The document summarizes an experiment that aimed to inject faults into a Raspberry Pi 3 computer using electromagnetic and magnetic fault injection. Two main types of fault injection were tested: exposing the Raspberry Pi to magnetic fields generated by an electromagnet and permanent magnet, and electromagnetic radiation from a wireless router and microwave. None of the experimental setups resulted in any bit flips being detected in the Raspberry Pi's SRAM. The document concludes that a stronger magnetic field or electromagnetic radiation source would likely be needed to successfully inject faults into the Raspberry Pi.
This document summarizes various papers on developing intrusion detection systems using neural networks. It discusses different algorithms researchers have used to train neural networks for intrusion detection, including feed-forward neural networks, self-organizing maps, test driven development neural networks, combinations of supervised and unsupervised learning techniques, differential evolution, and backpropagation neural networks. Each algorithm has advantages and disadvantages. The document concludes that neural networks provide a flexible approach to intrusion detection and can learn new intrusion patterns, and proposes developing an additional level of protection using self-organizing maps to better detect intrusions.
ER Publication,
IJETR, IJMCTR,
Journals,
International Journals,
High Impact Journals,
Monthly Journal,
Good quality Journals,
Research,
Research Papers,
Research Article,
Free Journals, Open access Journals,
erpublication.org,
Engineering Journal,
Science Journals,
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Composite Intrusion Detection in Process Control Networksguest8fdee6
This dissertation develops a multi-algorithm intrusion detection approach for process control networks. It uses estimation-inspection algorithms and probabilistic models to detect anomalies in RAM content evolutions from normal network traffic and physical processes. It also leverages specification-based detection from supervisory and automatic control applications. The approach was tested on a process control network testbed and exhibited high detection rates with low false alarms.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Models and approaches for Differential Power AnalysisAndrej Šimko
There are many side-channel attacks, which employ power analysis for discovering secret keys. This paper describes various methods (Hamming weight, Hamming distance, Switching distance and Signed distance) and approaches, like Simple Power Analysis (SPA); different kinds of Differential Power Analysis (DPA) - first order, Single-Exponent Multiple-Data Attack (SEMD), Multiple-Exponent Single-Data Attack (MESD), Zero-Exponent Multiple-Data Attack (ZEMD), High-Order, automated template; Correlation Power Analysis (CPA); Mutual Information Analysis (MIA). At the end, there is a chapter on countermeasures against the side channel attacks.
Abstract: Design verification is an essential step in the development of any product. It ensures that the product as designed is the same as the product as intended. Software simulation is the common approach for validating hardware design unfortunately, it will take hours together to execute. Difficulties in validation arise due to the complexity of the design and also due to the lack of on chip observability. One common solution to this problem is to instrument the prototype using trace-buffers to record a subset of internal signals into on-chip memory for subsequent analysis. In the proposed system, an example circuit is implemented to perform the tracing operation and various trace buffers are designed to record the different stages of internal signal states. The resulting signal states are to be stored, like a error outputs. Low power methodologies are also implemented to achieve low power consumption. Thus the errors are separately stored in the memory for analyzing the signals. This might be used for changes in the logic wherever needed. Thus this tracing is performed to monitor signal states of an FPGA.
Php project aim is to develop dynamic and attractive web application as per user requirement. you can easily develop web application with our guidance............
Our Project Guidance Methods
We are following Waterfall Methodology for Project development and condition and it has been strictly followed by each guiding staffs and we have better knowledge in this field and updated with new innovative technologies. Our past students have found project work at our centers as a reliable, efficient, inexpensive and a fruitful learning experience. We provide Students about their project at various stages of their project through regular classes and also through detailed technical documentation that we provide in digital format.
for more details..... contact us..........
softroniics
calicut || palakkad || coimbatore
9037061113 , 9037291113
www.softroniics.in
This document summarizes various papers on developing intrusion detection systems using neural networks. It discusses different algorithms researchers have used to train neural networks for intrusion detection, including feed-forward neural networks, self-organizing maps, test driven development neural networks, combinations of supervised and unsupervised learning techniques, differential evolution, and backpropagation neural networks. Each algorithm has advantages and disadvantages. The document concludes that neural networks provide a flexible approach to intrusion detection and can learn new intrusion patterns, and proposes developing an additional level of protection using self-organizing maps to better detect intrusions.
ER Publication,
IJETR, IJMCTR,
Journals,
International Journals,
High Impact Journals,
Monthly Journal,
Good quality Journals,
Research,
Research Papers,
Research Article,
Free Journals, Open access Journals,
erpublication.org,
Engineering Journal,
Science Journals,
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Composite Intrusion Detection in Process Control Networksguest8fdee6
This dissertation develops a multi-algorithm intrusion detection approach for process control networks. It uses estimation-inspection algorithms and probabilistic models to detect anomalies in RAM content evolutions from normal network traffic and physical processes. It also leverages specification-based detection from supervisory and automatic control applications. The approach was tested on a process control network testbed and exhibited high detection rates with low false alarms.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Models and approaches for Differential Power AnalysisAndrej Šimko
There are many side-channel attacks, which employ power analysis for discovering secret keys. This paper describes various methods (Hamming weight, Hamming distance, Switching distance and Signed distance) and approaches, like Simple Power Analysis (SPA); different kinds of Differential Power Analysis (DPA) - first order, Single-Exponent Multiple-Data Attack (SEMD), Multiple-Exponent Single-Data Attack (MESD), Zero-Exponent Multiple-Data Attack (ZEMD), High-Order, automated template; Correlation Power Analysis (CPA); Mutual Information Analysis (MIA). At the end, there is a chapter on countermeasures against the side channel attacks.
Abstract: Design verification is an essential step in the development of any product. It ensures that the product as designed is the same as the product as intended. Software simulation is the common approach for validating hardware design unfortunately, it will take hours together to execute. Difficulties in validation arise due to the complexity of the design and also due to the lack of on chip observability. One common solution to this problem is to instrument the prototype using trace-buffers to record a subset of internal signals into on-chip memory for subsequent analysis. In the proposed system, an example circuit is implemented to perform the tracing operation and various trace buffers are designed to record the different stages of internal signal states. The resulting signal states are to be stored, like a error outputs. Low power methodologies are also implemented to achieve low power consumption. Thus the errors are separately stored in the memory for analyzing the signals. This might be used for changes in the logic wherever needed. Thus this tracing is performed to monitor signal states of an FPGA.
Php project aim is to develop dynamic and attractive web application as per user requirement. you can easily develop web application with our guidance............
Our Project Guidance Methods
We are following Waterfall Methodology for Project development and condition and it has been strictly followed by each guiding staffs and we have better knowledge in this field and updated with new innovative technologies. Our past students have found project work at our centers as a reliable, efficient, inexpensive and a fruitful learning experience. We provide Students about their project at various stages of their project through regular classes and also through detailed technical documentation that we provide in digital format.
for more details..... contact us..........
softroniics
calicut || palakkad || coimbatore
9037061113 , 9037291113
www.softroniics.in
This document describes a plugin developed for the AWARE framework that estimates the indoor or outdoor location type of a mobile device using its on-board sensors. The plugin analyzes data from the accelerometer, magnetometer, light sensor, location sensor, and battery to infer the location type. It is moderately battery efficient, consuming between 3-10% of total device battery. The plugin stores location data and inferences in a database and displays updates every 3 minutes. It uses sensor data and established boundaries to assign weightings to indoor or outdoor predictions and sums the weights to determine the overall location type. The plugin was evaluated using real sensor data and boundaries were adjusted until it accurately inferred location in over 60% of tests.
