Search results for "Hardware"

showing 10 items of 1372 documents

Solution of the Skyrme-Hartree–Fock–Bogolyubovequations in the Cartesian deformed harmonic-oscillator basis. (VIII) hfodd (v2.73y): A new version of …

2017

We describe the new version (v2.73y) of the code HFODD which solves the nuclear Skyrme Hartree-Fock or Skyrme Hartree-Fock-Bogolyubov problem by using the Cartesian deformed harmonic-oscillator basis. In the new version, we have implemented the following new features: (i) full proton-neutron mixing in the particle-hole channel for Skyrme functionals, (ii) the Gogny force in both particle-hole and particle-particle channels, (iii) linear multi-constraint method at finite temperature, (iv) fission toolkit including the constraint on the number of particles in the neck between two fragments, calculation of the interaction energy between fragments, and calculation of the nuclear and Coulomb ene…

Angular momentumNuclear Theory[PHYS.NUCL]Physics [physics]/Nuclear Theory [nucl-th]SYMMETRYNuclear TheoryHartree–Fock methodGeneral Physics and AstronomyFOS: Physical sciencesGogny forceSkyrme interactionNuclear density functional theorySelf-consistent mean-field01 natural sciences114 Physical sciencesNuclear Theory (nucl-th)Energy density functional theorySYSTEMSQuantum mechanics0103 physical sciences010306 general physicsHarmonic oscillator[ PHYS.NUCL ] Physics [physics]/Nuclear Theory [nucl-th]PhysicsHartree–Fock–Bogolyubovta114010308 nuclear & particles physicsAugmented Lagrangian methodInteraction energyAngular-momentum projection113 Computer and information sciencesHardware and ArchitecturePairingIsospintheoretical nuclear physicsSelf-consistent mean fieldHartree-Fock-BogolyubovPairing correlations
researchProduct

Extraordinary tuning of a nanocavity by a near-field probe

2011

Abstract We report here an experimental observation of an extraordinary near-field interaction between a local probe and a small-volume solid-state nanocavity. We directly compare the normally observed near-field interaction regime driven by the perturbation theory and then report the extraordinary interaction regime. Subsequently, we show that the cavity can take up to 2 min to recover from this interaction after removing the probe and that leads to an extraordinary blue-shift of the cavity resonance wavelength (∼15 nm) which depends on the probe motion above the cavity and not the position. The reasons for this effect are not fully understood yet but we try to give some explanations.

Anomalous regimeSilicon photonicsPhysics::OpticsNear and far fieldNear-field opticsTuningPhotonic crystalsOpticsPosition (vector)Atomic and Molecular PhysicsElectronicNanotechnologyOptical and Magnetic MaterialsPerturbation theoryExtraordinary regimeElectrical and Electronic EngineeringOptomechanicsComputingMilieux_MISCELLANEOUSPhotonic crystalPhysicsSilicon photonicsbusiness.industryNear-field opticsCondensed Matter PhysicsAtomic and Molecular Physics and OpticsOptomechanicsElectronic Optical and Magnetic MaterialsWavelengthHardware and ArchitectureQuantum electrodynamicsAnomalous regime; Extraordinary regime; Microcavity; Nanotechnology; Near-field optics; Optomechanics; Photonic crystals; Silicon photonics; Tuning; Electronic Optical and Magnetic Materials; Atomic and Molecular Physics and Optics; Condensed Matter Physics; Hardware and Architecture; Electrical and Electronic Engineeringand OpticsbusinessMicrocavity
researchProduct

A Hardware and Secure Pseudorandom Generator for Constrained Devices

2018

Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…

Applied cryptography; Chaotic circuits; Constrained devices; Discrete dynamical systems; FPGA; Lightweight Cryptography; Random number generators; Statistical tests; Control and Systems Engineering; Information Systems; Computer Science Applications1707 Computer Vision and Pattern Recognition; Electrical and Electronic EngineeringHardware security moduleComputer scienceRandom number generationCryptography[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyPseudorandom generatorConstrained devicesLightweight CryptographyChaotic circuits[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]PermutationRandom number generatorsStatistical tests0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringField-programmable gate arrayThroughput (business)FPGAPseudorandom number generatorGenerator (category theory)business.industry020208 electrical & electronic engineeringComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsDiscrete dynamical systems[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science ApplicationsApplied cryptography[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Control and Systems EngineeringKey (cryptography)[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessComputer hardwareInformation SystemsIEEE Transactions on Industrial Informatics
researchProduct

