scholarly journals Research Progress of Biomimetic Memristor Flexible Synapse

Coatings ◽  
2021 ◽  
Vol 12 (1) ◽  
pp. 21
Author(s):  
Huiling Zhang ◽  
Ruping Liu ◽  
Huiqing Zhao ◽  
Zhicheng Sun ◽  
Zilong Liu ◽  
...  

With the development of the Internet of things, artificial intelligence, and wearable devices, massive amounts of data are generated and need to be processed. High standards are required to store and analyze this information. In the face of the explosive growth of information, the memory used in data storage and processing faces great challenges. Among many types of memories, memristors have received extensive attentions due to their low energy consumption, strong tolerance, simple structure, and strong miniaturization. However, they still face many problems, especially in the application of artificial bionic synapses, which call for higher requirements in the mechanical properties of the device. The progress of integrated circuit and micro-processing manufacturing technology has greatly promoted development of the flexible memristor. The use of a flexible memristor to simulate nerve synapses will provide new methods for neural network computing and bionic sensing systems. In this paper, the materials and structure of the flexible memristor are summarized and discussed, and the latest configuration and new materials are described. In addition, this paper will focus on its application in artificial bionic synapses and discuss the challenges and development direction of flexible memristors from this perspective.

2018 ◽  
Vol 6 (3) ◽  
pp. 359-363
Author(s):  
A. Saxena ◽  
◽  
S. Sharma ◽  
S. Dangi ◽  
A. Sharma ◽  
...  

2019 ◽  
Vol 6 (1) ◽  
pp. 47-63 ◽  
Author(s):  
Bettina Nissen ◽  
Ella Tallyn ◽  
Kate Symons

Abstract New digital technologies such as Blockchain and smart contracting are rapidly changing the face of value exchange, and present new opportunities and challenges for designers. Designers and data specialists are at the forefront of exploring new ways of exchanging value, using Blockchain, cryptocurrencies, smart contracting and the direct exchanges between things made possible by the Internet of Things (Tallyn et al. 2018; Pschetz et al. 2019). For researchers and designers in areas of Human Computer Interaction (HCI) and Interaction Design to better understand and explore the implications of these emerging and future technologies as Distributed Autonomous Organisations (DAOs) we delivered a workshop at the ACM conference Designing Interactive Systems (DIS) in Edinburgh in 2017 (Nissen et al. 2017). The workshop aimed to use the lens of DAOs to introduce the principle that products and services may soon be owned and managed collectively and not by one person or authority, thus challenging traditional concepts of ownership and power. This workshop builds on established HCI research exploring the role of technology in financial interactions and designing for the rapidly changing world of technology and value exchange (Kaye et al. 2014; Malmborg et al. 2015; Millen et al. 2015; Vines et al. 2014). Beyond this, the HCI community has started to explore these technologies beyond issues of finance, money and collaborative practice, focusing on the implications of these emerging but rapidly ascending distributed systems in more applied contexts (Elsden et al. 2018a). By bringing together designers and researchers with different experiences and knowledge of distributed systems, the aim of this workshop was two-fold. First, to further understand, develop and critique these new forms of distributed power and ownership and second, to practically explore how to design interactive products and services that enable, challenge or disrupt existing and emerging models.


2021 ◽  
Vol 54 (2) ◽  
pp. 1-35
Author(s):  
Chenning Li ◽  
Zhichao Cao ◽  
Yunhao Liu

With the development of the Internet of Things (IoT), many kinds of wireless signals (e.g., Wi-Fi, LoRa, RFID) are filling our living and working spaces nowadays. Beyond communication, wireless signals can sense the status of surrounding objects, known as wireless sensing , with their reflection, scattering, and refraction while propagating in space. In the last decade, many sophisticated wireless sensing techniques and systems were widely studied for various applications (e.g., gesture recognition, localization, and object imaging). Recently, deep Artificial Intelligence (AI), also known as Deep Learning (DL), has shown great success in computer vision. And some works have initially proved that deep AI can benefit wireless sensing as well, leading to a brand-new step toward ubiquitous sensing. In this survey, we focus on the evolution of wireless sensing enhanced by deep AI techniques. We first present a general workflow of Wireless Sensing Systems (WSSs) which consists of signal pre-processing, high-level feature, and sensing model formulation. For each module, existing deep AI-based techniques are summarized, further compared with traditional approaches. Then, we provide a view of issues and challenges induced by combining deep AI and wireless sensing together. Finally, we discuss the future trends of deep AI to enable ubiquitous wireless sensing.


