Due to the interdependency of frame synchronization(FS)and channel estimation(CE),joint FS and CE(JFSCE)schemes are proposed to enhance their functionalities and therefore boost the overall performance of wireless com...Due to the interdependency of frame synchronization(FS)and channel estimation(CE),joint FS and CE(JFSCE)schemes are proposed to enhance their functionalities and therefore boost the overall performance of wireless communication systems.Although traditional JFSCE schemes alleviate the influence between FS and CE,they show deficiencies in dealing with hardware imperfection(HI)and deterministic line-of-sight(LOS)path.To tackle this challenge,we proposed a cascaded ELM-based JFSCE to alleviate the influence of HI in the scenario of the Rician fading channel.Specifically,the conventional JFSCE method is first employed to extract the initial features,and thus forms the non-Neural Network(NN)solutions for FS and CE,respectively.Then,the ELMbased networks,named FS-NET and CE-NET,are cascaded to capture the NN solutions of FS and CE.Simulation and analysis results show that,compared with the conventional JFSCE methods,the proposed cascaded ELM-based JFSCE significantly reduces the error probability of FS and the normalized mean square error(NMSE)of CE,even against the impacts of parameter variations.展开更多
Massive computational complexity and memory requirement of artificial intelligence models impede their deploy-ability on edge computing devices of the Internet of Things(IoT).While Power-of-Two(PoT)quantization is pro...Massive computational complexity and memory requirement of artificial intelligence models impede their deploy-ability on edge computing devices of the Internet of Things(IoT).While Power-of-Two(PoT)quantization is pro-posed to improve the efficiency for edge inference of Deep Neural Networks(DNNs),existing PoT schemes require a huge amount of bit-wise manipulation and have large memory overhead,and their efficiency is bounded by the bottleneck of computation latency and memory footprint.To tackle this challenge,we present an efficient inference approach on the basis of PoT quantization and model compression.An integer-only scalar PoT quantization(IOS-PoT)is designed jointly with a distribution loss regularizer,wherein the regularizer minimizes quantization errors and training disturbances.Additionally,two-stage model compression is developed to effectively reduce memory requirement,and alleviate bandwidth usage in communications of networked heterogenous learning systems.The product look-up table(P-LUT)inference scheme is leveraged to replace bit-shifting with only indexing and addition operations for achieving low-latency computation and implementing efficient edge accelerators.Finally,comprehensive experiments on Residual Networks(ResNets)and efficient architectures with Canadian Institute for Advanced Research(CIFAR),ImageNet,and Real-world Affective Faces Database(RAF-DB)datasets,indicate that our approach achieves 2×∼10×improvement in the reduction of both weight size and computation cost in comparison to state-of-the-art methods.A P-LUT accelerator prototype is implemented on the Xilinx KV260 Field Programmable Gate Array(FPGA)platform for accelerating convolution operations,with performance results showing that P-LUT reduces memory footprint by 1.45×,achieves more than 3×power efficiency and 2×resource efficiency,compared to the conventional bit-shifting scheme.展开更多
The Internet of Vehicles(IoV)will carry a large amount of security and privacy-related data,which makes the secure communication between the IoV terminals increasingly critical.This paper studies the joint beamforming...The Internet of Vehicles(IoV)will carry a large amount of security and privacy-related data,which makes the secure communication between the IoV terminals increasingly critical.This paper studies the joint beamforming for physical-layer security transmission in the coexistence of Vehicle-to-Infrastructure(V2I)and Vehicle-toVehicle(V2V)communication with Reconfigurable Intelligent Surface(RIS)assistance,taking into account hardware impairments.A communication model for physical-layer security transmission is established when the eavesdropping user is present and the base station antenna has hardware impairments assisted by RIS.Based on this model,we propose to maximize the V2I physical-layer security transmission rate.To solve the coupled non-convex optimization problem,an alternating optimization algorithm based on second-order cone programming and semidefinite relaxation is proposed to obtain the optimal V2I base station transmit precoding and RIS reflect phase shift matrix.Finally,simulation results are presented to verify the convergence and superiority of our proposed algorithm while analyzing the impact of system parameters on the V2I physical-layer security transmission rate.The simulation results further demonstrate that the proposed robust beamforming algorithm considering hardware impairments will achieve an average performance improvement of 0.7 dB over a non-robustly designed algorithm.Furthermore,increasing the number of RIS reflective units from 10 to 50 results in an almost 2 dB enhancement in secure transmission rate.展开更多
The SubBytes (S-box) transformation is the most crucial operation in the AES algorithm, significantly impacting the implementation performance of AES chips. To design a high-performance S-box, a segmented optimization...The SubBytes (S-box) transformation is the most crucial operation in the AES algorithm, significantly impacting the implementation performance of AES chips. To design a high-performance S-box, a segmented optimization implementation of the S-box is proposed based on the composite field inverse operation in this paper. This proposed S-box implementation is modeled using Verilog language and synthesized using Design Complier software under the premise of ensuring the correctness of the simulation result. The synthesis results show that, compared to several current S-box implementation schemes, the proposed implementation of the S-box significantly reduces the area overhead and critical path delay, then gets higher hardware efficiency. This provides strong support for realizing efficient and compact S-box ASIC designs.展开更多
