In this paper, a modified power and data transmitter with high data rate to carrier frequency ratio (DRCF) is proposed for medical implants. The transmitter sends data and power through an inductive link which its pri...
详细信息
ISBN:
(数字)9798350376340
ISBN:
(纸本)9798350376357
In this paper, a modified power and data transmitter with high data rate to carrier frequency ratio (DRCF) is proposed for medical implants. The transmitter sends data and power through an inductive link which its primary coil is driven by a class-E power amplifier. The data rate is independent of the elements of the class-E power amplifier (especially RFC and the primary coil). Hence, the data rate can be increased up to the carrier frequency. In the previously proposed transmitter two different power supplies (main and auxiliary) are used. The auxiliary one delivers a negative power which should be transferred to the main power supply so that the saved power is reused. This complexity is solved in the proposed circuit. A proof-of-concept prototype of the proposed transmitter implemented on printed circuit board works at 1 MHz carrier frequency. The data rate is equal to 500 kbps. The power delivered to the load is 53 mW and the power efficiency is close to 58%.
Pistachios are nutritious nuts that are sorted based on the shape of their shell into two categories: Open mouth and Closed mouth. The open-mouth pistachios are higher in price, value, and demand than the closed-mouth...
详细信息
This paper presents a novel contribution to the field of regional style transfer. Existing methods often suffer from the drawback of applying style homogeneously across the entire image, leading to stylistic inconsist...
详细信息
The COVID-19 epidemic has had a huge impact on the educational landscape, prompting the adoption of online and remote learning as viable alternatives to conventional in-person instruction. In order to create effective...
详细信息
Nowadays, the drug discovery field of molecules in protein-ligand interactions developing effective therapeutics for identifying potential drug candidates with spatial features to predict binding affinity. However, th...
详细信息
The conventional network dimensioning and optimization approaches prioritize coverage and capacity as the most vital components. However, handover signaling overhead has emerged as a critical concern in the emerging c...
详细信息
Remote Power Analysis (RPA) attacks have demonstrated the ability to reveal secret keys from cryptographic implementations. RPA attacks have been demonstrated on Advanced Encryption Standard (AES) circuits running on ...
详细信息
ISBN:
(数字)9798331530983
ISBN:
(纸本)9798331530990
Remote Power Analysis (RPA) attacks have demonstrated the ability to reveal secret keys from cryptographic implementations. RPA attacks have been demonstrated on Advanced Encryption Standard (AES) circuits running on Field Programmable Gate Arrays (FPGAs). Thus far, RPA attacks were conducted using classical attacks such as correlation power analysis attacks (CPA).This paper presents a comprehensive study on the application of machine learning (ML) algorithms to improve the efficacy of RPA attacks against AES. We explore the integration of Convolutional Neural networks (CNNs) and Multi-Layer Perceptrons (MLPs) within the state-of-the-art AISY framework (initially proposed for classical power analysis attacks) to detect and exploit RPA vulnerabilities in AES-encrypted FPGA systems. The proposed methodology involves capturing power traces using a Time-to-Digital Converter (TDC) on-chip sensor during AES operations and then using MLP and CNN models to conduct RPA attacks to evaluate security. We demonstrate that ML-enhanced RPAs can significantly increase attack success rates while requiring fewer data samples. Our results show that CNN-based RPA attacks can reveal the secret within 10,000 traces. The research underscores the need for ongoing innovation in cryptographic defences to counteract the evolving threat landscape.
In the past few years, with the continuous development of deep reinforcement learning, the application of deep reinforcement has been set off within the realms of self-driving vehicle technology, game games, and natur...
详细信息
With the rapid development of large-scale language models, Retrieval-Augmented Generation (RAG) has been widely adopted. However, existing RAG paradigms are inevitably influenced by erroneous retrieval information, th...
详细信息
ISBN:
(数字)9798350352719
ISBN:
(纸本)9798350352726
With the rapid development of large-scale language models, Retrieval-Augmented Generation (RAG) has been widely adopted. However, existing RAG paradigms are inevitably influenced by erroneous retrieval information, thereby reducing the reliability and correctness of generated results. Therefore, to improve the relevance of retrieval information, this study proposes a method that replaces traditional retrievers with GPT-3.5, leveraging its vast corpus knowledge to generate retrieval information. We also propose a web retrieval based method to implement fine-grained knowledge retrieval, Utilizing the powerful reasoning capability of GPT-3.5 to realize semantic partitioning of problem. In order to mitigate the illusion of GPT retrieval and reduce noise in Web retrieval, we proposes a multi-source retrieval framework, named MSRAG, which combines GPT retrieval with web retrieval. Experiments on multiple knowledge-intensive QA datasets demonstrate that the proposed framework in this study performs better than existing RAG framework in enhancing the overall efficiency and accuracy of QA systems.
Data security is essential to the e-healthcare industry for protecting patients' confidential information. It is necessary to continuously monitor the patient's health to give them the proper medical care. The...
详细信息
暂无评论