* If you want to update the article please login/register
EMFI has become a common fault injection procedure due to its ability to inject faults precisely considering timing and location. We first demonstrate how to design an automated EMFI system with high scanning speed and good repeatability, which is large enough to st erect and server CPUs. We use our setup to target a deeply embedded security coprocessor in modern AMD systems on a chip, the AMD Secure Processor. We then see these fault locations on SoC photographs, enabling us to speculate about the SoC's components under attack. Lastly, we demonstrate that the signature verification process of one of the first executed firmware parts is susceptible to EMFI attacks, undermining the entire SoC's defense architecture. This is the first recorded EMFI attack on an AMD desktop CPU, according to the best of our knowledge.
Source link: https://arxiv.org/abs/2209.09835v1
The program yields a maximally entangled state of two qubits using a circuit consisting of nearest-neighbor Clifford gates and local measurements only, allowing for a fast computable Pauli correction. In addition, all operations within a repeater are local when the qubits are ordered in a square lattice.
Source link: https://arxiv.org/abs/2209.09774v1
Rolling bearings are the most important parts of turning machinery. Identifying defective bearings in a timely manner can prevent the breakdown of an entire machinery assembly assembly. As a result of machine parts' rapid development, the mechanical condition monitoring field has entered the big data phase. Manual feature extraction has the drawback of being ineffective and inaccurate when working with large amounts of data. In recent years, machine learning algorithms such as the Deep Learning algorithm have been used for mechanical fault detection in machine intelligence. Convolutional neural networks were mostly used in earlier studies to detect and identify bearing errors. Bearing failure laboratory experimental results were used to identify Bearing defects in Case Western Reserve University bearing failure laboratory experimental data. The vibration signals were converted into 2D time-frequency images using the short-time Fourier transform. As input parameters for the ViT, the 2D time-frequency photos are used.
Source link: https://arxiv.org/abs/2208.07070v2
With the three-dimensional cluster state, we investigate a number of fault-tolerant quantum error correction schemes based on the concatenation of small error detection or error correction codes.
Source link: https://arxiv.org/abs/2209.09390v1
Hydrogen embrittlement in Zr alloy fuel cladding is the most significant safety issue for water-based nuclear reactors. Fcc zirconium hydrides and planar defects observed in our experiments were identified in atomic-scale ab initio calculations, which focused on the solute interactions with generalized stacking faults in hcp 0̆3b1 -Zr and fcc zirconium hydrides in order to explain the emergence of hydrides and planar defects observed in our experiments. However, the solution enthalpy of Sn is lower in the comparison to other hydride phases indicative of two competing processes of Sn depletion/enrichment at the Zr hydride/matrix interface, but not the other hydride phases.
Source link: https://arxiv.org/abs/2209.09147v1
The process of applying machine learning and other statistical techniques to monitor machine health is the process of monitoring machine health. This paper explores the design of vibration images, a preprocessing technique that has been used to develop convolutional neural networks for ball bearing joint IFD.
Source link: https://arxiv.org/abs/2209.11041v1
Quantum Error Correction continuously produces a stream of syndrome reports that include details about the program's behaviours. For efficient fault-tolerant quantum computation, useful fault-tolerant quantum computation needs online decoders that are capable of processing this syndrome data at the rate it is received. Otherwise, a data backlog is created that grows exponentially with the T -gate depth of the computation's depth. In sub-1 0̆3bc s time, the decoders can perform QEC rounds in sub-1 s time, meeting a strict limit on the decoders' speed. All current decoder plans have a maximum code size above which syndrome processing becomes too slow to keep up with the data acquisition, effectively rendering the fault-tolerant computation not scalable. In addition, we find that the algorithm results in no decline in logical fidelity relative to the initial global decoder. We then discuss how the same method can be used in online hardware decoders.
Source link: https://arxiv.org/abs/2209.08552v1
Ground faults in converter-based grids can be difficult to detect because, unlike in grids with synchronous machines, they do not result in large currents. Optimal perturbation sequences for use with the Multiple Model Kalman Filter are presented in this paper. Simulations show that the most effective input sequence improves fault detection's credibility while decreasing detection time.
Source link: https://arxiv.org/abs/2209.06760v1
This paper explores a recent attempt at fault-tolerant quantum computation, which depends on quantum polar codes. First, we find that a subfamily of 835_1 codes is similar to the well-known family of Shor codes. In addition, we report that 835_1 codes significantly outperform Shor codes, of the same length and minimum distance. Second, we investigate the fault-tolerant production of 835_1 code states. Based on two-qubit Pauli measurements alone, we propose a recursive method to establish a 835_1 code state. Fault tolerance is then improved by combining the intended recursive process with an error detection system.
Source link: https://arxiv.org/abs/2209.06673v1
The C++ library implementation ReStore for MPI applications supports data recovery after process failures, and we present an algorithmic framework and its C++ library implementation. Recovery is much faster than traditional checkpointing schemes that rely on a parallel file system by storing all necessary data in memory by using an efficient data storage and replication platform. We also support shrinking recovery rather than recovering using spare compute nodes as the application designer can choose which data to load.
Source link: https://arxiv.org/abs/2203.01107v2
* Please keep in mind that all text is summarized by machine, we do not bear any responsibility, and you should always check original source before taking any actions