13 research outputs found

    Machine-learning-based side-channel evaluation of elliptic-curve cryptographic FPGA processor

    Get PDF
    Security of embedded systems is the need of the hour. A mathematically secure algorithm runs on a cryptographic chip on these systems, but secret private data can be at risk due to side-channel leakage information. This research focuses on retrieving secret-key information, by performing machine-learning-based analysis on leaked power-consumption signals, from Field Programmable Gate Array (FPGA) implementation of the elliptic-curve algorithm captured from a Kintex-7 FPGA chip while the elliptic-curve cryptography (ECC) algorithm is running on it. This paper formalizes the methodology for preparing an input dataset for further analysis using machine-learning-based techniques to classify the secret-key bits. Research results reveal how pre-processing filters improve the classification accuracy in certain cases, and show how various signal properties can provide accurate secret classification with a smaller feature dataset. The results further show the parameter tuning and the amount of time required for building the machine-learning models

    Machine-learning-based side-channel evaluation of elliptic-curve cryptographic FPGA processor.

    Get PDF
    Security of embedded systems is the need of the hour. A mathematically secure algorithm runs on a cryptographic chip on these systems, but secret private data can be at risk due to side-channel leakage information. This research focuses on retrieving secret-key information, by performing machine-learning-based analysis on leaked power-consumption signals, from Field Programmable Gate Array (FPGA) implementation of the elliptic-curve algorithm captured from a Kintex-7 FPGA chip while the elliptic-curve cryptography (ECC) algorithm is running on it. This paper formalizes the methodology for preparing an input dataset for further analysis using machine-learning-based techniques to classify the secret-key bits. Research results reveal how pre-processing filters improve the classification accuracy in certain cases, and show how various signal properties can provide accurate secret classification with a smaller feature dataset. The results further show the parameter tuning and the amount of time required for building the machine-learning modelsUniversity of Derb

    Mobile health apps use among Jordanian outpatients: A descriptive study

    Get PDF
    Our purpose in this descriptive cross-sectional study was to examine the prevalence of mobile health (mHealth) apps use, factors associated with downloading mHealth apps, and to describe characteristics of mHealth apps use among Jordanian patients in government-sponsored outpatient clinics. A total of 182 (41.6%) of the 438 outpatients who completed questionnaires downloaded mHealth apps. Common reasons for downloading mHealth apps included tracking physical activity, losing weight, learning exercises, as well as monitoring, and controlling diet. More than two thirds of the users (70%) stopped using the apps they downloaded due to loss of interest, lack of anticipated support, too time consuming, or better apps available. The most common personal reasons for never downloading mHealth apps were lack of interest, in good health, and the most common technical reasons included a limited data plan, lack of trust, cost, and complexity of the apps. We also found that gender, age, weight, and educational level influenced the decision whether to download mHealth apps or not. We have shown the potential in mHealth apps use among Jordanian patients is promising, and health care systems must adopt this technology as well as work through population needs and preferences to supply it

