-
16541
Load-to-store: exploit the time leakage of store buffer transient window
Published 2023-04-01“…To research the vulnerability of modern microarchitecture and consider the mitigation, memory order buffer which was responsible for managing the execution order of memory access instructions was analyzed and found that load forward would directly bypass the data of dependent store instructions to load instructions, and speculative load would execute independent load instructions in advance.While bring efficiency optimizations, it might also lead to errors and corresponding blocking.The existing optimization mechanisms on the Intel Coffee Lake microarchitecture, and the leak attack scheme by using them were analyzed.Using the four execution modes of MOB and the corresponding duration, a variety of attacks were constructed including transient attack, covert channel, and recovery of the private key of the cryptographic algorithm.The time difference caused by MOB was used to leak the address of memory instructions, and the implementation of AES T table was attacked.Key recovery experiments were conducted on AES-128 with OpenSSL 3.0.0 on an Intel i5-9400 processor.The experimental results show that 30 000 sets of samples can recover a key byte with a probability of 63.6%.Due to the characteristics of memory order buffer, the concealment of the exploit is better than traditional cache time leaks.…”
Get full text
Article -
16542
An Investigation of the Feasibility of Feedstock to Support the UK’s Sustainable Aviation Fuel Goals
Published 2025-01-01“…These findings are fed into a novel weighting algorithm that is designed to assess a number of factors, including various technical characteristics and feasibility studies, as well as produce a detailed outlook of the future potential of each fuel blend. …”
Get full text
Article -
16543
Modeling and Dynamical Analysis of the Water Resources Supply-Demand System: A Case Study in Haihe River Basin
Published 2014-01-01“…Then, the gray code hybrid accelerating genetic algorithm (GHAGA) is adopted to identify the unknown parameters of the system based on the statistic data (1998–2009). …”
Get full text
Article -
16544
Cognitive Optimization in Assistive Living System Development
Published 2012-01-01“…Support for this approach stems from the artificial intelligence field where optimization is considered to be a critical aspect of cognition, and from the similarity between the performance metrics for the two problem domains. A search algorithm is developed using the bracketing and gradient methods as inherited knowledge. …”
Get full text
Article -
16545
Gear Fault Diagnosis Based on APIT-SA-MEMD and FLLE
Published 2022-11-01“…To solve this problem, an intelligent fault diagnosis method based on adaptive projection intrinsically transformation sine-assisted multivariate empirical mode decomposition (APIT-SA-MEMD) and Floyd local linear embedding (FLLE) algorithm is proposed. Multivariate empirical mode decomposition of adaptive projection intrinsically transformation has modal aliasing phenomenon, so APIT-SA-MEMD is proposed to reduce the modal aliasing phenomenon existing in traditional empirical mode decomposition. …”
Get full text
Article -
16546
Using rule association to generate data collection policies
Published 2021-10-01“…Collecting security-related data of devices effectively is the foundation of analyzing network threats accurately.Existing data collection methods (full data collection, sampling based data collection and adaptive data collection) do not consider the validity of the collected data and their correlation, which will consume too much collection resources, resulting in low collection yield.To address this problem, considering the factors (relationship between node attributes, network topology relationship, threat status, node resource and node similarity) that impact collection costs and benefits, a rule association method to generate collection policies was designed.In the method, two types of association rules (inter-node association rules and inter-event association rules) were adopted to generate candidate data collection items and reduced the scope of data collection.Then, a multi-objective program was designed to maximize collection benefits and minimize collection costs.Further, a genetic algorithm was designed to solve this program.Proposed method was compared with existing data collection methods.The experimental results show that the number of the collected data records of proposed method is 1 000~3 000 less than that of others per 12 hours, and the validity of the collected data of proposed method is about 4%~10% higher than others, which proves the effectiveness of the proposed method.…”
Get full text
Article -
16547
Enhanced Modeling and Control of Organic Rankine Cycle Systems via AM‐LSTM Networks Based Nonlinear MPC
Published 2025-01-01“…Furthermore, a multi‐objective optimization approach that integrates nonlinear model predictive control (NMPC) with the multiverse optimizer (MVO) algorithm is implemented to ensure effective control under varying operating conditions and constraints. …”
Get full text
Article -
16548
Internal Leakage Diagnosis of a Hydraulic Cylinder Based on Optimization DBN Using the CEEMDAN Technique
Published 2021-01-01“…The reconstructed signals are regarded as the input of the optimization DBN, and the particle swarm optimization simulated annealing (PSOSA) algorithm is adopted to identify the four internal leakage levels. …”
Get full text
Article -
16549
Solving linear Fredholm-Stieltjes integral equations of the second kind by using the generalized Simpson’s rule