As friction, intrinsic steady-state nonlinearity poses a challenging dilemma to the control system of 3-DOF (three degree of freedom) flight simulator, a novel hybrid control strategy of nonlinear PID (proportional...As friction, intrinsic steady-state nonlinearity poses a challenging dilemma to the control system of 3-DOF (three degree of freedom) flight simulator, a novel hybrid control strategy of nonlinear PID (proportionalintegral-derivative) with additional FFC (feed-forward controller) is proposed, and the hardware-in-the-loop simulation results are also given. Based on the description of 3-DOF flight simulator, a novel nonlinear PID theory is well introduced. Then a nonlinear PID controller with additional FFC is designed. Subsequently, the loop structure of 3-DOF flight simulator is also designed. Finally, a series of hardware-in-the-loop simulation experiments are undertaken to verify the feasibility and effectiveness of the proposed nonlinear PID controller with additional FFC for 3-DOF flight simulator.展开更多
This work presents a novel wavelet-based denoising technique for improving the signal-to-noise ratio(SNR)of nonsteady vibration signals in hardware redundant systems.The proposed method utilizes the relationship betwe...This work presents a novel wavelet-based denoising technique for improving the signal-to-noise ratio(SNR)of nonsteady vibration signals in hardware redundant systems.The proposed method utilizes the relationship between redundant hardware components to effectively separate fault-related components from the vibration signature,thus enhancing fault detection accuracy.The study evaluates the proposed technique on two mechanically identical subsystems that are simultaneously controlled under the same speed and load inputs,with and without the proposed denoising step.The results demonstrate an increase in detection accuracy when incorporating the proposed denoising method into a fault detection system designed for hardware redundant machinery.This work is original in its application of a new method for improving performance when using residual analysis for fault detection in hardware redundant machinery configurations.Moreover,the proposed methodology is applicable to nonstationary equipment that experiences changes in both speed and load.展开更多
Lisfranc injuries can be difficult injuries to identify and treat, while also being the subject of significant debate on proper surgical management. A narrative literature review was performed using Pubmed and Google ...Lisfranc injuries can be difficult injuries to identify and treat, while also being the subject of significant debate on proper surgical management. A narrative literature review was performed using Pubmed and Google Scholar databases to identify recent studies evaluating open reduction internal fixation vs primary arthrodesis for Lisfranc injuries to further elucidate optimal surgical management. Additional focus was placed removal of hardware after ORIF to identify the need for routine hardware removal as an additional surgery may guide surgeon decision-making. This review showed inconclusive data on the superiority of ORIF vs arthrodesis, as multiple conflicting results exist, though established that functional results are similar between these options. Though both are generally accepted treatment options, there are no well-designed randomized controlled trials directly comparing the two. Retention of hardware after ORIF has been shown to be tolerated, though there is a significant risk of the need for unplanned removal due to pain and hardware breakage.展开更多
We report a design and implementation of a field-programmable-gate-arrays(FPGA)based hardware platform,which is used to realize control and signal readout of trapped-ion-based multi-level quantum systems.This platform...We report a design and implementation of a field-programmable-gate-arrays(FPGA)based hardware platform,which is used to realize control and signal readout of trapped-ion-based multi-level quantum systems.This platform integrates a four-channel 2.8 Gsps@14 bits arbitrary waveform generator,a 16-channel 1 Gsps@14 bits direct-digital-synthesisbased radio-frequency generator,a 16-channel 8 ns resolution pulse generator,a 10-channel 16 bits digital-to-analogconverter module,and a 2-channel proportion integration differentiation controller.The hardware platform can be applied in the trapped-ion-based multi-level quantum systems,enabling quantum control of multi-level quantum system and highdimensional quantum simulation.The platform is scalable and more channels for control and signal readout can be implemented by utilizing more parallel duplications of the hardware.The hardware platform also has a bright future to be applied in scaled trapped-ion-based quantum systems.展开更多
For polar codes,the performance of successive cancellation list(SCL)decoding is capable of approaching that of maximum likelihood decoding.However,the existing hardware architectures for the SCL decoding suffer from h...For polar codes,the performance of successive cancellation list(SCL)decoding is capable of approaching that of maximum likelihood decoding.However,the existing hardware architectures for the SCL decoding suffer from high hardware complexity due to calculating L decoding paths simultaneously,which are unfriendly to the devices with limited logical resources,such as field programmable gate arrays(FPGAs).In this paper,we propose a list-serial pipelined hardware architecture with low complexity for the SCL decoding,where the serial calculation and the pipelined operation are elegantly combined to strike a balance between the complexity and the latency.Moreover,we employ only one successive cancellation(SC)decoder core without L×L crossbars,and reduce the number of inputs of the metric sorter from 2L to L+2.Finally,the FPGA implementations show that the hardware resource consumption is significantly reduced with negligible decoding performance loss.展开更多
