23 research outputs found

    Hardware emulation of stochastic p-bits for invertible logic

    Full text link
    The common feature of nearly all logic and memory devices is that they make use of stable units to represent 0's and 1's. A completely different paradigm is based on three-terminal stochastic units which could be called "p-bits", where the output is a random telegraphic signal continuously fluctuating between 0 and 1 with a tunable mean. p-bits can be interconnected to receive weighted contributions from others in a network, and these weighted contributions can be chosen to not only solve problems of optimization and inference but also to implement precise Boolean functions in an inverted mode. This inverted operation of Boolean gates is particularly striking: They provide inputs consistent to a given output along with unique outputs to a given set of inputs. The existing demonstrations of accurate invertible logic are intriguing, but will these striking properties observed in computer simulations carry over to hardware implementations? This paper uses individual micro controllers to emulate p-bits, and we present results for a 4-bit ripple carry adder with 48 p-bits and a 4-bit multiplier with 46 p-bits working in inverted mode as a factorizer. Our results constitute a first step towards implementing p-bits with nano devices, like stochastic Magnetic Tunnel Junctions

    Weighted p-bits for FPGA implementation of probabilistic circuits

    Full text link
    Probabilistic spin logic (PSL) is a recently proposed computing paradigm based on unstable stochastic units called probabilistic bits (p-bits) that can be correlated to form probabilistic circuits (p-circuits). These p-circuits can be used to solve problems of optimization, inference and also to implement precise Boolean functions in an "inverted" mode, where a given Boolean circuit can operate in reverse to find the input combinations that are consistent with a given output. In this paper we present a scalable FPGA implementation of such invertible p-circuits. We implement a "weighted" p-bit that combines stochastic units with localized memory structures. We also present a generalized tile of weighted p-bits to which a large class of problems beyond invertible Boolean logic can be mapped, and how invertibility can be applied to interesting problems such as the NP-complete Subset Sum Problem by solving a small instance of this problem in hardware

    Towards a secure service provisioning framework in a Smart city environment

    Get PDF
    © 2017 Elsevier B.V. Over the past few years the concept of Smart cities has emerged to transform urban areas into connected and well informed spaces. Services that make smart cities “smart” are curated by using data streams of smart cities i.e., inhabitants’ location information, digital engagement, transportation, environment and local government data. Accumulating and processing of these data streams raise security and privacy concerns at individual and community levels. Sizeable attempts have been made to ensure the security and privacy of inhabitants’ data. However, the security and privacy issues of smart cities are not only confined to inhabitants; service providers and local governments have their own reservations — service provider trust, reliability of the sensed data, and data ownership, to name a few. In this research we identified a comprehensive list of stakeholders and modelled their involvement in smart cities by using the Onion Model approach. Based on the model we present a security and privacy-aware framework for service provisioning in smart cities, namely the ‘Smart Secure Service Provisioning’ (SSServProv) Framework. Unlike previous attempts, our framework provides end-to-end security and privacy features for trustable data acquisition, transmission, processing and legitimate service provisioning. The proposed framework ensures inhabitants’ privacy, and also guarantees integrity of services. It also ensures that public data is never misused by malicious service providers. To demonstrate the efficacy of SSServProv we developed and tested core functionalities of authentication, authorisation and lightweight secure communication protocol for data acquisition and service provisioning. For various smart cities service provisioning scenarios we verified these protocols by an automated security verification tool called Scyther

