Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (7)

Search Parameters:
Keywords = channel arbitration

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 831 KB  
Article
Energy-Efficient Dual-Core RISC-V Architecture for Edge AI Acceleration with Dynamic MAC Unit Reuse
by Cristian Andy Tanase
Computers 2026, 15(4), 219; https://doi.org/10.3390/computers15040219 - 1 Apr 2026
Viewed by 359
Abstract
This paper presents a dual-core RISC-V architecture designed for energy-efficient AI acceleration at the edge, featuring dynamic MAC unit sharing, frequency scaling (DFS), and FIFO-based resource arbitration. The system comprises two RISC-V cores that compete for shared computational resources—a single Multiply–Accumulate (MAC) unit [...] Read more.
This paper presents a dual-core RISC-V architecture designed for energy-efficient AI acceleration at the edge, featuring dynamic MAC unit sharing, frequency scaling (DFS), and FIFO-based resource arbitration. The system comprises two RISC-V cores that compete for shared computational resources—a single Multiply–Accumulate (MAC) unit and a shared external memory subsystem—governed by a channel-based arbitration mechanism with CPU-priority semantics, while each core maintains private instruction and data caches. The architecture implements a tightly coupled Neural Processing Unit (NPU) with CONV, GEMM, and POOL operations that execute opportunistically in the background when the MAC unit is available. Dynamic frequency scaling (DFS) with three levels (100/200/400 MHz) is applied to the shared MAC unit, allowing the dynamic acceleration of CNN workloads. The arbitration mechanism uses SystemC sc_fifo channels with CPU-priority polling, ensuring that CPU execution is minimally impacted by background AI processing while the NPU makes progress during idle MAC slots. The NPU supports 3 × 3 convolutions, matrix multiplication (GEMM) with 10 × 10 tiles, and pooling operations. The implementation is cycle-accurate in SystemC, targeting FPGA deployment. Experimental evaluation demonstrates that the dual-core architecture achieves 1.87× speedup with 93.5% efficiency for parallel workloads, while DFS enables 70% power reduction at low frequency. The system successfully executes simultaneous CPU and AI workloads, with CPU-priority arbitration ensuring no CPU starvation under contention. The proposed design offers a practical solution for embedded AI applications requiring both general-purpose computation and neural network acceleration, validated through comprehensive SystemC simulation on modern FPGA platforms. Full article
(This article belongs to the Special Issue High-Performance Computing (HPC) and Computer Architecture)
Show Figures

Figure 1

30 pages, 965 KB  
Article
Guarded Swarms: Building Trusted Autonomy Through Digital Intelligence and Physical Safeguards
by Uwe M. Borghoff, Paolo Bottoni and Remo Pareschi
Future Internet 2026, 18(1), 64; https://doi.org/10.3390/fi18010064 - 21 Jan 2026
Viewed by 755
Abstract
Autonomous UAV/UGV swarms increasingly operate in contested environments where purely digital control architectures are vulnerable to cyber compromise, communication denial, and timing faults. This paper presents Guarded Swarms, a hybrid framework that combines digital coordination with hardware-level analog safety enforcement. The architecture builds [...] Read more.
Autonomous UAV/UGV swarms increasingly operate in contested environments where purely digital control architectures are vulnerable to cyber compromise, communication denial, and timing faults. This paper presents Guarded Swarms, a hybrid framework that combines digital coordination with hardware-level analog safety enforcement. The architecture builds on Topic-Based Communication Space Petri Nets (TB-CSPN) for structured multi-agent coordination, extending this digital foundation with independent analog guard channels—thrust clamps, attitude limiters, proximity sensors, and emergency stops—that operate in parallel at the actuator interface. Each channel can unilaterally veto unsafe commands within microseconds, independently of software state. The digital–analog interface is formalized via timing contracts that specify sensor-consistency windows and actuation latency bounds. A two-robot case study demonstrates token-based arbitration at the digital level and OR-style inhibition at the analog level. The framework ensures local safety deterministically while maintaining global coordination as a best-effort property. This paper presents an architectural contribution establishing design principles and interface contracts. Empirical validation remains future work. Full article
(This article belongs to the Special Issue Intelligent Agents and Their Application)
Show Figures