Culture is the core of education and the proper meaning of education. Exploring the realization path and function mechanism of school culture education is a major task for educators at present and in the future. Then,...Culture is the core of education and the proper meaning of education. Exploring the realization path and function mechanism of school culture education is a major task for educators at present and in the future. Then, the current academic research started late, had few achievements and was relatively broad and weak. The article believes that the mechanism of school culture educating people includes three fields: “cultural field”, “cultivation field” and “education field”. School teachers and students should be guided to make cultural choices, consciously transform school culture into personal culture, and achieve the purpose of school culture educating people.展开更多
Hardware impairments(HI)are always present in low-cost wireless devices.This paper investigates the outage behaviors of intelligent reflecting surface(IRS)assisted non-orthogonal multiple access(NOMA)networks by takin...Hardware impairments(HI)are always present in low-cost wireless devices.This paper investigates the outage behaviors of intelligent reflecting surface(IRS)assisted non-orthogonal multiple access(NOMA)networks by taking into account the impact of HI.Specifically,we derive the approximate and asymptotic expressions of the outage probability for the IRS-NOMA-HI networks.Based on the asymptotic results,the diversity orders under perfect self-interference cancellation and imperfect self-interference cancellation scenarios are obtained to evaluate the performance of the considered network.In addition,the system throughput of IRS-NOMA-HI is discussed in delay-limited mode.The obtained results are provided to verify the accuracy of the theoretical analyses and reveal that:1)The outage performance and system throughput for IRS-NOMA-HI outperforms that of the IRS-assisted orthogonal multiple access-HI(IRS-OMA-HI)networks;2)The number of IRS elements,the pass loss factors,the Rician factors,and the value of HI are pivotal to enhancing the performance of IRS-NOMAHI networks;and 3)It is recommended that effective methods of reducing HI should be used to ensure system performance,in addition to self-interference cancellation techniques.展开更多
This paper investigates the system outage performance of a simultaneous wireless information and power transfer(SWIPT)based two-way decodeand-forward(DF)relay network,where potential hardware impairments(HIs)in all tr...This paper investigates the system outage performance of a simultaneous wireless information and power transfer(SWIPT)based two-way decodeand-forward(DF)relay network,where potential hardware impairments(HIs)in all transceivers are considered.After harvesting energy and decoding messages simultaneously via a power splitting scheme,the energy-limited relay node forwards the decoded information to both terminals.Each terminal combines the signals from the direct and relaying links via selection combining.We derive the system outage probability under independent but non-identically distributed Nakagami-m fading channels.It reveals an overall system ceiling(OSC)effect,i.e.,the system falls in outage if the target rate exceeds an OSC threshold that is determined by the levels of HIs.Furthermore,we derive the diversity gain of the considered network.The result reveals that when the transmission rate is below the OSC threshold,the achieved diversity gain equals the sum of the shape parameter of the direct link and the smaller shape parameter of the terminalto-relay links;otherwise,the diversity gain is zero.This is different from the amplify-and-forward(AF)strategy,under which the relaying links have no contribution to the diversity gain.Simulation results validate the analytical results and reveal that compared with the AF strategy,the SWIPT based two-way relaying links under the DF strategy are more robust to HIs and achieve a lower system outage probability.展开更多
SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a v...SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a variety of ways,but it is still difficult to achieve a precisely located fault attacks at a low cost,whereas a Hardware Trojan(HT)can realize this.Temperature,as a physical quantity incidental to the operation of a cryptographic device,is easily overlooked.In this paper,a temperature-triggered HT(THT)is designed,which,when activated,causes a specific bit of the intermediate state of the SKINNY-64-64 to be flipped.Further,in this paper,a THT-based algebraic fault analysis(THT-AFA)method is proposed.To demonstrate the effectiveness of the method,experiments on algebraic fault analysis(AFA)and THT-AFA have been carried out on SKINNY-64-64.In the THT-AFA for SKINNY-64-64,it is only required to activate the THT 3 times to obtain the master key with a 100%success rate,and the average time for the attack is 64.57 s.However,when performing AFA on this cipher,we provide a relation-ship between the number of different faults and the residual entropy of the key.In comparison,our proposed THT-AFA method has better performance in terms of attack efficiency.To the best of our knowledge,this is the first HT attack on SKINNY-64-64.展开更多
The natural and economic conditions of agricultural resources vary greatly in China,especially in hilly and mountainous areas.The phenomenon of land fragmentation has become increasingly prominent,so that large-scale ...The natural and economic conditions of agricultural resources vary greatly in China,especially in hilly and mountainous areas.The phenomenon of land fragmentation has become increasingly prominent,so that large-scale operations cannot be fully achieved in a short period of time,and the centralized and continuous scale of operations cannot be realized in China.In addition,with increasingly strict farmland protection and agricultural land use control systems,the issues of nongrain production and nonagricultural cultivated land use have become increasingly restricted.Thus,it is quite necessary to determine the appropriate scale of operations and the means to achieve moderately scaled operations for the new business entities.On the basis of microsurvey data for 108 new citrus-planting business entities in the modern agricultural park in the Chongqing's Jiangjin District,an area with long citrus-planting history,we measured the moderate scale of new citrus-planting business entities to maximize profit using a translog growth model.According to the projection pursuit model,we evaluated the suitability conditions of citrus planting in garden land,woodland,grassland,and