Optical speed sensors based on the spatial frequency filter method are a proven technology that offer high measurement accuracy over a wide speed range. Newly developed variants also enable measurements at very low sp...
详细信息
This paper introduces a novel and comprehensive approach for estimating the reliability of safety critical software components in autonomous vehicle motion systems. The proposed approach in this paper presents a combi...
详细信息
The main methods of analysis the accuracy of the geolocation system were studied. The aspects of technology for obtaining geographical coordinates using Google geolocation system (GPS) were considered. The best method...
详细信息
We deigned a spiking neural network that computes network weights in the temporal dimension. Such a network can be used for artificial intelligence and deep learning. We demonstrate circuits implementing blocks for bu...
详细信息
Fog computing extends the capabilities of cloud computing by enabling computing at the edge of the network, involving devices such as mobile collaborative devices or fixed nodes with integrated storage, computing, and...
详细信息
This paper describes the development of an IoT device prototype for measuring biogas release parameters. Through the device, measurements are made, and statistics are accumulated based on which calculations are perfor...
详细信息
Most of the sensor devices in the Internet of Things systems are based on energy-efficient microcontrollers, the computing resources of which are limited, as well as the amount of available memory. Increasing the secu...
详细信息
ISBN:
(数字)9798350384499
ISBN:
(纸本)9798350384505
Most of the sensor devices in the Internet of Things systems are based on energy-efficient microcontrollers, the computing resources of which are limited, as well as the amount of available memory. Increasing the security of the use of such devices with the help of neural networks is an important and urgent problem. The article describes the possibility of using artificial neural networks in small microcontrollers with limited resources. The purpose of this work is to check the possibility of calculating neural networks based on integer arithmetic to reduce the time of calculating a neural network and eliminate data normalization operations, as well as to evaluate the feasibility of using such neural networks in the field of security of the Internet of Things in comparison with traditional methods, such as black lists and white lists. The following results were obtained: when switching to integer arithmetic, compared to floating point, the accuracy of the result calculations is within the permissible error of neural network training, that is, it has not changed. Execution time decreased by $30-96 \%$ , depending on the architecture of the microcontroller. The program size is reduced by $22-48 \%$ , also depending on the microcontroller architecture. Conclusions: the possibility and expediency of using neural networks optimized for microcontrollers with limited resources was proved. This will increase the security of Internet of Things systems, especially against device authentication threats and intrusion detection. Prospects for further research are determined.
In object-oriented programming languages, objects with polymorphic attributes can negatively impact performance and hinder static analysis. These attributes require dynamic dispatch, which is slower than static bindin...
详细信息
ISBN:
(纸本)9798400708688
In object-oriented programming languages, objects with polymorphic attributes can negatively impact performance and hinder static analysis. These attributes require dynamic dispatch, which is slower than static binding, and complicate the analysis process. We propose a novel algorithm for object specialization that addresses this issue by replacing polymorphic attributes with monomorphic ones, resulting in improved performance and simplified static analysis. Our algorithm is a new approach compared to existing function specialization algorithms. We provide a proof of the algorithm’s soundness and correctness, and present an implementation of the algorithm as a software tool. Empirical evaluation shows that our approach achieves significant improvements in performance and simplifies the static analysis process. Our algorithm can be applied to a variety of object-oriented languages such as Java and Python.
This work presents a practical approach of designing a functionally safe ECU for automotive application by implementing the Model Based Development (MBD) methodology. Functional safety (FuSa) in automotive can be achi...
This work presents a practical approach of designing a functionally safe ECU for automotive application by implementing the Model Based Development (MBD) methodology. Functional safety (FuSa) in automotive can be achieved by strictly following the processes of electrical and electronic systems development as given in the ISO 26262. The scope of FuSa encompasses the risks emerging from systematic failures and random hardware failures. One approach to mitigate these failures is the Model Based Development (MBD) on which the ISO 26262 provides guidance. This approach enables to model an ECU and accelerates an IP creation by automatic RTL code generation for rapid prototyping on an FPGA level. In this work the MBD is implemented in accordance to the ISO 26262 to design and test a hardware model of an embedded ECU. The embedded Design under Test (DUT) is simulated and its output verified in Matlab/Simulink. Upon successful results, the RTL codes of the DUT are generated for a target FPGA. The RTL codes are simulated and the functionality of the DUT is verified at the FPGA level.
In this work, the effectiveness of using classical machine learning methods and modern deep neural network models for intrusion detection in computer networks has been investigated. The purpose of this work is to deve...
详细信息
ISBN:
(数字)9798350384499
ISBN:
(纸本)9798350384505
In this work, the effectiveness of using classical machine learning methods and modern deep neural network models for intrusion detection in computer networks has been investigated. The purpose of this work is to develop a model for detecting intrusions into computer networks based on the Transformer model using tabular input data. In this work, the UNSW-NB15 dataset is used as the source data. This dataset contains information about normal network behaviour as well as during synthetic intrusions. Models for intrusion detection in computer networks based on machine learning methods were investigated: Decision Tree, KNN, Logistic Regression, SVM, Gradient Boosting, Random Forest. A method of converting tabular data into images was developed, which made it possible to build intrusion detection models based on Vision Transformer and Vision Transformer for small-size datasets on modern Transformer architecture. The research results showed that developed model based on Vision Transformer and Vision Transformer for small-size datasets improves the quality of identification, and eliminates the need for a preprocessing step such as dimensionality reduction.
暂无评论