With the development of Ethernet systems and the growing capacity of modem silicon technology, embedded communication networks are playing an increasingly important role in embedded and safety critical systems. Hardwa...With the development of Ethernet systems and the growing capacity of modem silicon technology, embedded communication networks are playing an increasingly important role in embedded and safety critical systems. Hardware/software co-design is a methodology for solving design problems in processor based embedded systems. In this work, we implemented a new 1-cycle pipeline microprocessor and a fast Ethemet transceiver and established a low cost, high performance embedded network controller, and designed a TCP/IP stack to access the Intemet. We discussed the hardware/software architecture in the forepart, and then the whole system-on-a-chip on Altera Stratix EP1S25F780C6 device. Using the FPGA environment and SmartBit tester, we tested the system's throughput. Our simulation results showed that the maximum throughput of Ethemet packets is up to 7 Mbps, that of UDP packets is up to 5.8 Mbps, and that of TCP packets is up to 3.4 Mbps, which showed that this embedded system can easily transmit basic voice and video signals through Ethemet, and that using only one chip can realize that many electronic devices access to the Intemet directly and get high performance.展开更多
Thrust estimation is a significant part of aeroengine thrust control systems.The traditional estimation methods are either low in accuracy or large in computation.To further improve the estimation effect,a thrust esti...Thrust estimation is a significant part of aeroengine thrust control systems.The traditional estimation methods are either low in accuracy or large in computation.To further improve the estimation effect,a thrust estimator based on Multi-layer Residual Temporal Convolutional Network(M-RTCN)is proposed.To solve the problem of dead Rectified Linear Unit(ReLU),the proposed method uses the Gaussian Error Linear Unit(GELU)activation function instead of ReLU in residual block.Then the overall architecture of the multi-layer convolutional network is adjusted by using residual connections,so that the network thrust estimation effect and memory consumption are further improved.Moreover,the comparison with seven other methods shows that the proposed method has the advantages of higher estimation accuracy and faster convergence speed.Furthermore,six neural network models are deployed in the embedded controller of the micro-turbojet engine.The Hardware-in-the-Loop(HIL)testing results demonstrate the superiority of M-RTCN in terms of estimation accuracy,memory occupation and running time.Finally,an ignition verification is conducted to confirm the expected thrust estimation and real-time performance.展开更多
A new technique for designing a varactor-tunable frequency selective surface (FSS) with an embedded bias network is proposed and experimentally verified. The proposed FSS is based on a square-ring slot FSS. The freq...A new technique for designing a varactor-tunable frequency selective surface (FSS) with an embedded bias network is proposed and experimentally verified. The proposed FSS is based on a square-ring slot FSS. The frequency tuning is achieved by inserting varactor diodes between the square mesh and each unattached square patch. The square mesh is divided into two parts for biasing the varactor diodes. Full-wave numerical simulations show that a wide tuning range can be achieved by changing the capacitances of these loaded varactors. Two homo-type samples using fixed lumped capacitors are fabricated and measured using a standard waveguide measurement setup. Excellent agreement between the measured and simulated results is demonstrated.展开更多
A new-style remote monitoring system is proposed, which is based on enterprises' embedded web servers and can be widely used in enterprises' networked manufacturing systems. The principle and characteristics o...A new-style remote monitoring system is proposed, which is based on enterprises' embedded web servers and can be widely used in enterprises' networked manufacturing systems. The principle and characteristics of remote monitoring system based on embedded web server are analyzed. Such a kind of system for networked manufacturing is designed, and it proves efficient and feasible in promoting communication among enterprises, improving designing and scheduling, decreasing facility failure and reducing product cost.展开更多
Because of computational complexity,the deep neural network(DNN)in embedded devices is usually trained on high-performance computers or graphic processing units(GPUs),and only the inference phase is implemented in emb...Because of computational complexity,the deep neural network(DNN)in embedded devices is usually trained on high-performance computers or graphic processing units(GPUs),and only the inference phase is implemented in embedded devices.Data processed by embedded devices,such as smartphones and wearables,are usually personalized,so the DNN model trained on public data sets may have poor accuracy when inferring the personalized data.As a result,retraining DNN with personalized data collected locally in embedded devices is necessary.Nevertheless,retraining needs labeled data sets,while the data collected locally are unlabeled,then how to retrain DNN with unlabeled data is a problem to be solved.This paper proves the necessity of retraining DNN model with personalized data collected in embedded devices after trained with public data sets.It also proposes a label generation method by which a fake label is generated for each unlabeled training case according to users’feedback,thus retraining can be performed with unlabeled data collected in embedded devices.The experimental results show that our fake label generation method has both good training effects and wide applicability.The advanced neural networks can be trained with unlabeled data from embedded devices and the individualized accuracy of the DNN model can be gradually improved along with personal using.展开更多
