The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Household energy consumption is largely inefficient. In recent years, development in residential energy-use optimisation has attracted a great deal of attention. Given that consumers comprise a significant part of total demand, there is an incentive to assist users to manage household demand. This paper provides an introduction to Home Energy Management (HEM). An overview of available Home Energy...
As the Internet of Things (IoT) continues to grow, the need for lightweight cryptography intensifies. Research in this direction has presented us with novel encryption and hash algorithms that continue to decrease in circuit size at the cost of increase in execution time and relaxation in required security level. Perhaps the most resource constrained devices present in the IoT domain are RFID tags,...
A problem-oriented processor on the basis FPGA for high-precision calculations in floating-point formats (64-, 80-, 128-bit) for solving poorly conditioned systems of linear algebraic equations by the Gauss method was developed.
With Software Defined Networking (SDN) the control plane logic of forwarding devices, switches and routers, is extracted and moved to an entity called SDN controller, which acts as a broker between the network applications and physical network infrastructure. Failures of the SDN controller inhibit the network ability to respond to new application requests and react to events coming from the physical...
Due to severe power and timing constraints of the "things" in the Internet of things (IoT), cryptography is expensive for these devices. Custom hardware provides a viable solution. However, implementations of cryptographic algorithms in the devices need to be upgraded frequently compared to the longevity of these "things". Therefore, there is a critical need for reconfigurable,...
It is important to allow the test engineer great flexibility when developing a test program. Highly skilled test engineers desire flexibility and different hardware platforms to test a Unit Under Test (UUT). In the past, the engineer was told to use specific test equipment and not provided with the option to program an instrument to their specific test and diagnostic plans. Being stuck in a rut on...
To utilize the proper test techniques that expand our test and diagnosis process we should regularly evaluate and integrate new devices and new techniques. Willingness to embrace change is the major requirement for successful technology integration. Test technology is continuously and rapidly evolving. It is an ongoing process and demands continual research and understanding. Effective integration...
DOD Automatic Test Systems (ATS) guidance addresses the DOD-wide problem of Automatic Test Equipment (ATE) proliferation by establishing a requirement for a standard family of ATE in each Service that is based on non-proprietary open-architecture hardware and software. Policy requirements for ATS management are described in Navy Instructions and Army Regulations and DA PAMs. These guidance publications...
A Power Hardware in the Loop (FHIL) platform implementation for performing real time simulations of electric systems is proposed. The test bench consists of a FSS'®E real time power flow calculation in combination with a controlled grid emulator. Experimental results are presented to demonstrate the performance of the platform.
Multilevel system architecture of energy efficiency management in the region is developed in this work. The architecture model consists of three levels, namely, level of data collection and management of executive mechanisms, level of control and management of technological process, and level of operator control and formation of administrative decisions. Hardware and software of each hierarchical...
The document contains a comparative analysis of the key technologies to ensure collaboration of telecommunication networks that were built with using different versions of IP protocol: dual stack; tunneling and encapsulation; translation of the protocols. Two groups of factors are proposed: factors that will influence the choice of the technical migration way to the IPv6 stack and the factors that...
Problem of telemetry and telecontrol data transmission systems noise immunity at endpoints implementing in the Internet of Things technology is considered. A method of improving streaming data encryption in open communication channels was proposed. The dynamic change of crypto key using non-linear feedback in shift register data and quasi-periodic reconfigure of the encoder / decoder device in data...
Evaluating security vulnerabilities of software implementations at design step is of primary importance for applications developers, while it has received litte attention from scientific community. In this paper, we describe virtual prototyping of an implementation of scalar multiplication aiming to make it secure against simple side-channel attacks. Reproducing information leakage as close to reality...
Memory and logic integration on the same chip is becoming increasingly cost effective, creating the opportunity to offload data-intensive functionality to processing units placed inside memory chips. The introduction of memory-side processing units (MPUs) into conventional systems faces virtual memory as the first big showstopper: without efficient hardware support for address translation MPUs have...
Cyber-Physical Systems (CPS) consist of embedded computers with sensing and actuation capability, and are integrated into and tightly coupled with a physical system. Because the physical and cyber components of the system are tightly coupled, cyber-security is important for ensuring the system functions properly and safely. However, the effects of a cyberattack on the whole system may be difficult...
Methods, algorithms and structures of neural networks were analyzed. Basic components of neural networks were defined and the principles of their development were chosen. It was shown that use of vertical-parallel method for implementation of work algorithms of neural networks basic components provides increased performance, reduce hardware costs and efficient VLSI implementation. Parallel-consequent...
The method for finding inverse element by the module is based on the stepwise addition of residue is developed in this paper. This method allows avoiding performing the complex arithmetic operations and implementing calculations on numbers much lower bit compared to the classical approach based on the Euclid's algorithm and its consequences. Analytical expressions of time complexity characteristics...
The objective of the represented work is the effectiveness increase of PJ signals estimation in digital paths of telecommunication systems. The method and the device of phase jitter estimation of clock signals are suggested. That is characterized by enhanced resolving power and statistical stability of estimates by means of digital multistage periodogram-correlogram processing of jitter signals.
Clustering is a crucial tool for analyzing data in virtually every scientific and engineering discipline. The U.S. National Academy of Sciences (NAS) has recently announced "the seven giants of statistical data analysis" in which data clustering plays a central role [1]. This research also emphasizes that more scalable solutions are required to enable time and space clustering for the future...
Early design-space evaluation of computer-systems is usually performed using performance models such as detailed simulators, RTL-based models etc. Unfortunately, it is very challenging (often impossible) to run many emerging applications on detailed performance models owing to their complex application software-stacks, significantly long run times, system dependencies and the limited speed/potential...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.