Investigating the Impact of Radiation-Induced Soft Errors on the Reliability of Approximate Computing Systems

2020

International audience; Approximate Computing (AxC) is a well-known paradigm able to reduce the computational and power overheads of a multitude of applications, at the cost of a decreased accuracy. Convolutional Neural Networks (CNNs) have proven to be particularly suited for AxC because of their inherent resilience to errors. However, the implementation of AxC techniques may affect the intrinsic resilience of the application to errors induced by Single Events in a harsh environment. This work introduces an experimental study of the impact of neutron irradiation on approximate computing techniques applied on the data representation of a CNN.

Approximate computingComputer scienceReliability (computer networking)Radiation effectsRadiation induced02 engineering and technologyneuroverkotExternal Data Representation01 natural sciencesConvolutional neural networkSoftwareHardware020204 information systems0103 physical sciences0202 electrical engineering electronic engineering information engineering[SPI.NANO]Engineering Sciences [physics]/Micro and nanotechnologies/MicroelectronicsResilience (network)mikroprosessoritNeutronsResilience010308 nuclear & particles physicsbusiness.industryReliabilityApproximate computingPower (physics)[SPI.TRON]Engineering Sciences [physics]/ElectronicsComputer engineeringsäteilyfysiikka[INFO.INFO-ES]Computer Science [cs]/Embedded SystemsbusinessSoftware
researchProduct

Arc routing problems: A review of the past, present, and future

2020

[EN] Arc routing problems (ARPs) are defined and introduced. Following a brief history of developments in this area of research, different types of ARPs are described that are currently relevant for study. In addition, particular features of ARPs that are important from a theoretical or practical point of view are discussed. A section on applications describes some of the changes that have occurred from early applications of ARP models to the present day and points the way to emerging topics for study. A final section provides information on libraries and instance repositories for ARPs. The review concludes with some perspectives on future research developments and opportunities for emergin…

Arc routingHistory050210 logistics & transportation021103 operations researchComputer Networks and CommunicationsComputer science05 social sciences0211 other engineering and technologies02 engineering and technologyIndustrial engineeringVehicle routingHardware and ArchitectureSection (archaeology)ApplicationsState-of-the-art0502 economics and businessVehicle routing problemPoint (geometry)MATEMATICA APLICADAFutureArc routingSoftwareInformation SystemsNetworks
researchProduct

Improvement of Energy Efficiency for Indoor Lighting in a Big Shopping Center

2018

As the progressive diffusion of shopping centers in Italy, the paper analysis the potential energy savings in the indoor lighting plant, thanks to new technologies as LED lamps and Building Automation System. The case study, applied to a big shopping mall in the middle of Italy, shows great results, thanks to the high efficiency of LED technology, high number of operating hours and the implementation of a control system. An economic and environmental evaluation is reported.

Architectural engineeringEnvironmental evaluationEnvironmental EngineeringEmerging technologiesComputer science020209 energyEnergy Engineering and Power Technology02 engineering and technologyIndustrial and Manufacturing Engineeringlaw.inventionlaw0502 economics and business0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringBuilding automationSettore ING-IND/11 - Fisica Tecnica Ambientalebusiness.industryRenewable Energy Sustainability and the EnvironmentShopping mall05 social sciencesLEDEnergy SavingEnergy consumptionshopping centerLED lampindoor lighting plantHardware and Architecturebusiness050203 business & managementEfficient energy use
researchProduct

Multilanguage Semantic Interoperability in Distributed Applications

2013

JOSI is a software framework that tries to simplify the development of such kinds of applications both by providing the possibility of working on models for representing such semantic information and by offering some implementations of such models that can be easily used by software developers without any knowledge about semantic models and languages. This software library allows the representation of domain models through Java interfaces and annotations and then to use such a representation for automatically generating an implementation of domain models in different programming languages (currently Java and C++). Moreover, JOSI supports the interoperability with other applications both by …