This paper presents a new encryption embedded processor aimed at the application requirement of wireless sensor network (WSN). The new encryption embedded processor not only offers Rivest Shamir Adlemen (RSA), Adv...This paper presents a new encryption embedded processor aimed at the application requirement of wireless sensor network (WSN). The new encryption embedded processor not only offers Rivest Shamir Adlemen (RSA), Advanced Encryption Standard (AES), 3 Data Encryption Standard (3 DES) and Secure Hash Algorithm 1 (SHA - 1 ) security engines, but also involves a new memory encryption scheme. The new memory encryption scheme is implemented by a memory encryption cache (MEC), which protects the confidentiality of the memory by AES encryption. The experi- ments show that the new secure design only causes 1.9% additional delay on the critical path and cuts 25.7% power consumption when the processor writes data back. The new processor balances the performance overhead, the power consumption and the security and fully meets the wireless sensor environment requirement. After physical design, the new encryption embedded processor has been successfully tape-out.展开更多
The interconnection of Solar PV to the Tarkwa Bulk Supply Point (BSP) has become necessary in order to provide additional capacity to meet the ever-increasing demand of Tarkwa and its environs during the day. The Sola...The interconnection of Solar PV to the Tarkwa Bulk Supply Point (BSP) has become necessary in order to provide additional capacity to meet the ever-increasing demand of Tarkwa and its environs during the day. The Solar PV Plant will support the Tarkwa BSP during the day. In this study, a grid impact analysis for the integration of Solar PV plant at three points of common coupling (PCC) at Tarkwa Bulk Supply Point’s (BSP) 33 kV network of the Electricity Company of Ghana was carried out. The three PCCs were Tarkwa BSP, Ghana Australia Gold (GAG) Substation and Darmang Substation. Simulations and detailed analysis were carried out with the use of CYME Software (Cyme 8.0 Rev 05). The Solar PV was integrated at varying penetration levels of 9 MWp, 11 MWp, 14 MWp, 16 MWp, 18 MWp, 20 MWp and 23 MWp (representing penetration levels of 40%, 50%, 60%, 70%, 80%, 90% and 100%, respectively) of the 2020 projected light demand of Tarkwa BSP 25.15 MVA network at an average power factor of 0.903. From the study, the optimum capacity of Solar PV power that could be connected is 9 MWp at an optimum inverter power factor of 0.94 lagging, and the GAG Substation was identified as the optimal location. The stiffness ratio at the optimal location was determined as 41.9, a figure which is far greater than the minimum standard value of 5, and gives an indication of very little voltage control problems in the operation of the proposed Solar PV interconnection. The integration of the optimum 9 MW Solar PV Plant to the Tarkwa network represents an additional 12.77% capacity, decreased the technical losses by 7.76%, and increased the voltage profile by 1.97%.展开更多
In recent years,with the development of the natural language processing(NLP)technologies,security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine...In recent years,with the development of the natural language processing(NLP)technologies,security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine binary similarity,achieved great progress.However,we found that the existing frameworks often ignored the complex internal structure of instructions and didn’t fully consider the long-term dependencies of instructions.In this paper,we propose firmVulSeeker—a vulnerability search tool for embedded firmware images,based on BERT and Siamese network.It first builds a BERT MLM task to observe and learn the semantics of different instructions in their context in a very large unlabeled binary corpus.Then,a finetune mode based on Siamese network is constructed to guide training and matching semantically similar functions using the knowledge learned from the first stage.Finally,it will use a function embedding generated from the fine-tuned model to search in the targeted corpus and find the most similar function which will be confirmed whether it’s a real vulnerability manually.We evaluate the accuracy,robustness,scalability and vulnerability search capability of firmVulSeeker.Results show that it can greatly improve the accuracy of matching semantically similar functions,and can successfully find more real vulnerabilities in real-world firmware than other tools.展开更多
In order to achieve remote control problems for the intelligent home appliances, The paper presents a realization method through the Internet and GSM remote to control appliances of smart home, and given circuit. And ...In order to achieve remote control problems for the intelligent home appliances, The paper presents a realization method through the Internet and GSM remote to control appliances of smart home, and given circuit. And described in detail the hardware and software design of smart home appliances and their control method. Test results show that the system is stable and reliable.展开更多
Neural organoids and confocal microscopy have the potential to play an important role in microconnectome research to understand neural patterns.We present PLayer,a plug-and-play embedded neural system,which demonstrat...Neural organoids and confocal microscopy have the potential to play an important role in microconnectome research to understand neural patterns.We present PLayer,a plug-and-play embedded neural system,which demonstrates the utilization of sparse confocal microscopy layers to interpolate continuous axial resolution.With an embedded system focused on neural network pruning,image scaling,and post-processing,PLayer achieves high-performance metrics with an average structural similarity index of 0.9217 and a peak signal-to-noise ratio of 27.75 dB,all within 20 s.This represents a significant time saving of 85.71%with simplified image processing.By harnessing statistical map estimation in interpolation and incorporating the Vision Transformer–based Restorer,PLayer ensures 2D layer consistency while mitigating heavy computational dependence.As such,PLayer can reconstruct 3D neural organoid confocal data continuously under limited computational power for the wide acceptance of fundamental connectomics and pattern-related research with embedded devices.展开更多
