Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (10)

Search Parameters:
Keywords = European Processor Initiative

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
17 pages, 539 KiB  
Article
First Steps towards Efficient Genome Assembly on ARM-Based HPC
by Kristijan Poje, Mario Brcic, Josip Knezovic and Mario Kovac
Electronics 2024, 13(1), 39; https://doi.org/10.3390/electronics13010039 - 20 Dec 2023
Cited by 1 | Viewed by 1722
Abstract
Exponential advances in computational power have fueled advances in many disciplines, and biology is no exception. High-Performance Computing (HPC) is gaining traction as one of the essential tools in scientific research. Further advances to exascale capabilities will necessitate more energy-efficient hardware. In this [...] Read more.
Exponential advances in computational power have fueled advances in many disciplines, and biology is no exception. High-Performance Computing (HPC) is gaining traction as one of the essential tools in scientific research. Further advances to exascale capabilities will necessitate more energy-efficient hardware. In this article, we present our efforts to improve the efficiency of genome assembly on ARM-based HPC systems. We use vectorization to optimize the popular genome assembly pipeline of minimap2, miniasm, and Racon. We compare different implementations using the Scalable Vector Extension (SVE) instruction set architecture and evaluate their performance in different aspects. Additionally, we compare the performance of autovectorization to hand-tuned code with intrinsics. Lastly, we present the design of a CPU dispatcher included in the Racon consensus module that enables the automatic selection of the fastest instruction set supported by the utilized CPU. Our findings provide a promising direction for further optimization of genome assembly on ARM-based HPC systems. Full article
Show Figures

Figure 1

22 pages, 2166 KiB  
Article
Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments
by Luca Crocetti, Pietro Nannipieri, Stefano Di Matteo and Sergio Saponara
Electronics 2023, 12(23), 4843; https://doi.org/10.3390/electronics12234843 - 30 Nov 2023
Cited by 1 | Viewed by 1592
Abstract
Cyberattacks and cybercriminal activities constitute one of the biggest threats in the modern digital era, and the frequency, efficiency, and severity of attacks have grown over the years. Designers and producers of digital systems try to counteract such issues by exploiting increasingly robust [...] Read more.
Cyberattacks and cybercriminal activities constitute one of the biggest threats in the modern digital era, and the frequency, efficiency, and severity of attacks have grown over the years. Designers and producers of digital systems try to counteract such issues by exploiting increasingly robust and advanced security mechanisms to provide secure execution environments aimed at preventing cyberattacks or, in the worst case, at containing intrusions by isolation. One of the most significative examples comes from General Purpose Processor (GPP) manufacturers such as Intel, AMD, and ARM, which in the last years adopted the integration of dedicated resources to provide Trusted Execution Environments (TEEs) or secure zones. TEEs are built layer by layer on top of an implicitly trusted component, the Root-of-Trust (RoT). Since each security chain is only as strong as its weakest link, each element involved in the construction of a TEE starting from the RoT must be bulletproof as much as possible. In this work, we revise and propose a design methodology to implement in both hardware (HW) and software (SW) highly featured and robust security blocks by highlighting the key points that designers should take care of, and the key metrics that should be used to evaluate the security level of the developed modules. We also include an analysis of the state of the art concerning RoT-based TEEs, and we illustrate a case study that documents the implementation of a cryptographic coprocessor for the secure subsystem of the Rhea GPP from the European Processor Initiative (EPI) project, according to the presented methodology. This work can be used by HW/SW security module designers as a cutting-edge guideline. Full article
(This article belongs to the Special Issue Recent Advances in Computer Security and Online Privacy)
Show Figures

Figure 1

18 pages, 1244 KiB  
Article
A Qualitative Investigation of European Grain Legume Supply Markets through the Lens of Agroecology in Four Companies
by Rikke Lybæk and Henrik Hauggaard-Nielsen
Sustainability 2023, 15(7), 6103; https://doi.org/10.3390/su15076103 - 31 Mar 2023
Cited by 2 | Viewed by 2300
Abstract
Four companies in Europe were chosen as case studies using an information-oriented selection procedure on the basis of their location, processing equipment and size, and through the adoption of a “maximum variation” approach. The purpose was to investigate how legume processors of various [...] Read more.
Four companies in Europe were chosen as case studies using an information-oriented selection procedure on the basis of their location, processing equipment and size, and through the adoption of a “maximum variation” approach. The purpose was to investigate how legume processors of various sizes and in different locations in the European protein legume market are working to increase their market share within the paradigm of efficiency gains from agricultural specialisation and trade in order to improve both food availability and security. After identifying company typologies and characteristics, the company case studies along the legume value chain were investigated. The analysis revealed that the supply market for grain legumes is expected to grow rapidly, and the various processors are increasing their market shares in terms of product type and geography. Based on the principles of agroecology and levels of food system change, the companies were found to be adopting promising business strategies, but are not disrupting the competitive patterns among existing European legume supply companies and food consumers that dominate the current regime. System change is far from taking place. However, conventional perspectives are being challenged and new ways of operating are being developed, indicating that a significant transition can be initiated that would move legumes away from being a niche sector, demonstrating to legume processors and consumers in the regime that there is an alternative and more sustainable pathway for the future, possibly stimulating larger-scale initiatives. Full article
(This article belongs to the Special Issue Sustainable Food System Transition)
Show Figures

