Microprocessors and Microsystems最新文献

筛选
英文 中文
Retraction notice to “FPGA implementation of PMSG based AC conversion using soft switching twin–mode PWM/FPGA control for high power IM application” [Microprocessors and Microsystems 75 (2020) 103044] 关于“基于软开关双模PWM/FPGA控制的高功率IM应用中基于PMSG的交流转换的FPGA实现”的撤回通知[微处理器与微系统]75 (2020)103044]
IF 2.6 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2023-11-30 DOI: 10.1016/j.micpro.2023.104977
C. Kadhiravan, J. Baskaran
{"title":"Retraction notice to “FPGA implementation of PMSG based AC conversion using soft switching twin–mode PWM/FPGA control for high power IM application” [Microprocessors and Microsystems 75 (2020) 103044]","authors":"C. Kadhiravan, J. Baskaran","doi":"10.1016/j.micpro.2023.104977","DOIUrl":"10.1016/j.micpro.2023.104977","url":null,"abstract":"","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"104 ","pages":"Article 104977"},"PeriodicalIF":2.6,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0141933123002223/pdfft?md5=17a61357c1aeda88aa50056adda92d00&pid=1-s2.0-S0141933123002223-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138515481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wiretap resisting and privacy preserving data exchange with physical layer security and blockchain based authentication in Internet of Vehicles 基于物理层安全和区块链认证的车联网防窃听、保隐私数据交换
IF 2.6 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2023-11-23 DOI: 10.1016/j.micpro.2023.104965
Qiao Liu , Qi Han , Guangze Luo , Jin Cao , Hui Li , Yong Wang
{"title":"Wiretap resisting and privacy preserving data exchange with physical layer security and blockchain based authentication in Internet of Vehicles","authors":"Qiao Liu ,&nbsp;Qi Han ,&nbsp;Guangze Luo ,&nbsp;Jin Cao ,&nbsp;Hui Li ,&nbsp;Yong Wang","doi":"10.1016/j.micpro.2023.104965","DOIUrl":"10.1016/j.micpro.2023.104965","url":null,"abstract":"<div><p>With the development of automobile industry technology, vehicles have greatly affected everyday life, work and other aspects. With the continuous innovation of sensor technology, computer technology, wireless communication<span><span><span> technology, and GPS technology, the concept of Inter of Vehicles (IoV) has been widely regarded as the core technology to solve a series of problems. However, as a complexity network with multiple elements including people, vehicle, base-station and so on, IoV is confronted with security threatened. In this paper, secure data exchange has been considered for two authenticated On Board Units (OBUs) with help of Road Side Unit (RSU). Blockchain based </span>authentication<span> and physical layer security have been applied into IoV for wiretap resisting and privacy preserving data exchange. For wiretap resisting, two synchronized transmitted signals from OBUs act as artificial noise at eavesdropper. In addition, for privacy preserving, summed codeword is formed at RSU which cannot be recovered individually. Finally, simulation results have been conducted to demonstrate that the proposed protocol can achieve transmission efficiency as well as </span></span>informatics security.</span></p></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"104 ","pages":"Article 104965"},"PeriodicalIF":2.6,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138515506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the interactions between ILP and TLP with hardware transactional memory ILP和TLP与硬件事务性内存之间的相互作用
IF 2.6 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2023-11-19 DOI: 10.1016/j.micpro.2023.104975
Víctor Nicolás-Conesa, Rubén Titos-Gil, Ricardo Fernández-Pascual, Alberto Ros, Manuel E. Acacio
{"title":"On the interactions between ILP and TLP with hardware transactional memory","authors":"Víctor Nicolás-Conesa,&nbsp;Rubén Titos-Gil,&nbsp;Ricardo Fernández-Pascual,&nbsp;Alberto Ros,&nbsp;Manuel E. Acacio","doi":"10.1016/j.micpro.2023.104975","DOIUrl":"https://doi.org/10.1016/j.micpro.2023.104975","url":null,"abstract":"<div><p>Hardware implementations of Transactional Memory (HTM) are designed to facilitate efficient thread synchronization in parallel programs, encouraging the use of larger critical sections. By employing optimistic concurrency control to execute transactions speculatively, HTM systems promise to deliver the performance benefits typically associated with fine-grained locks. In doing so, HTM systems must deal with transaction aborts. While under certain conditions aborts may be caused by the inherent limitations of hardware structures employed to implement TM (e.g., caches), conflicting concurrent accesses to shared memory locations are generally the prevailing cause for