期刊文献+
共找到16,794篇文章
< 1 2 250 >
每页显示 20 50 100
EG-STC: An Efficient Secure Two-Party Computation Scheme Based on Embedded GPU for Artificial Intelligence Systems
1
作者 Zhenjiang Dong Xin Ge +2 位作者 Yuehua Huang Jiankuo Dong Jiang Xu 《Computers, Materials & Continua》 SCIE EI 2024年第6期4021-4044,共24页
This paper presents a comprehensive exploration into the integration of Internet of Things(IoT),big data analysis,cloud computing,and Artificial Intelligence(AI),which has led to an unprecedented era of connectivity.W... This paper presents a comprehensive exploration into the integration of Internet of Things(IoT),big data analysis,cloud computing,and Artificial Intelligence(AI),which has led to an unprecedented era of connectivity.We delve into the emerging trend of machine learning on embedded devices,enabling tasks in resource-limited environ-ments.However,the widespread adoption of machine learning raises significant privacy concerns,necessitating the development of privacy-preserving techniques.One such technique,secure multi-party computation(MPC),allows collaborative computations without exposing private inputs.Despite its potential,complex protocols and communication interactions hinder performance,especially on resource-constrained devices.Efforts to enhance efficiency have been made,but scalability remains a challenge.Given the success of GPUs in deep learning,lever-aging embedded GPUs,such as those offered by NVIDIA,emerges as a promising solution.Therefore,we propose an Embedded GPU-based Secure Two-party Computation(EG-STC)framework for Artificial Intelligence(AI)systems.To the best of our knowledge,this work represents the first endeavor to fully implement machine learning model training based on secure two-party computing on the Embedded GPU platform.Our experimental results demonstrate the effectiveness of EG-STC.On an embedded GPU with a power draw of 5 W,our implementation achieved a secure two-party matrix multiplication throughput of 5881.5 kilo-operations per millisecond(kops/ms),with an energy efficiency ratio of 1176.3 kops/ms/W.Furthermore,leveraging our EG-STC framework,we achieved an overall time acceleration ratio of 5–6 times compared to solutions running on server-grade CPUs.Our solution also exhibited a reduced runtime,requiring only 60%to 70%of the runtime of previously best-known methods on the same platform.In summary,our research contributes to the advancement of secure and efficient machine learning implementations on resource-constrained embedded devices,paving the way for broader adoption of AI technologies in various applications. 展开更多
关键词 Secure two-party computation embedded GPU acceleration privacy-preserving machine learning edge computing
下载PDF
CL2ES-KDBC:A Novel Covariance Embedded Selection Based on Kernel Distributed Bayes Classifier for Detection of Cyber-Attacks in IoT Systems
2
作者 Talal Albalawi P.Ganeshkumar 《Computers, Materials & Continua》 SCIE EI 2024年第3期3511-3528,共18页
The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed wo... The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks.In this framework,a Covariance Linear Learning Embedding Selection(CL2ES)methodology is used at first to extract the features highly associated with the IoT intrusions.Then,the Kernel Distributed Bayes Classifier(KDBC)is created to forecast attacks based on the probability distribution value precisely.In addition,a unique Mongolian Gazellas Optimization(MGO)algorithm is used to optimize the weight value for the learning of the classifier.The effectiveness of the proposed CL2ES-KDBC framework has been assessed using several IoT cyber-attack datasets,The obtained results are then compared with current classification methods regarding accuracy(97%),precision(96.5%),and other factors.Computational analysis of the CL2ES-KDBC system on IoT intrusion datasets is performed,which provides valuable insight into its performance,efficiency,and suitability for securing IoT networks. 展开更多
关键词 IoT security attack detection covariance linear learning embedding selection kernel distributed bayes classifier mongolian gazellas optimization
下载PDF
“Instruction-Category” Approach of Test Suite Construction for Oven Embedded System
3
作者 Mengqing Tanli Jiyi Xiao Ying Zhang 《Journal of Software Engineering and Applications》 2024年第9期713-730,共18页
Being different from testing for popular GUI software, the “instruction-category” approach is proposed for testing embedded system. This approach is constructed by three steps including refining items, drawing instr... Being different from testing for popular GUI software, the “instruction-category” approach is proposed for testing embedded system. This approach is constructed by three steps including refining items, drawing instruction-brief and instruction-category, and constructing test suite. Consequently, this approach is adopted to test oven embedded system, and detail process is deeply discussed. As a result, the factual result indicates that the “instruction-category” approach can be effectively applied in embedded system testing as a black-box method for conformity testing. 展开更多
关键词 “Instruction-Category” Approach Test Suite Construction embedded system
下载PDF
Teaching Reform and Practice of Embedded System Design Based on Outcome-Based Education
4
作者 Tao Zhang Xiangwu Deng 《Journal of Contemporary Educational Research》 2024年第3期13-18,共6页
