Microprocessors and Microsystems最新文献

筛选
英文 中文
CRAX: Code reuse attacks on Xtensa’s register window ABI CRAX:对Xtensa的注册窗口ABI的代码重用攻击
IF 2.6 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2025-08-12 DOI: 10.1016/j.micpro.2025.105188
Adebayo Omotosho , Christian Hammer
{"title":"CRAX: Code reuse attacks on Xtensa’s register window ABI","authors":"Adebayo Omotosho ,&nbsp;Christian Hammer","doi":"10.1016/j.micpro.2025.105188","DOIUrl":"10.1016/j.micpro.2025.105188","url":null,"abstract":"<div><div>Code reuse attacks exploit existing codes in applications to hijack control flow and cause security breaches. However, reusing code on architectures with a register window or windowed register application binary interface (Winreg ABI), as known on Xtensa, poses significant challenges due to their unique architectural behavior. Winreg ABI aims to enhance register performance by reducing stack operations during procedure calls in reduced instruction set computer architectures. Rudimentary investigations have explored Winreg ABI exception handlers as potential sources of vulnerability in register window operations. Despite these efforts, the approach has been limited, even in synthetic examples, as it cannot technically reuse codes beyond changing register values.</div><div>In this paper, we present a novel approach to producing gadget-based code reuse attacks on Xtensa cores utilizing Winreg ABI, as found in embedded systems like ESP32 and ESP8266. At the same time, we showcase that established methods to detect such attacks such as leveraging hardware performance counter can also detect such attack schemes. Finally, we identify an additional potential loophole in the Winreg ABI. Our evaluation results using a number of benchmark applications demonstrate that successful attacks exhibit a consistent pattern that can be accurately detected.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"117 ","pages":"Article 105188"},"PeriodicalIF":2.6,"publicationDate":"2025-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144858203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting time drifts for securing Proof of Hardware Time in blockchain 在区块链中检测时间漂移以确保硬件时间证明
IF 2.6 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2025-08-06 DOI: 10.1016/j.micpro.2025.105185
Quentin Jayet , Christine Hennebert , Yann Kieffer , Vincent Beroulle
{"title":"Detecting time drifts for securing Proof of Hardware Time in blockchain","authors":"Quentin Jayet ,&nbsp;Christine Hennebert ,&nbsp;Yann Kieffer ,&nbsp;Vincent Beroulle","doi":"10.1016/j.micpro.2025.105185","DOIUrl":"10.1016/j.micpro.2025.105185","url":null,"abstract":"<div><div>Blockchain technology enables the creation of a timestamped, shared, and replicated history of events among participants who do not trust each other. To agree on the shared history, the blockchain uses a consensus protocol, such as Nakamoto’s protocol in Bitcoin. This protocol relies on a proof that statistically ensures the elapsed time between two blocks by design through the Proof of Work (PoW) mechanism. However, PoW relies heavily on computation and is not suitable for embedded systems. Proof of Hardware Time (PoHT) aims to provide a secure by design elapsed time proof mechanism with low power consumption. PoHT is embedded in a System on Module (SoM) that features an ARM Cortex-A7 microprocessor with a TrustZone and a Trusted Platform Module. This paper focuses on the security of the elapsed time measurement during PoHT, conducting experimental attacks targeting clock oscillators under temperature variations. It presents a consolidation of the various available time sources, as well as a solution for detecting time drifts. Furthermore, an embedded architecture for the time drift detection system is outlined and experimental testing of the system is performed.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"117 ","pages":"Article 105185"},"PeriodicalIF":2.6,"publicationDate":"2025-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144831442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation and characterization of a fault-tolerant CCSDS 123 hardware accelerator under neutron radiation 中子辐射容错CCSDS 123硬件加速器的实现与特性研究
IF 2.6 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2025-07-30 DOI: 10.1016/j.micpro.2025.105184
Wesley Grignani , Douglas A. Santos , Maria Kastriotou , Carlo Cazzaniga , Luigi Dilillo , Douglas R. Melo
