With the rapid development of quantum computers capable of realizing Shor’s algorithm, existing public key-based algorithms face a significant security risk. Crystals-Kyber has been selected as the only key encapsulation mechanism (KEM) algorithm in the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) competition. In this study, we present a portable and efficient implementation of a Crystals-Kyber post-quantum KEM based on WebAssembly (Wasm), a recently released portable execution framework for high-performance web applications. Until now, most Kyber implementations have been developed with native programming languages such as C and Assembly. Although there are a few previous Kyber implementations based on JavaScript for portability, their performance is significantly lower than that of implementations based on native programming languages. Therefore, it is necessary to develop a portable and efficient Kyber implementation to secure web applications in the quantum computing era. Our Kyber software is based on JavaScript and Wasm to provide portability and efficiency while ensuring quantum security. Namely, the overall software is written in JavaScript, and the performance core parts (secure hash algorithm-3-based operations and polynomial multiplication) are written in Wasm. Furthermore, we parallelize the number theoretic transform (NTT)-based polynomial multiplication using single instruction multiple data (SIMD) functionality, which is available in Wasm. The three steps in the NTT-based polynomial multiplication have been parallelized with Wasm SIMD intrinsic functions. Our software outperforms the latest reference implementation of Kyber developed in JavaScript by ×4.02 (resp. ×4.32 and ×4.1), ×3.42 (resp. ×3.52 and ×3.44), and ×3.41 (resp. ×3.44 and ×3.38) in terms of key generation, encapsulation, and decapsulation on Google Chrome (resp. Firefox, and Microsoft Edge). As far as we know, this is the first software implementation of Kyber with Wasm technology in the web environment. 相似文献
Uncrewed aerial vehicles (UAVs) have become a vital element in nonterrestrial networks, especially with respect to 5G communication systems and beyond. The use of UAVs in support of 4G/5G base station (uncrewed aerial vehicle base station [UAV-BS]) has proven to be a practical solution for extending cellular network services to areas where conventional infrastructures are unavailable. In this study, we introduce a UAV-BS system that utilizes a high-capacity wireless backhaul operating in millimeter-wave frequency bands. This system can achieve a maximum throughput of 1.3 Gbps while delivering data at a rate of 300 Mbps, even at distances of 10 km. We also present the details of our testbed implementation alongside the performance results obtained from field tests. 相似文献
We propose an adaptive unmanned aerial vehicle (UAV)-assisted object recognition algorithm for urban surveillance scenarios. For UAV-assisted surveillance, UAVs are equipped with learning-based object recognition models and can collect surveillance image data. However, owing to the limitations of UAVs regarding power and computational resources, adaptive control must be performed accordingly. Therefore, we introduce a self-adaptive control strategy to maximize the time-averaged recognition performance subject to stability through a formulation based on Lyapunov optimization. Results from performance evaluations on real-world data demonstrate that the proposed algorithm achieves the desired performance improvements. 相似文献
This paper proposes a method that can reduce the complexity of a system matrix by analyzing the characteristics of a pseudoinverse matrix to receive a binomial frequency division multiplexing (BFDM) signal and decode it using the least squares (LS) method. The system matrix of BFDM can be expressed as a band matrix, and as this matrix contains many zeros, its amount of calculation when generating a transmission signal is quite small. The LS solution can be obtained by multiplying the received signal by the pseudoinverse matrix of the system matrix. The singular value decomposition of the system matrix indicates that the pseudoinverse matrix is a band matrix. The signal-to-interference ratio is obtained from their eigenvalues. Meanwhile, entries that do not contribute to signal generation are erased to enhance calculation efficiency. We decode the received signal using the pseudoinverse matrix and the removed pseudoinverse matrix to obtain the bit error rate performance and to analyze the difference. 相似文献
The safety of patients and the quality of medical care provided to them are vital for their wellbeing. This study establishes a set of RFID (Radio Frequency Identification)-based systems of patient care based on physiological signals in the pursuit of a remote medical care system. The RFID-based positioning system allows medical staff to continuously observe the patient's health and location. The staff can thus respond to medical emergencies in time and appropriately care for the patient. When the COVID-19 pandemic broke out, the proposed system was used to provide timely information on the location and body temperature of patients who had been screened for the disease. The results of experiments and comparative analyses show that the proposed system is superior to competing systems in use. The use of remote monitoring technology makes user interface easier to provide high-quality medical services to remote areas with sparse populations, and enables better care of the elderly and patients with mobility issues. It can be found from the experiments of this research that the accuracy of the position sensor and the ability of package delivery are the best among the other related studies. The presentation of the graphical interface is also the most cordial among human-computer interaction and the operation is simple and clear. 相似文献
International Journal of Computer Vision - Machine learning models are known to perpetuate and even amplify the biases present in the data. However, these data biases frequently do not become... 相似文献
Human activity recognition using smartphone has been attracting great interest. Since collecting large amount of labeled data is expensive and time-consuming for conventional machine learning techniques, transfer learning techniques have been proposed for activity recognition. However, existing transfer learning techniques typically rely on feature matching based on global domain shift and lack considering the intra-class knowledge transfer. In this paper, a novel transfer learning technique is proposed for cross-domain activity recognition, which can properly integrate feature matching and instance reweighting across the source and target domain in principled dimensionality reduction. The experiments using three real datasets demonstrate that the proposed scheme can achieve much higher precision (92%), recall (91%), and F1-score (92%), in comparison with the existing schemes.
