Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (29)
  • Open Access

    ARTICLE

    Root-Of-Trust for Continuous Integration and Continuous Deployment Pipeline in Cloud Computing

    Abdul Saboor1,*, Mohd Fadzil Hassan2, Rehan Akbar1, Erwin Susanto3, Syed Nasir Mehmood Shah4, Muhammad Aadil Siddiqui5, Saeed Ahmed Magsi5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2223-2239, 2022, DOI:10.32604/cmc.2022.028382

    Abstract Cloud computing has gained significant use over the last decade due to its several benefits, including cost savings associated with setup, deployments, delivery, physical resource sharing across virtual machines, and availability of on-demand cloud services. However, in addition to usual threats in almost every computing environment, cloud computing has also introduced a set of new threats as consumers share physical resources due to the physical co-location paradigm. Furthermore, since there are a growing number of attacks directed at cloud environments (including dictionary attacks, replay code attacks, denial of service attacks, rootkit attacks, code injection attacks, etc.), customers require additional assurances… More >

  • Open Access

    ARTICLE

    Steering Behavior-based Multiple RUAV Obstacle Avoidance Control

    Vishnu Kumar Kaliappan1, Tuan Anh Nguyen1, Dugki Min2,*, Jae-Woo Lee1, U. Sakthi3

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 575-591, 2022, DOI:10.32604/iasc.2022.024577

    Abstract In recent years, the applications of rotorcraft-based unmanned aerial vehicles (RUAV) have increased rapidly. In particular, the integration of bio-inspired techniques to enhance intelligence in coordinating multiple Rotorcraft-based Unmanned Aerial Vehicles (RUAVs) has been a focus of recent research and development. Due to the limitation in intelligence, these RUAVs are restricted in flying low altitude with high maneuverability. To make it possible, the RUAVs must have the ability to avoid both static and dynamic obstacles while operating at low altitudes. Therefore, developing a state-of-the-art intelligent control algorithm is necessary to avoid low altitude obstacles and coordinate without collision while executing… More >

  • Open Access

    ARTICLE

    Design of Logically Obfuscated Memory and Arithmetic Logic Unit for Improved Hardware Security

    M. Usharani1,*, B. Sakthivel2, K. Jayaram3, R. Renugadevi4

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1665-1675, 2022, DOI:10.32604/iasc.2022.023284

    Abstract In any kind of digital system, the processor and memories are used to play a vital role in today’s trend. The processors and memories are done many critical tasks in the system. Whereas the processor used to do several functions and memories used to store and retrieve the data. But these processors and memories are more vulnerable to various hardware attacks. By using several new devices may lead to many security issues which the attackers can leverage to introduce a new hardware attack. Various hardware security (HS) studies have been presented to prevent hardware from a security issue. Some of… More >

  • Open Access

    ARTICLE

    Realization of Deep Learning Based Embedded Soft Sensor for Bioprocess Application

    V. V. S. Vijaya Krishna1,*, N. Pappa1, S. P. Joy Vasantharani2

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 781-794, 2022, DOI:10.32604/iasc.2022.022181

    Abstract Industries use soft sensors for estimating output parameters that are difficult to measure on-line. These parameters can be determined by laboratory analysis which is an offline task. Now a days designing Soft sensors for complex nonlinear systems using deep learning training techniques has become popular, because of accuracy and robustness. There is a need to find pertinent hardware for realizing soft sensors to make it portable and can be used in the place of general purpose PC. This paper aims to propose a new strategy for realizing a soft sensor using deep neural networks (DNN) on appropriate hardware which can… More >

  • Open Access

    ARTICLE

    Performance Analysis of Low Power Interference Cancellation Architecture for OFDM System

    N. Manikanda Devarajan1,*, S. Thenmozhi2, K. Jayaram3, R. Saravanakumar4

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1167-1178, 2022, DOI:10.32604/iasc.2022.021558

    Abstract Orthogonal Frequency Division Multiplexing (OFDM) is a wireless communication technology that is used for highly reliable and high data rate communication. In a multi-user OFDM system, the interference has occurred in the receiver side between the consecutive OFDM symbols. This interference reduces the performance of the OFDM system. To achieve good quality in received symbols the interference level should be minimized. The conventional cancellation system requires higher interference reduction time and power. These limitations of the conventional interference cancellation architectures for OFDM systems are overcome by proposing efficient and low power interference cancellation architecture. Hence, this paper proposes a novel… More >

