Technology advancements have transformed medical science and practice, leading to the vast gathering of a wide range of medical data. Medical researchers use artificial intelligence techniques extensively because they...
详细信息
Advanced Encryption Standard (AES), which is approved and published by Federal Information Processing Standard (FIPS), is a cryptographic algorithm that can be used to protect electronic data. The AES algorithm can be...
详细信息
ISBN:
(纸本)9783319009506
Advanced Encryption Standard (AES), which is approved and published by Federal Information Processing Standard (FIPS), is a cryptographic algorithm that can be used to protect electronic data. The AES algorithm can be programmed in software or hardware. This paper presents encryption time comparison of the AES algorithm on FPGA and computer. In the study, Verilog HDL and C programming language is used on the FPGA and computer, respectively. The AES algorithm with 128-bit input and key length 128-bit (AES-128) was simulated on Xilinx ISE Design Suite 13.3. It was observed that, the AES algorithm runs on the FPGA faster than on a computer. We measured the time of encryption on FPGA and computer. Encryption time is 390ns of AES on FPGA and 11 μs of AES on a computer.
In this paper, a Safety System-on-Chip based on the open-source RISC-V processor SweRV EH1 from Western Digital is presented. A hardware comparator concept is followed. The SSoC is implemented on a Xilinx FPGA system ...
详细信息
The purpose of my HCI research is to use the Design Patterns approach to establish a framework to support designing WIMP User Interfaces. In this paper I will introduce the WIMP+ User Interfaces and the idea to use th...
详细信息
ISBN:
(纸本)1581132484
The purpose of my HCI research is to use the Design Patterns approach to establish a framework to support designing WIMP User Interfaces. In this paper I will introduce the WIMP+ User Interfaces and the idea to use the Acquisition-Computation-Expression-Execution [6] (ACEE) Design Pattern to build the framework.
This paper explores how to implement an iteratively staged domain-specific language (DSL) by embedding into a functional language. The domain is modelling and simulation of physical systems where models are expressed ...
详细信息
computers have been employed within the field of education for many years, often with disappointing results. However, recent and current research within the field of artificial intelligence (AI) is having a positive i...
详细信息
computers have been employed within the field of education for many years, often with disappointing results. However, recent and current research within the field of artificial intelligence (AI) is having a positive impact on educational applications. For example, there now exist ICAI (intelligent computer-assisted instruction) systems to teach or tutor many different subjects; several such systems are discussed herein. In addition to CAI (computer-assisted instruction) systems, we discuss the development of learning environments that are designed to facilitate student-initiated learning. A third major application is the use of expert systems to assist with educational diagnosis and assessment. During the course of our discussion of these three major application areas, we indicate where AI has already played a major role in the development of such systems and where further research is required in order to overcome current limitations.
Several standards and guidelines give advice on the development of qualitative and quantitative criteria to evaluate safety related systems, in order to apply these in safety critical applications. These standards don...
详细信息
ISBN:
(纸本)9784883254194
Several standards and guidelines give advice on the development of qualitative and quantitative criteria to evaluate safety related systems, in order to apply these in safety critical applications. These standards don't take into account the possibility of an external attack on the safety related system. In this paper, we will describe the current situation and explore methods and models for security and safety related systems with the help of Markov-models.
This paper deals with the multi-choice transportation problem (TP) in which the parameters of the TP such as the cost coefficients of the objective function, supplies and demands of the constraints are all followed mu...
详细信息
In recent years, the protection of the intellectual property rights of digital media has become a considerable issue. Especially using digital image editing tools has made it very easy and fast to manipulate images. T...
详细信息
Speech is a natural way of communicating between human beings and as such, it triggers an interest of transforming it to a way of interaction with a computer as well. Once it is converted into a sequence of words, it ...
详细信息
暂无评论