We are developing a speed reducer that can be considered a transformation of a worm gear reducer: the worm is replaced by an inverted roller screw, and the gear is replaced by a threaded chain drive. This configuratio...We are developing a speed reducer that can be considered a transformation of a worm gear reducer: the worm is replaced by an inverted roller screw, and the gear is replaced by a threaded chain drive. This configuration lessens wear, increases load capacity, and improves efficiency. The threaded chain consists of nut-shaped links. This paper presents the results of tests carried out on a prototype with a reduction ratio of 46.展开更多
针对基于Linux和TCG软件栈(Trusted computing group Software Stack,TSS)的复杂性问题,提出一种轻量级的可信软件栈。分析了TSS的基本结构与TSS在嵌入式系统的局限,总结出基于嵌入式系统的可信软件栈设计需求,设计出软件栈命令调用的...针对基于Linux和TCG软件栈(Trusted computing group Software Stack,TSS)的复杂性问题,提出一种轻量级的可信软件栈。分析了TSS的基本结构与TSS在嵌入式系统的局限,总结出基于嵌入式系统的可信软件栈设计需求,设计出软件栈命令调用的机制和软件栈的结构。此外,分析了TSS密钥管理缓存算法,在flash中定义一块密钥槽空间,方便密钥管理中直接访问,阐述密钥生成的逻辑过程,实现面向嵌入式系统的可信软件系统。经实验验证,该软件栈可以结合RT-Thread实时系统实现基本的可信计算功能。展开更多
Zhuang medicine medicated thread moxibustion is a kind of external therapy with ethnic medicine characteristics that spreads in Guangxi Zhuang region.It has a wide range of clinical application and significant curativ...Zhuang medicine medicated thread moxibustion is a kind of external therapy with ethnic medicine characteristics that spreads in Guangxi Zhuang region.It has a wide range of clinical application and significant curative effect,and can be used to treat diseases such as internal medicine,surgery,dermatology,gynecology,pediatrics,and five sense organs.Through reviewing and combing the literature on the Zhuang medicine medicated thread moxibustion in recent years,this paper summarizes and prospects its clinical application,with a view to further explaining the basic principles and application rules of Zhuang medicine medicated thread moxibustion and digging its clinical value.展开更多
One of the technologies that have attracted the most attention recently across a variety of applications is the Internet of Things (IoT). The Internet of Things (IoT) is the combination of sensor, embedded computing, ...One of the technologies that have attracted the most attention recently across a variety of applications is the Internet of Things (IoT). The Internet of Things (IoT) is the combination of sensor, embedded computing, and communication technologies. The goal of the Internet of Things is to provide seamless services to anything, everywhere, at any time. The internet of things (IoT) technologies plays a vital role everywhere after the internet and information and communication technology, ushering in the fourth disruptive technology revolution (ICT). For real-time processing, communication, and monitoring, the smart items are linked together through wired or wireless connections. Implementing the IoT system presents security and privacy challenges since IoT devices are incompatible with current security standards based on tradition. This paper discusses IoT security strands, mitigation strategies, and privacy issues. This study’s major objective is to get more knowledge about security threats, mitigation techniques, and privacy concerns in IoT devices. The authors also mentioned a few cutting-edge technologies that can address general security problems. This study’s major objectives are to find research gaps in IoT security and match solution paradigms. The advent and rapid growth of the Internet of Things (IoT), which offers innumerable benefits, facilities, and applications including smart grids, smart homes, smart cities, and intelligent transportation systems (ITS), have an impact on everyone’s life. However, the deployment and use of sensing devices exposes IoT-based systems and applications to many security flaws and attacks. Furthermore, the lack of standardization brought on by the diversity of devices and technologies makes integrating security in the IoT a severe problem. The purpose of this review paper is to highlight the numerous security threats, challenges, and attacks that IoT-enabled applications face.展开更多
文摘We are developing a speed reducer that can be considered a transformation of a worm gear reducer: the worm is replaced by an inverted roller screw, and the gear is replaced by a threaded chain drive. This configuration lessens wear, increases load capacity, and improves efficiency. The threaded chain consists of nut-shaped links. This paper presents the results of tests carried out on a prototype with a reduction ratio of 46.
文摘针对基于Linux和TCG软件栈(Trusted computing group Software Stack,TSS)的复杂性问题,提出一种轻量级的可信软件栈。分析了TSS的基本结构与TSS在嵌入式系统的局限,总结出基于嵌入式系统的可信软件栈设计需求,设计出软件栈命令调用的机制和软件栈的结构。此外,分析了TSS密钥管理缓存算法,在flash中定义一块密钥槽空间,方便密钥管理中直接访问,阐述密钥生成的逻辑过程,实现面向嵌入式系统的可信软件系统。经实验验证,该软件栈可以结合RT-Thread实时系统实现基本的可信计算功能。
基金"Zhuang medicine",a key discipline of traditional Chinese medicine in Guangxi(No.GZXK-Z-20-60),the project to improve the basic scientific research ability of young and middle-aged teachers in Guangxi universities(No.2020KY07023),and the scientific research project of Guangxi Zhuang Autonomous Region Administration of Traditional Chinese Medicine(No.GXZYZ20210456).
文摘Zhuang medicine medicated thread moxibustion is a kind of external therapy with ethnic medicine characteristics that spreads in Guangxi Zhuang region.It has a wide range of clinical application and significant curative effect,and can be used to treat diseases such as internal medicine,surgery,dermatology,gynecology,pediatrics,and five sense organs.Through reviewing and combing the literature on the Zhuang medicine medicated thread moxibustion in recent years,this paper summarizes and prospects its clinical application,with a view to further explaining the basic principles and application rules of Zhuang medicine medicated thread moxibustion and digging its clinical value.
文摘One of the technologies that have attracted the most attention recently across a variety of applications is the Internet of Things (IoT). The Internet of Things (IoT) is the combination of sensor, embedded computing, and communication technologies. The goal of the Internet of Things is to provide seamless services to anything, everywhere, at any time. The internet of things (IoT) technologies plays a vital role everywhere after the internet and information and communication technology, ushering in the fourth disruptive technology revolution (ICT). For real-time processing, communication, and monitoring, the smart items are linked together through wired or wireless connections. Implementing the IoT system presents security and privacy challenges since IoT devices are incompatible with current security standards based on tradition. This paper discusses IoT security strands, mitigation strategies, and privacy issues. This study’s major objective is to get more knowledge about security threats, mitigation techniques, and privacy concerns in IoT devices. The authors also mentioned a few cutting-edge technologies that can address general security problems. This study’s major objectives are to find research gaps in IoT security and match solution paradigms. The advent and rapid growth of the Internet of Things (IoT), which offers innumerable benefits, facilities, and applications including smart grids, smart homes, smart cities, and intelligent transportation systems (ITS), have an impact on everyone’s life. However, the deployment and use of sensing devices exposes IoT-based systems and applications to many security flaws and attacks. Furthermore, the lack of standardization brought on by the diversity of devices and technologies makes integrating security in the IoT a severe problem. The purpose of this review paper is to highlight the numerous security threats, challenges, and attacks that IoT-enabled applications face.