A Low-Cost Cache Coherence Verification Method for Snooping Systems

Author(s):  
D. Borodin ◽  
B.H.H. Juurlink
Author(s):  
Ayuningtyas Yuli Hapsari

Objective - The research aims to test influence of promotion in social media and effect of brand equity on Consumer Buying Interest. Methodology/Technique - This research uses descriptive verification method that examines many as 115 respondents with 15-40 years of age category, because it is an age of active users of social media such as: Instagram, YouTube, Facebook, etc. This study also uses primary data is based on interviews during the pre-survey and distribute questionnaires. After that at the time of processing the data, this study using multiple regression analysis as a verification method to measure how much digital video as a media campaign on consumer buying interest as well as to determine how much influence the brand equity on consumer buying interest as active users of social media Findings – After passing the calculations using regression and t-test, promotion through social media consisting of online communities and forums, blogs and social networks has a very strong influence on consumer buying interest compared to brand equity. This can be enhanced by strengthening social networking through social media to increase product sales, many companies still believe that social media as a low-cost promotional media but can increase sales, more promotion in social media will increase brand equity in the minds of consumers, so that in the end will benefit both sides. Novelty - The research conducted in the context of Indonesia with original data on brand equity effect on confidence of consumers. Type of Paper - Empirical Keywords: Digital Video; Promotion; Brand Equity; Consumer Buying Interest; Social Media. JEL Classification: M31, M37


Author(s):  
Wen Mo ◽  
Tian Wang ◽  
Shaobo Zhang ◽  
Jinhuan Zhang

Abstract Billions of Internet of Thing (IoT) devices are deployed in edge network. They are used to monitor specific event, process and to collect huge data to control center with smart decision based on the collected data. However, some malicious IoT devices may interrupt and interfere with normal nodes in data collection, causing damage to edge network. Due to the open character of the edge network, how to identify the credibility of these nodes, thereby identifying malicious IoT devices, and ensure reliable data collection in the edge network is a great challenge. In this paper, an Active and Verifiable Trust Evaluation (AVTE) approach is proposed to identify the credibility of IoT devices, so to ensure reliable data collection for Edge Computing with low cost. The main innovations of the AVTE approach compared with the existing work are as follows: (1) In AVTE approach, the trust of the device is obtained by an actively initiated trusted detection routing method. It is fast, accurate and targeted. (2) The acquisition of trust in the AVTE approach is based on a verifiable method and it ensures that the trust degree has higher reliability. (3) The trust acquisition method proposed in this paper is low-cost. An encoding returned verification method is applied to obtain verification messages at a very low cost. This paper proposes an encoding returned verification method, which can obtain verification messages at a very low cost. In addition, the strategy of this paper adopts initiation and verification of adaptive active trust detection according to the different energy consumption of IoT devices, so as to reliably obtain the trust of device under the premise of ensuring network lifetime. Theoretical analysis shows that AVTE approach can improve the data collection rate by 0.5 ~ 23.16% while ensuring long network lifetime compared with the existing scheme.


Sensors ◽  
2020 ◽  
Vol 20 (11) ◽  
pp. 3015 ◽  
Author(s):  
Sourav Panda ◽  
Yuanzhen Liu ◽  
Gerhard Petrus Hancke ◽  
Umair Mujtaba Qureshi

This paper explores the security vulnerability of Personal Identification Number (PIN) or numeric passwords. Entry Device (PEDs) that use small strings of data (PINs, keys or passwords) as means of verifying the legitimacy of a user. Today, PEDs are commonly used by personnel in different industrial and consumer electronic applications, such as entry at security checkpoints, ATMs and customer kiosks, etc. In this paper, we propose a side-channel attack on a 4–6 digit random PIN key, and a PIN key user verification method. The intervals between two keystrokes are extracted from the acoustic emanation and used as features to train machine-learning models. The attack model has a 60% chance to recover the PIN key. The verification model has an 88% accuracy on identifying the user. Our attack methods can perform key recovery by using the acoustic side-channel at low cost. As a countermeasure, our verification method can improve the security of PIN entry devices.