Embedded system design is the core course of the telecommunication major in engineering universities,which combines software and hardware through embedded development boards.Aiming at the problems existing in traditio... Embedded system design is the core course of the telecommunication major in engineering universities,which combines software and hardware through embedded development boards.Aiming at the problems existing in traditional teaching,this paper proposes curriculum teaching reform based on the outcome-based education(OBE)concept,including determining course objectives,reforming teaching modes and methods,and improving the curriculum assessment and evaluation system.After two semesters of practice,this method not only enhances students’learning initiative but also improves teaching quality. 展开更多
关键词 embedded system design Outcome-based education(OBE) Teaching reform
下载PDF
Oxygen functionalization-assisted anionic exchange toward unique construction of flower-like transition metal chalcogenide embedded carbon fabric for ultra-long life flexible energy storage and conversion 被引量:1
5
作者 Roshan M.Bhattarai Kisan Chhetri +5 位作者 Nghia Le Debendra Acharya Shirjana Saud Mai Cao Hoang Phuong Lan Nguyen Sang Jae Kim Young Sun Mok 《Carbon Energy》 SCIE EI CAS CSCD 2024年第1期72-93,共22页
The metal-organic framework(MOF)derived Ni–Co–C–N composite alloys(NiCCZ)were“embedded”inside the carbon cloth(CC)strands as opposed to the popular idea of growing them upward to realize ultrastable energy storag... The metal-organic framework(MOF)derived Ni–Co–C–N composite alloys(NiCCZ)were“embedded”inside the carbon cloth(CC)strands as opposed to the popular idea of growing them upward to realize ultrastable energy storage and conversion application.The NiCCZ was then oxygen functionalized,facilitating the next step of stoichiometric sulfur anion diffusion during hydrothermal sulfurization,generating a flower-like metal hydroxysulfide structure(NiCCZOS)with strong partial implantation inside CC.Thus obtained NiCCZOS shows an excellent capacity when tested as a supercapacitor electrode in a three-electrode configuration.Moreover,when paired with the biomass-derived nitrogen-rich activated carbon,the asymmetric supercapacitor device shows almost 100%capacity retention even after 45,000 charge–discharge cycles with remarkable energy density(59.4 Wh kg^(-1)/263.8μWh cm^(–2))owing to a uniquely designed cathode.Furthermore,the same electrode performed as an excellent bifunctional water-splitting electrocatalyst with an overpotential of 271 mV for oxygen evolution reaction(OER)and 168.4 mV for hydrogen evolution reaction(HER)at 10 mA cm−2 current density along with 30 h of unhinged chronopotentiometric stability performance for both HER and OER.Hence,a unique metal chalcogenide composite electrode/substrate configuration has been proposed as a highly stable electrode material for flexible energy storage and conversion applications. 展开更多
关键词 carbon cloth energy conversion energy storage FLEXIBLE metal embedding ultra-stable
下载PDF
ARM-Based Embedded System Platform and Its Portability Research
6
作者 Hao Liu 《Journal of Computer and Communications》 2023年第11期51-63,共13页
Taking ARM as the hardware platform, the embedded system is built from both hardware and software aspects with the application as the center. In the hardware design, build the hardware platform scheme, design the sche... Taking ARM as the hardware platform, the embedded system is built from both hardware and software aspects with the application as the center. In the hardware design, build the hardware platform scheme, design the schematic diagram as well as PCB, complete the hardware debugging, and ensure the system hardware platform function;in the software design, optimize the three-stage pipeline structure of ARM instruction system, design the instruction set, install the embedded system on the virtual machine, build the cross-toolchain, and set up the correct NFS network file system. Finish the design of the ARM-based embedded system platform, combined with the hardware requirements of the experimental platform, transplant the powerful Uboot as the Bootloader of the system, and further transplant the Linux-2.6. 32 kernel to the system start the operation normally, and finally, build the root file to finish the study of its portability. 展开更多
关键词 embedded Platforms PORTABILITY Operating systems
下载PDF
A Linked List Encryption Scheme for Image Steganography without Embedding
7
作者 Pengbiao Zhao Qi Zhong +3 位作者 Jingxue Chen Xiaopei Wang Zhen Qin Erqiang Zhou 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期331-352,共22页
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in... Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information undetectable.To enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover modification.In this paper,a novel encrypted communication scheme for image SWE is proposed.It reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer domains.By employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be identified.The receiver can restore the secretmessage fromthe received image using only the list header position information.The scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover image.It boasts high concealment and security,along with a complete message restoration rate,making it resistant to steganalysis.Furthermore,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of robustness.To validate the proposed framework,practical tests and comparisons are conducted using multiple datasets.The results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks. 展开更多