Article SubjectJavaProgramming languageComputer sciencebusiness.industryMechanical EngineeringGeneral Chemical EngineeringRepresentation (arts)Domain modelSemantic interoperabilitycomputer.software_genreIndustrial and Manufacturing EngineeringSoftware frameworkSoftwareHardware and Architecturelcsh:TA1-2040Domain analysisElectrical and Electronic Engineeringbusinesslcsh:Engineering (General). Civil engineering (General)computerImplementationCivil and Structural Engineeringcomputer.programming_languageJournal of Engineering
researchProduct

Error-Based Interference Detection in WiFi Networks

2017

In this paper we show that inter-technology interference can be recognized by commodity WiFi devices by monitoring the statistics of receiver errors. Indeed, while for WiFi standard frames the error probability varies during the frame reception in different frame fields (PHY, MAC headers, payloads) protected with heterogeneous coding, errors may appear randomly at any point during the time the demodulator is trying to receive an exogenous interfering signal. We thus detect and identify cross-technology interference on off-the-shelf WiFi cards by monitoring the sequence of receiver errors (bad PLCP, bad PCS, invalid headers, etc.) and develop an Artificial Neural Network (ANN) to recognize t…

Artificial Neural NetworkNeuronsMonitoringComputer scienceSettore ING-INF/03 - Telecomunicazioni05 social sciencesReal-time computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS050801 communication & media studies020206 networking & telecommunicationsWireless LAN02 engineering and technologySpectrum managementReceiversZigBee0508 media and communicationsComputer Networks and CommunicationPHYHardware and Architecture0202 electrical engineering electronic engineering information engineeringLong Term EvolutionDemodulationWireless fidelitySafety Risk Reliability and QualityInterference
researchProduct

DeepEva: A deep neural network architecture for assessing sentence complexity in Italian and English languages

2021

Abstract Automatic Text Complexity Evaluation (ATE) is a research field that aims at creating new methodologies to make autonomous the process of the text complexity evaluation, that is the study of the text-linguistic features (e.g., lexical, syntactical, morphological) to measure the grade of comprehensibility of a text. ATE can affect positively several different contexts such as Finance, Health, and Education. Moreover, it can support the research on Automatic Text Simplification (ATS), a research area that deals with the study of new methods for transforming a text by changing its lexicon and structure to meet specific reader needs. In this paper, we illustrate an ATE approach named De…

Artificial intelligenceComputer engineering. Computer hardwareText simplificationComputer scienceText simplificationcomputer.software_genreLexiconAutomatic-text-complexity-evaluationDeep-learningField (computer science)TK7885-7895Automatic text copmplexity evaluationText-complexity-assessmentText complexity assessmentStructure (mathematical logic)Settore INF/01 - InformaticaText-simplificationbusiness.industryDeep learningNatural language processingNatural-language-processingDeep learningGeneral MedicineQA75.5-76.95Artificial-intelligenceSupport vector machineElectronic computers. Computer scienceGradient boostingArtificial intelligencebusinesscomputerSentenceNatural language processingArray
researchProduct

Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation

2019

Abstract Recent advances in intrusion detection systems based on machine learning have indeed outperformed other techniques, but struggle with detecting multiple classes of attacks with high accuracy. We propose a method that works in three stages. First, the ExtraTrees classifier is used to select relevant features for each type of attack individually for each (ELM). Then, an ensemble of ELMs is used to detect each type of attack separately. Finally, the results of all ELMs are combined using a softmax layer to refine the results and increase the accuracy further. The intuition behind our system is that multi-class classification is quite difficult compared to binary classification. So, we…

Artificial intelligencelcsh:Computer engineering. Computer hardwareExtreme learning machineEnsemble methodsComputer scienceBinary numberlcsh:TK7885-7895Feature selection02 engineering and technologyIntrusion detection systemlcsh:QA75.5-76.95Machine learning0202 electrical engineering electronic engineering information engineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Multi layerExtreme learning machinebusiness.industryIntrusion detection system020206 networking & telecommunicationsPattern recognitionComputer Science ApplicationsBinary classificationFeature selectionSignal ProcessingSoftmax function020201 artificial intelligence & image processinglcsh:Electronic computers. Computer scienceArtificial intelligencebusinessClassifier (UML)EURASIP Journal on Information Security
researchProduct