The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Domain Name System (DNS) has evolved to support the exponential growth of the Internet, by relying heavily on a highly distributed infrastructure. Nevertheless, trust between server must exist in order to guarantee correct functioning of the system, which is prone to attacks and errors. The Domain Name System Security Extensions (DNSSEC) is the current extension of the DNS system to provide security...
This is a fact already known by all many companies make large and important disbursements to keep their equipment and information safe from possible attacks and threats that are internal or external. Among the internal threats are the duplication of users, the change of credentials of access to the network, where fraud, sabotage and robberies through the network are actions that need to be faced with...
In this paper, we propose a 2-D grouping FIFO based FFT hardware architecture, supporting 36 different FFT sizes defined in 3GPP-LTE systems. Also, the important design foundation is to develop a hybrid-radix computing kernel engine, including 4 configuration types. In a design implementation via TSMC 90-nm CMOS technology, the reconfigurable FFT chip only has a core area occupation of 1.51 mm2, dissipating...
In this paper, we propose a cost-efficient hardware design, coarse and fine rotation (CFR) based FFT twiddle factor generator. It aims to extremely reduce the hardware area, especially for the larger length of FFT-points. Also, our proposed approach is generalized for arbitrary FFT sizes, not limited to the power of 2. In hardware implementation by using TSMC 90-nm CMOS technology, the circuit area...
We present an analysis of how to determine security requirements for software that controls routing decisions in the distribution of discrete physical goods. Requirements are derived from stakeholder interests and threat scenarios. Three deployment scenarios are discussed: cloud and hybrid deployment as well as on-premise installation for legacy sites.
Large numbers of Internet of Things (IoT) devices are increasingly deployed in many aspects of modern life. Given their limited resources and computational power, verifying program integrity in such devices is a challenging issue. In this paper, we design MTRA, a Multiple-Tier Remote Attestation protocol, by exploiting differences in resources and computational power among various types of networked...
The need for convergence between technology and shipbuilding processes is identified in the Brazilian shipbuilding industry so that it has a greater competitiveness against the shipyards belonging to the Tiger Cub Economies. In this perspective, wireless sensor networks and identification technologies have gained space regarding industrial solutions. This paper proposes an Internet of Things (IoT)...
Today's industry increasingly requires flexibility and adaptability in the development of automation control software, especially for automated production systems (aPS) including an automated material flow system (aMFS). To meet these demands, the development of the automation control software and the modification during the operation of the aMFS has to become as easy as possible without taking a...
Energy storage technology is an important measure for power output of new energy generation system. T-type three-level structure is adopt as the topology of energy storage inverter. Mathematical model of grid-connected operation in ABC coordinate system and dq coordinate system is built. A double closed loop control strategy of which inner loop current and outer loop power control is proposed. The...
The stencil pattern is important in many scientific and engineering domains, spurring great interest from researchers and industry. In recent years, various optimizations have been proposed for parallel stencil applications running on GPUs. However, most of the runtime systems that execute those applications often fail to fully utilize the parallelism of modern heterogeneous systems. In this paper,...
Different neural network models have been proposed to design efficient associative memories like Hopfield networks, Boltzmann machines or Cogent confabulation. Compared to the classical models, Encoded Neural Network (ENN) is a recently introduced formalism with a proven higher efficiency. This model has been improved through different contributions like Clone-based ENN (CbNNs) or Sparse ENNs (S-ENNs)...
In this paper, we propose an energy-efficient approximate multiplier design approach. Fundamental to this approach is configurable lossy logic compression, coupled with low-cost error mitigation. The logic compression is aimed at reducing the number of product rows using progressive bit significance, and thereby decreasing the number of reduction stages in Wallace-tree accumulation. This accounts...
This paper presents a comparison between custom fixed-point (FxP) and floating-point (FlP) arithmetic, applied to bidimensional K-means clustering algorithm. After a discussion on the K-means clustering algorithm and arithmetic characteristics, hardware implementations of FxP and FlP arithmetic operators are compared in terms of area, delay and energy, for different bitwidth, using the ApxPerf2.0...
The high number of cells employed in a Modular Multilevel Converter represents a challenge for the control hardware. Some authors have proposed the use of digital communications to simplify the assemblage and maintenance in such converters, but the latency they add has undesirable consequences for the closed-loop performance. In this paper, we propose a model-based compensation of the latency that...
Paper presents hardware improvements, step by step, besides to software refinements for the fluorescent labelled cytokines detection, associated to bacterial meningitis diagnosis. The hardware optimization firstly concerns the implementation of a versatile hardware device with the possibility to obtain the finally best solution. The software refinement includes Monte Carlo combined with denoising...
This paper presents an approximate-model-based predictive current control (AMPCC) method for current regulation of buck converter, when it operates in continuous-conduction mode (CCM). In addition, the inductor current constraints are incorporated to further reduce the output voltage ripple. The output current of the buck converter is directly manipulated by the proposed AMPCC controller without PWM...
Traditional PLC system in the event of system failure, there is no perfect mechanism to ensure the safety of control, the safety PLC based on heterogeneous dual-processor redundant structure can meet the requirements of industrial control for equipment and personnel, improve the reliability of industrial control. In this paper, according to the operation requirements of safety PLC based on heterogeneous...
In Internet of Things (IoT) world, there can be many sensors deployed in a system, thus their costs must be considered during the system design and material selections, in order to support massive production and deployment. Design-To-Cost (DTC) is an effective technique for this situation. In Model-Based Design (MBD), DTC cost estimates are preferred to be generated from models as one of the parameters...
In this paper, a guidance law for tracking straight-line segment and a constant-altitude circular orbits are proposed for a fixed wing unmanned aerial vehicle (UAV). Both guidance laws are based on the notion of vector fields, which are used to generate desired commands to the inner-loop attitude controller. Ground track heading error and lateral following error approach zero asymptotically even in...
Like all systems, multi-agent systems need to be verified during the design cycle. But the test of multi-agent systems is more diffi-cult than the test of classic software. Indeed, it implies to test more than agent functionalities: individual agent behavior, inter-action between agents and global system need to be tested. Sever-al testing methods compensate these difficulties, but do not cover all...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.