The document discusses hardware Trojan detection techniques. It describes the objective of detecting Trojans in circuits by analyzing power and delay. It then discusses different Trojan detection techniques like power measurement, path delay measurement, and physical design based testing. It also describes different types of hardware Trojans and provides implementation results of detecting Trojans in circuits like an 8:1 MUX and full adder using LBIST. LBIST was also implemented in an AES core to detect Trojans, achieving high test coverage while detecting minimal changes in area and power between Trojan-free and Trojan-inserted circuits.
This document discusses differential power analysis (DPA) attacks against cryptographic devices. It begins with background on side-channel attacks in general and then defines simple power analysis and differential power analysis attacks specifically. It describes the stages of a typical DPA attack, including device instrumentation to collect power traces, prediction and selection functions to group traces, averaging traces in subsets, and evaluating the results to extract secrets. An example DPA attack on a FPGA decrypting triple DES is given. Finally, common countermeasures like balancing and masking are outlined to prevent leakage of secrets via power analysis.
Breaching of Ring Oscillator Based Trojan Detection and Prevention in Physica...idescitation
Trojan insertion has been made difficult in modern communications in the
recent years, due to extensive research work in the direction to protect Integrated Circuits
(ICs). Several Trojan detection techniques have been developed to prevent the destruction
caused by malicious insertion of Trojan in physical layer, making the process of Trojan
insertion much more difficult. In this paper, we highlight our major findings in terms of
innovative Trojan design that can easily evade existing Trojan detection approaches based
on side-channel analysis. We propose a design that makes Trojan undetectable for known
defense benchmarks and during functional testing. We demonstrate our Trojan model and
validate the results on a known defense mechanism. We also present a novel detection
mechanism for the same proposed Trojan model. The experimental results are presented
using Xilinx Place and Route characteristics, in particular, the Floorplanner tool to identify
the Trojan and address such problems.
This document describes a project to accelerate a stochastic disease spread simulation algorithm by implementing it on an FPGA system. It begins with an introduction explaining how FPGAs can provide parallel processing benefits over traditional CPUs. It then details the design and implementation of a stochastic SIR disease spread model on an FPGA, including generating random networks in MATLAB, designing hardware blocks for individuals, and using a VGA display to output results. Software simulations in MATLAB were used to test the algorithm design. The FPGA implementation matched the MATLAB results, and further verification tests confirmed the FPGA output was identical when using the same random number generator seeds. The project demonstrated successfully mapping a stochastic algorithm to run in hardware on an FPGA.
Automatic Object Detection and Target using Ultrasonic SensorIRJET Journal
The document describes an automatic object detection and targeting system using ultrasonic sensors. The system is intended to secure border areas by reducing human effort and increasing response time and precision. It uses an ultrasonic sensor to detect objects, determines the distance, and then automatically targets the object's position. The system is mounted on a robot that moves and rotates using stepper motors controlled by a microcontroller. When an object is detected, the ultrasonic sensor sends signals to the microcontroller which processes the data and activates a laser targeting mechanism. The system is capable of detecting objects from 2-400cm away with 3mm accuracy.
Robust Fault-Tolerant Training Strategy Using Neural Network to Perform Funct...Eswar Publications
This paper is intended to introduce an efficient as well as robust training mechanism for a neural network which can be used for testing the functionality of software. The traditional setup of neural network architecture is used constituting the two phases -training phase and evaluation phase. The input test cases are to be trained in first phase and consequently they behave like normal test cases to predict the output as untrained test cases. The test oracle measures the deviation between the outputs of untrained test cases with trained test cases and authorizes a final decision. Our framework can be applied to systems where number of test cases outnumbers the
functionalities or the system under test is too complex. It can also be applied to the test case development when the modules of a system become tedious after modification.
This document describes a master's thesis that designed a real-time telemetry system called BANET for monitoring mobile objects in groups. The system consists of sensing devices attached to objects, a group of monitored objects, and a monitoring application. Key design factors were the tendency of objects to form groups and their mobility. The innovative aspect of the system is that it supports group behavior by having neighboring objects form clusters with clusterheads that send aggregated data, improving performance over individual reporting. The thesis studied clustering algorithms and wireless technologies to design the network architecture. A prototype implementation including sensor nodes, server, and monitoring application was developed and experiments showed that clustering can significantly reduce data transmission costs for monitoring mobile groups in real-time.
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...ijwmn
From one side, sensor manufacturing technology and from other side wireless communication technology
improvement has an effect on the growth and deployment of Wireless Network Sensor (WSN). The
appropriate performance of WSN has abundant necessity which has dependent on the different parameters
such as optimize sensor placement and structure of network sensor. The optimized placement in WSN not
only would optimize number of sensors, but also help to reach to the more precise information. Therefore
different solutions are proposed to reduce cost and increase life time of sensor networks that most of them
are concentrated in the field of routing and information transmission. In this paper, places which they need
new sensors placement or sensor movements are determined and then with applying these changes,
performance of WSN will calculate. To achieve the optimum placement, the network should evaluate
precisely and effective criteria on the performance should extract. Therefore the criteria should be ranked
and after weighting with using AHP algorithms, with use of Geographical Information System (GIS), these
weighted criteria will combined and in the locations which WSN doesn’t have enough performance, new
sensor placement will create. New proposed method, improve 21.11% performance of WSN with sensor
placement in the low performance locations. Also the number of added sensor is 26.09% which is lowest
number of added sensors in comparison with other methods.
This thesis examines integrated optical realizations of qudits for quantum cryptography. The document is Thomas Balle's master's thesis submitted to the University of Aarhus. It provides background on quantum cryptography and discusses the design and characterization of integrated optical chips to encode photons for a quantum cryptography system based on the B92 protocol. The thesis also describes experiments conducted to test the chips and suggests improvements to the system.
This document discusses multisensor data fusion for defense applications. It describes data fusion as integrating data from multiple sensors to provide a more complete picture than from individual sensors alone. Some key defense applications discussed include surveillance, intelligence analysis, and missile guidance systems. The document also provides an example of using a Kalman filter for multisensor data fusion to estimate the state of a moving target tracked by multiple sensors.
Τhe economic crisis in Greece in recent years, combined with the weakness or non-selection for a form of a national strategy that is consistent with international developments, has negatively affected the Athens role in the international trend, that is followed by most cities abroad. But the emerging initiatives like the Re-launching Athens project, the Re- think project, the Niarchos project, the awarded start ups, the volunteerism, the creativity of the cultural sector are elements and actions which reveal that Athens is following global trends and starts to form a role .
We have action with participative collaboration and we have values and we have also cultural venues to enjoy.
That is now our story and we ought to promote it.
But is this the competitive advantage of Athens?
The advantage of the city is that it forms gradually a cluster of culture, of creative start ups and of volunteering participation.
In order our story to be unfolded—and that will not happen in a glance– we need our people to believe in it, because they are our ambassadors. According to Charles Landry, “creativity is the backbone of the city, and the critical resource is their people. It is the intelligence, the vitality, the imagination and most of all the creativity of people that feed the history. Indeed, the intensity of this creative power and its exploitation, is the key that will determine the progress and manage the sustainability of each city”.
Referring to our people, the Athenians of the center and of the periphery we provoke them to explore the possibilities of Athens. Exploring this possibilities, we believe that they will create a new perception about their city and gradually they will be much more involved to the project, not only through volunteering actions but participate with the completion of them, either working, either promoting the identity or proposing further actions.
Referring to the global community, we invite them to explore the possibilities of Athens, to observe the changes, to understand that the city is open to opportunities for creation, for investments, for delight. Rome, Istanbul, Berlin and Barcelona are great places but Athens is something more.
Anything could happen in this city.
A escritora Raquel Ramos visitou a biblioteca para ler suas obras para os alunos. Os alunos participaram ativamente fazendo perguntas à escritora e demonstraram interesse na atividade. Eles comentaram positivamente sobre a visita da escritora.
