-
41
-
42
-
43
A Country Risk Assessment from the Perspective of Cybersecurity in Local Entities
Published 2024-12-01Get full text
Article -
44
Cooling Trapped Ions with Phonon Rapid Adiabatic Passage
Published 2024-11-01“…In recent demonstrations of the quantum charge-coupled device computer architecture, circuit times are dominated by cooling. …”
Get full text
Article -
45
Episodic Reasoning for Vision-Based Human Action Recognition
Published 2014-01-01Get full text
Article -
46
An Intrusion Detection System Based on Deep Learning and Metaheuristic Algorithm for IOT
Published 2024-04-01Get full text
Article -
47
An Educational RISC-V-Based 16-Bit Processor
Published 2024-11-01“…By working on this project, students can gain hands-on experience with digital logic design, Verilog programming, and computer architecture. The project also includes tools and scripts to help students transform assembly code into binary format, making it easier for them to test and verify their designs. …”
Get full text
Article -
48
Crop Row Detection in Maize Fields Inspired on the Human Visual Perception
Published 2012-01-01Get full text
Article -
49
MIMD Programs Execution Support on SIMD Machines: A Holistic Survey
Published 2024-01-01“…This study will be beneficial for developers and researchers in the field of computer architecture and parallel computing of intensive scientific applications, specifically for early-stage high-performance computing researchers, to obtain a brief overview of performance optimization opportunities as well as the challenges of existing SIMD platforms.…”
Get full text
Article -
50
Real-Time Computing Strategies for Automatic Detection of EEG Seizures in ICU
Published 2024-12-01Get full text
Article -
51
-
52
On a Simplified Approach to Achieve Parallel Performance and Portability Across CPU and GPU Architectures
Published 2024-10-01“…This paper presents software advances to easily exploit computer architectures consisting of a multi-core CPU and CPU+GPU to accelerate diverse types of high-performance computing (HPC) applications using a single code implementation. …”
Get full text
Article -
53
-
54
Enabling Parallel Performance and Portability of Solid Mechanics Simulations Across CPU and GPU Architectures
Published 2024-11-01“…As constitutive models grow more complex and simulations scale up in size, harnessing the capabilities of modern computer architectures has become essential for achieving timely results. …”
Get full text
Article -
55
Research on ciphertext search and sharing technology in edge computing mode
Published 2022-04-01“…Aiming at the problem of edge computing data security, a ciphertext search and sharing solution was proposed, where the above-mentioned edge computing advantages were used to achieve user privacy data protection, edge nodes were used to construct encrypted inverted indexes, indexes and keys between edge nodes and cloud computing platforms were securely shared, and ciphertext search, secure data sharing, and dynamic index update were realized without changing the edge computing architecture and cloud computing architecture.Finally, compared to existing schemes, performance and security were analyzed and discussed, which proves that the proposed scheme has high security strength under ciphertext search attack model, and the ciphertext search efficiency and document dynamic update function are taken into account based on encrypted inverted index.…”
Get full text
Article -
56
Probabilistic photonic computing with chaotic light
Published 2024-12-01“…Our prototype demonstrates the seamless cointegration of a physical entropy source and a computational architecture that enables ultrafast probabilistic computation by parallel sampling.…”
Get full text
Article -
57
DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer
Published 2024-01-01“…In this paper, we propose a computing architecture based on endogenous security theory—dynamic heterogeneous redundant computing architecture (DHRCA) that can tolerate and detect HTs at runtime. …”
Get full text
Article -
58
An In-Memory-Computing Binary Neural Network Architecture With In-Memory Batch Normalization
Published 2024-01-01“…This paper describes an in-memory computing architecture that combines full-precision computation for the first and last layers of a neural network while employing binary weights and input activations for the intermediate layers. …”
Get full text
Article -
59
Personalized lightweight distributed network intrusion detection system in fog computing
Published 2023-06-01“…With the continuous development of Internet of Things (IoT) technology, there is a constant emergency of new IoT applications with low latency, high dynamics, and large bandwidth requirements.This has led to the widespread aggregation of massive devices and information at the network edge, promoting the emergence and deep development of fog computing architecture.However, with the widespread and in-depth application of fog computing architecture, the distributed network security architecture deployed to ensure its security is facing critical challenges brought by fog computing itself, such as the limitations of fog computing node computing and network communication resources, and the high dynamics of fog computing applications, which limit the edge deployment of complex network intrusion detection algorithms.To effectively solve the above problems, a personalized lightweight distributed network intrusion detection system (PLD-NIDS) was proposed based on the fog computing architecture.A large-scale complex network flow intrusion detection model was trained based on the convolutional neural network architecture, and furthermore the network traffic type distribution of each fog computing node was collected.The personalized model distillation algorithm and the weighted first-order Taylor approximation pruning algorithm were proposed to quickly compress the complex model, breaking through the limitation of traditional model compression algorithms that can only provide single compressed models for edge node deployment due to the high compression calculation overhead when facing a large number of personalized nodes.According to experimental results, the proposed PLD-NIDS architecture can achieve fast personalized compression of edge intrusion detection models.Compared with traditional model pruning algorithms, the proposed architecture achieves a good balance between computational loss and model accuracy.In terms of model accuracy, the proposed weighted first-order Taylor approximation pruning algorithm can achieve about 4% model compression ratio improvement under the same 0.2% model accuracy loss condition compared with the traditional first-order Taylor approximation pruning algorithm.…”
Get full text
Article -
60
Using the Functional Reach Test for Probing the Static Stability of Bipedal Standing in Humanoid Robots Based on the Passive Motion Paradigm
Published 2013-01-01“…The goal of this paper is to analyze the static stability of a computational architecture, based on the Passive Motion Paradigm, for coordinating the redundant degrees of freedom of a humanoid robot during whole-body reaching movements in bipedal standing. …”
Get full text
Article