general cultivated land in the study area.We then explored the potential for new moderate-scale business entities within different farming radii.The results showed that large-scale planting conditions of citrus in garden land,forest land,grassland,and general cultivated land in the study area were suitable,and the proportion of high-suitable and mediumsuitable land was 73.42%.Under the existing social and economic conditions,the moderate scale of new citrus-planting business entities in the study area was 1.8–2.7 hm^(2).In particular,its rankings from large to small were agricultural enterprises(17.19–25.78 hm^(2)),farmer cooperatives(16.88–25.33 hm^(2)),big growers and breeders(6.39–9.59 hm^(2)),and family farms(5.02–7.53 hm^(2)).In the sample of 108 households,only 47.22%of the entities achieved moderate-scale operation,of which 25%of the entities achieved a scale greater than moderate operation.However,52.78%of the entities achieved a scale of less than moderate operation.These entities would have to transfer the surrounding adjacent garden land,forest land,grassland,or general cultivated land to achieve largescale land management.The land area of the adjacent gardens in a 1000 m farming radius could meet the moderate-scale operation demand of the vast majority of new business entities.For the vast majority of new business entities,the land area of the adjacent woodland,grassland,and general cultivated land could supplement the garden land to achieve moderate-scale operation in a 500 m farming radius.If the land area with moderate suitability and high suitability is prioritized,the land area in the adjacent gardens in the 1000 m farming radius could meet the moderate-scale operation demand for the vast majority of new business entities.Within the 500 m farming radius,the vast majority of new business entities have achieved moderate-scale operations if the land area adjacent to forest land,grassland,and general arable land was supplemented by gardens;however,a few entities could not achieve moderate-scale operations.From the village perspective,gardens were prioritized.Sixteen villages had planting areas and planting suitability that exceeded the average level of the study area,accounting for 23.53%.If combined with the reserve potential of the garden land,eight villages could improve their potential,accounting for 11.76%.Therefore,the conditions of large-scale citrus planting in the study area should be further improved,and the scale expansion of new citrus-planting business entities should receive additional scientific guidance.展开更多
Wulingyuan is a world natural heritage property mainly dominated by rare quartz sandstone peak forest landscape at home and abroad and supplemented by karst landscapes,with a large number of geological and historical ...Wulingyuan is a world natural heritage property mainly dominated by rare quartz sandstone peak forest landscape at home and abroad and supplemented by karst landscapes,with a large number of geological and historical sites,biological and ecological landscape and unique cultural landscapes.Preserving the secluded and beautiful scenery environment,biological environment and ecosystem of subtropical zone,Wulingyuan presents a splendid and magnificent landscape,with high aesthetic value,and becomes an important practice base of aesthetic education.The aesthetic education value of Wulingyuan World Natural Heritage Property can be realized by systematically studying and presenting the aesthetic education value of Wulingyuan World Natural Heritage Property,developing a series of aesthetic education courses to lead tourists into the world of Wulingyuan aesthetic education,carrying out a series of popular science activities of“Wulingyuan World Natural Heritage Property Entering Campus”,and incorporating into the aesthetic education curriculum system of schools,etc.This paper analyzes the landscape aesthetic characteristics of Wulingyuan World Natural Heritage Property thoroughly,which indicates the direction for realizing the aesthetic education value of the property,and also provides a reference for realizing the aesthetic education value of similar world natural heritage property.展开更多
The Internet of Things (IoT) has become a reality: Healthcare, smart cities, intelligent manufacturing, e-agriculture, real-time traffic controls, environment monitoring, camera security systems, etc. are developing s...The Internet of Things (IoT) has become a reality: Healthcare, smart cities, intelligent manufacturing, e-agriculture, real-time traffic controls, environment monitoring, camera security systems, etc. are developing services that rely on an IoT infrastructure. Thus, ensuring the security of devices during operation and information exchange becomes a fundamental requirement inherent in providing safe and reliable IoT services. NIST requires hardware implementations that are protected against SCAs for the lightweight cryptography standardization process. These attacks are powerful and non-invasive and rely on observing the physical properties of IoT hardware devices to obtain secret information. In this paper, we present a survey of research on hardware security for the IoT. In addition, the challenges of IoT in the quantum era with the first results of the NIST standardization process for post-quantum cryptography are discussed.展开更多
In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy...In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy outage probability is obtained.Moreover,to get more information on the secrecy outage probability in a high signalto-noise regime,the asymptotic analysis along with the secrecy diversity order and secrecy coding gain for the secrecy outage probability are also further obtained,which presents a fast method to evaluate the impact of system parameters and hardware impairments on the considered network.Finally,Monte Carlo simulation results are provided to show the efficiency of the theoretical analysis.展开更多
基金supported in part by the Sichuan Science and Technology Program(Grant No.2023YFG0316)the Industry-University Research Innovation Fund of China University(Grant No.2021ITA10016)+1 种基金the Key Scientific Research Fund of Xihua University(Grant No.Z1320929)the Special Funds of Industry Development of Sichuan Province(Grant No.zyf-2018-056).
