首页 > 最新文献

Other Conferences最新文献

英文 中文
Design and research of MCU innovation simulation based on the perspective of technological innovation product development 基于技术创新产品开发视角的单片机创新模拟设计与研究
Pub Date : 2024-06-06 DOI: 10.1117/12.3032017
Qingquan Cui, Yanqiong Li, Ning Wang
The single chip microcomputer has many applications in the research and development of intelligent products and scientific and innovative products. How to improve the efficiency of development and design application effect in the design of single chip microcomputer is worth in-depth study. This paper takes the development of scientific and technological innovation products as the starting point, analyzes and studies how to effectively improve the development efficiency of MCU developers by using Proteus, and gives the specific design ideas and methods. Through the design and analysis of four actual MCU cases, the design efficiency and design effect of developers are verified. Through the statistics and analysis of the actual developer's development data, the design ideas and methods constructed in this paper can effectively improve the time and efficiency of single chip development, and have certain advantages and effects in innovative products, which can be widely used in single chip learning and education.
单片微型计算机在智能产品和科技创新产品的研发中有着诸多应用。如何在单片微机设计中提高开发效率和设计应用效果,值得深入研究。本文以科技创新产品的开发为切入点,分析研究了如何利用Proteus有效提高单片机开发人员的开发效率,并给出了具体的设计思路和方法。通过对四个实际 MCU 案例的设计和分析,验证了开发人员的设计效率和设计效果。通过对实际开发者开发数据的统计和分析,本文构建的设计思路和方法能有效提高单芯片开发的时间和效率,在创新产品方面具有一定的优势和效果,可广泛应用于单芯片学习和教育中。
{"title":"Design and research of MCU innovation simulation based on the perspective of technological innovation product development","authors":"Qingquan Cui, Yanqiong Li, Ning Wang","doi":"10.1117/12.3032017","DOIUrl":"https://doi.org/10.1117/12.3032017","url":null,"abstract":"The single chip microcomputer has many applications in the research and development of intelligent products and scientific and innovative products. How to improve the efficiency of development and design application effect in the design of single chip microcomputer is worth in-depth study. This paper takes the development of scientific and technological innovation products as the starting point, analyzes and studies how to effectively improve the development efficiency of MCU developers by using Proteus, and gives the specific design ideas and methods. Through the design and analysis of four actual MCU cases, the design efficiency and design effect of developers are verified. Through the statistics and analysis of the actual developer's development data, the design ideas and methods constructed in this paper can effectively improve the time and efficiency of single chip development, and have certain advantages and effects in innovative products, which can be widely used in single chip learning and education.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141379761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image steganalysis based on model compression 基于模型压缩的图像隐匿分析
Pub Date : 2024-06-06 DOI: 10.1117/12.3031915
Siyuan Huang, Minqing Zhang, Xiong Zhang, Chao Jiang, Yongjun Kong, Fuqiang Di, Yan Ke
Deep learning technology has developed rapidly in recent years, and deep learning-based steganography and steganalysis techniques have also achieved fruitful results. In the past few years, the over-expanded structure of steganalyzers based on deep learning has led to huge computational and storage costs. In this article, we propose image steganalysis based on model compression, and apply the model compression method to image steganalysis to reduce the network infrastructure of the existing large-scale over-parameter steganalyzer based on deep learning. We conducted extensive experiments on the BOSSBase+BOWS2 dataset. As can be seen from the experiment, compared with the original steganalysis model, the model structure we proposed can achieve performance with fewer parameters and floating-point operations. This model has better portability and scalability.
