Please login to be able to save your searches and receive alerts for new content matching your search criteria.
The rapid development of the research and study market has enhanced the intensity of market competition among enterprises, making the growth path of research and study entrepreneurial enterprises more complex. In order to enhance the growth path and deeply optimize the enterprise development strategy, this paper constructs an enterprise relationship analysis model using complex network analysis to help research and learning enterprises grasp the state of the market environment. It also analyzes customer information through the on-chip system integrated with embedded neural network to provide data information for enterprise product design optimization. The experimental results show that the model can effectively analyze the strength of the correlation between the research and learning entrepreneurial enterprises and other enterprises, and help the enterprises to understand their dominance over resources and information. In addition, the enterprise model in this paper is also able to analyze the market positioning deviation rate of enterprise research and learning products, and the research and learning products adjusted according to the results of the model analysis effectively enhance the efficiency of resource utilization, strengthen the enterprise’s dominance over resources and information in the network, improve the competitiveness of the enterprise’s market, and contribute to the shortening of the enterprise’s growth path and the optimization of the development strategy.
In the new generation of power grids, the smart grid (SG) integrates sophisticated characteristics, including situation awareness, two-way communication, and distributed energy supplies. Integrated SG uses various operational metrics, including devices with sensors, meters, and renewable power sources. There are several challenges when securely disposing and storing electricity data acquired from an SG. It is vulnerable to cyberattacks due to its digitization and integration of an increasing number of links. Issues with latency, security, privacy, and excessive bandwidth consumption will arise when this enormous amount of data is transmitted directly to the cloud. Edge computing (EC) solves this problem by moving data processing to the network’s periphery, close to the embedded devices. With improved data processing speeds, a more responsive and resilient grid may be achieved, instantly responding to energy demand and supply changes. EC reduces the volume of sensitive data sent to central servers, reducing potential security breaches. Data may be better protected from intrusions by being analyzed locally and only pertinent information transferred to the cloud. Thus, a blockchain is an intriguing SG paradigm solution with many benefits. The SG’s decentralization and improved cybersecurity have prompted a lot of work into using blockchain technology; since it is well-known that data saved in the blockchain is immutable, it is crucial to find foolproof ways to verify data are accurate and comply with high-quality standards before storing it in the blockchain. A practical solution for storing precise power data that enables the safe execution of adaptable transactions is a Cloud-Edge Fusion Blockchain model for the smart grid (CEFBM-SG). Consequently, the SG’s dependability, resilience, and scalability will be improved as the number of distributed energy sources (DERs) connected to it increases. Utilizing the idea of computing at the edge to enhance responsiveness and dependability. Executed security analyses and performance evaluations demonstrate CEFBM-SG’s exceptional security and efficiency.
A new general multistep predictor-corrector (PC) pair form is introduced for the numerical integration of second-order initial-value problems. Using this form, a new symmetric eight-step predictor-corrector method with minimal phase-lag and algebraic order ten is also constructed. The new method is based on the multistep symmetric method of Quinlan–Tremaine,1 with eight steps and 8th algebraic order and is constructed to solve numerically the radial time-independent Schrödinger equation. It can also be used to integrate related IVPs with oscillating solutions such as orbital problems. We compare the new method to some recently constructed optimized methods from the literature. We measure the efficiency of the methods and conclude that the new method with minimal phase-lag is the most efficient of all the compared methods and for all the problems solved.
Model stealing attack may happen by stealing useful data transmitted from embedded end to server end for an artificial intelligent systems. In this paper, we are interested in preventing model stealing of neural network for resource-constrained systems. We propose an Image Encryption based on Class Activation Map (IECAM) to encrypt information before transmitting in embedded end. According to class activation map, IECAM chooses certain key areas of the image to be encrypted with the purpose of reducing the model stealing risk of neural network. With partly encrypted information, IECAM can greatly reduce the time overheads of encryption/decryption in both embedded and server ends, especially for big size images. The experimental results demonstrate that our method can significantly reduce time overheads of encryption/decryption and the risk of model stealing compared with traditional methods.