In the digital economy era,many manufacturing enterprises are leveraging digital service enterprises to enhance their digital innovation processes.This paper introduces the concept of“digital innovation network embed...In the digital economy era,many manufacturing enterprises are leveraging digital service enterprises to enhance their digital innovation processes.This paper introduces the concept of“digital innovation network embeddedness”to describe this trend.Unlike traditional strategic resources,which are constrained by high-value,relatively static,restricted flow,and exclusivity,digital resources demonstrate superior fluidity,non-rivalrous access,and high value-driven interdependencies.To bridge this theoretical gap,this study examines the distinctive attributes of digital resources through the dual lenses of resource orchestration theory and dynamic capability theory.Specifically,it proposes big data capability as a mediating mechanism and organizational structure flexibility as a critical moderating factor.Developing this integrated research framework aims to elucidate the underlying mechanisms through which digital innovation network embeddedness dynamically shapes new product development(NPD)performance.Ultimately,this study seeks to advance theoretical understanding and provide actionable insights for digitally empowered manufacturing enterprises to enhance their NPD outcomes.The framework is tested using data from 559 manufacturing enterprises located in South China.There are three findings.(1)An inverted U-shaped relationship exists between digital innovation network structure and NPD performance,and between relationship embeddedness and NPD performance,respectively.(2)Big data capability mediates the relationship between moderate levels of digital innovation network embeddedness and NPD performance.However,at high levels of digital innovation network embeddedness,big data capability does not significantly mediate the relationship between digital innovation network structure/relationship embeddedness and NPD performance,respectively.(3)Organizational structure flexibility positively moderates the relationship between digital innovation network relationship embeddedness,big data capability,and NPD performance.Moreover,while mediated moderation occurred,the direct moderation effect on digital innovation network embeddedness is nonsignificant.The conclusions of this study provide insights for manufacturing enterprises seeking to enhance NPD performance within the context of digital innovation network embeddedness.展开更多
Sensor network has experienced world-wide explosive interests in recent years. It combines the technology of modern microelectronic sensors, embedded computational processing systems, and modern computer and wireless ...Sensor network has experienced world-wide explosive interests in recent years. It combines the technology of modern microelectronic sensors, embedded computational processing systems, and modern computer and wireless networking methodologies. In this overview paper, we first provide some rationales for the growth of sensor networking. Then we discuss various basic concepts and hardware issues. Four basic application cases in the US. National Science Foundation funded Ceneter for Embedded Networked Sensing program at UCLA are presented. Finally, six challenging issues in sensor networks are discussed. Numerous references including relevant papers, books, and conferences that have appeared in recent years are given.展开更多
Severe well interference through complex fracture networks(CFNs)can be observed among multi-well pads in low permeability reservoirs.The well interference analysis between multi-fractured horizontal wells(MFHWs)is vit...Severe well interference through complex fracture networks(CFNs)can be observed among multi-well pads in low permeability reservoirs.The well interference analysis between multi-fractured horizontal wells(MFHWs)is vitally important for reservoir effective development.Well interference has been historically investigated by pressure transient analysis,while it has shown that rate transient analysis has great potential in well interference diagnosis.However,the impact of complex fracture networks(CFNs)on rate transient behavior of parent well and child well in unconventional reservoirs is still not clear.To further investigate,this paper develops an integrated approach combining pressure and rate transient analysis for well interference diagnosis considering CFNs.To perform multi-well simulation considering CFNs,non-intrusive embedded discrete fracture model approach was applied for coupling fracture with reservoir models.The impact of CFN including natural fractures and frac-hits on pressure and rate transient behavior in multi-well system was investigated.On a logelog plot,interference flow and compound linear flow are two new flow regimes caused by nearby producers.When both NFs and frac-hits are present in the reservoir,frac-hits have a greater impact on well#1 which contains frac-hits,and NFs have greater impact on well#3 which does not have frac-hits.For all well producing circumstances,it might be challenging to see divergence during pseudosteady state flow brought on by frac-hits on the logelog plot.Besides,when NFs occur,reservoir depletion becomes noticeable in comparison to frac-hits in pressure distribution.Application of this integrated approach demonstrates that it works well to characterize the well interference among different multi-fractured horizontal wells in a well pad.Better reservoir evaluation can be acquired based on the new features observed in the novel model,demonstrating the practicability of the proposed approach.The findings of this study can help for better evaluating well interference degree in multi-well systems combing PTA and RTA,which can reduce the uncertainty and improve the accuracy of the well interference analysis based on both field pressure and rate data.展开更多