文摘Due to the interdependency of frame synchronization(FS)and channel estimation(CE),joint FS and CE(JFSCE)schemes are proposed to enhance their functionalities and therefore boost the overall performance of wireless communication systems.Although traditional JFSCE schemes alleviate the influence between FS and CE,they show deficiencies in dealing with hardware imperfection(HI)and deterministic line-of-sight(LOS)path.To tackle this challenge,we proposed a cascaded ELM-based JFSCE to alleviate the influence of HI in the scenario of the Rician fading channel.Specifically,the conventional JFSCE method is first employed to extract the initial features,and thus forms the non-Neural Network(NN)solutions for FS and CE,respectively.Then,the ELMbased networks,named FS-NET and CE-NET,are cascaded to capture the NN solutions of FS and CE.Simulation and analysis results show that,compared with the conventional JFSCE methods,the proposed cascaded ELM-based JFSCE significantly reduces the error probability of FS and the normalized mean square error(NMSE)of CE,even against the impacts of parameter variations.
基金This work was supported by Open Fund Project of State Key Laboratory of Intelligent Vehicle Safety Technology by Grant with No.IVSTSKL-202311Key Projects of Science and Technology Research Programme of Chongqing Municipal Education Commission by Grant with No.KJZD-K202301505+1 种基金Cooperation Project between Chongqing Municipal Undergraduate Universities and Institutes Affiliated to the Chinese Academy of Sciences in 2021 by Grant with No.HZ2021015Chongqing Graduate Student Research Innovation Program by Grant with No.CYS240801.
文摘Massive computational complexity and memory requirement of artificial intelligence models impede their deploy-ability on edge computing devices of the Internet of Things(IoT).While Power-of-Two(PoT)quantization is pro-posed to improve the efficiency for edge inference of Deep Neural Networks(DNNs),existing PoT schemes require a huge amount of bit-wise manipulation and have large memory overhead,and their efficiency is bounded by the bottleneck of computation latency and memory footprint.To tackle this challenge,we present an efficient inference approach on the basis of PoT quantization and model compression.An integer-only scalar PoT quantization(IOS-PoT)is designed jointly with a distribution loss regularizer,wherein the regularizer minimizes quantization errors and training disturbances.Additionally,two-stage model compression is developed to effectively reduce memory requirement,and alleviate bandwidth usage in communications of networked heterogenous learning systems.The product look-up table(P-LUT)inference scheme is leveraged to replace bit-shifting with only indexing and addition operations for achieving low-latency computation and implementing efficient edge accelerators.Finally,comprehensive experiments on Residual Networks(ResNets)and efficient architectures with Canadian Institute for Advanced Research(CIFAR),ImageNet,and Real-world Affective Faces Database(RAF-DB)datasets,indicate that our approach achieves 2×∼10×improvement in the reduction of both weight size and computation cost in comparison to state-of-the-art methods.A P-LUT accelerator prototype is implemented on the Xilinx KV260 Field Programmable Gate Array(FPGA)platform for accelerating convolution operations,with performance results showing that P-LUT reduces memory footprint by 1.45×,achieves more than 3×power efficiency and 2×resource efficiency,compared to the conventional bit-shifting scheme.
基金the Key Research and Development Plan of Jiangsu Province,grant number BE2020084-2the National Key Research and Development Program of China,grant number 2020YFB1600104.
文摘The Internet of Vehicles(IoV)will carry a large amount of security and privacy-related data,which makes the secure communication between the IoV terminals increasingly critical.This paper studies the joint beamforming for physical-layer security transmission in the coexistence of Vehicle-to-Infrastructure(V2I)and Vehicle-toVehicle(V2V)communication with Reconfigurable Intelligent Surface(RIS)assistance,taking into account hardware impairments.A communication model for physical-layer security transmission is established when the eavesdropping user is present and the base station antenna has hardware impairments assisted by RIS.Based on this model,we propose to maximize the V2I physical-layer security transmission rate.To solve the coupled non-convex optimization problem,an alternating optimization algorithm based on second-order cone programming and semidefinite relaxation is proposed to obtain the optimal V2I base station transmit precoding and RIS reflect phase shift matrix.Finally,simulation results are presented to verify the convergence and superiority of our proposed algorithm while analyzing the impact of system parameters on the V2I physical-layer security transmission rate.The simulation results further demonstrate that the proposed robust beamforming algorithm considering hardware impairments will achieve an average performance improvement of 0.7 dB over a non-robustly designed algorithm.Furthermore,increasing the number of RIS reflective units from 10 to 50 results in an almost 2 dB enhancement in secure transmission rate.
文摘The SubBytes (S-box) transformation is the most crucial operation in the AES algorithm, significantly impacting the implementation performance of AES chips. To design a high-performance S-box, a segmented optimization implementation of the S-box is proposed based on the composite field inverse operation in this paper. This proposed S-box implementation is modeled using Verilog language and synthesized using Design Complier software under the premise of ensuring the correctness of the simulation result. The synthesis results show that, compared to several current S-box implementation schemes, the proposed implementation of the S-box significantly reduces the area overhead and critical path delay, then gets higher hardware efficiency. This provides strong support for realizing efficient and compact S-box ASIC designs.
