Automation of malware characterization has become increasingly important for early malware detection over the past decades. Since it is crucial to be able to perform malware detection transparently, explainable machin...
详细信息
Smart cities require the use of many different types of sensors to make the communication, and distance sensors are one of the most commonly used elements in transportation systems and related infrastructures. The int...
详细信息
Regarding to the smart city infrastructures, there is a demand for big data processing and its further usage. This data can be gained by various means. There are many IoT devices in the city, which can communicate and...
详细信息
Processors for terrestrial applications are protected by Earth's atmosphere and magnetic field, so the probability of single event effects (SEE) is significantly lower. Shrinking of the technology nodes allows hig...
Processors for terrestrial applications are protected by Earth's atmosphere and magnetic field, so the probability of single event effects (SEE) is significantly lower. Shrinking of the technology nodes allows higher operational frequency and performance, but their susceptibility to SEE is increasing. Nowadays satellites and safety critical automotive applications require more and more computational power. The hardening by design has been implemented mainly by redundancy of the whole cores. The consequences are lower frequency, larger area, and higher power consumption. We propose a novel hardening technique, which enables high frequency operation and doesn't cause large power consumption and area overhead. The protection is based redundancy and separation of the pipeline into two main sections. It provides a fast detection of faults, simple recovery by flush of the pipeline, and allows a large prediction unit to be unprotected. The whole protection scheme can be implemented at the Register Transfer Level. We present the protection scheme at the core with RISC-V instruction set. Simulations confirm the protection can handle the injected faults. Synthesis shows, the protection lowers the maximum frequency by only about 4.7%. The area increase is only about 118% and can be even lower.
In this paper, we propose a novel hardening technique against Single Event Effects, which enables high-frequency operation and does not cause large power consumption and area overhead. The protection is based on redun...
In this paper, we propose a novel hardening technique against Single Event Effects, which enables high-frequency operation and does not cause large power consumption and area overhead. The protection is based on redundancy, separation of the pipeline into two main sections, and is fully applicable at Register Transfer Level. It provides fast detection of faults, simple recovery by a flush of the pipeline, and allows a large prediction unit to be unprotected. We present the protection scheme at the core with the RISC-V instruction set. Simulations confirm that the protection can handle the injected faults. Synthesis shows that protection lowers the maximum frequency by only 3.9%. The area increase is only 108% and can be even lower. Total power consumption increased by 119%.
Unmanned aerial vehicles (UAVs) have garnered significant attention from the research community during the last decade, due to their diverse capabilities and potential applications. One of the most critical functions ...
详细信息
Autonomous Underwater Gliders (AUGs) are extensively developed vehicles capable of prolonged exploration and observation in complex marine environments. Control of the AUG is challenging due to its slow response syste...
详细信息
Cloud computing is one of the most attractive and cost-saving models,which provides online services to *** computing allows the user to access data directly from any *** nowadays,cloud security is one of the biggest i...
详细信息
Cloud computing is one of the most attractive and cost-saving models,which provides online services to *** computing allows the user to access data directly from any *** nowadays,cloud security is one of the biggest issues that *** types of malware are wreaking havoc on the *** on the cloud server are happening from both internal and external *** paper has developed a tool to prevent the cloud server from spamming *** an attacker attempts to use different spamming techniques on a cloud server,the attacker will be intercepted through two effective techniques:Cloudflare and K-nearest neighbors(KNN)*** will block those IP addresses that the attacker will use and prevent spamming ***,the KNN classifiers will determine which area the spammer belongs *** the end of the article,various prevention techniques for securing cloud servers will be discussed,a comparison will be made with different papers,a conclusion will be drawn based on different results.
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the *** are many algorithms designed to protect the cloud server from a...
详细信息
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the *** are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server ***,the attackers have designed even better mechanisms to break these security *** cryptography is the best data protection algorithm that exchanges data between authentic *** this article,one symmetric cryptography algorithm will be designed to secure cloud server data,used to send and receive cloud server data securely.A double encryption algorithm will be implemented to send data in a secure ***,the XOR function will be applied to plain text,and then salt technique will be ***,a reversing mechanism will be implemented on that data to provide more data *** decrypt data,the cipher text will be reversed,salt will be removed,andXORwill be *** the end of the paper,the proposed algorithm will be compared with other algorithms,and it will conclude how much better the existing algorithm is than other algorithms.
The article the efficiency of the Microgrid network when transitioning to a transactive power system that uses control algorithms called to optimize the distribution of power between sources of distributed generation ...
详细信息
暂无评论