共查询到20条相似文献,搜索用时 78 毫秒
1.
针对卷积神经网络对于运算资源需求的不断增长,和传统的硬件卷积加速方案在功耗、面积敏感的边缘计算领域难以应用的问题,设计并实现了一个低功耗嵌入式卷积神经网络加速处理器.目标处理器基于RISC-V指令集架构,内核扩展4条自定义神经网络指令,并在硬件层面实现加速处理.该卷积神经网络处理器最大程度的复用了原RISC-V的数据通路和功能模块,减小了额外的功耗和芯片面积等资源开销.目标处理器通过RISC-V官方标准测试集验证,并对MNIST手写数据集进行识别测试,正确率达到97.23%.在TSMC 40nm标准数字工艺下,目标处理器面积仅为0.34 mm2,,动态功耗仅为11.1μw/MHz,与同期处理器相比,面积和功耗方面均具有一定优势. 相似文献
2.
3.
针对软件实现浮点运算的速度无法满足RISC-V嵌入式处理器浮点运算的需求,设计了一种由浮点加法器和浮点乘法器构成的浮点单元(FPU),其中浮点乘法器提出了新型的Wallace树压缩结构,提高了压缩速率。在“蜂鸟E203”处理器中,完成浮点指令的译码模块与派遣模块的设计,实现FPU模块的移植。基于Simc180 nm工艺,使用Sysnopsys公司的Design Compile、VCS工具对FPU进行功能验证和综合,仿真结果表明,浮点加法器的关键路径延时为10.17 ns,相比于串行浮点加法器延时缩短23%,浮点乘法器的压缩结构关键路径延时为0.27 ns,相比传统Wallace树压缩延时缩短10%,移植前后的FPU运算结果一致。 相似文献
4.
目前高复杂度设计的微处理器采用传统的定向验证很难满足高效灵活性的验证需求。针对以上问题,以RISC-V指令集处理器执行单元为验证对象,采用通用验证方法学(Universal Verification Methodology,UVM)设计灵活可配置组件,搭建约束随机指令发生器,成功实现验证平台约束随机激励生成、具备可复用性和可配置性的特点,并针对RISC-V指令集的参考模型SPIKE库存在访存不灵活,受SPIKE库规定地址约束的问题,提出分级思想,根据指令对地址是否访问,分级设计了访存指令参考模型和非访存指令参考模型,成功提高访存指令的验证效率。实验结果表明,该验证平台功能覆盖率约达到100%,代码覆盖率约达到98%以上,具备良好的高效灵活性。 相似文献
5.
6.
郑志蓉 《信息安全与通信保密》2012,(9):116-117
对基于PC构建的可信计算平台中可信计算基的构建方式进行了分析,指出通过逻辑方式构建的可信计算基存在被篡改和绕过的可能性,并提出了一种基于密码技术构建可信计算基的方法。该方法以可信平台模块为信任根,验证可信计算基的完整性,防止可信计算基被篡改;将系统中受控可执行程序执行解释部分加密存放,密钥存放在可信平台模块,程序的执行必须通过可信计算基,防止了可信计算基被绕过。通过分析其基本原理,验证了基于密码技术可有效构建具备完整性和唯一性的可信计算基。 相似文献
7.
8.
针对有实时性需求的精简指令集计算机(Reduced Instruction Set Computer, RISC)-V处理器中断响应延迟过长的问题,本文改进了中断响应中中断服务程序跳转地址计算的方式,扩展了不可屏蔽中断(Non-Maskable Interrupt,NMI)响应时的控制寄存器,提出了硬件矢量中断以及NMI相关控制寄存器扩展。硬件矢量中断提高了中断的响应速度,减少了中断响应的延迟。NMI扩展控制寄存器减少了NMI的响应延迟,减少了软件需要进行的保存现场操作。利用VCS仿真验证了中断优化的正确性以及性能。仿真结果表明,硬件矢量中断响应时间缩短了84.4%,响应速度提高为原本的6倍,NMI扩展控制寄存器减少了31个时钟周期的响应时间以及32个时钟周期的返回时间。 相似文献
9.