{"title":"Implementation and characterization of a fault-tolerant CCSDS 123 hardware accelerator under neutron radiation","authors":"Wesley Grignani ,&nbsp;Douglas A. Santos ,&nbsp;Maria Kastriotou ,&nbsp;Carlo Cazzaniga ,&nbsp;Luigi Dilillo ,&nbsp;Douglas R. Melo","doi":"10.1016/j.micpro.2025.105184","DOIUrl":"10.1016/j.micpro.2025.105184","url":null,"abstract":"<div><div>In space applications, remote sensing relies on HSIs (Hyperspectral Images) to capture extensive Earth observation data. However, the substantial data volumes generated by HSIs present significant challenges for onboard storage and processing in space systems, underscoring the importance of efficient compression strategies. Additionally, the harsh conditions of the space environment expose these systems to potential faults, making the integration of fault-tolerant mechanisms crucial for maintaining reliable operation. In this context, this article presents the implementation of a low-cost and fault-tolerant CCSDS 123 HSI compressor. The compressor is present in different configurations employing hardening techniques such as TMR (Triple Modular Redundancy) and Hamming ECC (Error Correcting Code) to mitigate SEUs (Single-Event Upsets). We implemented techniques to enhance observability and evaluated the compressor reliability through fault injection simulations and physical tests at the ChipIr neutron irradiation facility. We present the resource utilization and performance results of each version with a comparative analysis with related work. The results highlight the lowest resource utilization achieved in the unhardened version, capable of processing 20.57 MSa/s and accelerating the application in 24<span><math><mo>×</mo></math></span> compared to a software solution. The reliability results demonstrate a high error rate of 97.9% in the unhardened version, significantly reduced in partially hardened versions, with no error propagation in the fully hardened design. Furthermore, we present an analysis of the main components of the accelerator affected by the radiation-induced events observed in the particle accelerator test.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"117 ","pages":"Article 105184"},"PeriodicalIF":2.6,"publicationDate":"2025-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144749623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scala defined hardware generators for Chisel Scala为Chisel定义了硬件生成器
IF 2.6 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2025-07-21 DOI: 10.1016/j.micpro.2025.105182
Martin Schoeberl , Hans Jakob Damsgaard , Luca Pezzarossa , Oliver Keszocze , Erling Rennemo Jellum , Scott Beamer
{"title":"Scala defined hardware generators for Chisel","authors":"Martin Schoeberl ,&nbsp;Hans Jakob Damsgaard ,&nbsp;Luca Pezzarossa ,&nbsp;Oliver Keszocze ,&nbsp;Erling Rennemo Jellum ,&nbsp;Scott Beamer","doi":"10.1016/j.micpro.2025.105182","DOIUrl":"10.1016/j.micpro.2025.105182","url":null,"abstract":"<div><div>We describe digital hardware designs in hardware description languages such as VHDL and SystemVerilog. Both languages were developed in the 1980s and, although regularly updated, are still in the style of their time. They lack the constructs to write more configurable generators than just the number of bits for an operation. Based on Scala, Chisel is a hardware construction language that helps to write hardware generators.</div><div>Hardware generators are not a new idea. Scripting languages, such as Perl and TCL, are often used to generate VHDL or Verilog code from other sources of system description. However, mixing two languages and embedding VHDL or Verilog strings in generator code is not scalable.</div><div>As Chisel is embedded in Scala, we can write the generators using the same language/environment as we use to describe the digital logic. This paper explores different examples and patterns to describe parameterizable hardware generators. We are confident that practices from software development can improve the productivity of hardware designers to build and test the next billion transistor chips.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"117 ","pages":"Article 105182"},"PeriodicalIF":2.6,"publicationDate":"2025-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144722345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time neural network-based thermal stress compensation for pressure sensors in precision localization systems 基于实时神经网络的精密定位系统压力传感器热应力补偿
IF 1.9 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2025-07-07 DOI: 10.1016/j.micpro.2025.105183
