Secure computing necessitates hardware root of trust (RoT) integrated in Systems-on-Chips (SoCs) for cryptographic keys generation, authentication and identification. In this paper, we observe that bitflips in SRAM ce...
Secure computing necessitates hardware root of trust (RoT) integrated in Systems-on-Chips (SoCs) for cryptographic keys generation, authentication and identification. In this paper, we observe that bitflips in SRAM cells that appear while accessing multiple cells from the same bitline, are not stochastic, as previously considered, but systematic. Based on this observation, a novel strong in-memory Physical Unclonable Function (PUF) computation is proposed for harvesting static entropy from SRAM arrays. The proposed design is compatible with existing in-SRAM computing architectures. To verify our PUF operation, we implement a 6T SRAM array model that performs in-memory computing using a 32 nm CMOS Technology, and, through SPICE simulation, we evaluate the proposed PUF performance. The proposed PUF operation achieves uniqueness and uniformity of 49.99%, and 49.74%, respectively, and reliability higher than 97.4% when the temperature is varied from 0°C to 100°C, and higher than 95.2% when the nominal voltage supply is varied by 10%. Furthermore, we explore the scaling of the number of Challenge Response Pairs (CRPs) of the proposed PUF, and we compare it against the state-of-the-art. Our PUF offers orders of magnitude higher number of CRPs, therefore it is suitable for integrated mechanisms that assure secure computing in SoCs.
The limited autonomy of flight has long been considered a significant constraint in drone systems. In the context of drone inspections of power lines, this study focuses on a drone equipped with a coil designed for au...
The limited autonomy of flight has long been considered a significant constraint in drone systems. In the context of drone inspections of power lines, this study focuses on a drone equipped with a coil designed for autonomous battery charging. Positioned atop the drone is a charging coil, and on the upper surface, there is an upward-facing camera with a restricted field-of-view (FOV), serving the crucial role of aligning the drone with power lines. This research introduces a wireless power transfer strategy to facilitate the self-charging process of the drone while maintaining its position beneath power lines. To enable the drone's autonomous approach to power lines, a method is devised to guide the drone from below. As the drone approaches the power lines, it monitors the current induced by these lines and gradually adjusts its altitude until a sufficiently high induced current is achieved. The proposed approach ensures safety, as the drone avoids direct contact with high-voltage power lines, setting it apart from other existing methods that require such contact. To the best of our knowledge, this study offers a novel approach to precisely controlling drone movements, and establishing reliable wireless power transfer from power lines. The effectiveness of the developed wireless transfer strategy has been verified through MATLAB simulations.
Graphene PN Junction (GPNJ) logic circuits received significant attention from the researchers thanks to the availability of electrostatically doped graphene PN Junction (GPNJ) device- a promising one for designing lo...
详细信息
A constructive way to assist surgeons before performing brain tumor surgery is by visualizing a three-dimensional (3D) MRI image to determine the brain tumor volume when a pre-operative examination. However, the avail...
详细信息
Handicrafts hold historical significance in representing the essence of our nation's native culture. However, these handcrafted goods still need to be explored globally, and the manufacturers frequently need help ...
详细信息
ISBN:
(数字)9798350343878
ISBN:
(纸本)9798350343885
Handicrafts hold historical significance in representing the essence of our nation's native culture. However, these handcrafted goods still need to be explored globally, and the manufacturers frequently need help connecting directly with larger markets and potential customers. The scope of this project is bound to Kondapalli Toys, also known as Kondapalli Bommalu, renowned wooden handicrafts originating from Andhra Pradesh, India. The current resources for resolving this issue are not easily available on the market, and there is a lack of a user-friendly application. A dedicated Android application is needed to strengthen the handicraft business. This application enables artisans and potential customers to communicate effortlessly, guaranteeing secure transactions, offering valuable data insights, and providing resources for skill and capacity development. The user interface for this application was developed using the Flutter framework, which prioritizes data security and is scalable and region-adaptive. Through this application, manufacturers can conveniently reach markets while customers have the opportunity to explore and connect with their businesses, allowing them to display their craft items to a global audience.
Early diagnosis and treatment planning are greatly aided by the early identification of brain tumors. Because of its high resolution, low radiation, and low risk of patient discomfort, magnetic resonance imaging (MRI)...