  • Open Access

    ARTICLE

    An Efficient AES 32-Bit Architecture Resistant to Fault Attacks

    Hassen Mestiri1,2,3,*, Imen Barraj4,5, Abdullah Alsir Mohamed1, Mohsen Machhout3

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3667-3683, 2022, DOI:10.32604/cmc.2022.020716

    Abstract The Advanced Encryption Standard cryptographic algorithm, named AES, is implemented in cryptographic circuits to ensure high security level to any system which required confidentiality and secure information exchange. One of the most effective physical attacks against the hardware implementation of AES is fault attacks which can extract secret data. Until now, a several AES fault detection schemes against fault injection attacks have been proposed. In this paper, so as to ensure a high level of security against fault injection attacks, a new efficient fault detection scheme based on the AES architecture modification has been proposed. For this reason, the AES… More >

  • Open Access

    ARTICLE

    Performance Analysis of AODV Routing for Wireless Sensor Network in FPGA Hardware

    Namit Gupta1,*, Kunwar Singh Vaisla2, Arpit Jain3, Adesh Kumar4, Rajeev Kumar3

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1073-1084, 2022, DOI:10.32604/csse.2022.019911

    Abstract Wireless sensor network (WSN) is a group of interconnected sensor nodes that work wirelessly to capture the information of surroundings. The routing of the network is a challenging task. The routing of WSN is classified as proactive, reactive, and hybrid. Adhoc on-demand distance vector (AODV) routing is an example of reactive routing based on the demand route formations among different nodes in the network. The research article emphasizes the design and simulation of the AODV routing hardware chip using very-high-speed integrated circuit hardware description language (VHDL) programming in Xilinx integrated synthesis environment (ISE) 14.7 software. The performance of the chip… More >

  • Open Access

    ARTICLE

    Hardware Chip Performance of CORDIC Based OFDM Transceiver for Wireless Communication

    Amit Kumar1, Adesh Kumar2,*, Geetam Singh Tomar3

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 645-659, 2022, DOI:10.32604/csse.2022.019449

    Abstract The fourth-generation (4G) and fifth-generation (5G) wireless communication systems use the orthogonal frequency division multiplexing (OFDM) modulation techniques and subcarrier allocations. The OFDM modulator and demodulator have inverse fast Fourier transform (IFFT) and fast Fourier transform (FFT) respectively. The biggest challenge in IFFT/FFT processor is the computation of imaginary and real values. CORDIC has been proved one of the best rotation algorithms for logarithmic, trigonometric, and complex calculations. The proposed work focuses on the OFDM transceiver hardware chip implementation, in which 8-point to 1024-point IFFT and FFT are used to compute the operations in transmitter and receiver respectively. The coordinate… More >

  • Open Access

    ARTICLE

    Hardware Acceleration of Image and Video Processing on Xilinx Zynq Platform

    Praveenkumar Babu, Eswaran Parthasarathy*

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 1063-1071, 2021, DOI:10.32604/iasc.2021.018903

    Abstract Advancements in image and video processing are growing over the years for industrial robots, autonomous vehicles, indexing databases, surveillance, medical imaging and computer-human interaction applications. One of the major challenges in real-time image and video processing is the execution of complex functions and high computational tasks. In this paper, the hardware acceleration of different filter algorithms for both image and video processing is implemented on Xilinx Zynq®-7000 System on-Chip (SoC) device. It consists of Dual-core Cortex-A9 processors which provide computing ability to perform I/O and processing functions and software libraries using Vivado® High-Level Synthesis (HLS). In the proposed work, Sobel-Feldman… More >

  • Open Access

    ARTICLE

    An Evolutionary Algorithm for Non-Destructive Reverse Engineering of Integrated Circuits

    Huan Zhang1,2, Jiliu Zhou1,2,*, Xi Wu2

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.3, pp. 1151-1175, 2021, DOI:10.32604/cmes.2021.015462

    Abstract In hardware Trojan detection technology, destructive reverse engineering can restore an original integrated circuit with the highest accuracy. However, this method has a much higher overhead in terms of time, effort, and cost than bypass detection. This study proposes an algorithm, called mixed-feature gene expression programming, which applies non-destructive reverse engineering to the chip with bypass detection data. It aims to recover the original integrated circuit hardware, or else reveal the unknown circuit design in the chip. More >

Displaying 11-20 on page 2 of 29. Per Page