Author(s):  
Medhat Awadalla ◽  
Ahmed M. Sadek

To meet the growing computation-intensive applications and the needs of low-power, high-performance systems, the number of computing resources in single-chip has enormously increased. By adding many computing resources to build a system in System-on-Chip, its interconnection between each other becomes another challenging issue. In most System-on-Chip applications, a shared bus interconnection which needs an arbitration logic to serialize several bus access requests, is adopted to communicate with each integrated processing unit because of its low-cost and simple control characteristics. This paper focuses on the interconnection design issues of area, power and performance of chip multi-processors with shared cache memory. It shows that having shared cache memory contributes to the performance improvement, however, typical interconnection between cores and the shared cache using crossbar occupies most of the chip area, consumes a lot of power and does not scale efficiently with increased number of cores. New interconnection mechanisms are needed to address these issues. This paper proposes an architectural paradigm in an attempt to gain the advantages of having shared cache with the avoidance of penalty imposed by the crossbar interconnect. The proposed architecture achieves smaller area occupation allowing more space to add additional cache memory. It also reduces power consumption compared to the existing crossbar architecture. Furthermore, the paper presents a modified cache coherence algorithm called Tuned-MESI. It is based on the typical MESI cache coherence algorithm however it is tuned and tailored for the suggested architecture. The achieved results of the conducted simulated experiments show that the developed architecture produces less broadcast operations compared to the typical algorithm.


Author(s):  
Y. L. Chen ◽  
S. Fujlshiro

Metastable beta titanium alloys have been known to have numerous advantages such as cold formability, high strength, good fracture resistance, deep hardenability, and cost effectiveness. Very high strength is obtainable by precipitation of the hexagonal alpha phase in a bcc beta matrix in these alloys. Precipitation hardening in the metastable beta alloys may also result from the formation of transition phases such as omega phase. Ti-15-3 (Ti-15V- 3Cr-3Al-3Sn) has been developed recently by TIMET and USAF for low cost sheet metal applications. The purpose of the present study was to examine the aging characteristics in this alloy.The composition of the as-received material is: 14.7 V, 3.14 Cr, 3.05 Al, 2.26 Sn, and 0.145 Fe. The beta transus temperature as determined by optical metallographic method was about 770°C. Specimen coupons were prepared from a mill-annealed 1.2 mm thick sheet, and solution treated at 827°C for 2 hr in argon, then water quenched. Aging was also done in argon at temperatures ranging from 316 to 616°C for various times.


Author(s):  
J. D. Muzzy ◽  
R. D. Hester ◽  
J. L. Hubbard

Polyethylene is one of the most important plastics produced today because of its good physical properties, ease of fabrication and low cost. Studies to improve the properties of polyethylene are leading to an understanding of its crystalline morphology. Polyethylene crystallized by evaporation from dilute solutions consists of thin crystals called lamellae. The polyethylene molecules are parallel to the thickness of the lamellae and are folded since the thickness of the lamellae is much less than the molecular length. This lamellar texture persists in less perfect form in polyethylene crystallized from the melt.Morphological studies of melt crystallized polyethylene have been limited due to the difficulty of isolating the microstructure from the bulk specimen without destroying or deforming it.


Author(s):  
J. Temple Black

In ultramicrotomy, the two basic tool materials are glass and diamond. Glass because of its low cost and ease of manufacture of the knife itself is still widely used despite the superiority of diamond knives in many applications. Both kinds of knives produce plastic deformation in the microtomed section due to the nature of the cutting process and microscopic chips in the edge of the knife. Because glass has no well defined slip planes in its structure (it's an amorphous material), it is very strong and essentially never fails in compression. However, surface flaws produce stress concentrations which reduce the strength of glass to 10,000 to 20,000 psi from its theoretical or flaw free values of 1 to 2 million psi. While the microchips in the edge of the glass or diamond knife are generally too small to be observed in the SEM, the second common type of defect can be identified. This is the striations (also termed the check marks or feathers) which are always present over the entire edge of a glass knife regardless of whether or not they are visable under optical inspection. These steps in the cutting edge can be observed in the SEM by proper preparation of carefully broken knives and orientation of the knife, with respect to the scanning beam.


Sign in / Sign up

Export Citation Format

Share Document