Gotowa bibliografia na temat „Hardware identification”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Hardware identification”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Hardware identification"
Moein, Samer, Fayez Gebali, T. Aaron Gulliver i Abdulrahman Alkandari. "Hardware Trojan Identification and Detection". International Journal on Cryptography and Information Security 7, nr 2 (30.06.2017): 1–20. http://dx.doi.org/10.5121/ijcis.2017.7201.
Pełny tekst źródłaMACHER*, Georg, Harald SPORER, Eugen BRENNER i Christian KREINER. "Signal-Layer Security and Trust-Boundary Identification based on Hardware-Software Interface Definition". Journal of Ubiquitous Systems and Pervasive Networks 10, nr 1 (7.03.2018): 1–9. http://dx.doi.org/10.5383/juspn.10.01.001.
Pełny tekst źródłaSugisaka, Masanori, Shuuji Motomura, Takashi Kitaguchi, Toshiyuki Furuta i Hirotosi Eguchi. "Hardware-based neural identification: Linear dynamical systems". Artificial Life and Robotics 1, nr 3 (wrzesień 1997): 151–55. http://dx.doi.org/10.1007/bf02471131.
Pełny tekst źródłaAlex, Anish T., Michel Dumontier, Jonathan S. Rose i Christopher W. V. Hogue. "Hardware-accelerated protein identification for mass spectrometry". Rapid Communications in Mass Spectrometry 19, nr 6 (2005): 833–37. http://dx.doi.org/10.1002/rcm.1853.
Pełny tekst źródłaMondal, Anindan, Rajesh Kumar Biswal, Mahabub Hasan Mahalat, Suchismita Roy i Bibhash Sen. "Hardware Trojan Free Netlist Identification: A Clustering Approach". Journal of Electronic Testing 37, nr 3 (czerwiec 2021): 317–28. http://dx.doi.org/10.1007/s10836-021-05953-1.
Pełny tekst źródłaZheng Zhaoyang, 郑朝阳, 张天舒 Zhang Tianshu, 范广强 Fan Guangqiang, 刘洋 Liu Yang, 吕立慧 Lü Lihui i 项衍 Xiang Yan. "Identification Method of Ozone Lidar Hardware Failure Data". Chinese Journal of Lasers 46, nr 4 (2019): 0404004. http://dx.doi.org/10.3788/cjl201946.0404004.
Pełny tekst źródłaSantana Farias, Marcos, Nadia Nedjah i Luiza de Macedo Mourelle. "Hardware implementation of subtractive clustering for radionuclide identification". Integration 46, nr 3 (czerwiec 2013): 220–29. http://dx.doi.org/10.1016/j.vlsi.2012.10.005.
Pełny tekst źródłaJi, Yong Gang, Han Ming Zheng i Yan Peng Zhang. "Electromagnetic Identification Intelligent Vehicle System Design". Applied Mechanics and Materials 401-403 (wrzesień 2013): 1695–98. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.1695.
Pełny tekst źródłaCao, Qichun, Binqiang Wang, Gang Dong, Kekun Hu i Hongbin Yang. "Operator Optimization Oriented Person Re-Identification". Journal of Physics: Conference Series 2284, nr 1 (1.06.2022): 012019. http://dx.doi.org/10.1088/1742-6596/2284/1/012019.
Pełny tekst źródłaGude, Juan J., i Pablo García Bringas. "A Novel Control Hardware Architecture for Implementation of Fractional-Order Identification and Control Algorithms Applied to a Temperature Prototype". Mathematics 11, nr 1 (28.12.2022): 143. http://dx.doi.org/10.3390/math11010143.
Pełny tekst źródłaRozprawy doktorskie na temat "Hardware identification"
Krantz, Elias. "Experiment Design for System Identification on Satellite Hardware Demonstrator". Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-71351.
Pełny tekst źródłaLinvåg, Elisabeth. "Co-design implementation of FPGA hardware acceleration of DNA motif identification". Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8874.