Paola Vitolo , Rosalba Liguori , Luigi Di Benedetto , Alfredo Rubino , Danilo Pau , Gian Domenico Licciardo
{"title":"Real-time neural network-based thermal stress compensation for pressure sensors in precision localization systems","authors":"Paola Vitolo ,&nbsp;Rosalba Liguori ,&nbsp;Luigi Di Benedetto ,&nbsp;Alfredo Rubino ,&nbsp;Danilo Pau ,&nbsp;Gian Domenico Licciardo","doi":"10.1016/j.micpro.2025.105183","DOIUrl":"10.1016/j.micpro.2025.105183","url":null,"abstract":"<div><div>This article presents a real-time Artificial Intelligence-based Reconfigurable Self-Calibration Unit (AI-ReSCU) for piezoresistive MEMS pressure sensors, designed to mitigate long-term drift effects induced by thermal stress. The system integrates a compact and reconfigurable neural network to dynamically estimate and correct sensor inaccuracies with minimal energy and area overhead. The architecture comprises a trigger module for detecting deviations from nominal behavior and a compensation engine driven by a quantized neural network optimized for hardware efficiency. The network processes temporal input windows and operates using 24-bit activations and 1-bit weights, enabling real-time inference with ultra-low power consumption. The fully digital system was prototyped in STMicroelectronics’ BCD8 technology, occupying 0.55 mm<sup>2</sup> and achieving a dynamic power consumption of 4.46 nW under typical conditions, thanks to extensive resource reuse and clock gating strategies. Offline experimental validation on LPS22HH pressure sensors demonstrated the system’s ability to recover up to 1.6 hPa of drift-induced error with a recovery latency of approximately 50 input samples, while maintaining measurement deviations within ±0.5 hPa across multiple stress scenarios.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"117 ","pages":"Article 105183"},"PeriodicalIF":1.9,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144633254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High throughput DLP and mixed radix based architectures of Viterbi decoder 高吞吐量DLP和基于混合基数的维特比解码器架构
IF 1.9 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2025-06-23 DOI: 10.1016/j.micpro.2025.105181
Mohamed Asan Basiri M.
{"title":"High throughput DLP and mixed radix based architectures of Viterbi decoder","authors":"Mohamed Asan Basiri M.","doi":"10.1016/j.micpro.2025.105181","DOIUrl":"10.1016/j.micpro.2025.105181","url":null,"abstract":"<div><div>Viterbi decoders play an important role in digital communication. This manuscript proposes two high throughput VLSI architectures of Viterbi decoder. In the first proposed architecture, the data level parallelism (DLP) based Viterbi decoder of rate <span><math><mfrac><mrow><mn>1</mn></mrow><mrow><mi>N</mi></mrow></mfrac></math></span> can be used to perform 1, 2, 4, 8, …parallel decodings of rates <span><math><mfrac><mrow><mn>1</mn></mrow><mrow><mi>N</mi></mrow></mfrac></math></span>, <span><math><mfrac><mrow><mn>1</mn></mrow><mrow><mrow><mo>(</mo><mi>N</mi><mo>/</mo><mn>2</mn><mo>)</mo></mrow></mrow></mfrac></math></span>, <span><math><mfrac><mrow><mn>1</mn></mrow><mrow><mrow><mo>(</mo><mi>N</mi><mo>/</mo><mn>4</mn><mo>)</mo></mrow></mrow></mfrac></math></span>, <span><math><mfrac><mrow><mn>1</mn></mrow><mrow><mrow><mo>(</mo><mi>N</mi><mo>/</mo><mn>8</mn><mo>)</mo></mrow></mrow></mfrac></math></span>, …respectively. The second proposed mixed radix Viterbi decoder architecture is to perform four numbers of radix-<span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>k</mi><mo>−</mo><mn>1</mn></mrow></msup></math></span> decodings in parallel using one radix-<span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>k</mi></mrow></msup></math></span> Viterbi decoder, where <span><math><mrow><mi>k</mi><mo>≥</mo><mn>1</mn></mrow></math></span>. All the conventional and proposed Viterbi decoders are implemented in 45 nm CMOS technology using Cadence. The synthesis results show that the proposed designs achieve high throughput as compared with the conventional designs. According to the synthesis results, the proposed mixed radix-2&amp;4 decoder achieves 73.9% of improvement in maximum throughput as compared with the conventional radix-4 design.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"117 ","pages":"Article 105181"},"PeriodicalIF":1.9,"publicationDate":"2025-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144471309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High throughput event filtering: The interpolation-based DIF algorithm hardware architecture 高吞吐量事件过滤:基于插值的DIF算法硬件架构