近年来,深度学习技术发展迅速,基于深度学习的隐写术和隐分析技术也取得了丰硕成果。过去几年,基于深度学习的隐分析器结构过度膨胀,导致了巨大的计算和存储成本。本文提出了基于模型压缩的图像隐写分析方法,并将模型压缩方法应用于图像隐写分析,以减少现有基于深度学习的大规模超参数隐写分析器的网络基础设施。我们在BOSSBase+BOWS2数据集上进行了大量实验。从实验中可以看出,与原有的隐写分析模型相比,我们提出的模型结构能以更少的参数和浮点运算实现更高的性能。该模型具有更好的可移植性和可扩展性。
{"title":"Image steganalysis based on model compression","authors":"Siyuan Huang, Minqing Zhang, Xiong Zhang, Chao Jiang, Yongjun Kong, Fuqiang Di, Yan Ke","doi":"10.1117/12.3031915","DOIUrl":"https://doi.org/10.1117/12.3031915","url":null,"abstract":"Deep learning technology has developed rapidly in recent years, and deep learning-based steganography and steganalysis techniques have also achieved fruitful results. In the past few years, the over-expanded structure of steganalyzers based on deep learning has led to huge computational and storage costs. In this article, we propose image steganalysis based on model compression, and apply the model compression method to image steganalysis to reduce the network infrastructure of the existing large-scale over-parameter steganalyzer based on deep learning. We conducted extensive experiments on the BOSSBase+BOWS2 dataset. As can be seen from the experiment, compared with the original steganalysis model, the model structure we proposed can achieve performance with fewer parameters and floating-point operations. This model has better portability and scalability.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141381404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time traffic intrusion detection based on CNN-LSTM deep neural networks 基于 CNN-LSTM 深度神经网络的实时流量入侵检测
Pub Date : 2024-06-06 DOI: 10.1117/12.3031914
Runjie Liu, Yinpu Ma, Xu Gao, Lianji Zhang
As Internet technology is developed and applied, the problems of large amounts of real-time traffic data and many unknown attacks are becoming increasingly serious, and intrusion detection systems have increased in efficiency and effectiveness. In this paper, a real-time traffic intrusion detection method based on Inception-LSTM deep neural network combining CNN and LSTM is proposed for improving label-based intrusion detection performance. Network traffic records are converted into 2D gray scale graphs. It extracts network traffic features using image processing techniques with high generalization ability. Experimental validation is performed on the publicly available CIC-IDS-2017 dataset, and the results show that the proposed Inception-LSTM neural network improves the detection accuracy and F1-score by 0.5% and 0.7%, respectively; the results of the comparison between the detection done on real-time captured traffic data and the network security devices show that the method is effective and feasible.
随着互联网技术的发展和应用,海量实时流量数据和众多未知攻击的问题日益严重,入侵检测系统的效率和效果也随之提高。本文提出了一种基于 Inception-LSTM 深度神经网络的实时流量入侵检测方法,将 CNN 和 LSTM 相结合,提高了基于标签的入侵检测性能。网络流量记录被转换成二维灰度图。它利用图像处理技术提取网络流量特征,具有较高的泛化能力。在公开的 CIC-IDS-2017 数据集上进行了实验验证,结果表明,所提出的 Inception-LSTM 神经网络的检测准确率和 F1 分数分别提高了 0.5% 和 0.7%;在实时捕获的流量数据和网络安全设备上进行的检测对比结果表明,该方法是有效和可行的。
{"title":"Real-time traffic intrusion detection based on CNN-LSTM deep neural networks","authors":"Runjie Liu, Yinpu Ma, Xu Gao, Lianji Zhang","doi":"10.1117/12.3031914","DOIUrl":"https://doi.org/10.1117/12.3031914","url":null,"abstract":"As Internet technology is developed and applied, the problems of large amounts of real-time traffic data and many unknown attacks are becoming increasingly serious, and intrusion detection systems have increased in efficiency and effectiveness. In this paper, a real-time traffic intrusion detection method based on Inception-LSTM deep neural network combining CNN and LSTM is proposed for improving label-based intrusion detection performance. Network traffic records are converted into 2D gray scale graphs. It extracts network traffic features using image processing techniques with high generalization ability. Experimental validation is performed on the publicly available CIC-IDS-2017 dataset, and the results show that the proposed Inception-LSTM neural network improves the detection accuracy and F1-score by 0.5% and 0.7%, respectively; the results of the comparison between the detection done on real-time captured traffic data and the network security devices show that the method is effective and feasible.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141381418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of embedded target turntable system based on BS mode 基于 BS 模式的嵌入式目标转盘系统设计
Pub Date : 2024-06-06 DOI: 10.1117/12.3031923
Xiaojuan Chen, Shuai Lian
In order to meet the maintenance requirements of harsh environment and unattended equipment sites, it is proposed to use an embedded Web server as the core in the embedded target turntable system and use HTML web pages to design the human-computer interaction interface to facilitate cross-platform control. Deliver equipment software upgrades and equipment status monitoring, complete human-computer interaction, and achieve remote unmanned control. The article gives the key code for the server implementation. Through experiments, it is verified that the design scheme has little dependence on the control terminal platform and is reliable in operation. It is very suitable for promotion and application in monitoring and control and can improve equipment maintenance efficiency.