This paper presents the design and implementation of access controller used for Ethernet passive optical network ( EPON). As a first step to develop an ASIC product, the entire system is designed on a field programm...This paper presents the design and implementation of access controller used for Ethernet passive optical network ( EPON). As a first step to develop an ASIC product, the entire system is designed on a field programmable gate array (FPGA) with an embedded CPU. To reduce working frequency of the FPGA, the byte-to-word conversion is proposed. Propagation delays are equalized by ranging procedure so as to avoid data collision. Implementations of synchronization, classification, as well as Linux porting are illustrated in detail. The interface between the FPGA and CPU are also presented. Experimental results show that the proposed system can properly function in a relatively low cost FPGA.展开更多
The conservative Additive Increase Multiplicative Decrease mechanism of traditional TCP causes the link under-utilization in the Wide Area Networks(WANs) due to the WANs' intrinsic nature of high latency and high ...The conservative Additive Increase Multiplicative Decrease mechanism of traditional TCP causes the link under-utilization in the Wide Area Networks(WANs) due to the WANs' intrinsic nature of high latency and high packet loss.To alleviate the problem,we present the design and implantation of STAG,an Acceleration Gateway with Split-TCP in the paper.STAG is built on embedded network equipment and acts as a transparent proxy.In STAG,a new improved congestion control method named Rapid TCP is adopted,which determines whether or not to decrease the congestion window based on the packet loss trend.In particular,in the fast recovery phase,it chooses different window adjustment strategies based on the current size of congestion window to achieve higher utilization.The performance validation of STAG is done on both our emulation testbed and the real wide area network.The results show that STAG with Rapid TCP effectively adapts to the high loss network environment and significantly speeds up the applications without loss of fairness.展开更多
The generation method of three-dimensional fractal discrete fracture network(FDFN)based on multiplicative cascade process was developed.The complex multi-scale fracture system in shale after fracturing was characteriz...The generation method of three-dimensional fractal discrete fracture network(FDFN)based on multiplicative cascade process was developed.The complex multi-scale fracture system in shale after fracturing was characterized by coupling the artificial fracture model and the natural fracture model.Based on an assisted history matching(AHM)using multiple-proxy-based Markov chain Monte Carlo algorithm(MCMC),an embedded discrete fracture modeling(EDFM)incorporated with reservoir simulator was used to predict productivity of shale gas well.When using the natural fracture generation method,the distribution of natural fracture network can be controlled by fractal parameters,and the natural fracture network generated coupling with artificial fractures can characterize the complex system of different-scale fractures in shale after fracturing.The EDFM,with fewer grids and less computation time consumption,can characterize the attributes of natural fractures and artificial fractures flexibly,and simulate the details of mass transfer between matrix cells and fractures while reducing computation significantly.The combination of AMH and EDFM can lower the uncertainty of reservoir and fracture parameters,and realize effective inversion of key reservoir and fracture parameters and the productivity forecast of shale gas wells.Application demonstrates the results from the proposed productivity prediction model integrating FDFN,EDFM and AHM have high credibility.展开更多
A new Runge-Kutta (PK) fourth order with four stages embedded method with error control is presentea m this paper for raster simulation in cellular neural network (CNN) environment. Through versatile algorithm, si...A new Runge-Kutta (PK) fourth order with four stages embedded method with error control is presentea m this paper for raster simulation in cellular neural network (CNN) environment. Through versatile algorithm, single layer/raster CNN array is implemented by incorporating the proposed technique. Simulation results have been obtained, and comparison has also been carried out to show the efficiency of the proposed numerical integration algorithm. The analytic expressions for local truncation error and global truncation error are derived. It is seen that the RK-embedded root mean square outperforms the RK-embedded Heronian mean and RK-embedded harmonic mean.展开更多
An autonomous vehicle operates in a dynamically changing environment,where multiple sensors must work in a cooperative mode. In these scenarios reliability of the communication protocol carries a lot of importance in ...An autonomous vehicle operates in a dynamically changing environment,where multiple sensors must work in a cooperative mode. In these scenarios reliability of the communication protocol carries a lot of importance in real time data transfer. In this paper, CAN communication is used to demonstrate sensor integration using a LIDAR and a camera. Also demonstrated is a novel method for object detection, obstacle avoidance and navigation of an autonomous RC vehicle.展开更多
文摘With the development of Ethernet systems and the growing capacity of modem silicon technology, embedded communication networks are playing an increasingly important role in embedded and safety critical systems. Hardware/software co-design is a methodology for solving design problems in processor based embedded systems. In this work, we implemented a new 1-cycle pipeline microprocessor and a fast Ethemet transceiver and established a low cost, high performance embedded network controller, and designed a TCP/IP stack to access the Intemet. We discussed the hardware/software architecture in the forepart, and then the whole system-on-a-chip on Altera Stratix EP1S25F780C6 device. Using the FPGA environment and SmartBit tester, we tested the system's throughput. Our simulation results showed that the maximum throughput of Ethemet packets is up to 7 Mbps, that of UDP packets is up to 5.8 Mbps, and that of TCP packets is up to 3.4 Mbps, which showed that this embedded system can easily transmit basic voice and video signals through Ethemet, and that using only one chip can realize that many electronic devices access to the Intemet directly and get high performance.