An embedded, real-time, loosely-coupled INS/GPS integration system has been developed and used for an unmanned land vehicle's control and navigation. For this integrated system, a Kalman filter software is used for INS error damping and corrections via the weighted aiding of a GPS output. The detailed development work will be presented in this paper including algorithm simplification, sensor selection and critical problems solving. Vehicular trial is also conducted. Simulated outage in GPS availability is made to assess the bridging accuracy of this system.
Embedded ring injury is rarely encountered in clinical practice, and most of the few reported cases share common features, including deliberate neglect, mental illness, poor social support, female gender, and adult age group. Ischemia has never been reported in such injuries. Here, we report the case of a 16-year-old girl who presented with a completely embedded ring in the right index finger and a partially embedded ring in the left ring finger. Revascularization after ring embedment probably explains the intact vessel that was observed on the outer aspect of the embedded ring during surgical exploration of the right index finger.
Nickel nanoparticles embedded in mesoporous silica (Ni/SiO2) were successfully synthesized by microwave-assisted in situ self-assembly method using colloidal silica, urea and nickel nitrate as precursors and glucose as carbon template, which resulted in mesoporous structure of silica through removal of template. Ni nanoparticles were uniformly well-dispersed within mesoporous silica, which were 3.5–4.0nm in diameter and had a very narrow particle size distribution. In addition, particle size of Ni nanoparticles can be controllably adjusted by microwave power. As-prepared Ni/SiO2 catalyst exhibited better catalytic activity for reduction of 4-nitrophenol (4-NP) to 4-aminophenol (4-AP) than Ni/SiO2-IM catalyst, which was mainly attributed to confinement effect of mesoporous silica support. This simple and versatile method can also be extended to cover many kinds of other supported catalysts for broad applications in many other catalytic reactions in the future.
Chronic embedded-ring injury is a rare and uncommon presentation. This is also known as “chronic ring erosion” or “embedded ring syndrome” in the literature. Injury of this type has been associated with psychological impairment causing neglect of such injury. We herein describe a case of double embedded rings on the right ring finger in a 30-year-old healthy construction worker. A primary amputation at the metacarpophalangeal joint was performed in view of the chronicity of his condition and associated neurovascular damage. Early removal of ring is of paramount importance in any ring-associated injuries. However, fear of losing a digit has been the reason of delay in seeking medical treatment, which in turn ended up in dire consequences.
As an open source micro kernel embedded operating system, μC/OS-II does not take into account at its design beginning the system security due to the source code being open and the kernel being small. In order to ensure the good security of its Kernel, it is necessary to provide a security protection mechanism for the event trigger module in the μC/OS-II kernel. Based on μC/OS-II, this paper designs a set of mandatory access control policy based on BLP model and Biba model, which ensures the security control of the system access by using the common access control framework (GFAC) and the security attribute mapping table. The experimental results show that the designed access control method meets the design requirements, strengthens the security of the kernel and has good application performance.
A new method to realize hi-speed dynamic scanning curve is proposed based on Qt_E, in light of such problems in the embedded measurement system as Graphical user interface (GUI) takes up large space, has low operating efficiency and weak real-time performance. We analyzed the main characteristics of industrial equipment testing technology and added external plug-in library to basic library of Qt_E. Multi-threading technology is used that can simultaneously realize data collection, analysis and the function of parallel processing of the real-time display so as to ensure real-time performance and rapidity of GUI. The research experiment shows, hi-speed dynamic data display window was realized by making use of Qwt plug-in, fast and real-time, and can operate steadily in the environment of Linux embedded platform and provide good technical support for industrial equipment to realize hi-speed dynamic data display.
Traditional multimedia transmission systems use analog signals to transmit voices and images, but analog signals are easy to be interfered, do not have safety assurance and lack control function. This paper studies the framework of audio/video system driver and carries out structured design for the driver: 1. Divide the driver into three modules, including control/configuration module, data transmission module and system control module; 2. Provide 4 interface functions for the upper layer; 3. Use two types of data buffers. Finally, it realizes driver codes. At present, the whole system operation is normal and stable.