3 research outputs found

    FPGA Implementation of Neural Nets

    Get PDF
    The field programmable gate array (FPGA) is used to build an artificial neural network in hardware. Architecture for a digital system is devised to execute a feed-forward multilayer neural network. ANN and CNN are very commonly used architectures. Verilog is utilized to describe the designed architecture. For the computation of certain tasks, a neural network's distributed architecture structure makes it potentially efficient. The same features make neural nets suitable for application in VLSI technology. For the hardware of a neural network, a single neuron must be effectively implemented (NN). Reprogrammable computer systems based on FPGAs are useful for hardware implementations of neural networks

    Wireless Client Device Finger printing

    No full text
    Client device finger printing is method of identifying the client device type, operating system, Device vendor and other types of information which is connected to the wireless network. Also, it is the action of gathering device information to characterize it. This process generates a signature, also called a fingerprint, that describes the observed features of a device in a compact form. If the generated signature is distinctive enough, it may be used to identify a device. In the present developments where they are talking about internet of everything and bring your own device (BYOD) it is required for the enterprise to identify the devices connected to the network and mark them accordingly which may help the enterprise to avoid data leakage, unauthorized device connections and some other security violations. This paper gives the client fingerprinting types and new developed techniques to obtain the device details like device vendor, device operating system and device type

    Wireless Client Device Finger printing

    No full text
    Client device finger printing is method of identifying the client device type, operating system, Device vendor and other types of information which is connected to the wireless network. Also, it is the action of gathering device information to characterize it. This process generates a signature, also called a fingerprint, that describes the observed features of a device in a compact form. If the generated signature is distinctive enough, it may be used to identify a device. In the present developments where they are talking about internet of everything and bring your own device (BYOD) it is required for the enterprise to identify the devices connected to the network and mark them accordingly which may help the enterprise to avoid data leakage, unauthorized device connections and some other security violations. This paper gives the client fingerprinting types and new developed techniques to obtain the device details like device vendor, device operating system and device type
    corecore