This paper shows the implementation of a physically unclonable function (PUF) of the arbiter type and its modifications, the generation of random numbers and unique identifiers, and a statistical analysis of the gener...
This paper shows the implementation of a physically unclonable function (PUF) of the arbiter type and its modifications, the generation of random numbers and unique identifiers, and a statistical analysis of the generated sequences of random numbers. Within the framework of this work, experiments were carried out on different SoC, SoM crystals and within the same crystal with different placement on it, experiments with PUF modeling based on machine learning were simulated. The results and conclusions provide recommendations for the optimal and safe use of PUF.
In the multi-armed bandit (MAB) framework, we investigate the problem of learning the means of distributions that are associated with a finite n umber o f a rms under a monotonic constraint. Different from the traditi...
详细信息
There have been many different forms of evolution-ary algorithms (EAs) designed by humans over the past 50 years, with many variants optimized for specific classes of problems. As computational resources grow, the aut...
There have been many different forms of evolution-ary algorithms (EAs) designed by humans over the past 50 years, with many variants optimized for specific classes of problems. As computational resources grow, the automated design of EAs has become an increasingly viable method for improving performance. However, many components of EAs have been treated as largely immutable, for both human and automated designers, dramatically constraining design space. In particular, the evolutionary cycle (the repeating pattern of reproduction and survival) has little or no differences between most popular forms of EA. In a previous paper, we proposed a technique for automatically designing evolutionary cycles using directed graphs, greatly increasing the explorable design space. In this paper, we showcase an improved representation and evolutionary process, provide preliminary experiments demonstrating that EAs produced by this process can outperform those with a traditional cycle, and explore the phenotype landscape to show that the new space explored by our technique may contain better EAs than traditional cycles allow.
Travel demand forecasting (TDF) is a crucial task in route planning, navigation, and scheduling. However, developing models for such tasks requires significant amount of order data, which can pose privacy concerns for...
详细信息
Intelligent reflecting surface (IRS) has recently stimulated an upsurge of research interest due to its capability of enhancing the spectral and energy efficiencies for future sixth generation (6G) wireless communicat...
详细信息
The advancements in aircraft technology, particularly the increased electrification of aircraft, have introduced complexities in designing and integrating electrical systems. Hardware-in-the-loop (HIL) simulation is r...
The advancements in aircraft technology, particularly the increased electrification of aircraft, have introduced complexities in designing and integrating electrical systems. Hardware-in-the-loop (HIL) simulation is recognized as a crucial tool in the aerospace industry, utilizing Field-programmable Gate Arrays (FPGAs) for their high-speed data processing and low latency. This paper presents a method for accurate real-time simulation of cable harnesses in modern aircrafts, employing Frequency-Dependent Network Equivalent (FDNE) models and FPGAs. The implementation methodology and results of the FPGA-based HIL simulation are presented and discussed. Various equivalent models with different data types are evaluated to determine achievable time-step and resource consumption. Results show the effectiveness of the proposed method in achieving sub-microsecond time-step.
The evolution of intelligent transport systems (ITS) has significantly enhanced driving experiences in vehicular ad-hoc networks (VANET), crucial for improving road safety and traffic efficiency. Despite these advance...
详细信息
ISBN:
(数字)9798350373974
ISBN:
(纸本)9798350373981
The evolution of intelligent transport systems (ITS) has significantly enhanced driving experiences in vehicular ad-hoc networks (VANET), crucial for improving road safety and traffic efficiency. Despite these advancements, challenges persist. Trust management solutions often assume user legitimacy without verification. Moreover, the need for reauthentication as vehicles move between RSUs adds computational complexity. VANET is relatively vulnerable to security threats from multiple parties given its highly dynamic topology and its wireless and heterogeneous communication mode. We have expanded upon Maria et al.’s schema by specifically targeting and resolving significant shortcomings in their research. More precisely, we improve the features related to confirming the identity of users, preventing vehicles from being used without authorization, and continuously monitoring their current location in order to strengthen the security of vehicles and increase user involvement. We suggest implementing a schema that utilizes QR code verification to authenticate vehicle users, specifically targeting these difficulties. In VANETs, blockchain has been adopted with the authentication process for fog computing. The result is that there is no need for trusted authority (TA) while achieving privacy within the blockchain network and ensuring of the vehicle user authentication and the integrity of messages. Several key benefits have been achieved, such as blocking malicious entities and the potential damage they cause, enabling the revocation of malicious vehicles by conditional anonymization, as well as simplifying conflict resolution. Likewise, the proposed work was characterized by achieving an effective balance between effectiveness and complexity, protecting privacy, conditional tracking, ensuring integrity, and anonymous authentication.
Forecasting stock market prices is a challenging task for traders, analysts, and engineers due to the myriad of variables influencing stock prices. However, the advent of artificial intelligence (AI) and natural langu...
详细信息
In this study, it is aimed to estimate the probability of a customer who comes to the institution for the first time to make a transaction in the next 3 months, using data-driven machine learning models, in order to p...
详细信息
The availability of important characteristics such as decentralization, permanence, anonymity, and audacity has driven interest in blockchain technology more recently than ever before. This technology has been employe...
The availability of important characteristics such as decentralization, permanence, anonymity, and audacity has driven interest in blockchain technology more recently than ever before. This technology has been employed in a variety of applications, including education. Therefore, this research is a systematic review of research that investigates the applications of blockchain technology in higher education institutions in addition to those that present the role of this technology in combating the Corona pandemic, as it focuses on the following main topics: (1) blockchain-based applications and systems that can be used in higher education institutions; and (2) the current state of blockchain challenges in this area that need to be addressed in the future. A detailed analysis of the results of each topic as well as an extensive discussion were conducted based on the results. This review also provides insight into other areas that could benefit from blockchain technology during and after the pandemic.
暂无评论