Unmanned Aerial Vehicles (UAVs) have emerged as integral components in logistics systems, where their potential for efficient delivery services is being explored. However, the limited battery capacity of UAVs poses a ...
详细信息
In order to solve the problem of high cost and low efficiency in manual welding of power socket welding components, a soldering robot arm system was developed. The gripper, 5-DOF manipulator, clamp, support, and contr...
详细信息
Hardware Trojans(HTs)have drawn increasing attention in both academia and industry because of their significant potential *** this paper,we propose HTDet,a novel HT detection method using information entropybased *** ...
详细信息
Hardware Trojans(HTs)have drawn increasing attention in both academia and industry because of their significant potential *** this paper,we propose HTDet,a novel HT detection method using information entropybased *** maintain high concealment,HTs are usually inserted in the regions with low controllability and low observability,which will result in that Trojan logics have extremely low transitions during the *** implies that the regions with the low transitions will provide much more abundant and more important information for HT *** HTDet applies information theory technology and a density-based clustering algorithm called Density-Based Spatial Clustering of Applications with Noise(DBSCAN)to detect all suspicious Trojan logics in the circuit under *** DBSCAN is an unsupervised learning algorithm,that can improve the applicability of *** addition,we develop a heuristic test pattern generation method using mutual information to increase the transitions of suspicious Trojan *** on circuit benchmarks demonstrate the effectiveness of HTDet.
The integration of cloud computing and the Internet of Things (IoT) holds transformative potential across diverse industries. Performance assessment is essential to gauge the quality and efficiency of cloud computing ...
详细信息
The purpose of this research aims to monitor, analyze, and compare the performance of infrastructure as a service (IaaS) between the selective cloud providers. To assure which cloud provider has more stability, reliab...
详细信息
Cybersecurity has emerged as a critical concern in modern urban governance, as local governments now extend their responsibilities beyond traditional infrastructure management to safeguard digital systems and citizen ...
详细信息
The COVID-19 pathological test can be carried out with a sample taken from the nose, the back of the throat, or both, using a special swab. Currently, laboratories are checking through a process called Polymerase Chai...
详细信息
Bridge structures are exposed to several chronic and abrupt stressors, among which the combined effects of corrosion and earthquakes pose a major threat to their long-term safety. Probabilistic risk assessment framewo...
The edge-cloud computing is extensively deployed to provide convenient computing. A stochastic task offloading problem in edge-cloud environment is considered. For the problem under study, a greedy simulated annealing...
详细信息
In the field of high-performance computing, some application scenarios make extensive use of bit manipulation. RISC-V foundation issues B extension to reduce the number of instructions during the static compilation. B...
详细信息
暂无评论