Soldering irons are a hand tool that is indispensable in the process of making small series of electronic devices. Soldering irons have evolved from very simple devices without temperature control to devices with comp...
详细信息
Over the past two decades, the rise in video streaming has been driven by internet accessibility and the demand for high-quality video. To meet this demand across varying network speeds and devices, transcoding is ess...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web o...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web of challenges, prominently centered around potential threats and data security implications. Recent cryptography techniques, such as DNA-based cryptography, 3D chaos-based cryptography, and optical cryptography, face challenges including large encryption times, high energy consumption, and suboptimal rather than optimal performance. Particularly, the burden of long encryption cycles strains the energy resources of typical low-power and compact IoT devices. These challenges render the devices vulnerable to unauthorized breaches, despite large storage capacities. The hallmark of the IoT ecosystem, characterized by its low-power compact devices, is the burgeoning volume of data they generate. This escalating data influx, while necessitating expansive storage, remains vulnerable to unauthorized access and breaches. Historically, encryption algorithms, with their multifaceted architectures, have been the bulwark against such intrusions. However, their inherently-complex nature, entailing multiple encryption cycles, strains the limited energy reserves of typical IoT devices. In response to this intricate dilemma, we present a hybrid lightweight encryption strategy. Our algorithm innovatively leverages both one-dimensional (1D) and two-dimensional (2D) chaotic key generators. Furthermore, it amalgamates a classical encryption philosophy, harmonizing the strengths of Feistel and substitution-permutation networks. The centerpiece of our strategy is achieving effective encryption in merely three rounds, tailored expressly for compressed Three-Dimensional Video (3DV) frames, ensuring their unwavering integrity. Our workflow commences with the H.264/MVC compression algorithm, setting the stage for the subsequent encryption phase. Through rigorous MATLAB simulations,
Nowadays, high energy amount is being wasted by computing servers and personal electronic devices, which produce a high amount of carbon dioxide. Thus, it is required to decrease energy usage and pollution. Many appli...
详细信息
Indonesia has entered a period of demographic bonus. Human resources must be optimized. The number of children who do not in employment, education or training (NEET) in each province needs attention. Several factors t...
详细信息
In this digital era, users frequently share their thoughts, preferences, and ideas through social media, which reflect their Basic Human Values. Basic Human Values (aka values) are the fundamental aspects of human beh...
详细信息
To reduce system complexity and bridge the interface between electronic and photonic circuits,there is a high demand for a non-volatile memory that can be accessed both electrically and ***,practical solutions are sti...
详细信息
To reduce system complexity and bridge the interface between electronic and photonic circuits,there is a high demand for a non-volatile memory that can be accessed both electrically and ***,practical solutions are still lacking when considering the potential for large-scale complementary metal-oxide semiconductor compatible ***,we present an experimental demonstration of a non-volatile photonic-electronic memory based on a 3-dimensional monolithic integrated ferroelectric-silicon ring *** successfully demonstrate programming and erasing the memory using both electrical and optical methods,assisted by optical-to-electrical-to-optical *** memory cell exhibits a high optical extinction ratio of 6.6 dB at a low working voltage of 5 V and an endurance of 4×10^(4) ***,the multi-level storage capability is analyzed in detail,revealing stable performance with a raw bit-error-rate smaller than 5.9×10^(−2).This ground-breaking work could be a key technology enabler for future hybrid electronic-photonic systems,targeting a wide range of applications such as photonic interconnect,high-speed data communication,and neuromorphic computing.
Kidney disease (KD) is a gradually increasing global health concern. It is a chronic illness linked to higher rates of morbidity and mortality, a higher risk of cardiovascular disease and numerous other illnesses, and...
详细信息
Scheduling tasks in overloaded real-time systems is a challenging problem that has received a significant amount of attention in recent years. The processor is overloaded with more tasks than its capacity, resulting i...
详细信息
In this article, a new coupled-inductors based three-level bipolar buck-boost ac-ac converter is proposed. The proposed converter can produce highly efficient and symmetric in-phase and antiphase buck and boost modes ...
详细信息
暂无评论