This research investigated the microdrilling characteristics of metal foils depending on the materials of the cover plates and metal foils in the cover plate-laser beam machining (c-LBM) process, which is a method to achieve better quality in metal foil machining with a given piece of equipment. Laser beam drilling using a nanosecond pulsed laser was carried out on 10-µm-thick stainless steel 304 (STS304), nickel, and copper foils with 100-µm-thick cover plates of each material. Consequently, STS304 was found to be an effective cover plate material for reducing the hole diameter and spatter deposition on metal foils. Compared to the results without using a cover plate, the average hole diameter and the area of spatter deposition decreased by up to 77% and 96%, respectively, by using the STS304 cover plate. Meanwhile, the thermal deformation of the STS304 and nickel foils was prevented by using a cover plate, while the copper foil was barely deformed even without a cover plate. Lastly, it was remarkable that the copper foil was drilled with approximately 67% lower pulse energy than the effective minimum pulse energy required to drill it by using the STS304 cover plate, resulting in a smaller hole with little spatter. 相似文献
We investigate the relationship between superconductivity and spin glasses, which were observed to be coexistent in heavy fermion superconductors (HFSs). We begin by explaining the phase of spin glass using concepts of finite-sized block spin. We then introduce the phase of superconductivity in HFSs as collective Cooper pairing, that is, the pairing of block spins with net spin = 1/2, each of which is comprised of a large number of random spins that together produce a majority spin direction. The superconducting Bardeen-Cooper-Schrieffer (BCS)-type phonon-mediated electron-electron interaction is substituted for the BCS-type electron-electron interaction mediated by phonon-enhanced spin flips previously suggested by us. An effective charge of any value stemming from an electron attached to the flux of an electric field can be referred to as a composite charge. The distinguished difference between ours and the original BCS model is the following: (i) another BCS-type interaction, (ii) bare electrons that are substituted for block spins with net spin = 1/2 and net charge = e in the presence of electric fields, and (iii) Fermi-Dirac distributions that are replaced by a new distribution called as Brillouin distribution. 相似文献
Defects in bulk crystals can be classified into vacancies, interstitials, grain boundaries, stacking faults, dislocations, and so forth. In particular, the vacancy in semiconductors is a primary defect that governs electrical transport. Concentration of vacancies depends mainly on the growth conditions. Individual vacancies instead of aggregated vacancies are usually energetically more favorable at room temperature because of the entropy contribution. This phenomenon is not guaranteed in van der Waals 2D materials due to the reduced dimensionality (reduced entropy). Here, it is reported that the 1D connected/aggregated vacancies are energetically stable at room temperature. Transmission electron microscopy observations demonstrate the preferential alignment direction of the vacancy chains varies in different 2D crystals: MoS2 and WS2 prefer direction, while MoTe2 prefers direction. This difference is mainly caused by the different strain effect near the chalcogen vacancies. Black phosphorous also exhibits directional double‐chain vacancies along 〈01〉 direction. Density functional theory calculations predict that the chain vacancies act as extended gap (conductive) states. The observation of the chain vacancies in 2D crystals directly explains the origin of n‐type behavior in MoTe2 devices in recent experiments and offers new opportunities for electronic structure engineering with various 2D materials. 相似文献