450392174
To help prevent hardware security vulnerabilities from propagating to later design stages where fixes are costly, it is crucial to identify security concerns as early as possible, such as in RTL designs. In this work, we investigate the practical implications and feasibility of producing a set of security-specific scanners that operate on Verilog source files. The scanners indicate parts of code that might contain one of a set of MITRE's common weakness enumerations (CWEs). We explore the CWE database to characterize the scope and attributes of the CWEs and identify those that are amenable to static analysis. We prototype scanners and evaluate them on 11 open source designs - 4 system-on-chips (SoC) and 7 processor cores - and explore the nature of identified weaknesses. Our analysis reported 53 potential weaknesses in the OpenPiton SoC used in Hack@DAC-21, 11 of which we confirmed as security concerns.
暂无评论