4,559 research outputs found

    FPGA-based true random number generation using circuit metastability with adaptive feedback control

    Get PDF
    13th International Workshop, Nara, Japan, September 28 – October 1, 2011. ProceedingsThe paper presents a novel and efficient method to generate true random numbers on FPGAs by inducing metastability in bi-stable circuit elements, e.g. flip-flops. Metastability is achieved by using precise programmable delay lines (PDL) that accurately equalize the signal arrival times to flip-flops. The PDLs are capable of adjusting signal propagation delays with resolutions higher than fractions of a pico second. In addition, a real time monitoring system is utilized to assure a high degree of randomness in the generated output bits, resilience against fluctuations in environmental conditions, as well as robustness against active adversarial attacks. The monitoring system employs a feedback loop that actively monitors the probability of output bits; as soon as any bias is observed in probabilities, it adjusts the delay through PDLs to return to the metastable operation region. Implementation on Xilinx Virtex 5 FPGAs and results of NIST randomness tests show the effectiveness of our approach

    ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching

    Full text link
    Security critical software, e.g., OpenSSL, comes with numerous side-channel leakages left unpatched due to a lack of resources or experts. The situation will only worsen as the pace of code development accelerates, with developers relying on Large Language Models (LLMs) to automatically generate code. In this work, we explore the use of LLMs in generating patches for vulnerable code with microarchitectural side-channel leakages. For this, we investigate the generative abilities of powerful LLMs by carefully crafting prompts following a zero-shot learning approach. All generated code is dynamically analyzed by leakage detection tools, which are capable of pinpointing information leakage at the instruction level leaked either from secret dependent accesses or branches or vulnerable Spectre gadgets, respectively. Carefully crafted prompts are used to generate candidate replacements for vulnerable code, which are then analyzed for correctness and for leakage resilience. From a cost/performance perspective, the GPT4-based configuration costs in API calls a mere few cents per vulnerability fixed. Our results show that LLM-based patching is far more cost-effective and thus provides a scalable solution. Finally, the framework we propose will improve in time, especially as vulnerability detection tools and LLMs mature

    Unsupervised Segmentation of Action Segments in Egocentric Videos using Gaze

    Full text link
    Unsupervised segmentation of action segments in egocentric videos is a desirable feature in tasks such as activity recognition and content-based video retrieval. Reducing the search space into a finite set of action segments facilitates a faster and less noisy matching. However, there exist a substantial gap in machine understanding of natural temporal cuts during a continuous human activity. This work reports on a novel gaze-based approach for segmenting action segments in videos captured using an egocentric camera. Gaze is used to locate the region-of-interest inside a frame. By tracking two simple motion-based parameters inside successive regions-of-interest, we discover a finite set of temporal cuts. We present several results using combinations (of the two parameters) on a dataset, i.e., BRISGAZE-ACTIONS. The dataset contains egocentric videos depicting several daily-living activities. The quality of the temporal cuts is further improved by implementing two entropy measures.Comment: To appear in 2017 IEEE International Conference On Signal and Image Processing Application

    Knowledge, Attitude And Perception Of Ropivacaine Usage In Prosthodontics

    Get PDF
    Introduction The success of a minor oral procedure relies on the efficiency of the local anaesthetic and the dexterity of the operator. Local anaesthetic with an extended duration of action, good analgesia, and negligible toxicity is an optimal choice. A common standard option is 2% lignocaine hydrochloride with adrenaline (1:80,000). However, lignocaine is not recommended for long procedures or in patients with cardiovascular compromise.Various clinical trials have suggested other options, one of which is ropivacaine.The aim of the survey was to assess the knowledge, attitude and practice of ropivacaine in prosthodontics. Materials and methods An online questionnaire based cross-sectional study was conducted during 1st July to 12th July 2021, among undergraduate and postgraduate dental students of Saveetha Dental College. An online questionnaire survey which consisted of 17 questions, was circulated among the dental practitioners (n=100) within the city based on the inclusion and exclusion criteria of the study and the response was subjected to analysis. Results According to the survey 88.89% of the participants are aware that Ropivacaine falls under long acting amide link. According to the survey 55% of the participants think lidocaine is the most commonly used Local anaesthesia followed by ropivacaine 35%. About 92 % of the participants think Ropivacaine is better than bupivacaine due to its less lipophilic and have a significantly higher threshold CNS toxicity. According to the survey 85% of the participants think 14 minutes is the half life of ropivacaine followed by 2mins, 10mins, 4mins. Ropivacaine can be used in long prosthodontics procedures like FPD. According to the survey 58% know the commercial name of ropivacaine whereas 31% don’t know the commercial name. Conclusion: Within the limitations of the study, the participants are aware of ropivacaine.Saveetha Institute of Medical and Technical Sciences, Saveetha Dental College and Hospitals, Saveetha Universit

