|
|
|
Bo Cui, Lingyun Wang, Guangxi Li and Xian Ren
The dynamic star simulator is a commonly used ground-test calibration device for star sensors. For the problems of slow calculation speed, low integration, and high power consumption in the traditional star chart simulation method, this paper designs a F...
ver más
|
|
|
|
|
|
|
Marcin Aftowicz, Ievgen Kabin, Zoya Dyka and Peter Langendörfer
While IoT technology makes industries, cities, and homes smarter, it also opens the door to security risks. With the right equipment and physical access to the devices, the attacker can leverage side-channel information, like timing, power consumption, o...
ver más
|
|
|
|
|
|
|
Angeliki Bicaku, Maria Sapounaki, Athanasios Kakarountas and Sotiris K. Tasoulis
Throughout the last decades, neuromorphic circuits have incited the interest of scientists, as they are potentially a powerful tool for the treatment of neurological diseases. To this end, it is essential to consider the biological principles of the CNS ...
ver más
|
|
|
|
|
|
|
Jinnan Wang, Weiqin Tong and Xiaoli Zhi
Convolutional neural networks (CNNs) have made impressive achievements in image classification and object detection. For hardware with limited resources, it is not easy to achieve CNN inference with a large number of parameters without external storage. ...
ver más
|
|
|
|
|
|
|
Diba Das, Mehdi Hasan Chowdhury, Aditta Chowdhury, Kamrul Hasan, Quazi Delwar Hossain and Ray C. C. Cheung
The electrooculogram (EOG) is one of the most significant signals carrying eye movement information, such as blinks and saccades. There are many human?computer interface (HCI) applications based on eye blinks. For example, the detection of eye blinks can...
ver más
|
|
|
|
|
|
|
Argyrios Sideris, Theodora Sanida and Minas Dasygenis
Hash functions are an essential mechanism in today?s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including milit...
ver más
|
|
|
|
|
|
|
Arash Khajooei, Mohammad (Behdad) Jamshidi and Shahriar B. Shokouhi
Although the Metaverse is becoming a popular technology in many aspects of our lives, there are some drawbacks to its implementation on clouds, including long latency, security concerns, and centralized infrastructures. Therefore, designing scalable Meta...
ver más
|
|
|
|
|
|
|
Miaomiao Yuan, Zhuneng Fang, Peng Xiao, Ruijin Tong, Min Zhang and Yule Huang
Real-time systems for measuring structural cracks are of great significance due to their computational and cost efficacy, inherent hazards, and detection discrepancies associated with the manual visual assessment of structures. The precision and effectiv...
ver más
|
|
|
|
|
|
|
Weison Lin, Yajun Zhu and Tughrul Arslan
Edge AI accelerators are utilized to accelerate the computation in edge AI devices such as image recognition sensors on robotics, door lockers, drones, and remote sensing satellites. Instead of using a general-purpose processor (GPP) or graphic processin...
ver más
|
|
|
|
|
|
|
Partha Sarathi Paul, Anurag Dhungel, Maisha Sadia, Md Razuan Hossain and Md Sakib Hasan
This paper presents a general method, called ?self-parameterization?, for designing one-dimensional (1-D) chaotic maps that provide wider chaotic regions compared to existing 1-D maps. A wide chaotic region is a desirable property, as it helps to provide...
ver más
|
|
|
|