Zobrazeno 1 - 10
of 3 207
pro vyhledávání: '"hardware implementation"'
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-14 (2024)
Abstract In the field of Brain Machine Interface (BMI), the process of translating motor intention into a machine command is denoted as decoding. However, despite recent advancements, decoding remains a formidable challenge within BMI. The utilizatio
Externí odkaz:
https://doaj.org/article/4f1583abf6ab40689ff71a2123a28adf
Publikováno v:
Automatika, Vol 65, Iss 4, Pp 1447-1457 (2024)
Some traditional cryptographic techniques, like the Secure Hash Algorithm (SHA-256 for hashing), Rivest-Shamir-Adleman (RSA/Elliptic Curve for signing) and Advanced Encryption Standard (AES for encryption), perform well on systems with good hardware
Externí odkaz:
https://doaj.org/article/1ce5a0eda9cb445da7b4fca0c3493f2b
Publikováno v:
Tongxin xuebao, Vol 45, Pp 192-205 (2024)
An efficient implementation scheme for the BFV fully homomorphic encryption algorithm was proposed on the Zynq platform. This scheme effectively integrated the negative wrapped convolution with the number theoretic transform (NTT) algorithm, optimizi
Externí odkaz:
https://doaj.org/article/6dad319d35ea44139153c78fad0846f4
Autor:
Artem Perepelitsyn
Publikováno v:
Радіоелектронні і комп'ютерні системи, Vol 2024, Iss 3, Pp 156-165 (2024)
The subject of study in this article is the models, methods, and principles of organization of entire lifecycle of Artificial Intelligence (AI) as a Service implemented with the use of Field Programmable Gate Array (FPGA). The purpose of this work is
Externí odkaz:
https://doaj.org/article/17f0a40bc7c04b2a8be7d8bedd8e46d7
Autor:
Cankun Zhao, Hang Zhao, Jiangxue Liu, Bohan Yang, Wenping Zhu, Shuying Yin, Min Zhu, Shaojun Wei, Leibo Liu
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
SHA-3, the latest hash standard from NIST, is utilized by numerous cryptographic algorithms to handle sensitive information. Consequently, SHA-3 has become a prime target for side-channel attacks, with numerous studies demonstrating successful breach
Externí odkaz:
https://doaj.org/article/9da0c9eb23e24f6fa4a8cabecdcbb1a9
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 12, Pp 111097-111110 (2024)
Traditional microcontroller-based control systems increasingly face limitations due to their restricted capabilities and lack of parallel processing, creating bottlenecks in real-time energy optimization. This research introduces a novel approach to
Externí odkaz:
https://doaj.org/article/df6d80525662434fb500c84b7bf67509
Publikováno v:
IEEE Access, Vol 12, Pp 69568-69577 (2024)
The exponential growth of data, particularly JPEG images spurred by mobile and social media applications, poses significant storage challenges for data centers. Traditional deduplication methods such as FSP or CDC rely on binary data, which can diffe
Externí odkaz:
https://doaj.org/article/804fbcae525944c3af5894e505e5408d
Autor:
Talal Bonny, Wafaa Al Nassan
Publikováno v:
IEEE Access, Vol 12, Pp 62030-62046 (2024)
Encryption systems play a vital role in the transfer of sensitive data, and the integration of chaotic systems into this domain has garnered significant attention. However, these systems often grapple with complexity and insufficient security, posing
Externí odkaz:
https://doaj.org/article/d2d3a518994b497dbc4a5723d6da2e4e
Autor:
Ci-Hao Wu, Tian-Sheuan Chang
Publikováno v:
IEEE Open Journal of Circuits and Systems, Vol 5, Pp 128-140 (2024)
Transformer-based speech enhancement models yield impressive results. However, their heterogeneous and complex structure restricts model compression potential, resulting in greater complexity and reduced hardware efficiency. Additionally, these model
Externí odkaz:
https://doaj.org/article/f09a3025251843f3b0f67134760946d9