Graphical abstract

18 pages, 2147 KB  
Article
An Efficient Digital Channelized Receiver for Low SNR and Wideband Chirp Signals Detection
by Wenhai Cheng, Qunying Zhang, Wei Lu, Haiying Wang and Xiaojun Liu
Appl. Sci. 2023, 13(5), 3080; https://doi.org/10.3390/app13053080 - 27 Feb 2023
Cited by 5 | Viewed by 3891
Abstract
Synthetic aperture radar (SAR) is essential for obtaining intelligence in modern information warfare. Wideband chirp signals with a low signal-to-noise ratio (SNR) are widely used in SAR. Intercepting low-SNR wideband chirp signals is of great significance for anti-SAR reconnaissance. Digital channelization technology is [...] Read more.
Synthetic aperture radar (SAR) is essential for obtaining intelligence in modern information warfare. Wideband chirp signals with a low signal-to-noise ratio (SNR) are widely used in SAR. Intercepting low-SNR wideband chirp signals is of great significance for anti-SAR reconnaissance. Digital channelization technology is an effective means to intercept wideband signals. The existing digital channelization methods have the following problems: the contradiction of reception blind zone and signal spectrum aliasing, high computational complexity, and low estimating accuracy for chirp signals with a low SNR. This paper proposes a non-critical sampling digital channelized receiver architecture to intercept chirp signals. The receiver architecture has no blind zone in channel division and no aliasing of signal spectrum in the channel, which can provide reliable instantaneous frequency measurements. An adaptive threshold generation algorithm is proposed to detect signals without prior information. In addition, an improved instantaneous frequency measurement (IFM) algorithm is proposed, improving low SNR chirp signals’ frequency estimation accuracy. Moreover, a simple channel arbitration logic is proposed to complete the cross-channel combination of wideband signals. Simulations show that the proposed receiver architecture is reliable and robust for low SNR and wideband chirp signal detection. When the input SNR is 0 dB, the absolute frequency root-mean-square error (RMSE) of bandwidth and the center frequency is 0.57 MHz and 1.05 MHz, respectively. This frequency accuracy is great for radio frequency (RF) wideband systems. Full article
(This article belongs to the Topic Radar Signal and Data Processing with Applications)
Show Figures

Figure 1

15 pages, 1071 KB  
Article
TCAN-IDS: Intrusion Detection System for Internet of Vehicle Using Temporal Convolutional Attention Network
by Pengzhou Cheng, Kai Xu, Simin Li and Mu Han
Symmetry 2022, 14(2), 310; https://doi.org/10.3390/sym14020310 - 3 Feb 2022
Cited by 55 | Viewed by 5407
Abstract
Intrusion detection systems based on recurrent neural network (RNN) have been considered as one of the effective methods to detect time-series data of in-vehicle networks. However, building a model for each arbitration bit is not only complex in structure but also has high [...] Read more.
Intrusion detection systems based on recurrent neural network (RNN) have been considered as one of the effective methods to detect time-series data of in-vehicle networks. However, building a model for each arbitration bit is not only complex in structure but also has high computational overhead. Convolutional neural network (CNN) has always performed excellently in processing images, but they have recently shown great performance in learning features of normal and attack traffic by constructing message matrices in such a manner as to achieve real-time monitoring but suffer from the problem of temporal relationships in context and inadequate feature representation in key regions. Therefore, this paper proposes a temporal convolutional network with global attention to construct an in-vehicle network intrusion detection model, called TCAN-IDS. Specifically, the TCAN-IDS model continuously encodes 19-bit features consisting of an arbitration bit and data field of the original message into a message matrix, which is symmetric to messages recalling a historical moment. Thereafter, the feature extraction model extracts its spatial-temporal detail features. Notably, global attention enables global critical region attention based on channel and spatial feature coefficients, thus ignoring unimportant byte changes. Finally, anomalous traffic is monitored by a two-class classification component. Experiments show that TCAN-IDS demonstrates high detection performance on publicly known attack datasets and is able to accomplish real-time monitoring. In particular, it is anticipated to provide a high level of symmetry between information security and illegal intrusion. Full article
Show Figures

