Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backb...
详细信息
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519;and (ii): elliptic curve Diffie-Hellman (ECDH) based mutual authentication technique through a novel lightweight hash function. The proposed scheme attempts to efficiently counter all known perception layer security threats. Moreover, the pre-calculated key generation strategy resulted in cost-effective encryption with 192-bit curve security. It showed comparative efficiency in key strength, and curve strength compared with similar authentication schemes in terms of computational and memory cost, communication performance and encryption robustness.
Knowledge distillation (KD) compresses the network capacity by transferring knowledge from a large (teacher) network to a smaller one (student). It has been mainstream that the teacher directly transfers knowledge to ...
详细信息
Force field-based classical molecular dynamics(CMD)is efficient but its potential energy surface(PES)prediction error can be very *** functional theory(DFT)-based ab-initio molecular dynamics(AIMD)is accurate but comp...
详细信息
Force field-based classical molecular dynamics(CMD)is efficient but its potential energy surface(PES)prediction error can be very *** functional theory(DFT)-based ab-initio molecular dynamics(AIMD)is accurate but computational cost limits its applications to small ***,we propose a molecular dynamics(MD)methodology which can simultaneously achieve both AIMD-level high accuracy and CMD-level high *** high accuracy is achieved by exploiting deep neural network(DNN)’s arbitrarily-high precision to fit *** high efficiency is achieved by deploying multiplication-less DNN on a carefully-optimized special-purpose non von Neumann(NvN)computer to mitigate the performance-limiting data shuttling(i.e.,‘memory wall bottleneck’).By testing on different molecules and bulk systems,we show that the proposed MD methodology is generally-applicable to various MD *** proposed MD methodology has been deployed on an in-house computing server based on reconfigurable field programmable gate array(FPGA),which is freely available at http://***.
Increasing the life span and efficiency of Multiprocessor System on Chip(MPSoC)by reducing power and energy utilization has become a critical chip design challenge for multiprocessor *** the advancement of technology,...
详细信息
Increasing the life span and efficiency of Multiprocessor System on Chip(MPSoC)by reducing power and energy utilization has become a critical chip design challenge for multiprocessor *** the advancement of technology,the performance management of central processing unit(CPU)is *** densities and thermal effects are quickly increasing in multi-core embedded technologies due to shrinking of chip *** energy consumption reaches a threshold that creates a delay in complementary metal oxide semiconductor(CMOS)circuits and reduces the speed by 10%–15%because excessive on-chip temperature shortens the chip’s life *** this paper,we address the scheduling&energy utilization problem by introducing and evaluating an optimal energy-aware earliest deadline first scheduling(EA-EDF)based technique formultiprocessor environments with task migration that enhances the performance and efficiency in multiprocessor systemon-chip while lowering energy and power *** selection of core andmigration of tasks prevents the system from reaching itsmaximumenergy utilization while effectively using the dynamic power management(DPM)*** in the execution of tasks the temperature and utilization factor(u_(i))on-chip increases that dissipate more *** proposed approach migrates such tasks to the core that produces less heat and consumes less power by distributing the load on other cores to lower the temperature and optimizes the duration of idle and sleep times across multiple *** performance of the EA-EDF algorithm was evaluated by an extensive set of experiments,where excellent results were reported when compared to other current techniques,the efficacy of the proposed methodology reduces the power and energy consumption by 4.3%–4.7%on a utilization of 6%,36%&46%at 520&624 MHz operating frequency when particularly in comparison to other energy-aware methods for *** are running and accurately scheduled to make an energy-efficient
In video surveillance,anomaly detection requires training machine learning models on spatio-temporal video ***,sometimes the video-only data is not sufficient to accurately detect all the abnormal ***,we propose a nov...