基金the National Natural Science Foundation of China (60604009)Aeronautical Science Foundationof China(2006ZC51039)Beijing NOVA Program (2007A017).
文摘As friction, intrinsic steady-state nonlinearity poses a challenging dilemma to the control system of 3-DOF (three degree of freedom) flight simulator, a novel hybrid control strategy of nonlinear PID (proportionalintegral-derivative) with additional FFC (feed-forward controller) is proposed, and the hardware-in-the-loop simulation results are also given. Based on the description of 3-DOF flight simulator, a novel nonlinear PID theory is well introduced. Then a nonlinear PID controller with additional FFC is designed. Subsequently, the loop structure of 3-DOF flight simulator is also designed. Finally, a series of hardware-in-the-loop simulation experiments are undertaken to verify the feasibility and effectiveness of the proposed nonlinear PID controller with additional FFC for 3-DOF flight simulator.
文摘This work presents a novel wavelet-based denoising technique for improving the signal-to-noise ratio(SNR)of nonsteady vibration signals in hardware redundant systems.The proposed method utilizes the relationship between redundant hardware components to effectively separate fault-related components from the vibration signature,thus enhancing fault detection accuracy.The study evaluates the proposed technique on two mechanically identical subsystems that are simultaneously controlled under the same speed and load inputs,with and without the proposed denoising step.The results demonstrate an increase in detection accuracy when incorporating the proposed denoising method into a fault detection system designed for hardware redundant machinery.This work is original in its application of a new method for improving performance when using residual analysis for fault detection in hardware redundant machinery configurations.Moreover,the proposed methodology is applicable to nonstationary equipment that experiences changes in both speed and load.
文摘Lisfranc injuries can be difficult injuries to identify and treat, while also being the subject of significant debate on proper surgical management. A narrative literature review was performed using Pubmed and Google Scholar databases to identify recent studies evaluating open reduction internal fixation vs primary arthrodesis for Lisfranc injuries to further elucidate optimal surgical management. Additional focus was placed removal of hardware after ORIF to identify the need for routine hardware removal as an additional surgery may guide surgeon decision-making. This review showed inconclusive data on the superiority of ORIF vs arthrodesis, as multiple conflicting results exist, though established that functional results are similar between these options. Though both are generally accepted treatment options, there are no well-designed randomized controlled trials directly comparing the two. Retention of hardware after ORIF has been shown to be tolerated, though there is a significant risk of the need for unplanned removal due to pain and hardware breakage.
基金the Strategic Priority Research Program of CAS(Grant No.XDC07020200)the National Key R&D Program of China(Grants No.2018YFA0306600)+5 种基金the National Natural Science Foundation of China(Grant Nos.11974330 and 92165206)the Chinese Academy of Sciences(Grant No.QYZDY-SSW-SLH004)the Innovation Program for Quantum Science and Technology(Grant Nos.2021ZD0302200 and 2021ZD0301603)the Anhui Initiative in Quantum Information Technologies(Grant No.AHY050000)the Hefei Comprehensive National Science Centerthe Fundamental Research Funds for the Central Universities。
文摘We report a design and implementation of a field-programmable-gate-arrays(FPGA)based hardware platform,which is used to realize control and signal readout of trapped-ion-based multi-level quantum systems.This platform integrates a four-channel 2.8 Gsps@14 bits arbitrary waveform generator,a 16-channel 1 Gsps@14 bits direct-digital-synthesisbased radio-frequency generator,a 16-channel 8 ns resolution pulse generator,a 10-channel 16 bits digital-to-analogconverter module,and a 2-channel proportion integration differentiation controller.The hardware platform can be applied in the trapped-ion-based multi-level quantum systems,enabling quantum control of multi-level quantum system and highdimensional quantum simulation.The platform is scalable and more channels for control and signal readout can be implemented by utilizing more parallel duplications of the hardware.The hardware platform also has a bright future to be applied in scaled trapped-ion-based quantum systems.
基金supported in part by the National Key R&D Program of China(No.2019YFB1803400)。
文摘For polar codes,the performance of successive cancellation list(SCL)decoding is capable of approaching that of maximum likelihood decoding.However,the existing hardware architectures for the SCL decoding suffer from high hardware complexity due to calculating L decoding paths simultaneously,which are unfriendly to the devices with limited logical resources,such as field programmable gate arrays(FPGAs).In this paper,we propose a list-serial pipelined hardware architecture with low complexity for the SCL decoding,where the serial calculation and the pipelined operation are elegantly combined to strike a balance between the complexity and the latency.Moreover,we employ only one successive cancellation(SC)decoder core without L×L crossbars,and reduce the number of inputs of the metric sorter from 2L to L+2.Finally,the FPGA implementations show that the hardware resource consumption is significantly reduced with negligible decoding performance loss.
