Heart diseases comprise a extensive Various heart conditions and are commonly referred to as cardio vascular diseases. These encompass issues with the rhythm of the heart, blood vessel diseases, and congenital cardiac...
详细信息
Time variant coverage, called sweep coverage in wireless sensor networks has got attention from various re-searchers in recent time. In this problem, a set of mobile sensors are collectively monitoring certain area of...
详细信息
With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem *** security significantly relies on the secu...
详细信息
With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem *** security significantly relies on the security of the underlying hardware chip,which often contains critical information,such as encryption *** understand existing IoT chip security,this study analyzes the security of an IoT security chip that has obtained an Arm Platform Security Architecture(PSA)Level 2 *** analysis shows that the chip leaks part of the encryption key and presents a considerable security ***,we use commodity equipment to collect electromagnetic traces of the *** a statistical T-test,we find that the target chip has physical leakage during the AES encryption *** further use correlation analysis to locate the detailed encryption interval in the collected electromagnetic trace for the Advanced Encryption Standard(AES)encryption *** the basis of the intermediate value correlation analysis,we recover half of the 16-byte AES encryption *** repeat the process for three different tests;in all the tests,we obtain the same result,and we recover around 8 bytes of the 16-byte AES encryption ***,experimental results indicate that despite the Arm PSA Level 2 certification,the target security chip still suffers from physical *** layer application developers should impose strong security mechanisms in addition to those of the chip itself to ensure IoT application security.
This paper presents and discusses two methods for collecting data from decentralised control applications designed in IEC 61499 architecture. The topic is justified by the growing use of Cloud-based storage and presen...
详细信息
This paper proposes three types of neural network-based attack detectors for Internet of Vehicles (IoV) networks. The proposed attack detectors consist of Long Short-Term Memory (LSTM) layers. The fault detector is im...
详细信息
Transfer-learning has rapidly become one of the most sophisticated and effective techniques in dealing with medical datasets. The most common transfer-learning method uses of a state-of-the-art model and its correspon...
详细信息
This article suggests a method for diminishing the voltage unbalance in a three-phase five-level diode-clamped inverter (DCI) through the use of hexagonal hysteresis space vector modulation (HHSVM). Capacitor voltage ...
详细信息
This article suggests a method for diminishing the voltage unbalance in a three-phase five-level diode-clamped inverter (DCI) through the use of hexagonal hysteresis space vector modulation (HHSVM). Capacitor voltage balancing leads to enhanced system efficiency, reduced stress on components, enhanced performance, abridged electromagnetic interference, and reduced total harmonic distortion. The proposed modulation technique and its implementation are thoroughly examined in this study, along with modeling and experiment data that show how efficient the method is at lowering the capacitor voltage unbalance in the proposed five-level DCI. Capacitor voltage unbalance is reduced with the use of this HHSVM approach to 0.95%, which is a superior reduction compared to traditional PWM methods. The paper also discusses the advantages of the proposed method over other existing methods, making it a promising solution for practical applications in power electronics systems.
Electric vehicles(EVs)are widely deployed throughout the world,and photovoltaic(PV)charging stations have emerged for satisfying the charging demands of EV *** paper proposes a multi-objective optimal operation method...
详细信息
Electric vehicles(EVs)are widely deployed throughout the world,and photovoltaic(PV)charging stations have emerged for satisfying the charging demands of EV *** paper proposes a multi-objective optimal operation method for the centralized battery swap charging system(CBSCS),in order to enhance the economic efficiency while reducing its adverse effects on power *** proposed method involves a multi-objective optimization scheduling model,which minimizes the total operation cost and smoothes load fluctuations,***,we modify a recently proposed multi-objective optimization algorithm of non-sorting genetic algorithm III(NSGA-III)for solving this scheduling ***,simulation studies verify the effectiveness of the proposed multi-objective operation method.
Application of very large-scale integration circuit partitioning techniques toward those of power electronic systems reduces interconnect parasitics while improving overall power density. To that end, an EDA tool is c...
详细信息
Large-scale vision-language pretraining has revolutionized zero-shot learning tasks by enabling models to effectively handle novel object categories using rich, generalized visual-language associations. However, it is...
详细信息
暂无评论