squashing the work done by a transaction</p><p>In this study, we present what we believe to be, to the best of our knowledge, the first characterization of how the aggressiveness of processor cores, particularly their ability to exploit instruction-level parallelism (ILP), interacts with the support for optimistic thread-level speculation offered by HTM systems. We have observed that by adjusting the size of structures that facilitate out-of-order and speculative execution, the number of aborts in the execution of transactional workloads can be altered in best-effort HTM implementations. Our findings indicate that in scenarios with high contention, a smaller number of powerful cores is more suitable, whereas in low contention scenarios, using a larger number of less aggressive cores is preferable. In addition, HTM systems that employ lazy detection and those employing eager detection with requester-stalls resolution, benefit from using simpler cores. In conclusion, abort ratios can be reduced with a careful choice of both processor aggressiveness and design aspects for each application depending on its contention.</p></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"104 ","pages":"Article 104975"},"PeriodicalIF":2.6,"publicationDate":"2023-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S014193312300220X/pdfft?md5=ce105b99f7f43d90376360a92db4669c&pid=1-s2.0-S014193312300220X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138404142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault modeling for external energy or internal cell defect in quantum dot cellular automata 量子点元胞自动机中外部能量或内部细胞缺陷的故障建模
IF 2.6 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2023-11-01 DOI: 10.1016/j.micpro.2023.104948
Debajyoty Banik
{"title":"Fault modeling for external energy or internal cell defect in quantum dot cellular automata","authors":"Debajyoty Banik","doi":"10.1016/j.micpro.2023.104948","DOIUrl":"https://doi.org/10.1016/j.micpro.2023.104948","url":null,"abstract":"<div><p>Nanotechnology has made the circuits more susceptible to errors. It takes a lot of space and power to make sequential reversible circuits testable using one of the conventional methods (such as cascading gates with the original circuit). I suggest a superior testing strategy for sequential circuits based on conservative logic. The primary goal of this effort is to create a testable sequential circuit that is compact in terms of circuit area and other cost parameters. My method does not require changing the original circuit. So, incorporating testable features using the proposed method does not affect the complexity of the overall circuit. In this work, stuck-at-fault modeling for external unwanted energy or internal cell defect in low-power molecular QCA is also derived. The reversible double-edge triggered (DET) flip-flop is tested using the suggested approach. The proposed methodology can still be applied to achieve 100% fault coverage for unidirectional stuck-at-fault in quantum cellular automata (QCA) designs. The design is assigned into practice using a layered technique since it is more reliable and economical.</p></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"103 ","pages":"Article 104948"},"PeriodicalIF":2.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92046144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction notice to “Applications of internet of things (IOT) to improve the stability of a grid connected power system using interline power flow controller” [Microprocessors and Microsystems 76 (2020) 103038] 关于“物联网(IOT)在利用线间潮流控制器提高并网电力系统稳定性中的应用”的撤回通知[微处理器与微系统76 (2020)103038]
IF 2.6 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2023-11-01 DOI: 10.1016/j.micpro.2023.104941
G. Radhakrishnan , V. Gopalakrishnan
{"title":"Retraction notice to “Applications of internet of things (IOT) to improve the stability of a grid connected power system using interline power flow controller” [Microprocessors and Microsystems 76 (2020) 103038]","authors":"G. Radhakrishnan ,&nbsp;V. Gopalakrishnan","doi":"10.1016/j.micpro.2023.104941","DOIUrl":"10.1016/j.micpro.2023.104941","url":null,"abstract":"","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"103 ","pages":"Article 104941"},"PeriodicalIF":2.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0141933123001850/pdfft?md5=9c39cd78c348dc2f5f482827c00f13ab&pid=1-s2.0-S0141933123001850-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135371225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction notice to the articles published in the special issue embedded system from “Microprocessors and Microsystems” 《微处理器与微系统》嵌入式系统专刊文章撤回通知