文摘Culture is the core of education and the proper meaning of education. Exploring the realization path and function mechanism of school culture education is a major task for educators at present and in the future. Then, the current academic research started late, had few achievements and was relatively broad and weak. The article believes that the mechanism of school culture educating people includes three fields: “cultural field”, “cultivation field” and “education field”. School teachers and students should be guided to make cultural choices, consciously transform school culture into personal culture, and achieve the purpose of school culture educating people.
基金supported by the National Natural Science Foundation of China under Grants 62071052,61901043the R&D Program of Beijing Municipal Education Commission under Grant KM202011232003+1 种基金supported by Talent Engineering Training Funds of Hebei Province under Grant A202101106Science and Technology Project of Hebei Education Department under Grant QN2020508.
文摘Hardware impairments(HI)are always present in low-cost wireless devices.This paper investigates the outage behaviors of intelligent reflecting surface(IRS)assisted non-orthogonal multiple access(NOMA)networks by taking into account the impact of HI.Specifically,we derive the approximate and asymptotic expressions of the outage probability for the IRS-NOMA-HI networks.Based on the asymptotic results,the diversity orders under perfect self-interference cancellation and imperfect self-interference cancellation scenarios are obtained to evaluate the performance of the considered network.In addition,the system throughput of IRS-NOMA-HI is discussed in delay-limited mode.The obtained results are provided to verify the accuracy of the theoretical analyses and reveal that:1)The outage performance and system throughput for IRS-NOMA-HI outperforms that of the IRS-assisted orthogonal multiple access-HI(IRS-OMA-HI)networks;2)The number of IRS elements,the pass loss factors,the Rician factors,and the value of HI are pivotal to enhancing the performance of IRS-NOMAHI networks;and 3)It is recommended that effective methods of reducing HI should be used to ensure system performance,in addition to self-interference cancellation techniques.
基金supported in part by the National Natural Science Foundation of China under Grant 62201451in part by the Young Talent fund of University Association for Science and Technology in Shaanxi under Grant 20210121+1 种基金in part by the Shaanxi provincial special fund for Technological innovation guidance(2022CGBX-29)in part by BUPT Excellent Ph.D.Students Foundation under Grant CX2022106.
文摘This paper investigates the system outage performance of a simultaneous wireless information and power transfer(SWIPT)based two-way decodeand-forward(DF)relay network,where potential hardware impairments(HIs)in all transceivers are considered.After harvesting energy and decoding messages simultaneously via a power splitting scheme,the energy-limited relay node forwards the decoded information to both terminals.Each terminal combines the signals from the direct and relaying links via selection combining.We derive the system outage probability under independent but non-identically distributed Nakagami-m fading channels.It reveals an overall system ceiling(OSC)effect,i.e.,the system falls in outage if the target rate exceeds an OSC threshold that is determined by the levels of HIs.Furthermore,we derive the diversity gain of the considered network.The result reveals that when the transmission rate is below the OSC threshold,the achieved diversity gain equals the sum of the shape parameter of the direct link and the smaller shape parameter of the terminalto-relay links;otherwise,the diversity gain is zero.This is different from the amplify-and-forward(AF)strategy,under which the relaying links have no contribution to the diversity gain.Simulation results validate the analytical results and reveal that compared with the AF strategy,the SWIPT based two-way relaying links under the DF strategy are more robust to HIs and achieve a lower system outage probability.
基金supported in part by the Natural Science Foundation of Heilongjiang Province of China(Grant No.LH2022F053)in part by the Scientific and technological development project of the central government guiding local(Grant No.SBZY2021E076)+2 种基金in part by the PostdoctoralResearch Fund Project of Heilongjiang Province of China(Grant No.LBH-Q21195)in part by the Fundamental Research Funds of Heilongjiang Provincial Universities of China(Grant No.145209146)in part by the National Natural Science Foundation of China(NSFC)(Grant No.61501275).
文摘SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a variety of ways,but it is still difficult to achieve a precisely located fault attacks at a low cost,whereas a Hardware Trojan(HT)can realize this.Temperature,as a physical quantity incidental to the operation of a cryptographic device,is easily overlooked.In this paper,a temperature-triggered HT(THT)is designed,which,when activated,causes a specific bit of the intermediate state of the SKINNY-64-64 to be flipped.Further,in this paper,a THT-based algebraic fault analysis(THT-AFA)method is proposed.To demonstrate the effectiveness of the method,experiments on algebraic fault analysis(AFA)and THT-AFA have been carried out on SKINNY-64-64.In the THT-AFA for SKINNY-64-64,it is only required to activate the THT 3 times to obtain the master key with a 100%success rate,and the average time for the attack is 64.57 s.However,when performing AFA on this cipher,we provide a relation-ship between the number of different faults and the residual entropy of the key.In comparison,our proposed THT-AFA method has better performance in terms of attack efficiency.To the best of our knowledge,this is the first HT attack on SKINNY-64-64.