2014 ◽  
Vol 556-562 ◽  
pp. 5787-5789
Author(s):  
Jia Tang

Logistics Park as a highly centralized logistics distribution center, information construction is very an important platform to society. In this paper, Xi'an comprehensive bonded zone as an example, the Internet of things technology for the construction of logistics park information platform focusing on the design of cloud computing data center, and realizing the sharing of logistics information. [3] Logistics Park as a highly centralized logistics distribution center, the establishment of a unified information platform is the development direction of park information application. However, because the logistics park operation is complex and uncertainty, information management platform for the management information systems in general, can not adapt to the characteristics of park operations flexible, restricted the development of the park.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Dylan Rafferty ◽  
Kevin Curran

Cyber security breaches are on the rise globally. Due to the introduction of legislation like the EU’s General Data Protection Regulation (GDPR), companies are now subject to further financial penalties if they fail to meet requirements in protecting user information.  In 2018, 75% of CEOs and board members considered cyber security and technology acquisitions among their top priorities, and blockchain based solutions were among the most considered options. Blockchain is a decentralised structure that offers multiple security benefits over traditional, centralised network architectures. These two approaches are compared in this chapter in areas such as data storage, the Internet of Things (IoT) and Domain Name System (DNS) in order to determine blockchain’s potential in the future of cyber security.


Author(s):  
Hala A. Naman ◽  
Naseer Ali Hussien ◽  
Mohand Lokman Al-dabag ◽  
Haider Th.Salim Alrikabi

<p class="0abstract">One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion of Internet science and the use of the Internet worldwide, we will establish a security feature of the IOT service that will work more reliably and more effectively to deal with the Internet of Things and ensure the work of the services that the customer interacts with. A secret-key stenographic scheme that embeds four gray-scale secret size (128*128) pixel images into a size (512*512) pixel cover image in this work. Wavelet transform is the method used in this project to analyze the cover into its frequency components. In this work, combinations of steganography and cryptography were made to increase the level of safety and make the device more difficult for attackers to beat. The resulting stego-image that will be transmitted did not raise any suspicion by both objective and subjective evaluation, so the primary objective of Steganography is achieved. The proposed system was designed by using (MATLAB R2018b) and running on a Pentium-4 computer. The Internet of Things works with the encryption system for data in a synchronized manner with the technological development, and in order to maintain the stability of any Internet of things service, whether it is information signal services, visual or audio data, a remote control system, or data storage in the Internet cloud, we must focus on data preservation from internet pirates and internet system hackers. The picture Figure<strong> </strong>4 below shows the method of encryption and dealing with the Internet of things system..</p>


Author(s):  
Marie Söderberg

Japan and the European Union have recently made several agreements aiming to deepen their cooperation. An example of this is the “Partnership on Sustainable Connectivity and Quality Infrastructure between the European Union and Japan,” by which both EU and Japan agreed to “promote free, open, rules-based, fair, non-discriminatory and predictable regional and international trade and investment, transparent procurement practices, the ensuring of debt sustainability and the high standards of economic, fiscal, financial, social and environmental sustainability.” This is just the latest part in an effort by both to revive multilateral cooperation in the face of US withdrawal from international agreements and the rise of a more assertive China. Japan and EUs Strategic Partnership Agreement provides a legally binding framework for further cooperation in the field of politics, security, and development. Underpinning it are shared values and principles of democracy, the rule of law, human rights, and fundamental freedoms. For the protection of democracy and the liberal world order, Japan and the EU seem like ideal partners. The question is whether ongoing shifts in the power balance, geopolitics, crises of liberalism, domestic politics, and legal and technological changes will lead to broader and deeper cooperation. This chapter provides a historical background to Japan-European relations from WWII until today. The relation started with a heavy emphasis on trade and business. It is only recently that the two have broadened their cooperation and now stand up as two of the strongest defenders of a liberal rule-based world order.


2021 ◽  
Vol 27 (4) ◽  
pp. 188-194
Author(s):  
D. V. Malakhovetsky ◽  
◽  
A. I. Razumowsky ◽  

Parsing character arrays by recursive scoping and structuring using the example of VRML data. The article presents a new method for structuring, segmentation and algorithmic design of the parser of character arrays using the example of VRML data. The key feature of the method is the ability to form a hierarchically complex object by means of recursive data structuring, which makes it possible to cover in aggregate the entire contents of the object, including its arbitrary nesting of child objects. This leads to high controllability of the development of the parsing algorithm, allowing you to focus each time on a specific piece of data, while not losing sight of the entire aggregate connectivity of information. The results obtained can easily be used in plans for creating convenient data storage structures related to information security, solving the problem of containing the amount of data in files, managing big data in heterogeneous systems, and processing hierarchical data in the Internet of Things. Keywords: data analysis method, parsing, structuring, se


Author(s):  
Ping Lin ◽  
K. Selçuk Candan

The cost of creating and maintaining software and hardware infrastructures for delivering web services led to a notable trend toward the use of application service providers (ASPs) and, more generally, distributed application hosting services (DAHSs). The emergence of enabling technologies, such as J2EE and .NET, has contributed to the acceleration of this trend. DAHSs rent out Internet presence, computation power, and data storage space to clients with infrastructural needs. Consequently, they are cheap and effective outsourcing solutions for achieving increased service availability and scalability in the face of surges in demand. However, ASPs and DAHSs operate within the complex, multi-tiered, and open Internet environment and, hence, they introduce many security challenges that have to be addressed effectively to convince customers that outsourcing their IT needs is a viable alternative to deploying complex infrastructures locally. In this chapter, we provide an overview of typical security challenges faced by DAHSs, introduce dominant security mechanisms available at the different tiers in the information management hierarchy, and discuss open challenges


Sign in / Sign up

Export Citation Format

Share Document