I took photos outside to feature on the contents page of my magazine with an Autumn Style theme. I had someone take a photo of me to prove I took the photos. I had the subjects wear casual, warm clothes that are common in autumn as it is a cold month. For the contents page image, I chose a photo of them jumping to look more fun and show more of their clothes to match the Autumn Style theme.
For the cover photoshoot, I had Thea do the same pose in two different outfits in case I chose different colors for my magazine. I took one photo in my bedroom against a pink background because I had the space. I decided to use the photo of her in blue
El documento habla sobre un nuevo proyecto de ley que se presentará ante el congreso. El proyecto de ley busca aumentar los fondos para programas de educación y reducir los impuestos a las pequeñas empresas. Si es aprobado, el proyecto de ley podría estimular el crecimiento económico.
This document provides an overview of ancient Greece, including daily life and government structures in Athens and Sparta. It also provides biographical information about Alexander the Great and details his vast empire. The document contains 9 slides covering Athens and Sparta with descriptions of daily routines and how each city-state was governed. It also includes 2 slides on Alexander the Great's early life and his conquests across Europe and Asia to form one of the largest empires in the ancient world. Sources are listed at the end.
The document discusses the importance of renewable energy and describes a new solar panel technology that is more efficient and affordable than previous versions. This innovative solar technology can help reduce carbon emissions by providing a cheaper source of renewable energy to power homes and businesses.
Rondas campesinas edición especial venceremos cajamarcaTania Roja
- Presente y futuro de las Rondas Campesinas
- Las Rondas Campesinas y sus características más importantes
- Estatuto de las Rondas Campesinas-Urbanas e Indígenas del Perú (Primeros títulos del Estatuto de la CUNARC-Perú)
Silbo innovation communication startup changementSilbo
Silbo, la communication des innovateurs et des entrepreneurs du changement.
Silbo est un cabinet conseil pour tous les communicants qui souhaitent innover et les acteurs de l’innovation qui souhaitent mieux communiquer (start-ups, grandes entreprises, entrepreneurs sociaux).
Les savoir-faire de Silbo :
Nos savoir-faire :
• Inspiration : études/audits, revues de tendances et d’innovation, learning expeditions…
• Créativité : co-création et intelligence collective, design de stratégies et de plateformes
de communication
• Activation : co-pilotage et mise en en œuvre de campagnes innovantes (influence, brand content, digital…), choix de partenaires & d’outils, évaluation & mesure
• Formation : créativité, transformation digitale, management de la communication
O documento discute conceitos de polaridade de ligações químicas, geometria molecular e polaridade de moléculas. É dividido em seções onde alunos explicam esses tópicos de forma concisa, com exemplos ilustrativos.
This document describes a plugin developed for the AWARE framework that estimates the indoor or outdoor location type of a mobile device using its on-board sensors. The plugin analyzes data from the accelerometer, magnetometer, light sensor, location sensor, and battery to infer the location type. It is moderately battery efficient, consuming between 3-10% of total device battery. The plugin stores location data and inferences in a database and displays updates every 3 minutes. It uses sensor data and established boundaries to assign weightings to indoor or outdoor predictions and sums the weights to determine the overall location type. The plugin was evaluated using real sensor data and boundaries were adjusted until it accurately inferred location in over 60% of tests.
The document discusses hardware Trojan detection techniques. It describes the objective of detecting Trojans in circuits by analyzing power and delay. It then discusses different Trojan detection techniques like power measurement, path delay measurement, and physical design based testing. It also describes different types of hardware Trojans and provides implementation results of detecting Trojans in circuits like an 8:1 MUX and full adder using LBIST. LBIST was also implemented in an AES core to detect Trojans, achieving high test coverage while detecting minimal changes in area and power between Trojan-free and Trojan-inserted circuits.
This document discusses differential power analysis (DPA) attacks against cryptographic devices. It begins with background on side-channel attacks in general and then defines simple power analysis and differential power analysis attacks specifically. It describes the stages of a typical DPA attack, including device instrumentation to collect power traces, prediction and selection functions to group traces, averaging traces in subsets, and evaluating the results to extract secrets. An example DPA attack on a FPGA decrypting triple DES is given. Finally, common countermeasures like balancing and masking are outlined to prevent leakage of secrets via power analysis.
Breaching of Ring Oscillator Based Trojan Detection and Prevention in Physica...idescitation
Trojan insertion has been made difficult in modern communications in the
recent years, due to extensive research work in the direction to protect Integrated Circuits
(ICs). Several Trojan detection techniques have been developed to prevent the destruction
caused by malicious insertion of Trojan in physical layer, making the process of Trojan
insertion much more difficult. In this paper, we highlight our major findings in terms of
innovative Trojan design that can easily evade existing Trojan detection approaches based
on side-channel analysis. We propose a design that makes Trojan undetectable for known
defense benchmarks and during functional testing. We demonstrate our Trojan model and
validate the results on a known defense mechanism. We also present a novel detection
mechanism for the same proposed Trojan model. The experimental results are presented
using Xilinx Place and Route characteristics, in particular, the Floorplanner tool to identify
the Trojan and address such problems.
This document describes a project to accelerate a stochastic disease spread simulation algorithm by implementing it on an FPGA system. It begins with an introduction explaining how FPGAs can provide parallel processing benefits over traditional CPUs. It then details the design and implementation of a stochastic SIR disease spread model on an FPGA, including generating random networks in MATLAB, designing hardware blocks for individuals, and using a VGA display to output results. Software simulations in MATLAB were used to test the algorithm design. The FPGA implementation matched the MATLAB results, and further verification tests confirmed the FPGA output was identical when using the same random number generator seeds. The project demonstrated successfully mapping a stochastic algorithm to run in hardware on an FPGA.
Automatic Object Detection and Target using Ultrasonic SensorIRJET Journal
The document describes an automatic object detection and targeting system using ultrasonic sensors. The system is intended to secure border areas by reducing human effort and increasing response time and precision. It uses an ultrasonic sensor to detect objects, determines the distance, and then automatically targets the object's position. The system is mounted on a robot that moves and rotates using stepper motors controlled by a microcontroller. When an object is detected, the ultrasonic sensor sends signals to the microcontroller which processes the data and activates a laser targeting mechanism. The system is capable of detecting objects from 2-400cm away with 3mm accuracy.
Robust Fault-Tolerant Training Strategy Using Neural Network to Perform Funct...Eswar Publications
This paper is intended to introduce an efficient as well as robust training mechanism for a neural network which can be used for testing the functionality of software. The traditional setup of neural network architecture is used constituting the two phases -training phase and evaluation phase. The input test cases are to be trained in first phase and consequently they behave like normal test cases to predict the output as untrained test cases. The test oracle measures the deviation between the outputs of untrained test cases with trained test cases and authorizes a final decision. Our framework can be applied to systems where number of test cases outnumbers the
functionalities or the system under test is too complex. It can also be applied to the test case development when the modules of a system become tedious after modification.
This document describes a master's thesis that designed a real-time telemetry system called BANET for monitoring mobile objects in groups. The system consists of sensing devices attached to objects, a group of monitored objects, and a monitoring application. Key design factors were the tendency of objects to form groups and their mobility. The innovative aspect of the system is that it supports group behavior by having neighboring objects form clusters with clusterheads that send aggregated data, improving performance over individual reporting. The thesis studied clustering algorithms and wireless technologies to design the network architecture. A prototype implementation including sensor nodes, server, and monitoring application was developed and experiments showed that clustering can significantly reduce data transmission costs for monitoring mobile groups in real-time.