详细信息
In video surveillance,anomaly detection requires training machine learning models on spatio-temporal video ***,sometimes the video-only data is not sufficient to accurately detect all the abnormal ***,we propose a novel audio-visual spatiotemporal autoencoder specifically designed to detect anomalies for video surveillance by utilizing audio data along with video *** paper presents a competitive approach to a multi-modal recurrent neural network for anomaly detection that combines separate spatial and temporal autoencoders to leverage both spatial and temporal features in audio-visual *** proposed model is trained to produce low reconstruction error for normal data and high error for abnormal data,effectively distinguishing between the two and assigning an anomaly *** is conducted on normal datasets,while testing is performed on both normal and anomalous *** anomaly scores from the models are combined using a late fusion technique,and a deep dense layer model is trained to produce decisive scores indicating whether a sequence is normal or *** model’s performance is evaluated on the University of California,San Diego Pedestrian 2(UCSD PED 2),University of Minnesota(UMN),and Tampere University of Technology(TUT)Rare Sound Events datasets using six evaluation *** is compared with state-of-the-art methods depicting a high Area Under Curve(AUC)and a low Equal Error Rate(EER),achieving an(AUC)of 93.1 and an(EER)of 8.1 for the(UCSD)dataset,and an(AUC)of 94.9 and an(EER)of 5.9 for the UMN *** evaluations demonstrate that the joint results from the combined audio-visual model outperform those from separate models,highlighting the competitive advantage of the proposed multi-modal approach.
We consider a class of multi-agent optimal coverage problems in which the goal is to determine the optimal placement of a group of agents in a given mission space so that they maximize a coverage objective that repres...
详细信息
The right partner and high innovation speed are crucial for a successful research and development (R&D) alliance in the high-tech industry. Does homogeneity or heterogeneity between partners benefit innovation spe...
详细信息
Mobile Crowdsensing (MCS) has emerged as a compelling paradigm for data sensing and collection, leveraging the widespread adoption of mobile devices and the active participation of numerous users. Despite its potentia...
详细信息
In the context of Intelligent Transportation systems (ITS), the role of vehicle detection and classification is indispensable for streamlining transportation management, refining traffic control, and conducting in-dep...
详细信息
Wireless Sensor Networks (WSNs) are essential for collecting and transmitting data in modern applications that rely on data, where effective network connectivity and coverage are crucial. The optimal placement of rout...
详细信息
Wireless Sensor Networks (WSNs) are essential for collecting and transmitting data in modern applications that rely on data, where effective network connectivity and coverage are crucial. The optimal placement of router nodes within WSNs is a fundamental challenge that significantly impacts network performance and reliability. Researchers have explored various approaches using metaheuristic algorithms to address these challenges and optimize WSN performance. This paper introduces a new hybrid algorithm, CFL-PSO, based on combining an enhanced Fick’s Law algorithm with comprehensive learning and Particle Swarm Optimization (PSO). CFL-PSO exploits the strengths of these techniques to strike a balance between network connectivity and coverage, ultimately enhancing the overall performance of WSNs. We evaluate the performance of CFL-PSO by benchmarking it against nine established algorithms, including the conventional Fick’s law algorithm (FLA), Sine Cosine Algorithm (SCA), Multi-Verse Optimizer (MVO), Salp Swarm Optimization (SSO), War Strategy Optimization (WSO), Harris Hawk Optimization (HHO), African Vultures Optimization Algorithm (AVOA), Capuchin Search Algorithm (CapSA), Tunicate Swarm Algorithm (TSA), and PSO. The algorithm’s performance is extensively evaluated using 23 benchmark functions to assess its effectiveness in handling various optimization scenarios. Additionally, its performance on WSN router node placement is compared against the other methods, demonstrating its competitiveness in achieving optimal solutions. These analyses reveal that CFL-PSO outperforms the other algorithms in terms of network connectivity, client coverage, and convergence speed. To further validate CFL-PSO’s effectiveness, experimental studies were conducted using different numbers of clients, routers, deployment areas, and transmission ranges. The findings affirm the effectiveness of CFL-PSO as it consistently delivers favorable optimization results when compared to existing meth
暂无评论