    Types and clinical presentation of stroke

    Get PDF
    Background: Stroke is one of the leading causes of mortality and morbidity worldwide. In this study, authors worked on clinical presentation and types of stroke. The two main types of strokes are ischemic and haemorrhagic. Brain infarction is caused by decrease blood flow due to either narrowing of artery or complete obstruction to blood flow owing to embolism. While haemorrhage is caused by rupture of artery or aneurysms leading to accumulation of blood in the brain parenchyma.Methods: Cross sectional study of group of patients in Nishtar hospital Multan, Pakistan who presented with variety of neurological symptoms who were subsequently diagnosed as non-traumatic stroke. All patients were subjected to a detailed history and thorough clinical examination and investigations after obtaining informed consent.Results: Of 122 patient, 66 patients were male and 56 were female. Ischemic stroke was more common: present in 76 patients as compared to 46 patients with hemorrhagic stroke. Hypertension was present in 40.9% of ischemic stroke and 27.8% of hemorrhagic strokes. Most of the patients (67.2%) had altered sensorium at presentation followed by hemiplegia in 39.3 % of patients.Conclusions: Prevalence of ischemic strokes is higher than that of haemorrhagic stroke. Hypertension is associated with both types of these strokes. Moreover, hyperglycaemia and high blood pressure are common in early phase of stroke. Vomiting in stroke favors haemorrhagic stroke

    The inclusive analysis of ICT ethical issues on healthy society: a global digital divide approach

    Get PDF
    The Global Digital Division remains as a rising focus that has to be brought into the notice of the United Nations UN. It is about the vast disparity in exposure to the existing digital knowledge by ICT information and communication technologies amongst developed and developing nations. The work outlined here seeks to acknowledge the effects and provide feedback of an ethical issue on key areas. The study also provides information about the several concrete solutions to this issue in order to ensure the sustainable development of society. In addition, a Digital Effectiveness Framework has been suggested which consist of five phases namely access, exploration, knowledge acquisition, adoption, and innovation and transformation. The study ends with the molds that leads to address the impact of the Global Digital Divide will continue at national level. National surveillance systems must be set to determine the digital opportunity index DOI for each country and track their role as tech giants in the information and communication technology environment

    Impact of IoT on Manufacturing Industry 4.0: A New Triangular Systematic Review

    Get PDF
    The Internet of Things (IoT) has realised the fourth industrial revolution concept; however, its applications in the manufacturing industry are relatively sparse and primarily investigated without contextual peculiarities. Our research undertakes an intricate critical review to investigate significant aspects of IoT applications in the manufacturing Industry 4.0 perspective to address this gap. We adopt a systematic literature review approach by Denyer and Tranfield (2009) to carry out critical analyses that help develop future research domains based on empirical studies. We describe key knowledge gaps in the existing literature and empirical studies by exploring the main contribution categories and finding six critical differences between traditional and manufacturing Industry 4.0 and 10 enablers and 11 challenges of IoT applications. Finally, an agenda for future research is proposed with 11 research domains to focus on the recognised gaps

    Hardware Implementation of Autonomous Probabilistic Computers

    No full text
    Conventional digital computers are built using stable deterministic units known as “bits”. These conventional computers have greatly evolved into sophisticated machines, however there are many classes of problems such as optimization, sampling and machine learning that still cannot be addressed efficiently with conventional computing. Quantum computing, which uses q-bits, that are in a delicate superposition of 0 and 1, is expected to perform some of these tasks efficiently. However, decoherence, requirements for cryogenic operation and limited many-body interactions pose significant challenges to scaled quantum computers. Probabilistic computing is another unconventional computing paradigm which introduces the concept of a probabilistic bit or “p-bit”; a robust classical entity fluctuating between 0 and 1 and can be interconnected electrically. The primary contribution of this thesis is the first experimental proof-of-concept demonstration of p-bits built by slight modifications to the magnetoresistive random-access memory (MRAM) operating at room temperature. These p-bits are connected to form a clock-less autonomous probabilistic computer. We first set the stage, by demonstrating a high-level emulation of p-bits which establishes important rules of operation for autonomous p-computers. The experimental demonstration is then followed by a low-level emulation of MRAM based p-bits which will allow further study of device characteristics and parameter variations for proper operation of p-computers. We lastly demonstrate an FPGA based scalable synchronous probabilistic computer which uses almost 450 digital p-bits to demonstrate large p-circuits
    corecore