基金supported by National Natural Science Foundation of China(No.41971244)National Natural Science Foundation of China(No.41501104)Natural Science Foundation of Chongqing Municipal Science and Technology Commission(cstc2021jcyj-msxm X0696)。
文摘The natural and economic conditions of agricultural resources vary greatly in China,especially in hilly and mountainous areas.The phenomenon of land fragmentation has become increasingly prominent,so that large-scale operations cannot be fully achieved in a short period of time,and the centralized and continuous scale of operations cannot be realized in China.In addition,with increasingly strict farmland protection and agricultural land use control systems,the issues of nongrain production and nonagricultural cultivated land use have become increasingly restricted.Thus,it is quite necessary to determine the appropriate scale of operations and the means to achieve moderately scaled operations for the new business entities.On the basis of microsurvey data for 108 new citrus-planting business entities in the modern agricultural park in the Chongqing's Jiangjin District,an area with long citrus-planting history,we measured the moderate scale of new citrus-planting business entities to maximize profit using a translog growth model.According to the projection pursuit model,we evaluated the suitability conditions of citrus planting in garden land,woodland,grassland,and general cultivated land in the study area.We then explored the potential for new moderate-scale business entities within different farming radii.The results showed that large-scale planting conditions of citrus in garden land,forest land,grassland,and general cultivated land in the study area were suitable,and the proportion of high-suitable and mediumsuitable land was 73.42%.Under the existing social and economic conditions,the moderate scale of new citrus-planting business entities in the study area was 1.8–2.7 hm^(2).In particular,its rankings from large to small were agricultural enterprises(17.19–25.78 hm^(2)),farmer cooperatives(16.88–25.33 hm^(2)),big growers and breeders(6.39–9.59 hm^(2)),and family farms(5.02–7.53 hm^(2)).In the sample of 108 households,only 47.22%of the entities achieved moderate-scale operation,of which 25%of the entities achieved a scale greater than moderate operation.However,52.78%of the entities achieved a scale of less than moderate operation.These entities would have to transfer the surrounding adjacent garden land,forest land,grassland,or general cultivated land to achieve largescale land management.The land area of the adjacent gardens in a 1000 m farming radius could meet the moderate-scale operation demand of the vast majority of new business entities.For the vast majority of new business entities,the land area of the adjacent woodland,grassland,and general cultivated land could supplement the garden land to achieve moderate-scale operation in a 500 m farming radius.If the land area with moderate suitability and high suitability is prioritized,the land area in the adjacent gardens in the 1000 m farming radius could meet the moderate-scale operation demand for the vast majority of new business entities.Within the 500 m farming radius,the vast majority of new business entities have achieved moderate-scale operations if the land area adjacent to forest land,grassland,and general arable land was supplemented by gardens;however,a few entities could not achieve moderate-scale operations.From the village perspective,gardens were prioritized.Sixteen villages had planting areas and planting suitability that exceeded the average level of the study area,accounting for 23.53%.If combined with the reserve potential of the garden land,eight villages could improve their potential,accounting for 11.76%.Therefore,the conditions of large-scale citrus planting in the study area should be further improved,and the scale expansion of new citrus-planting business entities should receive additional scientific guidance.
文摘Wulingyuan is a world natural heritage property mainly dominated by rare quartz sandstone peak forest landscape at home and abroad and supplemented by karst landscapes,with a large number of geological and historical sites,biological and ecological landscape and unique cultural landscapes.Preserving the secluded and beautiful scenery environment,biological environment and ecosystem of subtropical zone,Wulingyuan presents a splendid and magnificent landscape,with high aesthetic value,and becomes an important practice base of aesthetic education.The aesthetic education value of Wulingyuan World Natural Heritage Property can be realized by systematically studying and presenting the aesthetic education value of Wulingyuan World Natural Heritage Property,developing a series of aesthetic education courses to lead tourists into the world of Wulingyuan aesthetic education,carrying out a series of popular science activities of“Wulingyuan World Natural Heritage Property Entering Campus”,and incorporating into the aesthetic education curriculum system of schools,etc.This paper analyzes the landscape aesthetic characteristics of Wulingyuan World Natural Heritage Property thoroughly,which indicates the direction for realizing the aesthetic education value of the property,and also provides a reference for realizing the aesthetic education value of similar world natural heritage property.
文摘The Internet of Things (IoT) has become a reality: Healthcare, smart cities, intelligent manufacturing, e-agriculture, real-time traffic controls, environment monitoring, camera security systems, etc. are developing services that rely on an IoT infrastructure. Thus, ensuring the security of devices during operation and information exchange becomes a fundamental requirement inherent in providing safe and reliable IoT services. NIST requires hardware implementations that are protected against SCAs for the lightweight cryptography standardization process. These attacks are powerful and non-invasive and rely on observing the physical properties of IoT hardware devices to obtain secret information. In this paper, we present a survey of research on hardware security for the IoT. In addition, the challenges of IoT in the quantum era with the first results of the NIST standardization process for post-quantum cryptography are discussed.
基金supported by the Natural Science Foundation of China under Grant No.62001517.
文摘In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy outage probability is obtained.Moreover,to get more information on the secrecy outage probability in a high signalto-noise regime,the asymptotic analysis along with the secrecy diversity order and secrecy coding gain for the secrecy outage probability are also further obtained,which presents a fast method to evaluate the impact of system parameters and hardware impairments on the considered network.Finally,Monte Carlo simulation results are provided to show the efficiency of the theoretical analysis.