为满足恶劣环境和无人值守设备现场的维护要求,建议在嵌入式目标转台系统中以嵌入式 Web 服务器为核心,采用 HTML 网页设计人机交互界面,方便跨平台控制。提供设备软件升级和设备状态监控,完成人机交互,实现远程无人控制。文章给出了服务器实现的关键代码。通过实验验证,该设计方案对控制终端平台依赖性小,运行可靠。非常适合在监控领域推广应用,并能提高设备维护效率。
{"title":"Design of embedded target turntable system based on BS mode","authors":"Xiaojuan Chen, Shuai Lian","doi":"10.1117/12.3031923","DOIUrl":"https://doi.org/10.1117/12.3031923","url":null,"abstract":"In order to meet the maintenance requirements of harsh environment and unattended equipment sites, it is proposed to use an embedded Web server as the core in the embedded target turntable system and use HTML web pages to design the human-computer interaction interface to facilitate cross-platform control. Deliver equipment software upgrades and equipment status monitoring, complete human-computer interaction, and achieve remote unmanned control. The article gives the key code for the server implementation. Through experiments, it is verified that the design scheme has little dependence on the control terminal platform and is reliable in operation. It is very suitable for promotion and application in monitoring and control and can improve equipment maintenance efficiency.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141379896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reversible data hiding in JPEG images based on two-stage embedding 基于两级嵌入的 JPEG 图像中的可逆数据隐藏
Pub Date : 2024-06-06 DOI: 10.1117/12.3032095
Fuqiang Di, Tianxue Li, Pan Yang, Siyuan Huang, Yongjun Kong
Reversible data hiding in images has become one of the research hotspots in the field of information hiding. JPEG images are widely used on social networks, and the research on reversible information hiding technology for JPEG images is of great significance. The existing reversible information hiding algorithms for JPEG images generally lack robustness, which affects the practical application of the algorithms. Inspired by the robust reversible algorithm for spatial domain images, this paper introduces a two-stage embedding method into JPEG images and proposes a new reversible data hiding algorithm for JPEG images based on two-stage embedding. First, apply robust watermarking technology to embed watermark information in the image to achieve robustness, and then apply reversible watermarking technology to embed distortion information to realize reversibility. Experiments have shown that, even if the carrier image is attacked, robust watermarks can still be extracted correctly. Although image restoration cannot be completed due to the destruction of reversible watermarks, the visual quality of the restored image can meet the requirements.
