Search results for "RDW"
showing 10 items of 1401 documents
Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks
2015
Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT device…
A Note on Keys and Keystreams of Chacha20 for Multi-key Channels
2018
In this paper we analyze the keystreams generated by the Chacha20 stream cipher. We also compare these to the ones generated by its predecessor, the RC4 stream cipher. Due to the proposed multi-key channels in the upcoming TLS 1.3 standard we analyze the behavior of the keystream in the boundary case where there is a single bit difference between two keys used for the initiation of the stream cipher algorithms. The goal is to check whether a single bit change in the key has any predictable influence on the bits of the keystream output.
Versatile Direct and Transpose Matrix Multiplication with Chained Operations: An Optimized Architecture Using Circulant Matrices
2016
With growing demands in real-time control, classification or prediction, algorithms become more complex while low power and small size devices are required. Matrix multiplication (direct or transpose) is common for such computation algorithms. In numerous algorithms, it is also required to perform matrix multiplication repeatedly, where the result of a multiplication is further multiplied again. This work describes a versatile computation procedure and architecture: one of the matrices is stored in internal memory in its circulant form, then, a sequence of direct or transpose multiplications can be performed without timing penalty. The architecture proposes a RAM-ALU block for each matrix c…
A DC and small signal AC model for organic thin film transistors including contact effects and non quasi static regime
2017
Abstract We present a compact model for the DC and small signal AC analysis of Organic Thin Film Transistors (OTFTs). The DC part of the model assumes that the electrical current injected in the OTFT is limited by the presence of a metal/organic semiconductor junction that, at source, acts as a reverse biased Schottky junction. By including this junction, modeled as a reverse biased gated diode at source, the DC model is able to reproduce the scaling of the electrical characteristics even for short channel devices. The small signal AC part of the model uses a transmission line approach in order to compute the impedances of the channel and parasitic regions of the device. The overlap capacit…
HPG-HMapper: A DNA hydroxymethylation analysis tool
2019
DNA methylation (mC) and hydroxymethylation (hmC) can significantly affect the normal human development, as well as health and disease status. hmC studies require not only specific treatment of DNA, but also software tools for their analysis. However, there are no software tools capable of analyzing DNA hmC currently. In this article, we propose HPG-HMapper, a parallel software tool for analyzing the DNA hmC data obtained by ten-eleven translocation–assisted bisulfite sequencing. This tool takes as input data the output files of mC aligner tools, and it yields mC maps and the accounting of methylated and hydroxymethylated bases on each chromosome. The design of this tool includes the consi…
FRIPON: a worldwide network to track incoming meteoroids
2020
Context. Until recently, camera networks designed for monitoring fireballs worldwide were not fully automated, implying that in case of a meteorite fall, the recovery campaign was rarely immediate. This was an important limiting factor as the most fragile - hence precious - meteorites must be recovered rapidly to avoid their alteration. Aims. The Fireball Recovery and InterPlanetary Observation Network (FRIPON) scientific project was designed to overcome this limitation. This network comprises a fully automated camera and radio network deployed over a significant fraction of western Europe and a small fraction of Canada. As of today, it consists of 150 cameras and 25 European radio receiver…
Industrial Environment Mapping Using Distributed Static 3D Sensor Nodes
2018
This paper presents a system architecture for mapping and real-time monitoring of a relatively large industrial robotic environment of size 10 m × 15 m × 5 m. Six sensor nodes with embedded computing power and local processing of the 3D point clouds are placed close to the ceiling. The system architecture and data processing is based on the Robot Operating System (ROS) and the Point Cloud Library (PCL). The 3D sensors used are the Microsoft Kinect for Xbox One and point cloud data is collected at 20 Hz. A new manual calibration procedure is developed using reflective planes. The specified range of the used sensor is 0.8 m to 4.2 m, while depth data up to 9 m is used in this paper. Despite t…
Design of the online PC farm for the high level trigger of the NA62 experiment at CERN
2012
We present a highly efficient data processing framework optimized for software based triggers of fixed-target HEP experiments with continuous data collection during burst time alternating with longer out-of-burst periods.
High Performance FOC for Induction Motors with Low Cost ATSAM3X8E Microcontroller
2018
In this paper the Authors present the Arduino Due board application for an induction motor field oriented control (FOC) algorithm. The low cost Arduino Due board is equipped with a ATSAM3X8E microcontroller that performs the algorithm calculation, data processing, current signals and speed/position data acquisition. The control algorithm has been developed with the help of the open source Arduino integrated development environment, whereas a user friendly control interface, used to manage the speed or position set point, has been developed in Java language by means of an other open source software, namely, Processing. An experimental test bed has been set up in order to validate the FOC sys…
The Belle II Pixel Detector Data Acquisition and Background Suppression System
2017
The Belle II experiment at the future SuperKEKB collider in Tsukuba, Japan, features a design luminosity of 8 1035 cm−2s−1, which is a factor of 40 larger than that of its predecessor Belle. The pixel detector (PXD) with about 8 million pixels is based on the DEPFET technology and will improve the vertex resolution in beam direction by a factor of 2. With an estimated trigger rate of 30 kHz, the PXD is expected to generate a data rate of 20 GBytes/s, which is about 10 times larger than the amount of data generated by all other Belle II subdetectors. Due to the large beam-related background, the PXD requires a data acquisition system with high-bandwidth data links and realtime background red…