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...ijwmn
From one side, sensor manufacturing technology and from other side wireless communication technology
improvement has an effect on the growth and deployment of Wireless Network Sensor (WSN). The
appropriate performance of WSN has abundant necessity which has dependent on the different parameters
such as optimize sensor placement and structure of network sensor. The optimized placement in WSN not
only would optimize number of sensors, but also help to reach to the more precise information. Therefore
different solutions are proposed to reduce cost and increase life time of sensor networks that most of them
are concentrated in the field of routing and information transmission. In this paper, places which they need
new sensors placement or sensor movements are determined and then with applying these changes,
performance of WSN will calculate. To achieve the optimum placement, the network should evaluate
precisely and effective criteria on the performance should extract. Therefore the criteria should be ranked
and after weighting with using AHP algorithms, with use of Geographical Information System (GIS), these
weighted criteria will combined and in the locations which WSN doesn’t have enough performance, new
sensor placement will create. New proposed method, improve 21.11% performance of WSN with sensor
placement in the low performance locations. Also the number of added sensor is 26.09% which is lowest
number of added sensors in comparison with other methods.
This thesis examines integrated optical realizations of qudits for quantum cryptography. The document is Thomas Balle's master's thesis submitted to the University of Aarhus. It provides background on quantum cryptography and discusses the design and characterization of integrated optical chips to encode photons for a quantum cryptography system based on the B92 protocol. The thesis also describes experiments conducted to test the chips and suggests improvements to the system.
This document discusses multisensor data fusion for defense applications. It describes data fusion as integrating data from multiple sensors to provide a more complete picture than from individual sensors alone. Some key defense applications discussed include surveillance, intelligence analysis, and missile guidance systems. The document also provides an example of using a Kalman filter for multisensor data fusion to estimate the state of a moving target tracked by multiple sensors.
Τhe economic crisis in Greece in recent years, combined with the weakness or non-selection for a form of a national strategy that is consistent with international developments, has negatively affected the Athens role in the international trend, that is followed by most cities abroad. But the emerging initiatives like the Re-launching Athens project, the Re- think project, the Niarchos project, the awarded start ups, the volunteerism, the creativity of the cultural sector are elements and actions which reveal that Athens is following global trends and starts to form a role .
We have action with participative collaboration and we have values and we have also cultural venues to enjoy.
That is now our story and we ought to promote it.
But is this the competitive advantage of Athens?
The advantage of the city is that it forms gradually a cluster of culture, of creative start ups and of volunteering participation.
In order our story to be unfolded—and that will not happen in a glance– we need our people to believe in it, because they are our ambassadors. According to Charles Landry, “creativity is the backbone of the city, and the critical resource is their people. It is the intelligence, the vitality, the imagination and most of all the creativity of people that feed the history. Indeed, the intensity of this creative power and its exploitation, is the key that will determine the progress and manage the sustainability of each city”.
Referring to our people, the Athenians of the center and of the periphery we provoke them to explore the possibilities of Athens. Exploring this possibilities, we believe that they will create a new perception about their city and gradually they will be much more involved to the project, not only through volunteering actions but participate with the completion of them, either working, either promoting the identity or proposing further actions.
Referring to the global community, we invite them to explore the possibilities of Athens, to observe the changes, to understand that the city is open to opportunities for creation, for investments, for delight. Rome, Istanbul, Berlin and Barcelona are great places but Athens is something more.
Anything could happen in this city.
A escritora Raquel Ramos visitou a biblioteca para ler suas obras para os alunos. Os alunos participaram ativamente fazendo perguntas à escritora e demonstraram interesse na atividade. Eles comentaram positivamente sobre a visita da escritora.
I took photos outside to feature on the contents page of my magazine with an Autumn Style theme. I had someone take a photo of me to prove I took the photos. I had the subjects wear casual, warm clothes that are common in autumn as it is a cold month. For the contents page image, I chose a photo of them jumping to look more fun and show more of their clothes to match the Autumn Style theme.
For the cover photoshoot, I had Thea do the same pose in two different outfits in case I chose different colors for my magazine. I took one photo in my bedroom against a pink background because I had the space. I decided to use the photo of her in blue
El documento habla sobre un nuevo proyecto de ley que se presentará ante el congreso. El proyecto de ley busca aumentar los fondos para programas de educación y reducir los impuestos a las pequeñas empresas. Si es aprobado, el proyecto de ley podría estimular el crecimiento económico.
This document provides an overview of ancient Greece, including daily life and government structures in Athens and Sparta. It also provides biographical information about Alexander the Great and details his vast empire. The document contains 9 slides covering Athens and Sparta with descriptions of daily routines and how each city-state was governed. It also includes 2 slides on Alexander the Great's early life and his conquests across Europe and Asia to form one of the largest empires in the ancient world. Sources are listed at the end.
The document discusses the importance of renewable energy and describes a new solar panel technology that is more efficient and affordable than previous versions. This innovative solar technology can help reduce carbon emissions by providing a cheaper source of renewable energy to power homes and businesses.
Rondas campesinas edición especial venceremos cajamarcaTania Roja
- Presente y futuro de las Rondas Campesinas
- Las Rondas Campesinas y sus características más importantes
- Estatuto de las Rondas Campesinas-Urbanas e Indígenas del Perú (Primeros títulos del Estatuto de la CUNARC-Perú)
Silbo innovation communication startup changementSilbo
Silbo, la communication des innovateurs et des entrepreneurs du changement.
Silbo est un cabinet conseil pour tous les communicants qui souhaitent innover et les acteurs de l’innovation qui souhaitent mieux communiquer (start-ups, grandes entreprises, entrepreneurs sociaux).
Les savoir-faire de Silbo :
Nos savoir-faire :
• Inspiration : études/audits, revues de tendances et d’innovation, learning expeditions…
• Créativité : co-création et intelligence collective, design de stratégies et de plateformes
de communication
• Activation : co-pilotage et mise en en œuvre de campagnes innovantes (influence, brand content, digital…), choix de partenaires & d’outils, évaluation & mesure
• Formation : créativité, transformation digitale, management de la communication
O documento discute conceitos de polaridade de ligações químicas, geometria molecular e polaridade de moléculas. É dividido em seções onde alunos explicam esses tópicos de forma concisa, com exemplos ilustrativos.
Campus Party Mexico 2016 - Realidad Virtual - El mundo visto con otros ojosMaia Kord
Recorrido sobre las bases donde surge esta nueva tecnología de la cual todos hablan. Conocerás los distintos dispositivos de realidad virtual y las empresas que los impulsan. Les compartiré mi visión sobre cómo generar experiencias más inmersivas combinando motions controllers y realidad aumentada.
Tomato pest insects A Lecture By Allah Dad Khan Provincial Coordinator IPM MI...Mr.Allah Dad Khan
1. The document provides information on 19 different insect pests that affect tomatoes. It describes the symptoms and signs of each pest and recommends various control methods including chemical pesticides, cultural practices like crop rotation and tillage, and biological controls using predators and parasites. Common tomato insect pests discussed include fruitworms, whiteflies, aphids, flea beetles, cutworms, hornworms, and nematodes. A variety of treatment options are presented for each pest ranging from insecticides to trapping and handpicking.
The Indian Dental Academy is the Leader in continuing dental education , training dentists in all aspects of dentistry and
offering a wide range of dental certified courses in different formats.for more details please visit
www.indiandentalacademy.com
An overview of atypical anti depressantsBrajesh Lahri
This powerpoint presentation deals with the pharmacology and psychiatric uses of atypical anti-depressants. TCAs and SSRIs are considered as typical anti-depressants, while other classes include SNRI, RIMAs and atypical antidepressants. In this presentation, i have briefly given an overview of atypical anti-depressants as well as of SNRIs and RIMAs.
The document summarizes and analyzes 4 advertisements. [1] A Coca Cola commercial uses a song sung by kids to convey hope. [2] A Brussels Airlines ad shows personalized customer service helping a father during a flight. [3] An anti-smoking PSA by O&M features actual smokers reacting to a warning. [4] A Krazy Glue print ad surprises viewers by sticking a doorknob on upside down. The document examines the theme, target audience, and core proposition of each ad.