Figure 1

17 pages, 1037 KiB  
Article
The Diversification and Enhancement of an IDS Scheme for the Cybersecurity Needs of Modern Supply Chains
by Dimitris Deyannis, Eva Papadogiannaki, Grigorios Chrysos, Konstantinos Georgopoulos and Sotiris Ioannidis
Electronics 2022, 11(13), 1944; https://doi.org/10.3390/electronics11131944 - 22 Jun 2022
Cited by 5 | Viewed by 4890
Abstract
Despite the tremendous socioeconomic importance of supply chains (SCs), security officers and operators are faced with no easy and integrated way for protecting their critical, and interconnected, infrastructures from cyber-attacks. As a result, solutions and methodologies that support the detection of malicious activity [...] Read more.
Despite the tremendous socioeconomic importance of supply chains (SCs), security officers and operators are faced with no easy and integrated way for protecting their critical, and interconnected, infrastructures from cyber-attacks. As a result, solutions and methodologies that support the detection of malicious activity on SCs are constantly researched into and proposed. Hence, this work presents the implementation of a low-cost reconfigurable intrusion detection system (IDS), on the edge, that can be easily integrated into SC networks, thereby elevating the featured levels of security. Specifically, the proposed system offers real-time cybersecurity intrusion detection over high-speed networks and services by offloading elements of the security check workloads on dedicated reconfigurable hardware. Our solution uses a novel framework that implements the Aho–Corasick algorithm on the reconfigurable fabric of a multi-processor system-on-chip (MPSoC), which supports parallel matching for multiple network packet patterns. The initial performance evaluation of this proof-of-concept shows that it holds the potential to outperform existing software-based solutions while unburdening SC nodes from demanding cybersecurity check workloads. The proposed system performance and its efficiency were evaluated using a real-life environment in the context of European Union’s Horizon 2020 research and innovation program, i.e., CYRENE. Full article
(This article belongs to the Special Issue Energy-Efficient Processors, Systems, and Their Applications)
Show Figures

Figure 1

18 pages, 824 KiB  
Review
Design and Test of an Integrated Random Number Generator with All-Digital Entropy Source
by Luca Crocetti, Stefano Di Matteo, Pietro Nannipieri, Luca Fanucci and Sergio Saponara
Entropy 2022, 24(2), 139; https://doi.org/10.3390/e24020139 - 18 Jan 2022
Cited by 18 | Viewed by 5069
Abstract
In the cybersecurity field, the generation of random numbers is extremely important because they are employed in different applications such as the generation/derivation of cryptographic keys, nonces, and initialization vectors. The more unpredictable the random sequence, the higher its quality and the lower [...] Read more.
In the cybersecurity field, the generation of random numbers is extremely important because they are employed in different applications such as the generation/derivation of cryptographic keys, nonces, and initialization vectors. The more unpredictable the random sequence, the higher its quality and the lower the probability of recovering the value of those random numbers for an adversary. Cryptographically Secure Pseudo-Random Number Generators (CSPRNGs) are random number generators (RNGs) with specific properties and whose output sequence has such a degree of randomness that it cannot be distinguished from an ideal random sequence. In this work, we designed an all-digital RNG, which includes a Deterministic Random Bit Generator (DRBG) that meets the security requirements for cryptographic applications as CSPRNG, plus an entropy source that showed high portability and a high level of entropy. The proposed design has been intensively tested against both NIST and BSI suites to assess its entropy and randomness, and it is ready to be integrated into the European Processor Initiative (EPI) chip. Full article
(This article belongs to the Special Issue Review Papers for Entropy)
Show Figures