Pełny tekst źródłaPattern matching in bio-informatics is a discipline in sturdy growth, and has a great need for searching through large amounts of data. At NTNU, a prototype specified in VHDL has been developed for an FPGA-solution identifying short motifs or patterns in genetic data using a Position-Weight Matrix (PWM). But programming FPGAs using VHDL is a complicated and time consuming process that requires intimate knowledge of how hardware works, and the prototype is not yet complete in terms of required functionality. Consequently, a desirable alternative is to make use of co-design languages to facilitate the use of hardware for a software developer, as well as to integrate the environment for development of soft- and hardware. This thesis deal with specification and implementation of a co-design based alternative to the existing VHDL based solution, as well as an evaluation of productivity vs final performance of the newly developed solution compared to the VHDL based solution. The chosen co-design language is Impulse-C, created by Impulse Accelerated Technologies Inc., which is a co-design language designed for data-flow oriented applications, but with the flexibility to support other programming models as well. The programming model simplifies the expression of highly parallel algorithms through the use of well-defined data communication, message passing and synchronization mechanisms. The affiliated development environment, CoDeveloper, contains tools that allow the FPGA system to be developed and debugged using Impulse-C. The software-to-hardware compiler and optimizer translates C-language processes to (RTL) VHDL code, while optimizing the generated logic and identifying opportunities for parallelism. Ease-of-use for the CoDeveloper environment is evaluated in this thesis, based on the authors experiences with the tools. In total, four variations of the Impulse-C solution has been implemented; a basic solution and a multicore solution, both implemented in a floating-point and a 'fixed-point' version. The implemented solutions are analyzed through various experiments described in this thesis, done during simulation using CoDeveloper. Attempts were made to get the solutions to run on the target platform, the Cray XD1 supercomputer Musculus, but these were unsuccessful. A wrong choice of properties and constraints in Xilinx ISE are believed to have caused the FPGA programming file to be generated faulty. There was no time to confirm and correct this. Some information about device utilization and performance could still be extracted from the Xilinx ISE 'Static timing' and 'Place and route' reports.
Rask, Ulf, i Pontus Mannestig. "Improvement of hardware basic testing : Identification and development of a scripted automation tool that will support hardware basic testing". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3392.
Pełny tekst źródłaHarder, Timothy A. "Identification of computer hardware and software used by the printing and publishing industry". Menomonie, WI : University of Wisconsin--Stout, 2005. http://www.uwstout.edu/lib/thesis/2005/2005hardert.pdf.
Pełny tekst źródłaBlack, Derek J. "Development and feasibility of economical hardware and software in control theory application". Thesis, Kansas State University, 2017. http://hdl.handle.net/2097/38170.
Pełny tekst źródłaDepartment of Mechanical and Nuclear Engineering
Dale E. Schinstock
Control theory is the study of feedback systems, and a methodology investigated by many engineering students throughout most universities. Because of control theory's broad and interdisciplinary nature, it necessitates further study by application through experimental learning and laboratory practice. Typically, the hardware used to connect the theoretical aspects of controls to the practical can be expensive, big, and time consuming to the students and instructors teaching on the equipment. Alternatively, using cheaper sensors and hardware, such as encoders and motor drivers, can obfuscate the collected data in a way that creates a disconnect between developed theoretical models and actual system results. This disconnect can dissuade the idea that systems can and will follow a modeled behavior. This thesis attempts to assess the feasibility of a piece of laboratory apparatus named the NERMLAB. Multiple experiments will be conducted on the NERMLAB system and compared against time-tested hardware to demonstrate the practicality of the NERMLAB system in control theory application.
Farias, Marcos Santana. "Hardware reconfigurável para identificação de radionuclídeos utilizando o método de agrupamento subtrativo". Universidade do Estado do Rio de Janeiro, 2012. http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=7451.
Pełny tekst źródłaRadioactive sources include radionuclides. A radionuclide is an atom with an unstable nucleus, i.e. a nucleus characterized by excess of energy, which is available to be imparted. In this process, the radionuclide undergoes radioactive decay and emits gamma rays and subatomic particles, constituting the ionizing radiation. So, radioactivity is the spontaneous emission of energy from unstable atoms. Correct radionuclide identification can be crucial to planning protective measures, especially in emergency situations, by defining the type of radiation source and its radiological hazard. This project introduces the application of subtractive clustering method, in a hardware implemnetation, for an identification system of radioactive elements that allows a rapid and efficient identification. In software implementations, clustering algorithms, usually, are demanding in terms of processing time. Thus, a custom implementation on reconfigurable hardware is a viable choice in embedded systems, so as to achieve real-time execution as well as low power consumption. The proposed architecture for the hardware of subtractive clustering is scalable, allowing for the inclusion of more of subtractive clustering unit that operate in parallel. This provides greater flexibility to accelerate the hardware with respect to the time and area requirements. The results show that the expected cluster center can be identified with efficiently. The identification of these points can classify the radioactive elements present in a sample. Using the designed hardware, it is possible to identify more than one cluster center, which would lead to the recognition of more than one radionuclide in radioactive sources. These results reveal that the proposed hardware to subtractive cluster can be used to design a portable system for radionuclides identification.