图像中的可逆数据隐藏已成为信息隐藏领域的研究热点之一。JPEG 图像广泛应用于社交网络,研究 JPEG 图像的可逆信息隐藏技术具有重要意义。现有的 JPEG 图像可逆信息隐藏算法普遍缺乏鲁棒性,影响了算法的实际应用。受空间域图像鲁棒可逆算法的启发,本文在 JPEG 图像中引入了两阶段嵌入方法,并提出了一种基于两阶段嵌入的新型 JPEG 图像可逆数据隐藏算法。首先,应用鲁棒水印技术在图像中嵌入水印信息以实现鲁棒性,然后应用可逆水印技术嵌入失真信息以实现可逆性。实验表明,即使载体图像受到攻击,鲁棒水印仍能被正确提取。虽然由于可逆水印被破坏而无法完成图像修复,但修复后的图像视觉质量可以满足要求。
{"title":"Reversible data hiding in JPEG images based on two-stage embedding","authors":"Fuqiang Di, Tianxue Li, Pan Yang, Siyuan Huang, Yongjun Kong","doi":"10.1117/12.3032095","DOIUrl":"https://doi.org/10.1117/12.3032095","url":null,"abstract":"Reversible data hiding in images has become one of the research hotspots in the field of information hiding. JPEG images are widely used on social networks, and the research on reversible information hiding technology for JPEG images is of great significance. The existing reversible information hiding algorithms for JPEG images generally lack robustness, which affects the practical application of the algorithms. Inspired by the robust reversible algorithm for spatial domain images, this paper introduces a two-stage embedding method into JPEG images and proposes a new reversible data hiding algorithm for JPEG images based on two-stage embedding. First, apply robust watermarking technology to embed watermark information in the image to achieve robustness, and then apply reversible watermarking technology to embed distortion information to realize reversibility. Experiments have shown that, even if the carrier image is attacked, robust watermarks can still be extracted correctly. Although image restoration cannot be completed due to the destruction of reversible watermarks, the visual quality of the restored image can meet the requirements.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141380415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method and design of encrypted image hiding based on random LSB matching 基于随机 LSB 匹配的加密图像隐藏方法与设计
Pub Date : 2024-06-06 DOI: 10.1117/12.3032037
Feng Yun
The Internet has provided great convenience for people, but at the same time, there have also been some problems that infringe on people's interests. How to effectively protect intellectual property rights and prevent works from being tampered with without permission is one of the issues that the Internet is concerned about. Information hiding is a method of hiding secret information into a general carrier of information, in order to prevent others from discovering it during transmission. Therefore, this article proposes a method for hiding encrypted images based on the random LSB matching algorithm. The experimental results show that this method can achieve better hiding effects.
互联网在为人们提供极大便利的同时,也出现了一些侵害人们利益的问题。如何有效保护知识产权,防止作品被擅自篡改,是互联网关注的问题之一。信息隐藏是一种将秘密信息隐藏到一般信息载体中,以防止他人在传输过程中发现的方法。因此,本文提出了一种基于随机 LSB 匹配算法的加密图像隐藏方法。实验结果表明,该方法可以达到较好的隐藏效果。
{"title":"Method and design of encrypted image hiding based on random LSB matching","authors":"Feng Yun","doi":"10.1117/12.3032037","DOIUrl":"https://doi.org/10.1117/12.3032037","url":null,"abstract":"The Internet has provided great convenience for people, but at the same time, there have also been some problems that infringe on people's interests. How to effectively protect intellectual property rights and prevent works from being tampered with without permission is one of the issues that the Internet is concerned about. Information hiding is a method of hiding secret information into a general carrier of information, in order to prevent others from discovering it during transmission. Therefore, this article proposes a method for hiding encrypted images based on the random LSB matching algorithm. The experimental results show that this method can achieve better hiding effects.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141378039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A keystone extension to defend against cache timing attacks 抵御缓存定时攻击的 Keystone 扩展
Pub Date : 2024-06-06 DOI: 10.1117/12.3032012
Kai Nie, Rongcai Zhao, Xiao Zhang, Haoyang Chai
Trusted Execution Environment (TEE) find extensive applications in various scenarios such as secure cloud services, databases, big data computing, and blockchain. They establish a secure operational zone, often referred to as an Enclave, for applications. The Keystone Trusted Execution Environment offers a range of security primitives, including memory isolation, secure boot, and remote authentication. It stands out as the first open-source framework under the RISC-V architecture designed for constructing customized TEEs and is currently the mainstream TEE in the RISC-V architecture. However, Keystone itself does not provide protection for Enclaves or security monitors against Cache timing attacks. Recent research has demonstrated that malicious actors, leveraging Spectre attacks, can use Cache timing attack techniques to detect Enclave data through shared caches. This paper proposes a Keystone extension design, calling the extended framework Keyson-LLCI (Last Leavel Cache Isolation). Through security analysis, we prove that it can isolate enclaves and operating systems into different cache paths at the LLC level, thus eliminating the influence of cache side channels and increasing the isolation and security of enclaves. We implemented this hardware extension on an FPGA development board and conducted performance testing and IOZone testing. The test results indicate that Keystone-LLCI can effectively defend against Cache timing attacks, with a performance loss of approximately 14%. The latency of read and write operations increased by 12.4% and 14.1%, respectively. It represents an extension design with relatively low performance loss.