Figure 1

20 pages, 1586 KiB  
Article
Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications
by Stefano Di Matteo, Luca Baldanzi, Luca Crocetti, Pietro Nannipieri, Luca Fanucci and Sergio Saponara
Energies 2021, 14(15), 4676; https://doi.org/10.3390/en14154676 - 1 Aug 2021
Cited by 47 | Viewed by 9333
Abstract
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low latencies are required, along with security requirements to protect the large number of attack surfaces to which IoT devices are exposed. Elliptic Curve Cryptography (ECC) is largely adopted in [...] Read more.
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low latencies are required, along with security requirements to protect the large number of attack surfaces to which IoT devices are exposed. Elliptic Curve Cryptography (ECC) is largely adopted in an IoT context to provide security services such as key-exchange and digital signature. For Real-Time IoT applications, hardware acceleration for ECC-based algorithms can be mandatory to meet low-latency and low-power/energy requirements. In this paper, we propose a fast and configurable hardware accelerator for NIST P-256/-521 elliptic curves, developed in the context of the European Processor Initiative. The proposed architecture supports the most used cryptography schemes based on ECC such as Elliptic Curve Digital Signature Algorithm (ECDSA), Elliptic Curve Integrated Encryption Scheme (ECIES), Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Menezes-Qu-Vanstone (ECMQV). A modified version of Double-And-Add-Always algorithm for Point Multiplication has been proposed, which allows the execution of Point Addition and Doubling operations concurrently and implements countermeasures against power and timing attacks. A simulated approach to extract power traces has been used to assess the effectiveness of the proposed algorithm compared to classical algorithms for Point Multiplication. A constant-time version of the Shamir’s Trick has been adopted to speed-up the Double-Point Multiplication and modular inversion is executed using Fermat’s Little Theorem, reusing the internal modular multipliers. The accelerator has been verified on a Xilinx ZCU106 development board and synthesized on both 45 nm and 7 nm Standard-Cell technologies. Full article
(This article belongs to the Special Issue Near Real-Time Smart IoT Applications)
Show Figures

Graphical abstract

14 pages, 4730 KiB  
Article
Ten-Year Assessment of IASI Radiance and Temperature
by Marie Bouillon, Sarah Safieddine, Juliette Hadji-Lazaro, Simon Whitburn, Lieven Clarisse, Marie Doutriaux-Boucher, Dorothée Coppens, Thomas August, Elsa Jacquette and Cathy Clerbaux
Remote Sens. 2020, 12(15), 2393; https://doi.org/10.3390/rs12152393 - 25 Jul 2020
Cited by 23 | Viewed by 4151
Abstract
The Infrared Atmospheric Sounding Interferometers (IASIs) are three instruments flying on board the Metop satellites, launched in 2006 (IASI-A), 2012 (IASI-B), and 2018 (IASI-C). They measure infrared radiance from the Earth and atmosphere system, from which the atmospheric composition and temperature can be [...] Read more.
The Infrared Atmospheric Sounding Interferometers (IASIs) are three instruments flying on board the Metop satellites, launched in 2006 (IASI-A), 2012 (IASI-B), and 2018 (IASI-C). They measure infrared radiance from the Earth and atmosphere system, from which the atmospheric composition and temperature can be retrieved using dedicated algorithms, forming the Level 2 (L2) product. The operational near real-time processing of IASI data is conducted by the EUropean organisation for the exploitation of METeorological SATellites (EUMETSAT). It has improved over time, but due to IASI’s large data flow, the whole dataset has not yet been reprocessed backwards. A necessary step that must be completed before initiating this reprocessing is to uniformize the IASI radiance record (Level 1C), which has also changed with time due to various instrumental and software modifications. In 2019, EUMETSAT released a reprocessed IASI-A 2007–2017 radiance dataset that is consistent with both the L1C product generated after 2017 and with IASI-B. First, this study aimed to assess the changes in radiance associated with this update by comparing the operational and reprocessed datasets. The differences in the brightness temperature ranged from 0.02 K at 700 cm−1 to 0.1 K at 2200 cm−1. Additionally, two major updates in 2010 and 2013 were seen to have the largest impact. Then, we investigated the effects on the retrieved temperatures due to successive upgrades to the Level 2 processing chain. We compared IASI L2 with ERA5 reanalysis temperatures. We found differences of ~5–10 K at the surface and between 1 and 5 K in the atmosphere. These differences decreased abruptly after the release of the IASI L2 processor version 6 in 2014. These results suggest that it is not recommended to use the IASI inhomogeneous temperature products for trend analysis, both for temperature and trace gas trends. Full article
(This article belongs to the Section Atmospheric Remote Sensing)
Show Figures