Project Based Learning involves students answering complex questions or solving problems through an extended inquiry process. It shifts instruction from teacher-centered to student-centered, with students working on rigorous projects that help them develop key academic and life skills. This model makes learning more relevant by connecting it to real-world issues. Teachers take on the roles of coach and facilitator to build relationships with students. Examples of PBL include constructing board games to showcase content knowledge, making models and diagrams, and creating edible replicas of scientific concepts using everyday objects like food.
Este documento contiene un examen de geometría y trigonometría compuesto por 44 preguntas de opción múltiple sobre diferentes temas como ángulos, triángulos, polígonos y trapecios. El examen forma parte de la práctica número 1 de la asignatura Gestión II del curso prefacultativo 2012 de la Facultad de Ciencias y Tecnología de la Universidad Mayor de San Simón.
Polymorphism and crystallisation : The mysterious phenomenonMadhulika Harde
This document discusses crystallization and polymorphism in the pharmaceutical industry. It begins with basic concepts of crystallization and factors that influence crystallization such as concentration and supersaturation. It then discusses new trends in crystallization techniques like capillary, laser-induced, and sonocrystallization. The document also covers polymorphism, how to characterize different polymorphs, how physical and chemical properties can vary between polymorphs, and challenges polymorphism can present in drug development like changing bioavailability. Case studies on drugs like ritonavir and ranitidine hydrochloride are discussed to show real examples of issues that emerged from polymorphism.
This document presents research on inducing faults in an ARM9 general purpose CPU through undervolting. It characterizes the fault model and induced errors. It is shown that undervolting gradually increases faulty computations. In a specific voltage range, most faulty computations are caused by single faults. Experimental attacks are presented on AES and RSA implementations, validating the practical ability to break ciphers with this fault injection technique. For AES, a new key recovery attack is presented. For RSA, a new plaintext recovery attack from a correct and faulty ciphertext is shown.
This document proposes a novel methodology for integrating on-chip power noise measurement (OCM) into the standard testing flow for hardware security and trust evaluation. It demonstrates that OCM provides higher quality side-channel traces than traditional measurement methods. It then proposes for the first time using OCM to establish a standard side-channel measurement setup, and provides a methodology to integrate hardware security and trust validation into the standard testing process using OCM.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...VLSICS Design
Time and efforts for functional testing of digital logic is big chunk of overall project cycle in VLSI industry. Progress of functional testing is measured by functional coverage where test-plan defines what needs to be covered, and test-results indicates quality of stimulus. Claiming closer of functional testing requires that functional coverage hits 100% of original test-plan. Depending on the complexity of the design, availability
of resources and budget, various methods are used for functional testing. Software simulations using various logic simulators, available from Electronic Design Automation (EDA) companies, is primary method for functional testing. The next level in functional testing is pre-silicon verification using Field
Programmable Gate Array (FPGA) prototype and/or emulation platforms for stress testing the Design Under Test (DUT). With all the efforts, the purpose is to gain confidence on maturity of DUT to ensures first time silicon success that meets time to market needs of the industry. For any test-environment the
bottleneck, in achieving verification closer, is controllability and observability that is quality of stimulus to unearth issues at early stage and coverage calculation. Software simulation, FPGA prototype, or emulation, each method has its own limitations, be it test-time, ease of use, or cost of software, tools and
hardware-platform. Compared to software simulation, FPGA prototyping and emulation methods pose greater challenges in quality stimulus generation and coverage calculation. Many researchers have identified the problems of bug-detection / localization, but very few have touched the concept of quality
stimulus generation that leads to better functional coverage and thereby uncover hidden bugs in FPGA prototype verification setup. This paper presents a novel approach to address above-mentioned issues by embedding synthesizable active-agent and coverage collector into FPGA prototype. The proposed
architecture has been experimented for functional and stress testing of Universal Serial Bus (USB) Link Training and Status State Machine (LTSSM) logic module as DUT in FPGA prototype. The proposed solution is fully synthesizable and hence can be used in both software simulation as well as in prototype system. The biggest advantage is plug and play nature of this active-agent component, that allows its
reusability in any USB3.0 LTSSM digital core.
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...VLSICS Design
This document describes a proposed architecture for functional testing of a USB Link Training and Status State Machine (LTSSM) logic module using a synthesizable active agent embedded in an FPGA prototyping system. The active agent controls stimulus generation and injects errors to target time-sensitive link training and low power states. It also includes a coverage collector to provide observability for closed-loop functional testing. The active agent is fully synthesizable, making it reusable for both software simulation and FPGA prototyping. Experimental results showed the architecture was able to better generate stimuli and improve functional coverage for stress testing the LTSSM module.
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...VLSICS Design
Time and efforts for functional testing of digital logic is big chunk of overall project cycle in VLSI industry. Progress of functional testing is measured by functional coverage where test-plan defines what needs to be covered, and test-results indicates quality of stimulus. Claiming closer of functional testing requires that functional coverage hits 100% of original test-plan. Depending on the complexity of the design, availability of resources and budget, various methods are used for functional testing. Software simulations using various logic simulators, available from Electronic Design Automation (EDA) companies, is primary method for functional testing. The next level in functional testing is pre-silicon verification using Field Programmable Gate Array (FPGA) prototype and/or emulation platforms for stress testing the Design Under Test (DUT). With all the efforts, the purpose is to gain confidence on maturity of DUT to ensuresfirst time silicon success that meets time to market needs of the industry. For any test-environment the bottleneck, in achieving verification closer, is controllability and observability that is quality of stimulus to unearth issues at early stage and coverage calculation. Software simulation, FPGA prototype, or emulation, each method has its own limitations, be it test-time, ease of use, or cost of software, tools and
hardware-platform. Compared to software simulation, FPGA prototyping and emulation methods pose greater challenges in quality stimulus generation and coverage calculation. Many researchers have identified the problems of bug-detection / localization, but very few have touched the concept of quality stimulus generation that leads to better functional coverage and thereby uncover hidden bugs in FPGA prototype verification setup. This paper presents a novel approach to address above-mentioned issues by embedding synthesizable active-agent and coverage collector into FPGA prototype. The proposed architecture has been experimented for functional and stress testing of Universal Serial Bus (USB) Link Training and Status State Machine (LTSSM) logic module as DUT in FPGA prototype. The proposed solution is fully synthesizable and hence can be used in both software simulation as well as in prototype system. The biggest advantage is plug and play nature of this active-agent component, that allows its reusability in any USB3.0 LTSSM digital core.
1. Power analysis attacks target specific implementations of cryptographic algorithms by studying their power consumption patterns. Differential power analysis (DPA) is a powerful technique that can reveal secret keys.
2. To prevent DPA, algorithms must be modified such that intermediate values are "masked" with random data and all operations take the same time and power regardless of inputs. Hardware implementations have less variable power consumption than software but are not always possible.
3. DPA works by dividing power measurements from multiple operations into sets based on key or plaintext/ciphertext values and using statistics to detect correlations that reveal secrets. Preventing DPA requires algorithms where operations occur on "blinded" data related by a mathematical function.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios.
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...chennaijp
We are good IEEE java projects development center in Chennai and Pondicherry. We guided advanced java technologies projects of cloud computing, data mining, Secure Computing, Networking, Parallel & Distributed Systems, Mobile Computing and Service Computing (Web Service).
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/java-projects/
IRJET- Real Time Implementation of Air WritingIRJET Journal
This document presents a system for real-time control of industrial devices through hand gestures from a remote location using a wireless system. The system uses a camera and microcontroller to detect when a red pointer is brought near different quadrants, representing different devices, and switches the corresponding device on or off. It was implemented using MATLAB and allows controlling systems wirelessly with accuracy while saving power through a simple circuit. The system provides remote management of devices without physical operation and could potentially be expanded to control additional parameters like speed or duration of operation.