    Implementasi Sistem Informasi Puskesmas Elektronik (SIMPUSTRONIK) dan Hubungan dengan Pelayanan Kesehatan Ibu dan Anak (KIA) (Studi Perbandingan Implementasi di Puskesmas Sumberasih dan Puskesmas Paiton Kabupaten Probolinggo)

    Full text link
    Puskesmas sebagai penyedia sarana pelayanan kesehatan dituntut untuk memberikan pelayanan kesehatan yang cepat, tepat dan akurat. Oleh karena itu, merupakan suatu keharusan bahwa puskesmas memanfaatkan kemajuan informasi teknologi dalam memenuhi tuntutan pelayanan tersebut. Dengan pendekatan kuantitatif positivitik untuk menjelaskan hipotesa penelitian guna menjawab faktor implementasi yang mendukung dan kemanfaatan SIMPUSTRONIK. Survey yang dilakukan kepada bidan sebagai pelaksana SIMPUSTRONIK di Puskesmas Paiton dan Puskesmas Sumberasih Kabupaten Probolinggo menghasilkan 3 indikator implementasi yang tidak mendukung keberhasilan implementasi SIMPUSTRONIK yaitu pembagian tugas dan wewenang, keikutsertaan pengguna dalam pengembangan implementasi dan keikutsertaan pengguna dalam evaluasi implementasi. Sedang indikator yang diteliti lainnya menunjukkan adanya hubungan. indikator implementasi tersebut berhubungan erat dengan kesiapan SDM (pengetahuan SDM) serta keterkaitan keikutseraan (partisipasi) implementor. Hampir semua responden menunjukkan bahwa implementasi SIMPUSTRONIK bermanfaat dan mendukung kegiatan mereka dalam pelayanan KIA, tetapi yang terbesar adalah kemanfaatan penemuan ibu hamil resiko tinggi yang dirujuk

    Geometry-based shading for shape depiction Enhancement,

    Get PDF
    Recent works on Non-Photorealistic Rendering (NPR) show that object shape enhancement requires sophisticated effects such as: surface details detection and stylized shading. To date, some rendering techniques have been proposed to overcome this issue, but most of which are limited to correlate shape enhancement functionalities to surface feature variations. Therefore, this problem still persists especially in NPR. This paper is an attempt to address this problem by presenting a new approach for enhancing shape depiction of 3D objects in NPR. We first introduce a tweakable shape descriptor that offers versatile func- tionalities for describing the salient features of 3D objects. Then to enhance the classical shading models, we propose a new technique called Geometry-based Shading. This tech- nique controls reflected lighting intensities based on local geometry. Our approach works without any constraint on the choice of material or illumination. We demonstrate results obtained with Blinn-Phong shading, Gooch shading, and cartoon shading. These results prove that our approach produces more satisfying results compared with the results of pre- vious shape depiction techniques. Finally, our approach runs on modern graphics hardware in real time, which works efficiently with interactive 3D visualization

    A Fast Silhouette Detection Algorithm for Shadow Volumes in Augmented Reality

    Get PDF
    Real-time shadow generation in virtual environments and Augmented Reality (AR) was always a hot topic in the last three decades. Lots of calculation for shadow generation among AR needs a fast algorithm to overcome this issue and to be capable of implementing in any real-time rendering. In this paper, a silhouette detection algorithm is presented to generate shadows for AR systems. Δ+algorithm is presented based on extending edges of occluders to recognize which edges are silhouettes in the case of real-time rendering. An accurate comparison between the proposed algorithm and current algorithms in silhouette detection is done to show the reduction calculation by presented algorithm. The algorithm is tested in both virtual environments and AR systems. We think that this algorithm has the potential to be a fundamental algorithm for shadow generation in all complex environments

    Shadow mapping algorithms: Applications and limitations

    Get PDF
    This study provides an overview of popular and famous algorithms and techniques in shadow maps generation.Well- known techniques in shadow maps generation is described detail, along with a discussion of the advantages and drawbacks of each. Basic ideas, improvements and future works of the techniques are also comprehensively summarized and analyzed in depth. Often, programmers have difficulty selecting an appropriate shadow generation algorithm that is specific to their purpose. We have classified and systemized these techniques. The main goal of this paper is to provide researchers with background on a variety of shadow mapping techniques so as make it easier for them to choose the method best suited to their aims. It is al-so hoped that our analysis will help researchers find solutions to the shortcomings of each technique. © 2015 NSP Natural Sciences Publishing Co
    corecore