可信执行环境(TEE)广泛应用于各种场景,如安全云服务、数据库、大数据计算和区块链。它们为应用程序建立了一个安全运行区,通常称为 "飞地"(Enclave)。Keystone 可信执行环境提供了一系列安全基元,包括内存隔离、安全启动和远程验证。它是 RISC-V 架构下首个专为构建定制 TEE 而设计的开源框架,也是目前 RISC-V 架构中的主流 TEE。然而,Keystone 本身并不为 Enclaves 提供保护,也不提供针对高速缓存定时攻击的安全监控。最近的研究表明,恶意行为者利用 Spectre 攻击,可以使用高速缓存定时攻击技术,通过共享高速缓存检测 Enclave 数据。本文提出了一种 Keystone 扩展设计,将扩展框架称为 Keyson-LLCI (Last Leavel Cache Isolation)。通过安全分析,我们证明它可以在 LLC 层将飞地和操作系统隔离到不同的缓存路径中,从而消除缓存侧信道的影响,提高飞地的隔离度和安全性。我们在 FPGA 开发板上实现了这一硬件扩展,并进行了性能测试和 IOZone 测试。测试结果表明,Keystone-LLCI 可以有效抵御高速缓存时序攻击,性能损失约为 14%。读取和写入操作的延迟分别增加了 12.4% 和 14.1%。这是一种性能损失相对较低的扩展设计。
{"title":"A keystone extension to defend against cache timing attacks","authors":"Kai Nie, Rongcai Zhao, Xiao Zhang, Haoyang Chai","doi":"10.1117/12.3032012","DOIUrl":"https://doi.org/10.1117/12.3032012","url":null,"abstract":"Trusted Execution Environment (TEE) find extensive applications in various scenarios such as secure cloud services, databases, big data computing, and blockchain. They establish a secure operational zone, often referred to as an Enclave, for applications. The Keystone Trusted Execution Environment offers a range of security primitives, including memory isolation, secure boot, and remote authentication. It stands out as the first open-source framework under the RISC-V architecture designed for constructing customized TEEs and is currently the mainstream TEE in the RISC-V architecture. However, Keystone itself does not provide protection for Enclaves or security monitors against Cache timing attacks. Recent research has demonstrated that malicious actors, leveraging Spectre attacks, can use Cache timing attack techniques to detect Enclave data through shared caches. This paper proposes a Keystone extension design, calling the extended framework Keyson-LLCI (Last Leavel Cache Isolation). Through security analysis, we prove that it can isolate enclaves and operating systems into different cache paths at the LLC level, thus eliminating the influence of cache side channels and increasing the isolation and security of enclaves. We implemented this hardware extension on an FPGA development board and conducted performance testing and IOZone testing. The test results indicate that Keystone-LLCI can effectively defend against Cache timing attacks, with a performance loss of approximately 14%. The latency of read and write operations increased by 12.4% and 14.1%, respectively. It represents an extension design with relatively low performance loss.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141379466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TeTPCM: building endogenous trusted computing on trusted execution environment TeTPCM:在可信执行环境上构建内生可信计算
Pub Date : 2024-06-06 DOI: 10.1117/12.3031944
Jiajian Li, Chenlin Huang, Jun Luo, Jinzhu Kong, Yiwen Ji, Yongpeng Liu, Kaikai Sun, Shuyang Deng
Traditional Trusted Computing is mainly implemented in the form of boards, chips, etc., and the requirements of hardware modification have greatly limited the widely use of trusted computing. To cope with the dilemma, the idea of designing “Trusted Computing on Chips” becomes a trend with the development of the build-in security module in CPUs. The main challenge lies on how to make full use of processor security features and design a dual-computing security system that meets the requirements of Trusted Computing 3.0. At present, the built-in secure and cryptographic units on processors, such as Phytium and Loongson, and the supported Trust Execution Environment have already provided the foundation for endogenous trusted computing. In this paper, we propose TeTPCM: a TEE Based Endogenous Trusted Platform Control Module (TPCM), which builds an endogenous trusted computing architecture by the collaboration of the TEE and the SoC on phytium processor. Experimental analysis shows that compared with the general-purpose trusted computing chip, endogenous trusted TPCM does not need additional hardware, and is characterized by strong capability, high performance, good scalability, and has better application prospects.