Early diagnosis and treatment planning are greatly aided by the early identification of brain tumors. Because of its high resolution, low radiation, and low risk of patient discomfort, magnetic resonance imaging (MRI) is frequently used to diagnose brain tumors. Brain tumor identification is only one area where recent developments in convolutional neural networks (CNNs) have shown exceptional effectiveness. This article summarizes recent progress in detecting brain tumors by utilizing MRI images and bespoke CNN layers with transfer learning. The review kicks off with a discussion of the difficulties of detecting brain cancers, such as the tumors' complexity and heterogeneity and the scarcity of available annotated data. The article proceeds to go into the foundations of CNNs and their applicability to MRI image processing. To improve detection accuracy, we incorporate custom CNN layers that are tailored to capture salient tumor-specific information. The concept of transfer learning, in which CNN models trained on large-scale datasets are repurposed for brain tumor detection, is also discussed at length in the review. Using transfer learning, we can take advantage of what we've learned about general image identification to better train models to spot brain tumors. Fine-tuning, feature extraction, and other transfer learning methods are addressed at length. Recent research using custom CNN layers and transfer learning approaches to detect brain cancers in MRI images is thoroughly analyzed in this study. Among the benefits and drawbacks discussed are the methods' adaptability to small datasets, enhanced detection accuracy, and decreased training time. Also, the significance of using metrics for measuring performance and benchmark datasets for comparing methods fairly is discussed. The analysis concludes with suggestions for future study, such as the combination of functional and diffusion tensor imaging with conventional MRI scans to better detect brain tumors. Further
Whenever a read operation is performed in a flash memory storage device, the surrounding cells in the same block are affected and their reliability gradually decreases. This phenomenon is known as read disturb problem...
Whenever a read operation is performed in a flash memory storage device, the surrounding cells in the same block are affected and their reliability gradually decreases. This phenomenon is known as read disturb problem. A remedy to this read disturb is to count the number of read operations for each block and perform read reclaim, the process of moving the existing data to a new block when the count reaches a predefined threshold. However, as the number of blocks in the flash memory device increases, maintaining the per-block read count requires a great amount of memory space in the controller. Therefore, system designers are forced to maintain read counts for a group of blocks (i.e. superblock) which results in the loss of accuracy. This paper proposes novel read disturb management schemes that can reduce the number of read reclaims significantly even if the read count is maintained for each superblock. In the proposed Pointer-based scheme, we keep track of the last block read so as to avoid excessive increase in the read count when the data is read sequentially. We also propose the Bitmap-based scheme that can successfully approximate the actual read count in the presence of random reads, with a negligible space overhead. Our experiments with real-world traces show that the Pointer-based scheme and the Bitmap-based scheme reduce the number of read reclaims by 65.5% and 90.5% on average, respectively, compared to the conventional scheme.
On social media platforms, people express their views in various ways, sometimes using formal words and sometimes in informal form. The informal conversations may contain jargon words i.e. slang words which might be i...
On social media platforms, people express their views in various ways, sometimes using formal words and sometimes in informal form. The informal conversations may contain jargon words i.e. slang words which might be improper for all kinds of audience. In this work, an attempt has been made to identify slang words in a text, posted on the social media platform. The overall experiment has been carried out in 4 modules. In module-1, the suspicious words from the posted text have been identified using minimum edit distance. This experiment has been implemented by the help of a dataset of printable slang words collected from Kaggle. In module-2, the topic of discussion has been analyzed by using a knowledge based approach. This part of the experiment has been carried out by creating a newspaper archive from the online repository of the "Times of India" newspaper. But, this knowledge based strategy could not produce an appreciable accuracy at its baseline. Therefore, as a modification of this technique, in module-3, the context analysis task has been implemented combining knowledge based approach and machine learning based approach. In module-4, the module-1 and module-3 are merged to tag a suspicious word with its level of abusiveness.
Recently, blockchain technology has been used to build private and secure internet of things (IoT) data markets and trading systems. Reputation of the trading parties is an important attribute that affect their profit...
详细信息
We explore machine unlearning (MU) in the domain of large language models (LLMs), referred to as LLM unlearning. This initiative aims to eliminate undesirable data influence (e.g., sensitive or illegal information) an...
详细信息
暂无评论