1,430 research outputs found
Kecerdasan matematik-logik dalam kalangan pelajar sarjana Pendidikan Teknik dan Vokasional UTHM
Kecerdasan matematik-logik sering dikaitkan dengan penguasaan pelajar dalam subjek
matematik. Pencapaian pelajar, khususnya pelajar Sarjana Pendidikan Teknik dan
Vokasional, Universiti Tun Hussein Onn Malaysia (UTHM) dalam kursus Statistik dalam
Penyelidikan sedikit sebanyak mempengaruhi pencapaian akademik pelajar. Oleh itu,
kajian ini dijalankan untuk mengkaji pengaruh kecerdasan matematik-logik terhadap
pencapaian pelajar dalam kursus Statistik dalam Penyelidikan. Kajian berbentuk tinjauan
secara kuantitatif untuk melihat hubungan diantara dua pembolehubah iaitu pembolehubah
tidak bersandar (kecerdasan matematik-logik) dan pembolehubah bersandar (penguasaan
pelajar dalam kursus Statistik dalam Penyelidikan). Persampelan rawak mudah digunakan
dalam kajian ini dengan mengambil sampel seramai 108 orang pelajar Sarjana Pendidikan
Teknik dan Vokasional sebagai responden kajian. Data diperoleh daripada sampel dengan
menggunakan borang soal selidik yang diolah berdasarkan alat pengukuran kecerdasan
MIDAS (Multiple Intelligence Development Assessment Scales). Data dianalisis
menggunakan perisian SPSS (Statistical Package for Social Science) versi 16.0 yang
melibatkan ujian statistik skor min dan kolerasi pangkat Spearman. Hasil dapatan kajian
menunjukkan tahap kecenderungan kecerdasan matematik-logik pelajar berada pada tahap
yang tinggi dan mempunyai hubungan yang signifikan dengan pencapaian pelajar dalam
kursus Statistik dalam Penyelidikan. Berdasarkan dapatan kajian boleh disimpulkan
bahawa kecerdasan matematik-logik dapat dijadikan kayu ukur dalam memastikan
kejayaan pelajar
KLEIN: A New Family of Lightweight Block Ciphers
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role as a building block for security protocols. In this paper, we describe a new family of lightweight block ciphers named KLEIN, which is designed for resource-constrained devices such as wireless sensors and RFID tags. Compared to the related proposals, KLEIN has advantage in the software performance on legacy sensor platforms, while in the same time its hardware implementation can also be compact
Implementing a protected zone in a reconfigurable processor for isolated execution of cryptographic algorithms
We design and realize a protected zone inside a reconfigurable and extensible embedded RISC processor for isolated execution of cryptographic algorithms. The protected zone is a collection of processor subsystems such as functional units optimized for high-speed execution of integer operations, a small amount of local memory, and general and special-purpose registers. We outline the principles for secure software implementation of cryptographic algorithms
in a processor equipped with the protected zone. We also demonstrate the efficiency and effectiveness of the protected zone by implementing major cryptographic algorithms, namely RSA, elliptic curve cryptography, and AES in the protected zone. In terms of time efficiency, software implementations
of these three cryptographic algorithms outperform equivalent software implementations on similar processors reported in the literature. The protected zone is designed in such a modular fashion that it can easily be integrated into any RISC processor; its area overhead is considerably moderate in the sense that
it can be used in vast majority of embedded processors. The protected zone can also provide the necessary support to implement TPM functionality within the boundary of a processor
Transparent code authentication at the processor level
The authors present a lightweight authentication mechanism that verifies the authenticity of code and thereby addresses the virus and malicious code problems at the hardware level eliminating the need for trusted extensions in the operating system. The technique proposed tightly integrates the authentication mechanism into the processor core. The authentication latency is hidden behind the memory access latency, thereby allowing seamless on-the-fly authentication of instructions. In addition, the proposed authentication method supports seamless encryption of code (and static data). Consequently, while providing the software users with assurance for authenticity of programs executing on their hardware, the proposed technique also protects the software manufacturers’ intellectual property through encryption. The performance analysis shows that, under mild assumptions, the presented technique introduces negligible overhead for even moderate cache sizes
An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics
Near-sensor data analytics is a promising direction for IoT endpoints, as it
minimizes energy spent on communication and reduces network load - but it also
poses security concerns, as valuable data is stored or sent over the network at
various stages of the analytics pipeline. Using encryption to protect sensitive
data at the boundary of the on-chip analytics engine is a way to address data
security issues. To cope with the combined workload of analytics and encryption
in a tight power envelope, we propose Fulmine, a System-on-Chip based on a
tightly-coupled multi-core cluster augmented with specialized blocks for
compute-intensive data processing and encryption functions, supporting software
programmability for regular computing tasks. The Fulmine SoC, fabricated in
65nm technology, consumes less than 20mW on average at 0.8V achieving an
efficiency of up to 70pJ/B in encryption, 50pJ/px in convolution, or up to
25MIPS/mW in software. As a strong argument for real-life flexible application
of our platform, we show experimental results for three secure analytics use
cases: secure autonomous aerial surveillance with a state-of-the-art deep CNN
consuming 3.16pJ per equivalent RISC op; local CNN-based face detection with
secured remote recognition in 5.74pJ/op; and seizure detection with encrypted
data collection from EEG within 12.7pJ/op.Comment: 15 pages, 12 figures, accepted for publication to the IEEE
Transactions on Circuits and Systems - I: Regular Paper
Review on DNA Cryptography
Cryptography is the science that secures data and communication over the
network by applying mathematics and logic to design strong encryption methods.
In the modern era of e-business and e-commerce the protection of
confidentiality, integrity and availability (CIA triad) of stored information
as well as of transmitted data is very crucial. DNA molecules, having the
capacity to store, process and transmit information, inspires the idea of DNA
cryptography. This combination of the chemical characteristics of biological
DNA sequences and classical cryptography ensures the non-vulnerable
transmission of data. In this paper we have reviewed the present state of art
of DNA cryptography.Comment: 31 pages, 12 figures, 6 table
- …