基金co-supported by the National Natural Science Foundation of China(Nos.61890920,61890921)。
文摘Thrust estimation is a significant part of aeroengine thrust control systems.The traditional estimation methods are either low in accuracy or large in computation.To further improve the estimation effect,a thrust estimator based on Multi-layer Residual Temporal Convolutional Network(M-RTCN)is proposed.To solve the problem of dead Rectified Linear Unit(ReLU),the proposed method uses the Gaussian Error Linear Unit(GELU)activation function instead of ReLU in residual block.Then the overall architecture of the multi-layer convolutional network is adjusted by using residual connections,so that the network thrust estimation effect and memory consumption are further improved.Moreover,the comparison with seven other methods shows that the proposed method has the advantages of higher estimation accuracy and faster convergence speed.Furthermore,six neural network models are deployed in the embedded controller of the micro-turbojet engine.The Hardware-in-the-Loop(HIL)testing results demonstrate the superiority of M-RTCN in terms of estimation accuracy,memory occupation and running time.Finally,an ignition verification is conducted to confirm the expected thrust estimation and real-time performance.
基金supported by the National Natural Science Foundation of China (Grant Nos. 60901029, 61172148, and 60925005)the Natural Science Foundation of Shaanxi Province, China (Grant No. 2011JQ8040)
文摘A new technique for designing a varactor-tunable frequency selective surface (FSS) with an embedded bias network is proposed and experimentally verified. The proposed FSS is based on a square-ring slot FSS. The frequency tuning is achieved by inserting varactor diodes between the square mesh and each unattached square patch. The square mesh is divided into two parts for biasing the varactor diodes. Full-wave numerical simulations show that a wide tuning range can be achieved by changing the capacitances of these loaded varactors. Two homo-type samples using fixed lumped capacitors are fabricated and measured using a standard waveguide measurement setup. Excellent agreement between the measured and simulated results is demonstrated.
基金Funded by China 863 R&D Program (No:2001AA414630)
文摘A new-style remote monitoring system is proposed, which is based on enterprises' embedded web servers and can be widely used in enterprises' networked manufacturing systems. The principle and characteristics of remote monitoring system based on embedded web server are analyzed. Such a kind of system for networked manufacturing is designed, and it proves efficient and feasible in promoting communication among enterprises, improving designing and scheduling, decreasing facility failure and reducing product cost.
基金supported by the National Natural Science Foundation of China under Grants No.61534002,No.61761136015,No.61701095.
文摘Because of computational complexity,the deep neural network(DNN)in embedded devices is usually trained on high-performance computers or graphic processing units(GPUs),and only the inference phase is implemented in embedded devices.Data processed by embedded devices,such as smartphones and wearables,are usually personalized,so the DNN model trained on public data sets may have poor accuracy when inferring the personalized data.As a result,retraining DNN with personalized data collected locally in embedded devices is necessary.Nevertheless,retraining needs labeled data sets,while the data collected locally are unlabeled,then how to retrain DNN with unlabeled data is a problem to be solved.This paper proves the necessity of retraining DNN model with personalized data collected in embedded devices after trained with public data sets.It also proposes a label generation method by which a fake label is generated for each unlabeled training case according to users’feedback,thus retraining can be performed with unlabeled data collected in embedded devices.The experimental results show that our fake label generation method has both good training effects and wide applicability.The advanced neural networks can be trained with unlabeled data from embedded devices and the individualized accuracy of the DNN model can be gradually improved along with personal using.