Graphical abstract

8 pages, 2929 KiB  
Project Report
How Europe Is Preparing Its Core Solution for Exascale Machines and a Global, Sovereign, Advanced Computing Platform
by Mario Kovač, Philippe Notton, Daniel Hofman and Josip Knezović
Math. Comput. Appl. 2020, 25(3), 46; https://doi.org/10.3390/mca25030046 - 20 Jul 2020
Cited by 6 | Viewed by 5387
Abstract
In this paper, we present an overview of the European Processor Initiative (EPI), one of the cornerstones of the EuroHPC Joint Undertaking, a new European Union strategic entity focused on pooling the Union’s and national resources on HPC to acquire, build and deploy [...] Read more.
In this paper, we present an overview of the European Processor Initiative (EPI), one of the cornerstones of the EuroHPC Joint Undertaking, a new European Union strategic entity focused on pooling the Union’s and national resources on HPC to acquire, build and deploy the most powerful supercomputers in the world within Europe. EPI started its activities in December 2018. The first three years drew processor and platform designers, embedded software, middleware, applications and usage experts from 10 EU countries together to co-design Europe’s first HPC Systems on Chip and accelerators with its unique Common Platform (CP) technology. One of EPI’s core activities also takes place in the automotive sector, providing architectural solutions for a novel embedded high-performance computing (eHPC) platform and ensuring the overall economic viability of the initiative. Full article
(This article belongs to the Special Issue High-Performance Computing 2020)
Show Figures

Figure 1

16 pages, 4173 KiB  
Article
Sentinel-2 Satellites Provide Near-Real Time Evaluation of Catastrophic Floods in the West Mediterranean
by Isabel Caballero, Javier Ruiz and Gabriel Navarro
Water 2019, 11(12), 2499; https://doi.org/10.3390/w11122499 - 27 Nov 2019
Cited by 62 | Viewed by 8950
Abstract
Flooding is among the most common natural disasters in our planet and one of the main causes of economic and human life loss worldwide. Evidence suggests the increase of floods at European scale with the Mediterranean coast being critically vulnerable to this risk. [...] Read more.
Flooding is among the most common natural disasters in our planet and one of the main causes of economic and human life loss worldwide. Evidence suggests the increase of floods at European scale with the Mediterranean coast being critically vulnerable to this risk. The devastating event in the West Mediterranean during the second week of September 2019 is a clear case of this risk crystallization, when a record-breaking flood (locally called the “Cold Drop” (Gota Fría)) has swollen into a catastrophe to the southeast of Spain surpassing previous all-time records. By using a straightforward approach with the Sentinel-2 twin satellites from the Copernicus Programme and the ACOLITE atmospheric correction processor, an initial approximation of the delineated flooded zones, including agriculture and urban areas, was accomplished in quasi-real time. The robust and flexible approach requires no ancillary data for rapid implementation. A composite of pre- and post-flood images was obtained to identify change detection and mask water pixels. Sentinel-2 identifies not only impacts on land but also on water ecosystem and its services, providing information on water quality deterioration and concentration of suspended matter in highly sensitive environments. Subsequent water quality deterioration occurred in large portions of Mar Menor, the largest coastal lagoon in the Mediterranean. The present study demonstrates the potentials brought by the free and open-data policy of Sentinel-2, a valuable source of rapid synoptic spatio-temporal information at the local or regional scale to support scientists, managers, stakeholders, and society in general during and after the emergency. Full article
(This article belongs to the Special Issue Monitoring, Modelling and Management of Water Quality)
Show Figures

Graphical abstract

26 pages, 11010 KiB  
Article
Retrieval of Chlorophyll a from Sentinel-2 MSI Data for the European Union Water Framework Directive Reporting Purposes
by Ave Ansper and Krista Alikas
Remote Sens. 2019, 11(1), 64; https://doi.org/10.3390/rs11010064 - 31 Dec 2018
Cited by 206 | Viewed by 12522
Abstract
The European Parliament and The Council of the European Union have established the Water Framework Directive (2000/60/EC) for all European Union member states to achieve, at least, “good” ecological status of all water bodies larger than 50 hectares in Europe. The MultiSpectral Instrument [...] Read more.
The European Parliament and The Council of the European Union have established the Water Framework Directive (2000/60/EC) for all European Union member states to achieve, at least, “good” ecological status of all water bodies larger than 50 hectares in Europe. The MultiSpectral Instrument onboard European Space Agency satellite Sentinel-2 has suitable 10, 20, 60 m spatial resolution to monitor most of the Estonian lakes as required by the Water Framework Directive. The study aims to analyze the suitability of Sentinel-2 MultiSpectral Instrument data to monitor water quality in inland waters. This consists of testing various atmospheric correction processors to remove the influence of atmosphere and comparing and developing chlorophyll a algorithms to estimate the ecological status of water in Estonian lakes. This study shows that the Sentinel-2 MultiSpectral Instrument is suitable for estimating chlorophyll a in water bodies and tracking the spatial and temporal dynamics in the lakes. However, atmospheric corrections are sensitive to surrounding land and often fail in narrow and small lakes. Due to that, deriving satellite-based chlorophyll a is not possible in every case, but initial results show the Sentinel-2 MultiSpectral Instrument could still provide complementary information to in situ data to support Water Framework Directive monitoring requirements. Full article
Show Figures

Figure 1

Back to TopTop