Performance Analysis of multithreaded applications based on Hardware Simulati...Maria Stylianou
The document discusses performance analysis of multithreaded applications using two hardware simulation tools: Dimemas and Pin. Dimemas is used to simulate the effect of latency, network bandwidth, number of buses, and processor speed on application execution time. Pin is used to simulate cache hierarchies and study the impact of cache size, line size, associativity, cluster size, and number of processors. The results show that application performance is most sensitive to latency below 1000ns, bandwidth below 1000MB, and number of buses at 2. Cache hit rates generally increase with larger cache sizes.
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET Journal
This document proposes a low-cost and energy-efficient solution to detect replica nodes in static wireless sensor networks. Existing solutions require expensive hardware like GPS receivers, but the proposed solution does not need any additional hardware. It uses Bloom filters and a sequential delivery algorithm to detect replicas. Through simulations, the proposed solution shows similar or better replica detection performance compared to existing solutions, while consuming less energy in most cases. The solution aims to provide an efficient and low-cost replica detection system for wireless sensor networks.
Reproducible Emulation of Analog Behavioral Modelsfnothaft
1) Analog behavioral models are abstracted using SystemVerilog real numbers to allow simulation in digital emulation environments with higher throughput.
2) Key challenges to emulating analog models include converting floating-point implementations to fixed-point and handling high sampling rates in filters.
3) The document describes techniques used by Broadcom to synthesize analog behavioral models for emulation, including pragmas for sensitivity analysis and parallelizing filters.
Acceleration of stochastic algorithm on fpga systemSheela ArokiaMary
This document describes a project to accelerate a stochastic disease spread simulation algorithm by implementing it on an FPGA system. It first designs a MATLAB simulation of a basic Susceptible-Infected-Recovered (SIR) disease model. It then implements the algorithm on three FPGAs using a hardware-compatible discrete version. The FPGA implementation generates random networks using MATLAB and displays results on a VGA screen in real-time. Verification shows the FPGA results match the MATLAB simulation, validating the hardware implementation.
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...IRJET Journal
The document summarizes research on Embedded Deterministic Test (EDT) logic insertion's impact on VLSI designs. Key findings include:
1) EDT insertion enhances test and fault coverage, but also increases the number of test patterns required.
2) There are significant shifts in fault sub-classes like untestable faults and tied cells after EDT insertion, highlighting its nuanced effects.
3) Results provide empirical evidence for designers to optimize testability by strategically integrating EDT logic.
Fault diagnosis of a high voltage transmission line using waveform matching a...ijsc
This paper is based on the problem of accurate fault diagnosis by incorporating a waveform matching technique. Fault isolation and detection of a double circuit high voltage power transmission line is of immense importance from point of view of Energy Management services. Power System Fault types namely single line to ground faults, line to line faults, double line to ground faults etc. are responsible for transients in current and voltage waveforms in Power Systems. Waveform matching deals with the approximate superimposition of such waveforms in discretized versions obtained from recording devices and Software respectively. The analogy derived from these waveforms is obtained as an error function of voltage and current, from the considered metering devices. This assists in modelling the fault identification as an optimization problem of minimizing the error between these sets of waveforms. In other words, it utilizes the benefit of software discrepancies between these two waveforms. Analysis has been done using the Bare Bones Particle Swarm Optimizer on an IEEE 2 bus, 6 bus and 14 bus system. The performance of the algorithm has been compared with an analogous meta-heuristic algorithm called BAT optimization on a 2 bus level. The primary focus of this paper is to demonstrate the efficiency of such methods and state the common peculiarities in measurements, and the possible remedies for such distortions.
Complex Test Pattern Generation for high speed fault diagnosis in FPGA based ...IJMERJOURNAL
ABSTRACT: The memory blocks testing is a separate testing procedure followed in VLSI testing. The memory block testing involves writing a specific bit sequences in the memory locations and reading them again. This type of test is called March test. A particular March test consists of a sequence of writes followed by reads with increasing or decreasing address. For example the March C- test has the following test pattern. There are several test circuits available for testing the memory chips. However no test setup is developed so far for testing the memory blocks inside the FPGA. The BRAM blocks of FPGA are designed to work at much higher frequency than the FPGA core logic. Hence testing the BRAMs at higher speed is essential. The conventional memory test circuits cannot be used for this purpose. Hence the proposed work develops a memory testing tool based on March tests for FPGA based BRAM (block RAM testing). The code modules for March test generator shall be developed in VHDL and shall be synthesized for Xilinx Spartan 3 Family device. A PC based GUI tool shall send command to FPGA using serial port for selecting the type of test. The FPGA core gets the command through UART and performs the appropriate and sends the test report back to PC. The results shall be verified in simulation with Xilinx ISE simulator and also in hardware by using Chip scope. Xilinx Spartan 3 family FPGA board shall be used for hardware verification of the developed March test generator
Complex Test Pattern Generation for high speed fault diagnosis in FPGA based ...
Final Paper
1. 1
Fault Injection using the Raspberry Pi 3 Computer
Colby Stanley
Department of ECE
Duke University
Durham, NC 27701
cts20@duke.edu
Abstract
Throughout this project, multiple
means of fault injection are explored using a
Raspberry Pi 3 computer as the test bed.
The two major sets of fault injection
experiments are electromagnetic fault
injection and magnetic fault injection. The
presence of a fault is determined based on
what is expected to be in the SRAM versus
what is read out of the SRAM of the CPU of
the device after each experiment. If an
unexpected value is found, such as a 0 when
a 1 was expected, this course of action is
deemed to have injected a transient fault
into the Raspberry Pi’s SRAM. The scope of
this work is limited to transient faults in
SRAM in order to have a more controlled
environment where an expected value can be
compared with the result of a test. Results
indicated that the use of commodity devices
such as wireless routers, microwaves, a
permanent neodymium magnet, and an
electromagnet are inconclusive in their
ability to inject transient faults.
1. Introduction
When developing a scheme for
tolerating faults, it is important to test the
design to determine how well the design
handles the specific scenarios it is intended
for according to its fault model. However,
this leads to the question of how can a
design be tested and how does one
determine if the tests are passed or failed.
Typically, in order to perform fault
injection, simulators running a specific
processor’s architecture are used. This
allows control over where the fault is
injected and the duration of the fault if it is
transient [1]. Simulators are useful tools for
injecting faults and testing a system’s ability
to cope with different types of faults. The
simulator, however, is only as good as the
data that the simulation is based on, and the
inputs that are used. If the simulated faults
are not realistic in terms of the portion of the
chip that is impacted, or the duration over
which a voltage spike occurs, they may not
truly test some of the main cases effectively.
Additionally, faults may be logically masked
and if careful effort is not made to determine
whether the faults are being masked, the
fault can go undetected even after significant
testing [2].
An alternative to simulating fault
injection is to inject faults using real sources
of faults on real hardware. This approach is
not as commonly used as simulation because
it is time consuming and costly. The cost of
manufacturing the hardware for the
experiment and the cost of the test
environment itself can be prohibitive [1].
This project aims to provide an alternative
by using commonly found devices that have
the potential to inject faults into real
hardware. Additionally, the data gathered
provides insight into how the Raspberry Pi
responds to fault injection of different kinds.
The Raspberry Pi is becoming more popular
for different scientific and engineering
applications, and it is important to be aware
2. 2
of its sensitivity to different types of
conditions.