IF 1.9 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2025-06-11 DOI: 10.1016/j.micpro.2025.105171
Marcin Kowalczyk, Tomasz Kryjak
{"title":"High throughput event filtering: The interpolation-based DIF algorithm hardware architecture","authors":"Marcin Kowalczyk,&nbsp;Tomasz Kryjak","doi":"10.1016/j.micpro.2025.105171","DOIUrl":"10.1016/j.micpro.2025.105171","url":null,"abstract":"<div><div>In recent years, there has been rapid development in the field of event vision. It manifests itself both on the technical side, as better and better event sensors are available, and on the algorithmic side, as more and more applications of this technology are proposed and scientific papers are published. However, the data stream from these sensors typically contains a significant amount of noise, which varies depending on factors such as the degree of illumination in the observed scene or the temperature of the sensor. We propose a hardware architecture of the Distance-based Interpolation with Frequency Weights(DIF) filter and implement it on an FPGA chip. To evaluate the algorithm and compare it with other solutions, we have prepared a new high-resolution event dataset, which we are also releasing to the community. Our architecture achieved a throughput of 403.39 million events per second (MEPS) for a sensor resolution of 1280 × 720 and 428.45 MEPS for a resolution of 640 × 480. The averagevalues of the Area Under the Receiver Operating Characteristic (AUROC) index ranged from 0.844 to 0.999, depending on the dataset, which is comparable to the state-of-the-art filtering solutions, but with much higher throughput and better operation over a wide range of noise levels.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"117 ","pages":"Article 105171"},"PeriodicalIF":1.9,"publicationDate":"2025-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144502646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the performance of TinyML singular and ensemble techniques for intrusion detection in IoT networks 评估TinyML奇异和集成技术在物联网网络中入侵检测的性能
IF 1.9 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2025-06-03 DOI: 10.1016/j.micpro.2025.105172
Abderahmane Hamdouchi , Ali Idri
{"title":"Evaluating the performance of TinyML singular and ensemble techniques for intrusion detection in IoT networks","authors":"Abderahmane Hamdouchi ,&nbsp;Ali Idri","doi":"10.1016/j.micpro.2025.105172","DOIUrl":"10.1016/j.micpro.2025.105172","url":null,"abstract":"<div><div>As the Internet of Things (IoT) expands, safeguarding IoT networks from vulnerabilities becomes critical. Intrusion detection systems (IDS) leveraging machine learning (ML) techniques are essential for enhancing security and preventing unauthorized access. However, transmitting data to the cloud can introduce latency, impeding real-time attack detection. This research evaluates three TinyML ensemble techniques (random forest, XGBoost, and extra trees) and three singular techniques (decision tree, Gaussian naive Bayes, and multilayer perceptron) using two feature selection methods (maximum relevance minimum redundancy and analysis of variance) on the NF-ToN-IoT-v2 and NF-BoT-IoT-v2 datasets for cyberattack detection. Evaluations on the Arduino UNO used the prediction performance criteria (Cohen’s kappa and Matthew’s correlation coefficient), device metrics (latency, static RAM, and flash memory), and the Scott-Knott test and Borda count voting system to assess the statistical significance and to rank the models. Results show that singular TinyML models outperformed ensemble models for multiclass classification in the IDS-IoT context. The best models are: (1) MLP with 20 features and a hidden layer size of 56 for NF-ToN-IoT-v2; and (2) ET with 13 features, 2 estimators, and a tree depth of 16 for NF-BoT-IoT-v2.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"117 ","pages":"Article 105172"},"PeriodicalIF":1.9,"publicationDate":"2025-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144262850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A reconfigurable PUF and TRNG design based on multiplexers for securing IoT applications 基于多路复用器的可重构PUF和TRNG设计,用于保护物联网应用
IF 1.9 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2025-05-30 DOI: 10.1016/j.micpro.2025.105170