Maki, Phyllis A. "Identification of entry-level clerical/secretarial skills and competencies and utilization of hardware and software applications in Clark County businesses". PDXScholar, 1990. https://pdxscholar.library.pdx.edu/open_access_etds/3496.
Pełny tekst źródłaAykin, Murat Deniz. "Efficient Calibration Of A Multi-camera Measurement System Using A Target With Known Dynamics". Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/3/12609798/index.pdf.
Pełny tekst źródłastate&rdquo
of one or more real world objects. Camera calibration is the process of pre-determining all the remaining optical and geometric parameters of the measurement system which are either static or slowly varying. For a single camera, this consist of the internal parameters of the camera device optics and construction while for a multiple camera system, it also includes the geometric positioning of the individual cameras, namely &ldquo
external&rdquo
parameters. The calibration is a necessary step before any actual state measurements can be made from the system. In this thesis, such a multi-camera state measurement system and in particular the problem of procedurally effective and high performance calibration of such a system is considered. This thesis presents a novel calibration algorithm which uses the known dynamics of a ballistically thrown target object and employs the Extended Kalman Filter (EKF) to calibrate the multi-camera system. The state-space representation of the target state is augmented with the unknown calibration parameters which are assumed to be static or slowly varying with respect to the state. This results in a &ldquo
super-state&rdquo
vector. The EKF algorithm is used to recursively estimate this super-state hence resulting in the estimates of the static camera parameters. It is demonstrated by both simulation studies as well as actual experiments that when the ballistic path of the target is processed by the improved versions of the EKF algorithm, the camera calibration parameter estimates asymptotically converge to their actual values. Since the image frames of the target trajectory can be acquired first and then processed off-line, subsequent improvements of the EKF algorithm include repeated and bidirectional versions where the same calibration images are repeatedly used. Repeated EKF (R-EKF) provides convergence with a limited number of image frames when the initial target state is accurately provided while its bidirectional version (RB-EKF) improves calibration accuracy by also estimating the initial target state. The primary contribution of the approach is that it provides a fast calibration procedure where there is no need for any standard or custom made calibration target plates covering the majority of camera field-of-view. Also, human assistance is minimized since all frame data is processed automatically and assistance is limited to making the target throws. The speed of convergence and accuracy of the results promise a field-applicable calibration procedure.
Senses, Engin Utku. "Blur Estimation And Superresolution From Multiple Registered Images". Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/3/12609929/index.pdf.
Pełny tekst źródłaSeyed, Saboonchi Nima. "Hardware Security Module Performance Optimization by Using a "Key Pool" : Generating keys when the load is low and saving in the external storage to use when the load is high". Thesis, KTH, Radio Systems Laboratory (RS Lab), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-158122.
