The Advanced Encryption Standard cryptographic algorithm,named AES,is implemented in cryptographic circuits to ensure high security level to any system which required confidentiality and secure information *** of the ...
详细信息
The Advanced Encryption Standard cryptographic algorithm,named AES,is implemented in cryptographic circuits to ensure high security level to any system which required confidentiality and secure information *** of the most effective physical attacks against the hardware implementation of AES is fault attacks which can extract secret *** now,a several AES fault detection schemes against fault injection attacks have been *** this paper,so as to ensure a high level of security against fault injection attacks,a new efficient fault detection scheme based on the AES architecture modification has been *** this reason,the AES 32-bit round is divided into two half rounds and input and pipeline registers are implemented between *** proposed scheme is independent of the procedure the AES is ***,it can be implemented to secure the pipeline and iterative *** evaluate the robustness of the proposed fault detection scheme against fault injection attacks,we conduct a transient and permanent fault attacks and then we determine the fault detection capability;it is about 99.88585%and 99.9069%for transient and permanent faults *** have modeled the AES fault detection scheme using VHDL hardware language and through hardware FPGA *** FPGA results demonstrate that our scheme can efficiently protect the AES hardware implementation against fault *** can be simply implemented with low *** addition,the FPGA implementation performances prove the low area overhead and the high efficiency and working frequency for the proposed AES detection scheme.
As cloud computing continuum services become ever more important, the need of platforms that facilitate and manage their proper operation is unquestionable. An integral part of these platforms is a series of tools whi...
详细信息
ISBN:
(数字)9798350354232
ISBN:
(纸本)9798350354249
As cloud computing continuum services become ever more important, the need of platforms that facilitate and manage their proper operation is unquestionable. An integral part of these platforms is a series of tools which will complement day one and day two operations in the context of the application software lifecycle. This work introduces an approach towards a Service Level Objective (SLO) Violation Detection system, based on the perceived Severity of an imminent or predicted violation. This system leverages insights to stay operational and triggers appropriate reconfiguration actions by continuously considering the required conditions of good operation. The detailed architecture of the system, its operation overview as well as the required interactions with other components – parts of an adaptation ecosystem of a cloud platform, are provided. Finally, potential future improvements are discussed. Keywords—application reconfiguration, modelling, elasticity, cloud computing, service adaptation
The neural information decoding of birds in natural flight is very significant for the development of new biological robots, but there is little research at present. In this paper, we recorded the local field potentia...
详细信息
Robotic-assisted rehabilitation for wrist movements demands adaptive systems capable of balancing patient autonomy with robotic support. The integration of artificial intelligence (AI) into robotic-assisted rehabilita...
详细信息
In this article, the author’s name Stephen Ojo was incorrectly written as Stepehn Ojo and the affiliation details for author Stephen Ojo was incorrectly given as ‘Department of electrical and computerengineering, C...
Target detection of small samples with a complex background is always difficult in the classification of remote sensing *** propose a new small sample target detection method combining local features and a convolution...
详细信息
Target detection of small samples with a complex background is always difficult in the classification of remote sensing *** propose a new small sample target detection method combining local features and a convolutional neural network(LF-CNN)with the aim of detecting small numbers of unevenly distributed ground object targets in remote sensing *** k-nearest neighbor method is used to construct the local neighborhood of each point and the local neighborhoods of the features are extracted one by one from the convolution *** the local features are aggregated by maximum pooling to obtain global feature *** classification probability of each category is then calculated and classified using the scaled expected linear units function and the full connection *** experimental results show that the proposed LF-CNN method has a high accuracy of target detection and classification for hyperspectral imager remote sensing data under the condition of small *** drawbacks in both time and complexity,the proposed LF-CNN method can more effectively integrate the local features of ground object samples and improve the accuracy of target identification and detection in small samples of remote sensing images than traditional target detection methods.
Model merging combines multiple homologous models into one model, achieving convincing generalization without the necessity of additional training. A key challenge in this problem is resolving parameter redundancies a...
详细信息
In this paper, we focus on a reconfigurable intelligent surface (RIS)-assisted millimeter-wave (mmWave) communications system, where a RIS is deployed to create reliable reflection links and alleviate multi-user inter...
详细信息
We introduce Probabilistic Coordinate Fields (PCFs), a novel geometric-invariant coordinate representation for image correspondence problems. In contrast to standard Cartesian coordinates, PCFs encode coordinates in c...
详细信息
Integrating AI into medical diagnosis can provide a more accurate diagnosis when medical staff make treatment decisions. This paper studied on several deep neural networks, re-used with further training for a specific...
详细信息
暂无评论