文摘This paper presents a new encryption embedded processor aimed at the application requirement of wireless sensor network (WSN). The new encryption embedded processor not only offers Rivest Shamir Adlemen (RSA), Advanced Encryption Standard (AES), 3 Data Encryption Standard (3 DES) and Secure Hash Algorithm 1 (SHA - 1 ) security engines, but also involves a new memory encryption scheme. The new memory encryption scheme is implemented by a memory encryption cache (MEC), which protects the confidentiality of the memory by AES encryption. The experi- ments show that the new secure design only causes 1.9% additional delay on the critical path and cuts 25.7% power consumption when the processor writes data back. The new processor balances the performance overhead, the power consumption and the security and fully meets the wireless sensor environment requirement. After physical design, the new encryption embedded processor has been successfully tape-out.
文摘The interconnection of Solar PV to the Tarkwa Bulk Supply Point (BSP) has become necessary in order to provide additional capacity to meet the ever-increasing demand of Tarkwa and its environs during the day. The Solar PV Plant will support the Tarkwa BSP during the day. In this study, a grid impact analysis for the integration of Solar PV plant at three points of common coupling (PCC) at Tarkwa Bulk Supply Point’s (BSP) 33 kV network of the Electricity Company of Ghana was carried out. The three PCCs were Tarkwa BSP, Ghana Australia Gold (GAG) Substation and Darmang Substation. Simulations and detailed analysis were carried out with the use of CYME Software (Cyme 8.0 Rev 05). The Solar PV was integrated at varying penetration levels of 9 MWp, 11 MWp, 14 MWp, 16 MWp, 18 MWp, 20 MWp and 23 MWp (representing penetration levels of 40%, 50%, 60%, 70%, 80%, 90% and 100%, respectively) of the 2020 projected light demand of Tarkwa BSP 25.15 MVA network at an average power factor of 0.903. From the study, the optimum capacity of Solar PV power that could be connected is 9 MWp at an optimum inverter power factor of 0.94 lagging, and the GAG Substation was identified as the optimal location. The stiffness ratio at the optimal location was determined as 41.9, a figure which is far greater than the minimum standard value of 5, and gives an indication of very little voltage control problems in the operation of the proposed Solar PV interconnection. The integration of the optimum 9 MW Solar PV Plant to the Tarkwa network represents an additional 12.77% capacity, decreased the technical losses by 7.76%, and increased the voltage profile by 1.97%.
文摘In recent years,with the development of the natural language processing(NLP)technologies,security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine binary similarity,achieved great progress.However,we found that the existing frameworks often ignored the complex internal structure of instructions and didn’t fully consider the long-term dependencies of instructions.In this paper,we propose firmVulSeeker—a vulnerability search tool for embedded firmware images,based on BERT and Siamese network.It first builds a BERT MLM task to observe and learn the semantics of different instructions in their context in a very large unlabeled binary corpus.Then,a finetune mode based on Siamese network is constructed to guide training and matching semantically similar functions using the knowledge learned from the first stage.Finally,it will use a function embedding generated from the fine-tuned model to search in the targeted corpus and find the most similar function which will be confirmed whether it’s a real vulnerability manually.We evaluate the accuracy,robustness,scalability and vulnerability search capability of firmVulSeeker.Results show that it can greatly improve the accuracy of matching semantically similar functions,and can successfully find more real vulnerabilities in real-world firmware than other tools.
文摘In order to achieve remote control problems for the intelligent home appliances, The paper presents a realization method through the Internet and GSM remote to control appliances of smart home, and given circuit. And described in detail the hardware and software design of smart home appliances and their control method. Test results show that the system is stable and reliable.
基金supported by the National Key R&D Program of China(Grant No.2021YFA1001000)the National Natural Science Foundation of China(Grant Nos.82111530212,U23A20282,and 61971255)+2 种基金the Natural Science Founda-tion of Guangdong Province(Grant No.2021B1515020092)the Shenzhen Bay Laboratory Fund(Grant No.SZBL2020090501014)the Shenzhen Science,Technology and Innovation Commission(Grant Nos.KJZD20231023094659002,JCYJ20220530142809022,and WDZC20220811170401001).
文摘Neural organoids and confocal microscopy have the potential to play an important role in microconnectome research to understand neural patterns.We present PLayer,a plug-and-play embedded neural system,which demonstrates the utilization of sparse confocal microscopy layers to interpolate continuous axial resolution.With an embedded system focused on neural network pruning,image scaling,and post-processing,PLayer achieves high-performance metrics with an average structural similarity index of 0.9217 and a peak signal-to-noise ratio of 27.75 dB,all within 20 s.This represents a significant time saving of 85.71%with simplified image processing.By harnessing statistical map estimation in interpolation and incorporating the Vision Transformer–based Restorer,PLayer ensures 2D layer consistency while mitigating heavy computational dependence.As such,PLayer can reconstruct 3D neural organoid confocal data continuously under limited computational power for the wide acceptance of fundamental connectomics and pattern-related research with embedded devices.