IF 2.6 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2023-11-01 DOI: 10.1016/j.micpro.2023.104972
{"title":"Retraction notice to the articles published in the special issue embedded system from “Microprocessors and Microsystems”","authors":"","doi":"10.1016/j.micpro.2023.104972","DOIUrl":"https://doi.org/10.1016/j.micpro.2023.104972","url":null,"abstract":"","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"103 ","pages":"Article 104972"},"PeriodicalIF":2.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S014193312300217X/pdfft?md5=de0c28b605a9506bcca421fc6c60a2e5&pid=1-s2.0-S014193312300217X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138471765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploration of optimal functional Trojan-resistant hardware intellectual property (IP) core designs during high level synthesis 在高级合成过程中探索最优功能抗特洛伊木马硬件知识产权(IP)核心设计
IF 2.6 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2023-11-01 DOI: 10.1016/j.micpro.2023.104973
Anirban Sengupta, Aditya Anshul, Rahul Chaurasia
{"title":"Exploration of optimal functional Trojan-resistant hardware intellectual property (IP) core designs during high level synthesis","authors":"Anirban Sengupta,&nbsp;Aditya Anshul,&nbsp;Rahul Chaurasia","doi":"10.1016/j.micpro.2023.104973","DOIUrl":"https://doi.org/10.1016/j.micpro.2023.104973","url":null,"abstract":"<div><p>Hardware Trojans that have the capability to change the computed functional output in intellectual property (IP) cores, integrated into computing systems can be a vital reliability concern in the context of correct system operation. Therefore, determining an optimal Trojan-resistant hardware design architecture that considers multi-objective orthogonal parameters such as area and delay is crucial. This paper presents a novel exploration of optimal hardware IP core design methodology with Trojan defense capability (<em>i.e.,</em> detection and isolation) during high level synthesis (HLS) that provides isolation of functional Trojan in a system design to ensure reliable and correct functional behavior. The proposed methodology is robust and provides the capability to yield the correct output value using HLS-based triple modular redundancy (TMR) logic and a distinct multivendor allocation policy. Therefore, the proposed HLS methodology can generate an optimal hardware IP core/system-on-chip (SoC) design with functional Trojan defense capability. The paper presents an overall flow of the proposed methodology along with a demonstrative case study on designing optimal Trojan resistant finite impulse response filter (FIR) hardware SoC design. Results of the proposed approach are evaluated in terms of design cost, convergence time, security and optimality analysis, and comparison with prior works. The proposed approach is able to generate fully functional Trojan-resistant optimal SoC designs with minimum overhead, as evident from optimality analysis and design cost.</p></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"103 ","pages":"Article 104973"},"PeriodicalIF":2.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134656190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental EMFI detection on a RISC-V core using the Trace Verifier solution 使用跟踪验证解决方案在RISC-V核心上进行实验性EMFI检测
IF 2.6 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2023-11-01 DOI: 10.1016/j.micpro.2023.104968
Anthony Zgheib, Olivier Potin, Jean-Baptiste Rigaud, Jean-Max Dutertre
{"title":"Experimental EMFI detection on a RISC-V core using the Trace Verifier solution","authors":"Anthony Zgheib,&nbsp;Olivier Potin,&nbsp;Jean-Baptiste Rigaud,&nbsp;Jean-Max Dutertre","doi":"10.1016/j.micpro.2023.104968","DOIUrl":"https://doi.org/10.1016/j.micpro.2023.104968","url":null,"abstract":"<div><p>Physical attacks are powerful threats that can cause changes in the execution behavior of a program. Control-Flow Integrity (CFI) is used to check the program’s flow execution, ensuring that it remains unaltered by these attacks. The RISC-V Trace Encoder (TE) provides valuable information about the user program’s execution path, and is used as part of a CFI solution. An enhanced version of the TE specifications permits detecting intricate fault models such as the corruption of any discontinuity instruction, using an additional Trace Verifier (TV) hardware module. In this paper, we present a buffer overflow software attack simulation and experimental ElectroMagnetic Fault Injection (EMFI) attacks conducted on an Field Programmable Gate Array (FPGA) board that implements a RISC-V core linked to the enhanced TE and TV modules. Unlike existing CFI solutions, our proposed approach does not require modifications to the RISC-V compiler, user application code or the RISC-V core. The average overhead of our solution in terms of hardware area, memory and power consumption are equal to 13.6%, 3.5% and 9% respectively.</p></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"103 ","pages":"Article 104968"},"PeriodicalIF":2.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91959632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fischer machine learning for mobile cloud computing in eHealth systems using blockchain mechanism Fischer机器学习在电子医疗系统中使用区块链机制进行移动云计算
