The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The iterative property of inverse butterfly permutation network makes it possible to implement shift operation with simple routing algorithm, which has high application value in cryptography, digital image processing and other fields. Based on the inverse butterfly network, this paper proposes a subword shift unit, which integrates the operations of subword rotation shift, subword logical shift and...
Convolutional Neural Networks are being studied to provide features such as real time image recognition. One of the key operations to support HW implementations of this type of network is the multiplication. Despite the high number of operations required by Convolutional Neural Networks, they became feasible in the past years due the high availability of computing power, present on devices such as...
Reliability testing has become extremely important in modern electronics as the soft error rate has been increasing due to technology scaling. The testing must be controllable, generic, done before deployment, cheap, and fast. Even though fault injection is often the most appropriate solution considering these requirements, it is very time-consuming. This work proposes a hybrid fault injection framework...
We present progress on the construction and operation of a room- temperature quantum computer built with trapped atomic ion qubits. Based on the technological underpinnings of atomic clocks that define time, atomic qubits are standards of quantum information because they are all identical. They present a fundamentally scalable approach to quantum computation where interactions can be faithfully replicated...
Network Functions Virtualization (NFV) is a new network paradigm that has been strongly promoted from both scientific community and telecom industry, where network functions (NFs) such as firewalls, load balancers, gateways among others, are virtualized, isolated from middleboxes and housed on one or more industry standard computing nodes. One of the main challenges for service providers when they...
The information terminal bus stop has been studied widely. It is reported that the information terminal bus stop for citizen support is effective for the purpose of improving citizens' convenience. In particular, the bus location system is considered important for the purpose of eliminating users' concern about what time will it arrive?, Will it arrive at all?; thus, there is a great deal of research...
With the rapid advances in IoT technologies, the role of IoT gateways becomes even more important. Therefore, improving the reliability, availability and serviceability (RAS) of IoT gateways is crucial. Nowadays, Linux is widely adopted for core enterprise systems not only because it is a free operating system but also because it offers advantages in regards to operational stability. With many Linux...
In this paper, we propose an energy-efficient approximate multiplier design approach. Fundamental to this approach is configurable lossy logic compression, coupled with low-cost error mitigation. The logic compression is aimed at reducing the number of product rows using progressive bit significance, and thereby decreasing the number of reduction stages in Wallace-tree accumulation. This accounts...
A general fault diagnosis method is proposed for modular dc-dc converter system. The magnetic component voltage in each module is chosen as diagnostic signal, which can be easily obtained by adding an auxiliary winding into each magnetic core. Based on the feature of these signals, two logical hardware circuits are designed to achieve fast fault detection for different demands. Fault can be detected...
Poor air quality in urban areas is becoming an important problem that needs to be addressed. This paper presents the system architecture of project Urb@nEcoLife for compilation of environmental data using low-cost data sensors. Although there are several proposals dealing with sensor networks, most of them focus on solving partial problems. Urb@nEcoLife is a comprehensive proposal that develops a...
This paper briefly introduces the technology of expressway emergency telephone system and internet communication middleware, and introduces the technology of using the Internet of things middleware technology to realize the interconnection of expressway emergency telephone system.
Recently, Real-time Ethernet has become popular communication technology in automation system applications due to its high bandwidth capacity and low market cost. In addition, CC-Link IE Field has been successful in combining the ultra-high speed feature with the large amount of data to be transferred while integrating in field-level industrial communication networks. This protocol also provides a...
The Department of Homeland Security Cyber Security Division (CSD) chose Moving Target Defense as one of the fourteen primary Technical Topic Areas pertinent to securing federal networks and the larger Internet. Moving Target Defense over IPv6 (MT6D) employs an obscuration technique offering keyed access to hosts at a network level without altering existing network infrastructure. This is accomplished...
Nowadays multiple bus communication types are comprehensively employed to construct different networks in vehicles information system design. Data interchange among these networks must be conducted through complex communication gateways, which are difficult to test all the features wholly by manual work. MIC and RS422 communication networks are very common in some special vehicles, so in this paper...
Clock glitches are useful in hardware security applications, where systems are tested for vulnerabilities emerging from fault attacks. Usually a precisely timed and controlled glitch signal is employed. However, this requires complex generators and deep knowledge about the system under attack. Therefore we present a novel approach on clock glitch fault attacks that replaces the single precise glitch...
In recent years, synthetic test instruments have become increasingly popular in the automatic test equipment (ATE) market. This type of instrument gives users the ability to create custom solutions to better meet their test requirements. FPGA (Field Programmable Gate Array) based solutions are the most common synthetic test instrument on the market today. FPGA based solutions can work well due to...
This paper investigates the switching performances of two state-of-the-art half-bridge SiC MOSFET modules using a standard double pulse test methodology. A deliberate choice of the modules with the same voltage and current ratings, the same packaging, but different stray inductances and capacitances is made in order to give an insight into the influence of parasitics in the switching transients and...
Logic encryption is a popular technique to safeguard an IC design from different security vulnerabilities. However, several recently proposed attacks can extract the secret keys of an encrypted design. In this paper, we propose a new logic encryption strategy, which integrates an additional key generation unit with the design. The key generation unit takes external keys and performs a permutation...
A deep learning processor with 8 gated recurrent neural network (RNN) accelerators is proposed in this paper. It features on-chip incremental learning by numerical and local gradient computation enhancement. Extra precision of training is obtained without extending the bit-width. Tri-mode weight access (DMA/FIFO/RAM) improves the throughput during incremental learning. The number multipliers and activation...
Although Internet of Things (IoT) is an evolving paradigm which allows everyday physical objects, devices and appliances to connect to the internet, and to communicate with each other, there are several essential challenges that should be addressed. One of them is big data generated by physical objects. It is quite challenging to manage and control such enormous amount of data. In this paper, we propose...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.