基金supported by the Post-Funded Project of the National Social Science Fund of China(No.23FGLB088)the General Project of the National Natural Science Foundation of China(No.71974059)+2 种基金the Ministry of Education in China Liberal Arts and Social Sciences Foundation(No.23YJA630124)the Development of Philosophy and Social Sciences in Guangzhou in 2021(No.2021GZYB12)the Guangdong Basic and Applied Basic Research Foundation(No.2024A1515030110).
文摘In the digital economy era,many manufacturing enterprises are leveraging digital service enterprises to enhance their digital innovation processes.This paper introduces the concept of“digital innovation network embeddedness”to describe this trend.Unlike traditional strategic resources,which are constrained by high-value,relatively static,restricted flow,and exclusivity,digital resources demonstrate superior fluidity,non-rivalrous access,and high value-driven interdependencies.To bridge this theoretical gap,this study examines the distinctive attributes of digital resources through the dual lenses of resource orchestration theory and dynamic capability theory.Specifically,it proposes big data capability as a mediating mechanism and organizational structure flexibility as a critical moderating factor.Developing this integrated research framework aims to elucidate the underlying mechanisms through which digital innovation network embeddedness dynamically shapes new product development(NPD)performance.Ultimately,this study seeks to advance theoretical understanding and provide actionable insights for digitally empowered manufacturing enterprises to enhance their NPD outcomes.The framework is tested using data from 559 manufacturing enterprises located in South China.There are three findings.(1)An inverted U-shaped relationship exists between digital innovation network structure and NPD performance,and between relationship embeddedness and NPD performance,respectively.(2)Big data capability mediates the relationship between moderate levels of digital innovation network embeddedness and NPD performance.However,at high levels of digital innovation network embeddedness,big data capability does not significantly mediate the relationship between digital innovation network structure/relationship embeddedness and NPD performance,respectively.(3)Organizational structure flexibility positively moderates the relationship between digital innovation network relationship embeddedness,big data capability,and NPD performance.Moreover,while mediated moderation occurred,the direct moderation effect on digital innovation network embeddedness is nonsignificant.The conclusions of this study provide insights for manufacturing enterprises seeking to enhance NPD performance within the context of digital innovation network embeddedness.
基金Supported by the US National Science Foundation, Center for Embedded Networked Sensing (EF-0410438) ARO-Multidisciplinary University Research Initiative/Penn State University (50126) in the USA
文摘Sensor network has experienced world-wide explosive interests in recent years. It combines the technology of modern microelectronic sensors, embedded computational processing systems, and modern computer and wireless networking methodologies. In this overview paper, we first provide some rationales for the growth of sensor networking. Then we discuss various basic concepts and hardware issues. Four basic application cases in the US. National Science Foundation funded Ceneter for Embedded Networked Sensing program at UCLA are presented. Finally, six challenging issues in sensor networks are discussed. Numerous references including relevant papers, books, and conferences that have appeared in recent years are given.
基金The authors are grateful to the financial support from China Postdoctoral Science Foundation(2022M712645)Opening Fund of Key Laboratory of Enhanced Oil Recovery(Northeast Petroleum University),Ministry of Education(NEPU-EOR-2021-03).
文摘Severe well interference through complex fracture networks(CFNs)can be observed among multi-well pads in low permeability reservoirs.The well interference analysis between multi-fractured horizontal wells(MFHWs)is vitally important for reservoir effective development.Well interference has been historically investigated by pressure transient analysis,while it has shown that rate transient analysis has great potential in well interference diagnosis.However,the impact of complex fracture networks(CFNs)on rate transient behavior of parent well and child well in unconventional reservoirs is still not clear.To further investigate,this paper develops an integrated approach combining pressure and rate transient analysis for well interference diagnosis considering CFNs.To perform multi-well simulation considering CFNs,non-intrusive embedded discrete fracture model approach was applied for coupling fracture with reservoir models.The impact of CFN including natural fractures and frac-hits on pressure and rate transient behavior in multi-well system was investigated.On a logelog plot,interference flow and compound linear flow are two new flow regimes caused by nearby producers.When both NFs and frac-hits are present in the reservoir,frac-hits have a greater impact on well#1 which contains frac-hits,and NFs have greater impact on well#3 which does not have frac-hits.For all well producing circumstances,it might be challenging to see divergence during pseudosteady state flow brought on by frac-hits on the logelog plot.Besides,when NFs occur,reservoir depletion becomes noticeable in comparison to frac-hits in pressure distribution.Application of this integrated approach demonstrates that it works well to characterize the well interference among different multi-fractured horizontal wells in a well pad.Better reservoir evaluation can be acquired based on the new features observed in the novel model,demonstrating the practicability of the proposed approach.The findings of this study can help for better evaluating well interference degree in multi-well systems combing PTA and RTA,which can reduce the uncertainty and improve the accuracy of the well interference analysis based on both field pressure and rate data.