IF 2.6 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2023-11-01 DOI: 10.1016/j.micpro.2023.104969
Nithya Rekha Sivakumar , Sara Abdelwahab Ghorashi , Nada Ahmed , Hafiza Elbadie Ahmed Elsrej , Shakila Basheer
{"title":"Fischer machine learning for mobile cloud computing in eHealth systems using blockchain mechanism","authors":"Nithya Rekha Sivakumar ,&nbsp;Sara Abdelwahab Ghorashi ,&nbsp;Nada Ahmed ,&nbsp;Hafiza Elbadie Ahmed Elsrej ,&nbsp;Shakila Basheer","doi":"10.1016/j.micpro.2023.104969","DOIUrl":"https://doi.org/10.1016/j.micpro.2023.104969","url":null,"abstract":"<div><p>The Electronic Healthcare (eHealth) systems are competent to ensure effective care engineering and intensified healthcare quality which are user-friendly cache and administration, in Electronic Health Records (EHRs). For secure EHRs of Mobile Cloud-based eHealth systems, ensuring high security and data privacy, Interplanetary File System in healthcare has traditionally been concentrated. However, there has been a recent push towards achieving high quality of e-health services because blockchain-based health care applications require QoS guarantees in terms of requirements such as network latency and end-to-end delay. In this work, an Extended Validation Certification-based Fischer Neural Network Optimization (EVC-FNNO) method for secured Mobile Cloud-based E-Health Systems is proposed. With the identity being the digital certificate, the EVC is provided with the identity to the mobile cloud user who will transact in the network. In this way, the mobile cloud user is being ensured to access the ledger for the transaction. Therefore, both data privacy and security is said to be provided. Next, with Fischer Neural Network Optimization (FNNO), every authenticated mobile cloud user via EVC then possess a copy of shared ledger, therefore resolving data acquisition in cloud server and hence solving network latency. The proposed method is verified by some demonstrative examples in addressing QoS. The empirical results show that the EVC-FNNO method provides an efficient solution by validating the mobile cloud user sensitive health information with digital certificate. Security analysis proves that the EVC-FNNO method is secure. We also conduct comprehensive performance evaluations that demonstrate the high efficiency of the EVC-FNNO method in terms of end-to-end delay, network latency and data privacy, compared to the existing data sharing methods.</p></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"103 ","pages":"Article 104969"},"PeriodicalIF":2.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91959633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction notice to “Application of Machine Learning and Big Data in Doubly Fed Induction Generator based Stability Analysis of Multi Machine System using Substantial Transformative Optimization Algorithm” [Microprocessors and Microsystems 73 (2020) 102971] “机器学习和大数据在基于双馈感应发电机的多机系统稳定性分析中的应用”[微处理器与微系统]73 (2020)102971]
IF 2.6 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2023-11-01 DOI: 10.1016/j.micpro.2023.104942
V. Subha Seethalakshmi , R. Karthigaivel , N. Vengadachalam , S. Selvakumaran
{"title":"Retraction notice to “Application of Machine Learning and Big Data in Doubly Fed Induction Generator based Stability Analysis of Multi Machine System using Substantial Transformative Optimization Algorithm” [Microprocessors and Microsystems 73 (2020) 102971]","authors":"V. Subha Seethalakshmi ,&nbsp;R. Karthigaivel ,&nbsp;N. Vengadachalam ,&nbsp;S. Selvakumaran","doi":"10.1016/j.micpro.2023.104942","DOIUrl":"10.1016/j.micpro.2023.104942","url":null,"abstract":"","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"103 ","pages":"Article 104942"},"PeriodicalIF":2.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0141933123001862/pdfft?md5=a48894a240cf9261b64bd305c867c9f7&pid=1-s2.0-S0141933123001862-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135411776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信