Pełny tekst źródłaDetta examensarbete undersöker prestandabegränsningar för Hardware Security Module (HSM) enheter med avseende på att uppfylla behov av säkerhetstjänster i en snabbt växande marknad och på ett kostnadseffektivt sätt. I synnerhet på grund av de säkerhetskrav som nu existerar/tillkommit efter införandet av ett nytt elektroniskt ID-system i Sverige (Federationen för Svensk eID) och hur underskrifter skapas och hanteras. SafeNet Luna SA 1700 är en högpresterande HSM enhet tillgänglig på marknaden. I den här avhandlingen presenteras nuvarande HSM kapacitet och en omfattande analys av resultatet visar ett prestanda gap mellan vad HSMS för närvarande kan göra och vad som behöver förbättras för att ta itu med de förväntade kraven. En fallstudie fokuserad på nya säkerhetstjänster som krävs i och med Sveriges nya e-Identifiering presenteras. Baserat på resultatet i den här avhandlingen föreslås en optimerad HSM lösning för att tillgodose prestanda gapet mellan vad HSM presterar och de nya krav som ställs. Ett flertal tester genomfördes för att mäta en befintlig HSM prestanda. En analys av dessa mätningar användes för att föreslå en optimerad lösning för HSMS (eller liknande) enheter. Ett av de huvudsakliga kraven för den nya signeringstjänsten är att ha en kapacitet av 50 digitala signaturer inom en accepterad svarstidsintervall, vilket är 300ms vid ordinarie trafik och 3000ms vid högtrafik. Förslagen i avhandlingen möjliggör HSM enheten att tillgodose kraven på 50 signeringen per sekund under två timmars högtrafik, och till en 1/9 kostnad genom att skala upp antalet HSMs. Målgruppen i den här avhandlingen är användare av HSMs och där behovet av lagring och generering av nycklar i höga volymer är stort. Även HSM leverantörer som kan implementera den här optimeringen/lösningen i befintlig funktionalitet för att tillgodose det här behovet i en alltmer växande marknad.
Książki na temat "Hardware identification"
Alex, Anish. Hardware Accelerated protein identification. Ottawa: National Library of Canada, 2003.
Znajdź pełny tekst źródła1928-, Moran Robert, i Business Communications Co, red. Automatic product/people identification: Systems, hardware. Norwalk, Conn: Business Communications Co., 1987.
Znajdź pełny tekst źródłaZhu, Yucai. Identification of Multivariable Industrial Processes: For Simulation, Diagnosis and Control. London: Springer London, 1993.
Znajdź pełny tekst źródłaRao, A. Ravishankar. A Taxonomy for Texture Description and Identification. New York, NY: Springer US, 1990.
Znajdź pełny tekst źródłaInteractive system identification: Prospects and pitfalls. Berlin: Springer-Verlag, 1991.
Znajdź pełny tekst źródłaBohlin, Torsten. Interactive System Identification: Prospects and Pitfalls. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991.
Znajdź pełny tekst źródłaHeuring, Jerry. Collector's guide to E.C. Simmons Keen Kutter cutlery and tools: Identification & values. Paducah, KY: Collector Books, 2000.
Znajdź pełny tekst źródłaWilson, H. Weber. Antique hardware price guide: A comprehensive collector's price and identification guide to vintage doorknobs, door bells, mail slots, hinges, door pulls, shutter hardware, and locksets. Iola, Wis: Krause Publications, 1999.
Znajdź pełny tekst źródłaEhrlich, Paul R. The birder's handbook: A field guide to the natural history of North American birds : including all species that regularly breed north of Mexico. New York: Simon & Schuster, 1988.
Znajdź pełny tekst źródłaA Taxonomy for Texture Description and Identification. Springer My Copy UK, 1990.
Znajdź pełny tekst źródłaCzęści książek na temat "Hardware identification"
Zhang, Guangjun. "Hardware Implementation and Performance Test of Star Identification". W Star Identification, 199–223. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-53783-1_7.
Pełny tekst źródłaTuyls, Pim. "Hardware Intrinsic Security". W Radio Frequency Identification: Security and Privacy Issues, 123. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16822-2_11.
Pełny tekst źródłaFarahmandi, Farimah, M. Sazadur Rahman, Sree Ranjani Rajendran i Mark Tehranipoor. "CAD for Security Asset Identification". W CAD for Hardware Security, 21–35. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26896-0_2.
Pełny tekst źródłaAlex, Anish, Jonathan Rose, Ruth Isserlin-Weinberger i Christopher Hogue. "Hardware Accelerated Novel Protein Identification". W Field Programmable Logic and Application, 13–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30117-2_4.
Pełny tekst źródłaCanyellas, Nicolau, Enrique Cantó, Giuseppe Forte i Mariano López. "Hardware-Software Codesign of a Fingerprint Identification Algorithm". W Lecture Notes in Computer Science, 683–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11527923_71.
Pełny tekst źródłaSantana Farias, Marcos, Nadia Nedjah i Luiza de Macedo Mourelle. "Reconfigurable Hardware to Radionuclide Identification Using Subtractive Clustering". W Algorithms and Architectures for Parallel Processing, 387–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24669-2_37.