传统的可信计算主要以板卡、芯片等形式实现,对硬件改造的要求极大地限制了可信计算的广泛应用。为应对这一困境,随着 CPU 内置安全模块的发展,设计 "芯片上的可信计算 "成为一种趋势。主要的挑战在于如何充分利用处理器的安全特性,设计出符合可信计算 3.0 要求的双计算安全系统。目前,Phytium 和 Loongson 等处理器的内置安全和加密单元以及支持的可信执行环境已经为内生可信计算奠定了基础。本文提出了 TeTPCM:基于 TEE 的内生可信平台控制模块 (TPCM),通过 TEE 与 phytium 处理器上的 SoC 协同工作,构建内生可信计算架构。实验分析表明,与通用可信计算芯片相比,内生可信TPCM无需额外硬件,具有能力强、性能高、可扩展性好等特点,具有更好的应用前景。
{"title":"TeTPCM: building endogenous trusted computing on trusted execution environment","authors":"Jiajian Li, Chenlin Huang, Jun Luo, Jinzhu Kong, Yiwen Ji, Yongpeng Liu, Kaikai Sun, Shuyang Deng","doi":"10.1117/12.3031944","DOIUrl":"https://doi.org/10.1117/12.3031944","url":null,"abstract":"Traditional Trusted Computing is mainly implemented in the form of boards, chips, etc., and the requirements of hardware modification have greatly limited the widely use of trusted computing. To cope with the dilemma, the idea of designing “Trusted Computing on Chips” becomes a trend with the development of the build-in security module in CPUs. The main challenge lies on how to make full use of processor security features and design a dual-computing security system that meets the requirements of Trusted Computing 3.0. At present, the built-in secure and cryptographic units on processors, such as Phytium and Loongson, and the supported Trust Execution Environment have already provided the foundation for endogenous trusted computing. In this paper, we propose TeTPCM: a TEE Based Endogenous Trusted Platform Control Module (TPCM), which builds an endogenous trusted computing architecture by the collaboration of the TEE and the SoC on phytium processor. Experimental analysis shows that compared with the general-purpose trusted computing chip, endogenous trusted TPCM does not need additional hardware, and is characterized by strong capability, high performance, good scalability, and has better application prospects.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141378185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Haptic texture rendering based on vision 基于视觉的触觉纹理渲染
Pub Date : 2024-06-06 DOI: 10.1117/12.3032085
Meiqi Zhao, Ge Yu, Yu He
During teleoperation tasks such as disinfection and cleaning inside the space station, the operator on the ground controls the robotic arm within the experimental cabinet to maintain continuous contact with areas of different texture properties by operating the handle of a haptic device. Therefore, real-time and stable haptic feedback can help operators distinguish between different contact areas and assist in completing various teleoperation tasks. This article constructs a 2.5D virtual model integrating shape and texture using curved texture images based on a visual approach. It proposes a textured haptic rendering algorithm, which includes two steps of collision detection and collision response, to achieve virtual force computation integrating contact force and texture force. Finally, the real-time performance and stability of the algorithm are evaluated through subjective and objective experiments.