基金Project supported by Science Foundation of Shanghai Municipal Commission of Science and Technology (Grant No .04dz12045)
文摘This paper presents the design and implementation of access controller used for Ethernet passive optical network ( EPON). As a first step to develop an ASIC product, the entire system is designed on a field programmable gate array (FPGA) with an embedded CPU. To reduce working frequency of the FPGA, the byte-to-word conversion is proposed. Propagation delays are equalized by ranging procedure so as to avoid data collision. Implementations of synchronization, classification, as well as Linux porting are illustrated in detail. The interface between the FPGA and CPU are also presented. Experimental results show that the proposed system can properly function in a relatively low cost FPGA.
基金supported by the National Natural Science Foundation of China(Grant nos.61173169,61103204,and 61402542)the open funding of Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory(Grant no.ITDU14010/KX142600017)the Postgraduate Innovative Research Project of Hunan Province(No.CX2012B065)
文摘The conservative Additive Increase Multiplicative Decrease mechanism of traditional TCP causes the link under-utilization in the Wide Area Networks(WANs) due to the WANs' intrinsic nature of high latency and high packet loss.To alleviate the problem,we present the design and implantation of STAG,an Acceleration Gateway with Split-TCP in the paper.STAG is built on embedded network equipment and acts as a transparent proxy.In STAG,a new improved congestion control method named Rapid TCP is adopted,which determines whether or not to decrease the congestion window based on the packet loss trend.In particular,in the fast recovery phase,it chooses different window adjustment strategies based on the current size of congestion window to achieve higher utilization.The performance validation of STAG is done on both our emulation testbed and the real wide area network.The results show that STAG with Rapid TCP effectively adapts to the high loss network environment and significantly speeds up the applications without loss of fairness.
基金supported by National Natural Science Foundation of China(61304263,61233007)the Cross-disciplinary Collaborative Teams Program for Science,Technology and Innovation of Chinese Academy of Sciences-Network and System Technologies for Security Monitoring and Information Interaction in Smart Arid
基金Supported by the National Science and Technology Major Project(2017ZX05063-005)Science and Technology Development Project of PetroChina Research Institute of Petroleum Exploration and Development(YGJ2019-12-04)。
文摘The generation method of three-dimensional fractal discrete fracture network(FDFN)based on multiplicative cascade process was developed.The complex multi-scale fracture system in shale after fracturing was characterized by coupling the artificial fracture model and the natural fracture model.Based on an assisted history matching(AHM)using multiple-proxy-based Markov chain Monte Carlo algorithm(MCMC),an embedded discrete fracture modeling(EDFM)incorporated with reservoir simulator was used to predict productivity of shale gas well.When using the natural fracture generation method,the distribution of natural fracture network can be controlled by fractal parameters,and the natural fracture network generated coupling with artificial fractures can characterize the complex system of different-scale fractures in shale after fracturing.The EDFM,with fewer grids and less computation time consumption,can characterize the attributes of natural fractures and artificial fractures flexibly,and simulate the details of mass transfer between matrix cells and fractures while reducing computation significantly.The combination of AMH and EDFM can lower the uncertainty of reservoir and fracture parameters,and realize effective inversion of key reservoir and fracture parameters and the productivity forecast of shale gas wells.Application demonstrates the results from the proposed productivity prediction model integrating FDFN,EDFM and AHM have high credibility.
基金supported as a part of Technical Quality Improvement Programme (TEQIP)
文摘A new Runge-Kutta (PK) fourth order with four stages embedded method with error control is presentea m this paper for raster simulation in cellular neural network (CNN) environment. Through versatile algorithm, single layer/raster CNN array is implemented by incorporating the proposed technique. Simulation results have been obtained, and comparison has also been carried out to show the efficiency of the proposed numerical integration algorithm. The analytic expressions for local truncation error and global truncation error are derived. It is seen that the RK-embedded root mean square outperforms the RK-embedded Heronian mean and RK-embedded harmonic mean.
文摘An autonomous vehicle operates in a dynamically changing environment,where multiple sensors must work in a cooperative mode. In these scenarios reliability of the communication protocol carries a lot of importance in real time data transfer. In this paper, CAN communication is used to demonstrate sensor integration using a LIDAR and a camera. Also demonstrated is a novel method for object detection, obstacle avoidance and navigation of an autonomous RC vehicle.