Zhiyuan Pan , Jiafeng Cheng , Nengyuan Sun , Jinghe Wang , Kai Shi , Jianghong Li , Zhaoyi Niu , Jiaqi Wang , Jiawei Zhang , Linhan Wang , Weize Yu
{"title":"A reconfigurable PUF and TRNG design based on multiplexers for securing IoT applications","authors":"Zhiyuan Pan ,&nbsp;Jiafeng Cheng ,&nbsp;Nengyuan Sun ,&nbsp;Jinghe Wang ,&nbsp;Kai Shi ,&nbsp;Jianghong Li ,&nbsp;Zhaoyi Niu ,&nbsp;Jiaqi Wang ,&nbsp;Jiawei Zhang ,&nbsp;Linhan Wang ,&nbsp;Weize Yu","doi":"10.1016/j.micpro.2025.105170","DOIUrl":"10.1016/j.micpro.2025.105170","url":null,"abstract":"<div><div>Physical Unclonable Function (PUF) and True Random Number Generator (TRNG) are two important hardware security primitives in modern cryptography. A regular arbiter PUF can be broken by machine learning (ML) attacks without much effort since a high linear relationship exists between the input data and the output response of the PUF. In this paper, an ML-resistant reconfigurable PUF and TRNG (RePT) architecture is proposed for the first time. Within this RePT design, a non-linearization technique by masking the linear relationship between the input data and the output response is proposed to greatly reinforce the robustness of an arbiter PUF against ML attacks without significantly increasing its area and power overhead. So as to further reuse the existing hardware resource within the arbiter PUF to build another hardware security primitive: TRNG, a novel algorithm is proposed to efficiently determine the selection signal value of each multiplexer within the arbiter PUF. As shown in the result, the proposed RePT design is able to achieve a 38 Mbps PUF (260 Mbps TRNG) throughput with 32,621 <span><math><mi>μ</mi></math></span>m<span><math><msup><mrow></mrow><mrow><mn>2</mn></mrow></msup></math></span> area, under the synthesis of SMIC 55 nm process design kits (PDK). Additionally, when ML attacks are performed on the proposed RePT circuit, it cannot be cracked even if 100,000 training data are enabled.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"116 ","pages":"Article 105170"},"PeriodicalIF":1.9,"publicationDate":"2025-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144189866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STRATUM project: AI-based point of care computing for neurosurgical 3D decision support tools STRATUM项目:基于人工智能的神经外科三维决策支持工具护理点计算
IF 1.9 4区 计算机科学
Microprocessors and Microsystems Pub Date : 2025-05-14 DOI: 10.1016/j.micpro.2025.105157
Himar Fabelo , Raquel Leon , Emanuele Torti , Santiago Marco , Asaf Badouh , Max Verbers , Carlos Vega , Javier Santana-Nunez , Yann Falevoz , Yolanda Ramallo-Fariña , Christian Weis , Ana M Wägner , Eduardo Juarez , Claudio Rial , Alfonso Lagares , Gustav Burström , Francesco Leporati , Luis Jimenez-Roldan , Elisa Marenzi , Teresa Cervero , Gustavo M. Callico
{"title":"STRATUM project: AI-based point of care computing for neurosurgical 3D decision support tools","authors":"Himar Fabelo ,&nbsp;Raquel Leon ,&nbsp;Emanuele Torti ,&nbsp;Santiago Marco ,&nbsp;Asaf Badouh ,&nbsp;Max Verbers ,&nbsp;Carlos Vega ,&nbsp;Javier Santana-Nunez ,&nbsp;Yann Falevoz ,&nbsp;Yolanda Ramallo-Fariña ,&nbsp;Christian Weis ,&nbsp;Ana M Wägner ,&nbsp;Eduardo Juarez ,&nbsp;Claudio Rial ,&nbsp;Alfonso Lagares ,&nbsp;Gustav Burström ,&nbsp;Francesco Leporati ,&nbsp;Luis Jimenez-Roldan ,&nbsp;Elisa Marenzi ,&nbsp;Teresa Cervero ,&nbsp;Gustavo M. Callico","doi":"10.1016/j.micpro.2025.105157","DOIUrl":"10.1016/j.micpro.2025.105157","url":null,"abstract":"<div><div>Integrated digital diagnostics are transforming complex surgical procedures, with brain tumour surgery being among the most challenging. STRATUM, a five-year Horizon Europe-funded project, aims to develop an advanced 3D decision support system leveraging real-time multimodal data processing powered by artificial intelligence. A key innovation of STRATUM is its design as an energy-efficient Point-of-Care computing system, seamlessly integrated into neurosurgical workflows. This system will provide surgeons with real-time, AI-driven insights, enhancing decision-making accuracy and efficiency. By optimizing surgical precision and reducing procedure duration, STRATUM is expected to improve patient outcomes while streamlining resource utilization within European healthcare systems.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"116 ","pages":"Article 105157"},"PeriodicalIF":1.9,"publicationDate":"2025-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144106844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信