Figure 1

17 pages, 496 KB  
Article
A Verifiable Arbitrated Quantum Signature Scheme Based on Controlled Quantum Teleportation
by Dianjun Lu, Zhihui Li, Jing Yu and Zhaowei Han
Entropy 2022, 24(1), 111; https://doi.org/10.3390/e24010111 - 11 Jan 2022
Cited by 28 | Viewed by 3024
Abstract
In this paper, we present a verifiable arbitrated quantum signature scheme based on controlled quantum teleportation. The five-qubit entangled state functions as a quantum channel. The proposed scheme uses mutually unbiased bases particles as decoy particles and performs unitary operations on these decoy [...] Read more.
In this paper, we present a verifiable arbitrated quantum signature scheme based on controlled quantum teleportation. The five-qubit entangled state functions as a quantum channel. The proposed scheme uses mutually unbiased bases particles as decoy particles and performs unitary operations on these decoy particles, applying the functional values of symmetric bivariate polynomial. As such, eavesdropping detection and identity authentication can both be executed. The security analysis shows that our scheme can neither be disavowed by the signatory nor denied by the verifier, and it cannot be forged by any malicious attacker. Full article
(This article belongs to the Special Issue Practical Quantum Communication)
Show Figures

Figure 1

39 pages, 2112 KB  
Article
A Traceable Online Insurance Claims System Based on Blockchain and Smart Contract Technology
by Chin-Ling Chen, Yong-Yuan Deng, Woei-Jiunn Tsaur, Chun-Ta Li, Cheng-Chi Lee and Chih-Ming Wu
Sustainability 2021, 13(16), 9386; https://doi.org/10.3390/su13169386 - 21 Aug 2021
Cited by 59 | Viewed by 10529
Abstract
In the current medical insurance claims process, there are problems of low efficiency and complex services. When a patient applies for medical insurance claims, he/she must go to the hospital to apply for a diagnosis certificate and receipt and then send the relevant [...] Read more.
In the current medical insurance claims process, there are problems of low efficiency and complex services. When a patient applies for medical insurance claims, he/she must go to the hospital to apply for a diagnosis certificate and receipt and then send the relevant application documents to the insurance company. The patient will not receive compensation until the company completes the verification with the patient’s hospital. However, we can improve the current dilemma through blockchain technology. Blockchain technology can effectively open up the information channels of the insurance industry and medical institutions, promote industry integration, and enhance the ability of insurance companies to obtain information. In this research, we used blockchain and smart contract technology to make the following contributions to the development of Internet insurance. First, blockchain and smart contract technology can effectively solve the problem of online underwriting. Second, it is conducive to improving supervision. Third, it is conducive to solving risk control problems. Fourth, it is conducive to effective anti-money laundering. The proposed scheme fulfills the following security requirements: mutual authentication of identities, non-repudiation between each of two roles, and other major blockchain-based security requirements. In the event of a dispute, we also proposed an arbitration mechanism to divide responsibilities. Full article
Show Figures

Figure 1

17 pages, 624 KB  
Article
Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs
by Jiawei Huang, Qi Li, Shaohua Zhong, Lianhai Liu, Ping Zhong, Jianxin Wang and Jin Ye
Sensors 2017, 17(2), 338; https://doi.org/10.3390/s17020338 - 10 Feb 2017
Cited by 22 | Viewed by 6834
Abstract
Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies [...] Read more.
Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. Full article
Show Figures

Figure 1

Back to TopTop