There is less information that can be
found in terms of system state working with
real hardware, unless the hardware is
designed with circuitry for accessing state
information at different points. This makes it
important to first determine what is the
expected outcome of an operation in order to
have a way of comparing that which is
expected with what has occurred
experimentally. For this project, it was
useful to target the SRAM for fault injection
because the initial values can be manually
selected for each SRAM cell and compared
with the results without the need for
additional hardware storing state
information.
The following information will make
up the remainder of this paper. First, prior
work done in the field of fault injection will
be discussed as well as how it differs from
this research. Next, the experimental setup
and equipment used to perform fault
injection experiments will be discussed, and
lastly the experimental results will be
included along with a detailed explanation
proceeded with a conclusion.
2. Prior Work
Existing methods of fault injection
on real hardware rely on either hardware or
software to inject faults. Software based
fault injection can be done at compile-time
and runtime, and does not require special
equipment. This form of fault injection is
limited, though, by the portions of hardware
that can be reached through software. Fault
injection done at compile-time works by
changing certain instructions to improper
instructions simulating what would happen
if a fault changed their value. Runtime fault
injection can work similarly to compile-time
fault injection by adding code as well as the
use of interrupts and exceptions to call
functions used to inject faults. Hardware
based fault injection can be done through
contact and non-contact methods. A non-
contact method would be to bombard a chip
or component with radiation. When a
radioactive particle strikes, it can generate a
current [6]. Depending on the current
generated, a bit may be flipped. As for
contact methods of fault injection, probes
can be used to alter the current at a specific
pin. This probe based method allows for a
targeted fault injection which can be useful
for testing how a design handles specific
faults. On the contrary, methods such as
bombarding a chip with radiation can
produce more realistic tests due to the
unpredictable nature [1].
Additional methods of noncontact
fault injection include those that rely on
electromagnetic radiation including the use
of lasers to change the voltage on a wire
within a chip resulting in a bit flip. Such
forms of fault injection can be used in
testing cryptographic systems in order to test
their security. The certification of a
cryptographic system can rely on the
system’s ability to withstand fault attacks
with the intention of revealing cryptographic
information. Such testing relies on a system
using an electromagnetic probe which is
connected to a pulse generator through
which a voltage pulse is produced. The
specialized magnetic probe is intended for
targeted attacks directed at certain portions
of a chip rather than exposing the entire chip
to a magnetic field [5].
With the forms of fault injection
discussed, each has its own benefits and
drawbacks. Without removing a processor’s
cap, fault injection using a laser or an
intense pulse of light such as a camera flash
would not produce desirable results.
Similarly, applying a magnetic field to a
system that has a metal case for fault
injection would also be fruitless due to the
metal case being a Faraday cage protecting
3. 3
the CPU and other components [3].
Radiation based fault injection using a
radioactive source provides an unpredictable
means of fault injection that is more realistic
in nature. However, specialized equipment
would be needed to fire radioactive particles
at a system and its components.
With each of the possible forms of
fault injection considered, it was found that
noncontact fault injection using magnetic
fields and electromagnetic radiation would
be capable of producing realistic results
similar to that of the firing of radioactive
particles. If used without a magnetic probe
focusing the magnetic pulse to a region of
the chip or component, a magnetic field
could be produced capable of impacting the
entire chip at once. Another added benefit is
that the two chosen fault injection methods
could be achieved through the use of
commonly found items or be built with
relatively little cost.
3. Experimental Setup
The Raspberry Pi computer is
commonly referred to as a system on a chip.
Aside from the small size, there is little
difference between a Raspberry Pi and the
average personal computer. The major
differences lie in the use of a microSD card
instead of a traditional hard disk drive, and
the GPIO (General Purpose Input-Output
Connector) that can be used to power
different devices such as servos. The
Raspberry Pi 3 used for each of these
experiments ran the Linux based operating
system Raspbian version 4.4 which provided
the basic functionality for the experiments
performed. Before any significant data was
taken, it was important to develop a
consistent way of determining whether or
not an SRAM cell had been effected by the
attempt at fault injection. This was done
through a simple program written in C that
allocates space for a user selected number of
unsigned integers and stores either 1’s or 0’s
in the entire allocated space. The Raspberry
Pi’s processor is a Broadcom BCM2837
which has a 32 KB L1 cache for each of the
four cores and a shared 512 KB L2 cache.
Because each unsigned integer is 4 bytes,
each trial was performed by allocating space
for 136,000 unsigned integers to ensure that
all of the SRAM was being used. The initial
values for each of the integers are written to
one file, while the final values are written to
a separate file when the console receives
user input. Using the diff command, it was
determined whether there was a change in
the integers written to file from the SRAM
after the attempted fault injection or if the
two files remained the same [4].
3.1 Magnetic Fields
According to Faraday’s Law, the
motion of a circuit in a magnetic field, the
change of a magnetic field’s strength, and
the movement of a magnetic field in relation
to a circuit are each capable of generating a
current. This is known as electromagnetic
induction and is the driving idea behind
using an electromagnet to flip bits within
SRAM cells. By passing a magnet over the
processor in different directions, the
magnetic field has the potential to impact
the current being carried within the cache
memory or the combinational logic.
However, there are several unknowns in
regards to this approach. Because the
voltage that denotes a 1 or a 0 being held in
the cross coupled inverters of each cache
cell is not included in the Broadcom
processor’s datasheet, it is only through
experimental measures that a determination
of this voltage can be determined [3].
During the magnetic fault injection
portion of the project, several different
approaches were taken. Initially, a Uxcell
electromagnet solenoid was used with
4. 4
multiple input voltages at a fixed distance
from the processor. Also, a permanent
neodymium magnet was used which proved
to have a higher magnetic field strength than
what could be achieved with the
electromagnet. It was important for the
testing done to avoid producing any
permanent faults by shorting out pins
through contact between the board and the
magnets. This limited the proximity the
magnets could be used within with respect
to the Raspberry Pi and as a result this
limited the magnetic field strength reaching
the processor.
There are several differences
between the experimental setup for the
magnetic fault injection experiments of this
project and that of prior work including the
lack of a motorized stage [4]. Rather than
relying on a motorized stage, the magnet
was moved manually in the x, y, and z
directions. Also, the magnetic field
generated was done using an electromagnet
solenoid rather than a magnetic probe, and
the voltage was constant for each trial rather
than pulsed.
3.2 Electromagnetic Radiation
Following the testing done using
magnetic fields to inject faults,
electromagnetic radiation was explored.
Many common devices can be significant
sources of electromagnetic radiation. The
devices used were a wireless router and two
different microwave ovens. Due to the
danger of operating an open microwave, the
Raspberry Pi was placed on top of a closed
microwave during the experiments. This,
however, does not mean that there was no
microwave radiation reaching the Raspberry
Pi. A simple test showed that both
microwaves used leaked electromagnetic
radiation. The test involved placing a cell
phone inside of each microwave while they
were unplugged and monitoring its
connection to the wireless network. If the
device lost its connection to the wireless
network, this would indicate that the
microwave was well insulated and did not
leak electromagnetic radiation. However, it
was found in the case of both microwaves
that they did leak electromagnetic radiation.
Wireless routers also produce
electromagnetic radiation, however at a
lesser intensity. Testing was performed
using a wireless router alone, a wireless
router and a microwave simultaneously, and
the addition of parabolic reflectors to direct
the electromagnetic radiation from the
wireless router towards the Raspberry Pi.
These devices were used over different
durations and in different combinations in an
attempt to inject transient faults.
4. Experimental Results and Analysis
The first experiments performed
were using the electromagnet at different
operating voltages/currents at a fixed
distance from the Raspberry Pi. At each
input voltage, the magnet was moved
manually in the x, y, and z directions
relative to the Raspberry Pi’s processor
(shown in Figure 1).