谈剑峰 《信息安全与通信保密》2014,(3):116-119,122
在网络信息技术高速发展和信息安全威胁肆虐的今天,各类信息环境均要面临如何保障其自身运行环境的安全可信问题.文中通过对可信计算技术,这一结合安全软硬件信息技术的研究与分析,通过其自身的安全机制与物理防御能力,以及信任链验证体系,为信息系统环境与身份识别环境提供一种有效的可信环境实现方法. 相似文献
10.
可信计算芯片是可信计算的核心部件,承担着对可信计算平台软硬件系统的完整性度量、完整性报告和可信存储等任务。目前,国外可信计算芯片大多采用国际可信计算组织的可信平台模块TPM规范,而国内可信计算芯片依据的是可信平台控制模块规范。文中从芯片的主要功能、组成结构、接入方式和工作模式等方面,研究和分析了两类常见可信计算芯片,最后讨论了可信计算芯片面临的各种挑战。 相似文献
11.
12.
The letter presents a systolic architecture for computing the two-dimensional Wigner distribution. The system is based on exploiting a characterising array for the data and cordic cells to achieve structural modularity and parallelism. 相似文献
13.
为保障边缘计算的服务质量,提出一种在多约束条件下边缘计算可信协同任务迁移策略。该策略基于任务需求,由边缘计算协同服务盟主节点组织调度协同服务盟员,基于用户任务迁移的K维权重指标,确定协同盟员调度优先级,以盟员负载均衡性为适应函数,通过贪心算法执行盟员任务分配与调度,基于路由捎带选择备用节点,通过迁移优先级评估,实现协同服务异常时的调度和迁移,由此提高边缘计算任务迁移的服务质量,保障任务迁移的可靠性。仿真实验表明,该机制能有效完成协同任务分发与迁移调度,提高边缘计算协同效率,保障网络服务质量。 相似文献
14.
15.
Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to mitigate the risks associated with naïve username/password based authentication. However, these approaches have two major limitations: they are not applicable to services where authentication occurs outside the domain of the mobile device—such as web-based services; and they often overly tax the limited computational capabilities of mobile devices. In this paper, we propose a protocol for keystroke dynamics analysis which allows web-based applications to make use of remote attestation and delegated keystroke analysis. The end result is an efficient keystroke-based user identification mechanism that strengthens traditional password protected services while mitigating the risks of user profiling by collaborating malicious web services. We present a prototype implementation of our protocol using the popular Android operating system for smartphones. 相似文献
16.
17.
18.
Distributed architecture is often adopted for the intrusion-tolerance system currently. However, this distributed intrusion-tolerance system has a consensus problem. To solve this problem, this article explores a distributed intrusion-tolerance system of hybrid time model based on trusted timely computing base (TTCB) and implement an atomic multicast protocol using TTCB services. The TTCB is a trust secure real-time component inside the server, with a well defined interface and separated from the operation system. It is in the synchronous communication environment, while the application layer in the server works asynchronously. By the atomic multicast protocol, it can be achieved that when the servers are over twice the number of faulty servers, the consensus can be satisfied. The performance evaluations show that the proposed protocol can yield larger good throughput with a lower unavailability. 相似文献
19.
《Integration, the VLSI Journal》1988,6(1):101-110
In this paper the ciruit and the design of an experimental 16 bits processor are described. The circuit is used in controller applications between mass storage devices and CPU of mainframes. The chip is fabricated in 2.5μ NMOS technology. This component (45 000 transistors, 35 mm2, 40 pins) handles data generated by a CAD tool for real-time control system (PIASTRE). 相似文献
20.
The sensor-cloud is combined with cloud computing and wireless sensor networks,which extends the service ability of WSN by the support of cloud computing.It is one of the hot topics among the current researches.After comparing and surveying the mainstream system adequately,the characteristics and development of sensor-Cloud were summed up.Then,the direct influence of existing trust issues in the system for data protection and application on upper layer were found.The announced reasons explained that existing schemes were difficult to provide trusted sensor-cloud services.This was because that the capabilities of the underlying WSN nodes were too weak,and cloud computing model lacked the direct management of underlying nodes and data and so on.The trusted structures based on fog computing were given,and the key technologies of trusted evaluation,trusted data collection,and trusted storage were designed.Finally,the discussion pointed out new views for the researches in trusted sensor-cloud. 相似文献