Integrated sensing and communication (ISAC) emerges as a promising technology for 6G, particularly in the millimeter-wave (mmWave) band. However, the widely utilized hybrid architecture in mmWave systems compromises m...
详细信息
The formation control problem of second-order nonholonomic systems formulated by a force-balance equation is investigated with network communication constraints. A novel event-triggered mechanism based on polynomial i...
详细信息
With the rapid development of radar jamming technology, traditional detection techniques face significant limitations in complex electromagnetic environments. Recent interference detection methods based on deep learni...
详细信息
The Advanced Encryption Standard cryptographic algorithm,named AES,is implemented in cryptographic circuits to ensure high security level to any system which required confidentiality and secure information *** of the ...
详细信息
The Advanced Encryption Standard cryptographic algorithm,named AES,is implemented in cryptographic circuits to ensure high security level to any system which required confidentiality and secure information *** of the most effective physical attacks against the hardware implementation of AES is fault attacks which can extract secret *** now,a several AES fault detection schemes against fault injection attacks have been *** this paper,so as to ensure a high level of security against fault injection attacks,a new efficient fault detection scheme based on the AES architecture modification has been *** this reason,the AES 32-bit round is divided into two half rounds and input and pipeline registers are implemented between *** proposed scheme is independent of the procedure the AES is ***,it can be implemented to secure the pipeline and iterative *** evaluate the robustness of the proposed fault detection scheme against fault injection attacks,we conduct a transient and permanent fault attacks and then we determine the fault detection capability;it is about 99.88585%and 99.9069%for transient and permanent faults *** have modeled the AES fault detection scheme using VHDL hardware language and through hardware FPGA *** FPGA results demonstrate that our scheme can efficiently protect the AES hardware implementation against fault *** can be simply implemented with low *** addition,the FPGA implementation performances prove the low area overhead and the high efficiency and working frequency for the proposed AES detection scheme.
Scheduling workflows in hybrid cloud environments presents significant challenges due to the inherent complexity of workflows and the dynamic nature of cloud resources. This complexity is further increased when attemp...
详细信息
Dear Editor,Life can utilize energy with high efficiency,especially with the help of aerobic respiration,where the tricarboxylic acid(TCA)cycle acts as an important metabolic engine for mitochondria to produce the cel...
详细信息
Dear Editor,Life can utilize energy with high efficiency,especially with the help of aerobic respiration,where the tricarboxylic acid(TCA)cycle acts as an important metabolic engine for mitochondria to produce the cell energy currency of adenosine triphosphate(ATP),and nicotinamide adenine dinucleotide(NAD)plays a particular role of energy management molecule in the TCA cycle[1].
This work focuses on advancing security research in the hardware design space by formally defining the realistic problem of Hardware Trojan (HT) detection. The goal is to model HT detection more closely to the real wo...
详细信息
As cloud computing continuum services become ever more important, the need of platforms that facilitate and manage their proper operation is unquestionable. An integral part of these platforms is a series of tools whi...
详细信息
ISBN:
(数字)9798350354232
ISBN:
(纸本)9798350354249
As cloud computing continuum services become ever more important, the need of platforms that facilitate and manage their proper operation is unquestionable. An integral part of these platforms is a series of tools which will complement day one and day two operations in the context of the application software lifecycle. This work introduces an approach towards a Service Level Objective (SLO) Violation Detection system, based on the perceived Severity of an imminent or predicted violation. This system leverages insights to stay operational and triggers appropriate reconfiguration actions by continuously considering the required conditions of good operation. The detailed architecture of the system, its operation overview as well as the required interactions with other components – parts of an adaptation ecosystem of a cloud platform, are provided. Finally, potential future improvements are discussed. Keywords—application reconfiguration, modelling, elasticity, cloud computing, service adaptation
The neural information decoding of birds in natural flight is very significant for the development of new biological robots, but there is little research at present. In this paper, we recorded the local field potentia...
详细信息
Robotic-assisted rehabilitation for wrist movements demands adaptive systems capable of balancing patient autonomy with robotic support. The integration of artificial intelligence (AI) into robotic-assisted rehabilita...
详细信息
暂无评论