在空间站内进行消毒和清洁等远程操作任务时,地面操作员通过操作触觉装置的手柄,控制实验柜内的机械臂与不同质地特性的区域保持持续接触。因此,实时稳定的触觉反馈可以帮助操作员区分不同的接触区域,协助完成各种远程操作任务。本文基于视觉方法,利用曲面纹理图像构建了一个集形状和纹理于一体的 2.5D 虚拟模型。它提出了一种纹理触觉渲染算法,包括碰撞检测和碰撞响应两个步骤,实现了接触力和纹理力一体化的虚拟力计算。最后,通过主观和客观实验对算法的实时性和稳定性进行了评估。
{"title":"Haptic texture rendering based on vision","authors":"Meiqi Zhao, Ge Yu, Yu He","doi":"10.1117/12.3032085","DOIUrl":"https://doi.org/10.1117/12.3032085","url":null,"abstract":"During teleoperation tasks such as disinfection and cleaning inside the space station, the operator on the ground controls the robotic arm within the experimental cabinet to maintain continuous contact with areas of different texture properties by operating the handle of a haptic device. Therefore, real-time and stable haptic feedback can help operators distinguish between different contact areas and assist in completing various teleoperation tasks. This article constructs a 2.5D virtual model integrating shape and texture using curved texture images based on a visual approach. It proposes a textured haptic rendering algorithm, which includes two steps of collision detection and collision response, to achieve virtual force computation integrating contact force and texture force. Finally, the real-time performance and stability of the algorithm are evaluated through subjective and objective experiments.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141376360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of kinematics simulation software for 6R series robot 为 6R 系列机器人设计运动学模拟软件
Pub Date : 2024-06-06 DOI: 10.1117/12.3031917
WenBin Wu, Zheng Zhang
In this paper, a joint angle selection method basedIn this paper, a joint angle selection method based on Conformal Geometric Algebra (CGA) is proposed for the inverse kinematics model of robot. Then a CGA library is developed and used to construct various kinematic models of 6R serial manipulators. The software of spatial 6R serial manipulator kinematic simulation is developed by Qt and OpenGL technology. This software includes the above-mentioned CGA library and kinematic models. It can display the STL format robot model in three dimensions and modify the size of the model and plan its trajectory.
本文提出了一种基于共形几何代数(CGA)的关节角度选择方法,用于机器人的逆运动学模型。然后开发了一个 CGA 库,用于构建 6R 串行机械手的各种运动学模型。空间 6R 串行机械手运动学仿真软件采用 Qt 和 OpenGL 技术开发。该软件包括上述 CGA 库和运动学模型。它可以三维显示 STL 格式的机械手模型,修改模型大小并规划其运动轨迹。
{"title":"Design of kinematics simulation software for 6R series robot","authors":"WenBin Wu, Zheng Zhang","doi":"10.1117/12.3031917","DOIUrl":"https://doi.org/10.1117/12.3031917","url":null,"abstract":"In this paper, a joint angle selection method basedIn this paper, a joint angle selection method based on Conformal Geometric Algebra (CGA) is proposed for the inverse kinematics model of robot. Then a CGA library is developed and used to construct various kinematic models of 6R serial manipulators. The software of spatial 6R serial manipulator kinematic simulation is developed by Qt and OpenGL technology. This software includes the above-mentioned CGA library and kinematic models. It can display the STL format robot model in three dimensions and modify the size of the model and plan its trajectory.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141381567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Other Conferences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1