The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network Intrusion Detection Systems (NIDSs) play a crucial role in detecting malicious activities within the networks. Basically, an NIDS monitors network flows and compares it with the pre-defined suspicious patterns. To be effective, different intrusion detection algorithms and packet capturing methods have been implemented. With rapidly increasing network speeds, NIDSs face a challenging problem...
Enabled by modern languages and retargetable compilers, software development is in a virtual “Cambrian explosion” driven by a critical mass of powerfully parameterized libraries; but hardware development practices lag far behind. We hypothesize that existing hardware construction languages (HCLs) and novel hardware compiler frameworks (HCFs) can put hardware development on a similar evolutionary path...
This paper presents a real-time, low-cost, wireless, AC and DC monitoring system based on an ATmega328P-PU microcontroller. The proposed system is composed by different client nodes, which have the task to measure the main electrical quantities involved in the system, and a server node that collects the data and send them to a display device. The system is well suited for a good accuracy monitoring...
Random numbers are critical in every cryptographic fields. They can be used as cryptographic key, seed, nonce, initialization vector, etc. In this paper, new (pseudo) random number generator (PRNG or RNG) based on computer's source is proposed. The principle of method consist in collecting (nearly) random sources produced from computer and used it as seed for (pseudo) random number generation. Random...
Network Function Virtualization (NFV) shed new light for the design, deployment, and management of cloud networks. Many network functions such as firewalls, load balancers, and intrusion detection systems can be virtualized by servers. However, network operators often have to sacrifice programmability to achieve high throughput, especially at networks' edge where complex network functions are required...
Modular multiplication, addition, and subtraction being the core operation of Elliptic curve public(ECC) system, the decrease of area and the merging of structure have been a hot topic in recent years. This paper first analyzes the difference between multiplication type and addition type of modular multiplier. Then, Combined with the structural characteristics of the modular adder, and mixing modular...
The iterative property of inverse butterfly permutation network makes it possible to implement shift operation with simple routing algorithm, which has high application value in cryptography, digital image processing and other fields. Based on the inverse butterfly network, this paper proposes a subword shift unit, which integrates the operations of subword rotation shift, subword logical shift and...
The main objective of this paper is to show that large-scale sensor data collection is feasible while relying on vehicles to collect and deliver data to a relatively small number of static nodes on the roadside infrastructure. The proposed technology is based on simple 802.11 beacons (as opposed to 802.15 WAVE and 802.11p and others) which are accessible on common smartphones and are comparatively...
In the paper, a method for the estimation of type I and type II errors of the built-in diagnostic hardware depending on the preventive maintenance periodicity is proposed. The approach considers an operational process of electronics as a Semi-Markov process with states of hazardous, latent and fictitious failures. The derived expressions may be used for the evaluation and analysis of the mentioned...
Decimal Arithmetic Hardware Research accelerated phenomenally in the last decade with introduction of Decimal Floating Point formats in IEEE 754–2008. ‘Addition’ being one of the primitive arithmetic operations has attracted numerous literary proposals involving the 8421 standard BCD code as well as nonstandard decimal digit representation codes (4221, 5211 etc.). This paper concentrates on Fixed...
This paper outlines the feasibility of detecting epilepsy though low-cost and low-energy dedicated hardware with bit-serial processing. The concept of a novel bit-serial data processing unit (DPU) is presented which implements the functionality of a complete neuron. The proposed approach has been tested using various network configurations and compared with related work. The proposed DPU uses only...
Software Defined Networking (SDN) is fast gaining acceptance as a networking architecture, which simplifies network management, by separating the control plane from the data plane. Edge-Core SDN is an extended SDN architecture which divides the underlying network into edge and core components. This decouples the edge switch requirements from the network core switch behaviour. When the number of networking...
Given the complexity of modern integrated circuits, design reuse is essential, but current hardware description languages do not adequately address reuse challenges for many classes of design. Processor cores, as an example, are shaped by cycle-level interactions, and leveraging such designs into environments with different timing constraints requires retiming, repipelining, and microarchitectural...
Convolutional Neural Networks are being studied to provide features such as real time image recognition. One of the key operations to support HW implementations of this type of network is the multiplication. Despite the high number of operations required by Convolutional Neural Networks, they became feasible in the past years due the high availability of computing power, present on devices such as...
This study offers a fully automatic BBN-ANFIS-based model of online condition monitoring system for a resilient MEG using FPGA chips. A direct connection of a FPGA-ZedBoard with on-field sensors is proposed in this study. The design enables real-time concurrent measurements of MEG's fault diagnosis assessment by mean of a hybrid BBN and ANFIS based model. The BBN capable to form a consistent function...
The end of Dennard scaling has led to an increase in demand for energy-efficient custom hardware accelerators, but current hardware design is slow and laborious, partly because each iteration of the compile-run-debug cycle can take hours or even days with existing simulation and emulation platforms. Cyclist is a new emulation platform designed specifically to shorten the total compile-run-debug cycle...
Network Functions Virtualization allows Communication Service Providers to extend their traditional service portfolio to new models of service offerings, such as Virtualized Network Functions as a Service (VNFaaS), in which network functions can be traded following the “on-demand” Cloud paradigm. Incremental deployment and interoperability with legacy infrastructure, in particular Wide Area Network...
Nonlinear dynamics and chaos contribute flexibility and rich, complex behavior to nonlinear systems. Transistors and transistor circuits are inherently nonlinear. It was demonstrated that this nonlinearity and the flexibility that comes with it can be utilized to implement flexible, reconfigurable computing, and such approaches are called Nonlinear Dynamics-Based Computing. In nonlinear dynamics-based...
Evolution-in-materio is a form of unconventional computing combining materials' training and evolutionary search algorithms. In previous work, a mixture of single-walled-carbon-nanotubes (SWCNTs) dispersed in a liquid crystal (LC) was trained so that its morphology and electrical properties were gradually changed to perform a computational task. Material-based computation is treated as an optimisation...
We live in interesting times. Our systems have unprecedented levels of device integration. Analog and mixed signal components and devices form increasingly large parts of our designs built for low power and high flexibility. New architectures and models of computation that embrace variation like neuromorphic computing are a part of our horizon. Architectures specialized for neural networks and learning...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.