Also, along with a variable voltage for
electromagnet, each trial was performed
with the SRAM full of 1’s and the SRAM
X
Y
Z
Figure 1: (The z axis is coming out of the page)
5. 5
full of 0’s in order to account for the
induction flipping bits in one direction more
easily than another. The electromagnet is
rated for 12 volts DC. Nonetheless, without
knowing the permeability of the core’s
material and the number of turns of
magnetic wire it was impossible to calculate
the magnetic field strength of the magnet.
All that is known is the magnet’s lifting
force is 50kg when operated at its threshold
voltage according to its documentation. The
electromagnet was operated at each voltage
between 0 and 12 volts for a total of 24
trials. Some work was done operating the
electromagnet beyond its rated voltage, but
the magnet became dangerously hot. It was
found that with the magnet used along with
the experimental setup that transient faults
could not be injected. One major issue is the
distance between the electromagnet and the
Raspberry Pi’s processor. This distance was
maintained in order to keep the
electromagnet from contacting pins and
shorting them out. Magnetic field strength is
dependent on the distance from the
electromagnet itself, therefore by having this
gap distance between the electromagnet and
the processor the magnetic field strength
reaching processor was reduced [3].
Additionally, a cylindrical
neodymium magnet with a 13,500 Gauss
internal magnetic field strength was tested in
a similar fashion. However, due to the
permanent magnet’s size, the magnet could
be placed against the Raspberry Pi’s
processor rather than at a fixed distance.
This proximity along with the noticeably
more powerful magnetic field generated by
the permanent magnet created what was
thought to be better conditions for
performing fault injection. After performing
trials with the SRAM full of 1’s and then
0’s, it was found that just as with the
electromagnet no bits were flipped in the
caches of the Raspberry Pi.
Next, the use of electromagnetic
radiation from a microwave and a wireless
router were tested. Trials were done with the
microwave and wireless router individually.
Below in Figure 2, the table shows the
various setups that were used in the hopes of
isolating the change that caused enough
electromagnetic radiation exposure to flip
bits within the Raspberry Pi. Each of the
tests in the following figure were performed
with the Raspberry Pi’s cache being filled
with 1’s and then with 0’s.
Microwave Router Parabolic
Reflectors
Duration
(Minutes)
X 10
X 60
X X 60
X X 10
X X X 10
Figure 2: Experimental setup combinations
for electromagnetic fault injection
The duration in Figure 2 is the
duration for which the Raspberry Pi was
exposed to the sources of electromagnetic
radiation before the resulting data was
collected. It was found that regardless of the
experimental setup used, the Raspberry Pi
functioned normally and the data read out of
the caches showed no flipped bits. An
important aside is that the duration the
microwave was run was limited by the time
it took for ice to become boiling water. It is
unsafe to run a microwave oven empty as it
can damage it, therefore ice was used as a
simple solution for running the microwave
for extended periods of time without harm.
One possible reason for the results
attained through both methods of fault
injection is that the induced current due to
the magnet/electromagnet and the
electromagnetic fields were not great
enough to change the system’s state.
Therefore, the use of more powerful sources
of induction such as a more powerful
6. 6
electromagnet and power supply or
microwave emission device that is without
shielding that limits the amount of
electromagnetic radiation reaching the target
device. Also, longer durations of exposure to
the sources of electromagnetic radiation may
increase the chance of transient faults being
injection.
In terms of the Raspberry Pi’s
resistance to fault injection techniques, the
results show that it would take a greater
magnetic field strength than 13,500 Gauss to
produce a transient fault, and that wireless
routers and microwaves do not produce
enough electromagnetic radiation to readily
impact the processor’s state. Both of these
pieces of information are helpful in
developing future experiments for injecting
faults into the Raspberry Pi and they
demonstrate the device’s ability to withstand
various forms of fault injection.
5. Conclusion
There were two major objectives in
this paper, the first of which being to
develop a method of fault injection using
magnets, wireless routers, and microwaves
instead of costly specialized equipment that
is typically used when performing hardware
based fault injection. The second objective
was to study the Raspberry Pi’s ability to
tolerate these sources of fault injection.
Raspberry Pi computers are becoming more
popular for many projects, therefore the
ability of the device to withstand common
sources of faults is beneficial. It was found
that with the experimental setup used it is
not likely that a Raspberry Pi under similar
conditions would experience a transient
fault. However, even though there were no
detected faults in the data readout from the
device’s SRAM, this does not mean that
transient faults did not exist in the device’s
DRAM or combinational logic as a result of
the testing. Transient faults in combinational
logic could be logically masked, and any
transient error in DRAM may not be a value
that is used by the system again.
This paper demonstrates a repeatable
experimental setup for testing multiple
forms of fault injection that could be built
upon. By making use of commonly found
items, the provided setup attempts to reduce
the need for specialized equipment, thereby
making non-contact, hardware based fault
injection a more appealing choice when
testing a system’s ability to handle faults.
Future work could demonstrate this low-cost
approach to fault injection as an effective
alternative that provides realistic faults on
par with the use of radioactive particles.
6. Future Work
Moving forward, one major
improvement that could be made is building
an electromagnet specifically for the
purpose of injecting faults. Some work was
done to gather the materials such as
magnetic wire and a ferromagnetic core,
however finding a suitable power source
hindered the efforts to take experimental
data using this more powerful magnet.
Additionally, using a voltage pulse with the
electromagnet could be beneficial as well.
An issue discovered with the electromagnet
used is the heat that is generated, therefore
reducing the time over which the current is
running through the magnetic wire would
aid in the reduction of temperature of the
electromagnet.
Another avenue would be the use of
more powerful permanent magnets, but one
of the determining factors in how powerful a
permanent magnet is its size. Larger
magnets would be more cumbersome to pass
over the Raspberry Pi’s processor and the
larger dimensions might require a larger gap
between the magnet and the Raspberry Pi to
avoid contacting the GPIO pins. This could
defeat the purpose of having a more
7. 7
powerful magnet because the magnetic field
strength decreases proportionally to the
distance from the magnetic core [3]. With
that in mind, the motivations behind using a
small electromagnetic magnetic probe
controlled with short voltage pulses over a
traditional electromagnet or permanent
magnet become apparent as it is better suited
for use with sensitive electronic devices.
References
[1] Hsueh, M., Tsai, T. K., & Iyer, R. K.
(1997, April). Fault Injection Techniques
and ... - ece.cmu.edu. Retrieved November
1, 2016, from
https://www.ece.cmu.edu/~ece749/docs/faul
tInjectionSurvey.pdf
[2] Shivakumar, P., Kistler, M., Keckler, S.,
Burger, D., & Alvisi, L. (n.d.). Modeling the
effect of technology trends on the soft error
rate of combinational logic. Proceedings
International Conference on Dependable
Systems and Networks. 2002
[3] Griffiths, D. J. (2003). Introduction to
electrodynamics (4th ed.). Pearson.
[4] Raspberry Pi Hardware. (n.d.). Retrieved
November 7, 2016, from
https://www.raspberrypi.org/documentation/
hardware/raspberrypi/README.md
[5] Dehbaoui, A., Dutertre, J., Robinson, B.,
Orsatelli, P., Maurine, P., & Tria, A. (n.d.).
Injection of transient faults using
electromagnetic pulses Practical results on a
cryptographic system. Retrieved from
https://www.researchgate.net/profile/Bruno_
Robisson/publication/267407641_Injection_
of_transient_faults_using_electromagnetic_
pulses_Practical_results_on_a_cryptographi
c_system/links/546278520cf2cb7e9da64fe1.
pdf
[6] Ziegler, J. F., Curtis, H. W., Muhlfeld,
H. P., Montrose, C. J., Chin, B., Nicewicz,
M., . . . Wahaus, C. W. (1996). IBM
experiments in soft fails in computer
electronics (1978–1994). IBM Journal of
Research and Development, 40(1), 3-18.
doi:10.1147/rd.401.0003