    A Network Slicing Approach between Multiple Autonomous Systems

    Get PDF
    Resource sharing is common within operating systems and computational hardware infrastructures. The scientific community, driven by flexibility and scalability requirements, has expanded the concept of sharing resources to the scope of communication network infrastructures. For this, enabling technologies such as Software-Defined Networking, Network Functions Virtualization, Segment Routing, and cloud computing paradigms leverage new approaches to sharing resources. Sharing network resources by organizing them functionally and logically in the network connectivity ecosystem can be recognized as a network slice. Network slicing has received joint efforts from academia and industry because of new technological enablers such as programmability and virtualization. Network slicing has been extensively explored in the specification and standardization process for new mobile network architectures, specifically \textit{5G}. Therefore, the proposals in the literature focus predominantly on providing network slicing in the context of mobile networks. Approaches that proposed network slicing beyond mobile networks proved to be functionally ineffective in providing network slicing across multiple Autonomous Systems (ASs). Thus, this thesis builds and evaluates a network slicing method between multiple ASs based on Internet routing algorithms. This thesis answers the assumed hypothesis by adding dynamism to the network slice process by enabling the user or administrator to perform network slice specifies definitions, such as service parameters and the path along with Internet routers to the network slice. Besides, this thesis brings novelty with a conceptual and technological framework for performing recursive slicing. Experiments measuring the applicability, relevance, and performance of the network slicing approach were conducted and contrasted with traditional methods. Experimental results in significant scenarios suggest that the method of this thesis functionally and in performance surpasses traditional state-of-the-art methods. Furthermore, experiments demonstrate that dynamism in choosing the network slice path can improve the quality of experience for real-time applications.CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível SuperiorTese (Doutorado)O compartilhamento de recursos é comum no âmbito dos sistemas operacionais e em infraestruturas de hardware computacional. A comunidade científica, orientada por requisitos de flexibilidade e escalabilidade, tem expandido o conceito de compartilhamento de recursos para o âmbito das infraestruturas de redes de comunicação. Para isso, tecnologias habilitadoras como Redes Definidas por Software, Virtualização de Funções de Rede, Roteamento por Segmentos e paradigmas de computação em nuvem potencializam novas abordagens de compartilhamento de recursos. Compartilhar recursos de rede os organizando funcionalmente, logicamente em conectividade de rede pode ser percebido como fatiamento de rede. O fatiamento de rede recebeu esforços conjuntos da academia e indústria em virtude dos novos habilitadores tecnológicos como a programabilidade e a virtualização. O fatiamento de rede tem sido amplamente explorado no processo de especificação e padronização das novas arquiteturas de redes móveis, especificamente o 5G. Por isso, as propostas da literatura concentram-se predominantemente em prover fatiamento de rede no contexto das redes móveis. As abordagens que propuseram fatiamento de rede para além de redes móveis mostraram-se funcionalmente incapazes de prover fatiamento de rede entre múltiplos Sistemas Autônomos (SAs). Nesse sentido, esta tese estrutura, constrói e avalia um método de fatiamento de rede entre múltiplos SAs, baseando-se nos algoritmos de roteamento da Internet. Esta tese responde a hipótese conjecturada adicionando dinamismo ao processo de fatiamento de rede ao habilitar o usuário ou administrador realizar definições específicas da fatia de rede, como parâmetros de serviço e o caminho ao longo de roteadores da Internet para a fatia de rede. Além disso, avança o estado da arte com um arcabouço conceitual e tecnológico para realização de fatiamento recursivo. Experimentos que mensuraram a aplicabilidade, pertinência e desempenho da abordagem de fatiamento de rede foram conduzidos e contrastados com métodos tradicionais. Resultados experimentais em cenários significativos sugerem que o método desta tese supera funcionalmente e em desempenho métodos tradicionais do estado da arte. Além disso, experimentos demonstram que o dinamismo na escolha do caminho para a fatia de rede pode aprimorar a qualidade de experiência para aplicações de tempo real

    A standard European tank? Procurement politics, technology transfer and the challenges of collaborative MBT projects in the NATO alliance since 1945

    Get PDF
    International cooperation in weapons technology projects has long been a feature of alliance politics; and, there are many advantages to both international technology transfer and standardisation within military alliances. International collaboration between national defence industries has produced successful weapon systems from technologically advanced fighter aircraft to anti-tank missiles. Given the success of many joint defence projects, one unresolved question is why there have been no successful collaborative international main battle tank (MBT) projects since 1945. This thesis seeks to answer this question by considering four case studies of failed attempts to produce an MBT through an international collaborative tank project: first and second, the Franco-German efforts to produce a standard European tank, or Euro-Panzer (represented by two separate projects in 1957-63 and 1977-83); third, the US-German MBT-70 project (1963-70); and, fourth, the Anglo-German Future Main Battle Tank, or KPz3 (1971-77). In order to provide an explanation of the causes of failure on four separate occasions, the analysis includes reference to other high-technology civilian and military joint projects which either succeeded, or which cannot be classified as international MBT collaborative projects (such as the KNDS demonstration tank and the MBT-2000 developed by China and Pakistan). In addition to identifying the multiple causes of failure and providing an analysis of the most significant factor(s) in each case, it will be argued that the pattern which emerged during the Cold War does not necessarily provide an ‘absolute principle’ for future collaborative MBT projects: financial and other pressures may yet create conditions conducive to the completion of a successful collaborative MBT high-technology project. Future projects ought, however, to take note of the lessons from previous experience

    Neutrosophic Sets and Systems, Vol. 36, 2020

    Get PDF

    Full Issue

    Get PDF

    Application of Optimization in Production, Logistics, Inventory, Supply Chain Management and Block Chain

    Get PDF
    The evolution of industrial development since the 18th century is now experiencing the fourth industrial revolution. The effect of the development has propagated into almost every sector of the industry. From inventory to the circular economy, the effectiveness of technology has been fruitful for industry. The recent trends in research, with new ideas and methodologies, are included in this book. Several new ideas and business strategies are developed in the area of the supply chain management, logistics, optimization, and forecasting for the improvement of the economy of the society and the environment. The proposed technologies and ideas are either novel or help modify several other new ideas. Different real life problems with different dimensions are discussed in the book so that readers may connect with the recent issues in society and industry. The collection of the articles provides a glimpse into the new research trends in technology, business, and the environment
    corecore