Published 2016-05-01“…The graph of these results is plotted. An algorithm of this application is given by using Maple. …”
Get full text
Article -
16550
Development of a standardized data collection and intelligent fabric quality prediction system for the weaving department
Published 2025-01-01“…This study leverages the standardization and interoperability features of open platform communications unified architecture technology to facilitate data acquisition within the weaving department, establishing a reliable Internet of Things framework that supports subsequent fabric quality prediction, and optimizing the back propagation neural network through the K-means clustering algorithm and particle swarm optimization to predict the type and number of fabric defects. …”
Get full text
Article -
16551
Using Statistical Model to Study the Daily Closing Price Index in the Kingdom of Saudi Arabia (KSA)
Published 2021-01-01“…The expectation-maximization (EM) algorithm converged in 2 repetitions. The data source is from Tadawul KSA.…”
Get full text
Article -
16552
Dynamic Sign Guidance Optimization for Crowd Evacuation considering Flow Equilibrium
Published 2022-01-01“…A method based on the fundamental diagram, the cell transmission model, and the point-queuing theory is developed to estimate evacuation travel time considering congestion and queuing. A heuristic algorithm is extended to solve the bi-level program. …”
Get full text
Article -
16553
Complexity of Deep Convolutional Neural Networks in Mobile Computing
Published 2020-01-01“…Finally, at the third stage, it employs Huffman encoding algorithm to deal with the storage issue of the remaining weights.…”
Get full text
Article -
16554
Coordinated Control for Driving Mode Switching of Hybrid Electric Vehicles
Published 2020-01-01“…Taking a hybrid electric vehicle using double-row planetary gear power coupling mechanism as a research object, this study proposes a coordinated control algorithm of “torque distribution, engine torque monitoring, and motor torque compensation” in an attempt to realize coordinated control for driving mode switching. …”
Get full text
Article -
16555
Designing and Manufacturing of Industrial Robots with Dual-Angle Sensors Taking into Account Vibration Signal Fusion
Published 2023-01-01“…The overall optimization of the system algorithm enhances the accuracy and reliability of the measurement.…”
Get full text
Article -
16556
Lie Detection Technology of Bimodal Feature Fusion Based on Domain Adversarial Neural Networks
Published 2024-01-01“…Simulations conducted on two professional lying databases with different distributions show the superiority of the detection rate of the proposed method compared to an unimodal feature detection algorithm. The maximum improvement in detection rate was 23.3% compared to the traditional neural network-based detection method. …”
Get full text
Article -
16557
STUDY ON ENERGY ABSORPTION CHARACTERISTICS OF CIRCULAR TUBE WITH RECTANGULAR GROOVE BASED ON REGRESSION ANALYSIS
Published 2024-04-01“…Finally, the energy absorption performance index was introduced and the structure of the circular tube was optimized by genetic algorithm. The optimization results show that when the diameter and the groove end distance are the smallest. the wall ess and the groove width are the largest, and the groove depth is the shallowest, the circular tube has the best energy absorption performance in the range of research.…”
Get full text
Article -
16558
Recent advances in the management of chronic ankle instability
Published 2025-01-01“…Treatment of CAI requires a multifaceted algorithm, involving historical analysis, clinical evaluations, and diagnostic imaging. …”
Get full text
Article -
16559
The Comparison of Lately Proposed Harris Hawks Optimization and Jaya Optimization in Solving Directional Overcurrent Relays Coordination Problem
Published 2020-01-01“…Meanwhile, another lately proposed optimization algorithm named Jaya is also adopted to solve the same problem, and the results are compared with HHO in aspects of objective function value, convergence rate, robustness, and computation efficiency. …”
Get full text
Article -
16560
Analysis of communication data of mobile terminal based on protocol reversal
Published 2018-12-01“…The most problem in analysis of communication protocols and communication data for mobile terminals is that many mobile applications do not have the relevant public technical documents,and it is difficult to know the type of communication protocol it adopts.The instruction execution sequence analysis technique takes the instruction sequence executed by the program as a research object,and inversely infers the message format and the state machine to obtain the communication protocol.However,due to the incomplete collection of sequence information,the state machine infers that the inference is incomplete and cannot be effective.A novel protocol reverse scheme based on state machine comparison is proposed,which can be used for the forensics of mobile terminal communication data.The scheme first uses PIN for dynamical identification of the taint,and track it and analyzes the trajectory to obtain the message format.Secondly,the message clustering is performed on the basis of the message format to infer the protocol state machine.Finally,the LCS algorithm is used to compare the state machines to get a complete protocol state machine.This article tests and evaluates the scheme based on two types of application design experiments on the Android platform.The experimental results show that the results are both complete and real-time,and have practical value.…”
Get full text
Article