Pełny tekst źródłaCox, David, i David Oswald. "$$\upmu $$ Proxy: A Hardware Relay for Anonymous and Secure Internet Access". W Radio Frequency Identification and IoT Security, 175–87. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-62024-4_13.
Pełny tekst źródłaGogoi, Ankur, i Bibhas Ghoshal. "Application-Driven Fault Identification in NoC Designs". W VLSI and Hardware Implementations Using Modern Machine Learning Methods, 79–96. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003201038-5.
Pełny tekst źródłaKim, Mooseop, Jaecheol Ryou, Yongje Choi i Sungik Jun. "Low Power AES Hardware Architecture for Radio Frequency Identification". W Advances in Information and Computer Security, 353–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11908739_25.
Pełny tekst źródłaSimons, Robert A. "Identification of major vehicle-related hardware and technological trends". W Driverless Cars, Urban Parking and Land Use, 14–36. First edition. | Abingdon, Oxon ; New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.1201/9780429469541-3.
Pełny tekst źródłaStreszczenia konferencji na temat "Hardware identification"
Hamers, Juan, i Lieven Eeckhout. "Automated hardware-independent scenario identification". W the 45th annual conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1391469.1391710.
Pełny tekst źródłaBianchi, Gea, Fabiola Casasopra, Gianluca C. Durelli i Marco D. Santambrogio. "A hardware approach to protein identification". W 2015 IEEE Biomedical Circuits and Systems Conference (BioCAS). IEEE, 2015. http://dx.doi.org/10.1109/biocas.2015.7348382.
Pełny tekst źródłaLi, Weiwei, Mingshu Li, Yue Ma i Qiusong Yang. "PMU-extended Hardware ROP Attack Detection". W 2018 12th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID). IEEE, 2018. http://dx.doi.org/10.1109/icasid.2018.8693210.
Pełny tekst źródłaIavich, Maksim, Razvan Bocu, Giorgi Iashvili i Sergiy Gnatyuk. "Novel Method of Hardware Security Problems Identification". W 2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T). IEEE, 2020. http://dx.doi.org/10.1109/picst51311.2020.9467966.
Pełny tekst źródłaJinhai, Zhang. "Hardware design of embedded fingerprint identification system". W 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet). IEEE, 2011. http://dx.doi.org/10.1109/cecnet.2011.5769119.
Pełny tekst źródłaFarias, M. S., N. Nedjah i L. de Macedo Mourelle. "Efficient hardware architecture for embedded radionuclide identification". W 2013 IEEE 4th Latin American Symposium on Circuits and Systems (LASCAS). IEEE, 2013. http://dx.doi.org/10.1109/lascas.2013.6519032.
Pełny tekst źródłaVaidya, Girish, i T. V. Prabhakar. "Hardware based identification for Intelligent Electronic Devices". W 2022 IEEE/ACM Seventh International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, 2022. http://dx.doi.org/10.1109/iotdi54339.2022.00018.
Pełny tekst źródłaHeafield, Kenneth, Rohan Kshirsagar i Santiago Barona. "Language Identification and Modeling in Specialized Hardware". W Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 2: Short Papers). Stroudsburg, PA, USA: Association for Computational Linguistics, 2015. http://dx.doi.org/10.3115/v1/p15-2063.
Pełny tekst źródłaLiang, Feng, i Chun Zhang. "Hardware Oriented Vision System of Logistics Robotics". W 2018 12th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID). IEEE, 2018. http://dx.doi.org/10.1109/icasid.2018.8693116.
Pełny tekst źródłaRahman, Mostafizur, Iqbalur Rahman Rokon i Miftahur Rahman. "Efficient hardware implementation of RSA cryptography". W 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication (2009 ASID). IEEE, 2009. http://dx.doi.org/10.1109/icasid.2009.5276895.
Pełny tekst źródłaRaporty organizacyjne na temat "Hardware identification"
Maki, Phyllis. Identification of entry-level clerical/secretarial skills and competencies and utilization of hardware and software applications in Clark County businesses. Portland State University Library, styczeń 2000. http://dx.doi.org/10.15760/etd.5379.
Pełny tekst źródłaMohr, M. O. L51679 Diver Assisted Pipeline Repair Manual. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), grudzień 1992. http://dx.doi.org/10.55274/r0010288.
Pełny tekst źródła