关键词 STEGANOGRAPHY ENCRYPTION steganography without embedding coverless steganography
下载PDF
Enhancing visual security: An image encryption scheme based on parallel compressive sensing and edge detection embedding
8
作者 王一铭 黄树锋 +2 位作者 陈煌 杨健 蔡述庭 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第1期287-302,共16页
A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete... A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality. 展开更多
关键词 visual security image encryption parallel compressive sensing edge detection embedding
下载PDF
Advances of embedded resistive random access memory in industrial manufacturing and its potential applications
9
作者 Zijian Wang Yixian Song +7 位作者 Guobin Zhang Qi Luo Kai Xu Dawei Gao Bin Yu Desmond Loke Shuai Zhong Yishu Zhang 《International Journal of Extreme Manufacturing》 SCIE EI CAS CSCD 2024年第3期175-214,共40页
Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to en... Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to enhance performance.Among them,resistive random access memory(RRAM)has gained significant attention due to its numerousadvantages over traditional memory devices,including high speed(<1 ns),high density(4 F^(2)·n^(-1)),high scalability(~nm),and low power consumption(~pJ).This review focuses on the recent progress of embedded RRAM in industrial manufacturing and its potentialapplications.It provides a brief introduction to the concepts and advantages of RRAM,discusses the key factors that impact its industrial manufacturing,and presents the commercial progress driven by cutting-edge nanotechnology,which has been pursued by manysemiconductor giants.Additionally,it highlights the adoption of embedded RRAM in emerging applications within the realm of the Internet of Things and future intelligent computing,with a particular emphasis on its role in neuromorphic computing.Finally,the review discusses thecurrent challenges and provides insights into the prospects of embedded RRAM in the era of big data and artificial intelligence. 展开更多
关键词 embedded resistive random access memory industrial manufacturing intelligent computing advanced process node
下载PDF
Identification of partial differential equations from noisy data with integrated knowledge discovery and embedding using evolutionary neural networks
10
作者 Hanyu Zhou Haochen Li Yaomin Zhao 《Theoretical & Applied Mechanics Letters》 CAS CSCD 2024年第2期90-97,共8页
Identification of underlying partial differential equations(PDEs)for complex systems remains a formidable challenge.In the present study,a robust PDE identification method is proposed,demonstrating the ability to extr... Identification of underlying partial differential equations(PDEs)for complex systems remains a formidable challenge.In the present study,a robust PDE identification method is proposed,demonstrating the ability to extract accurate governing equations under noisy conditions without prior knowledge.Specifically,the proposed method combines gene expression programming,one type of evolutionary algorithm capable of generating unseen terms based solely on basic operators and functional terms,with symbolic regression neural networks.These networks are designed to represent explicit functional expressions and optimize them with data gradients.In particular,the specifically designed neural networks can be easily transformed to physical constraints for the training data,embedding the discovered PDEs to further optimize the metadata used for iterative PDE identification.The proposed method has been tested in four canonical PDE cases,validating its effectiveness without preliminary information and confirming its suitability for practical applications across various noise levels. 展开更多
关键词 PDE discovery Gene Expression Programming Deep Learning Knowledge embedding
下载PDF
A chaotic hierarchical encryption/watermark embedding scheme for multi-medical images based on row-column confusion and closed-loop bi-directional diffusion
11
作者 张哲祎 牟俊 +1 位作者 Santo Banerjee 曹颖鸿 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期228-237,共10页
Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is desi... Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is designed,and a multiimage encryption(MIE)algorithm with row and column confusion and closed-loop bi-directional diffusion is adopted in the paper.While ensuring secure communication of medical image information,people with different security levels have different levels of decryption keys,and differentiated visual effects can be obtained by using the strong sensitivity of chaotic keys.The highest security level can obtain decrypted images without watermarks,and at the same time,patient information and copyright attribution can be verified by obtaining watermark images.The experimental results show that the scheme is sufficiently secure as an MIE scheme with visualized differences and the encryption and decryption efficiency is significantly improved compared to other works. 展开更多
关键词 chaotic hierarchical encryption multi-medical image encryption differentiated visual effects row-column confusion closed-loop bi-directional diffusion transform domain watermark embedding
下载PDF
TCM-HIN2Vec:A strategy for uncovering biological basis of heart qi deficiency pattern based on network embedding and transcriptomic experiment
12
作者 Lihong Diao Xinyi Fan +5 位作者 Jiang Yu Kai Huang Edouard C.Nice Chao Liu Dong Li Shuzhen Guo 《Journal of Traditional Chinese Medical Sciences》 CAS 2024年第3期264-274,共11页
Objective:To elucidate the biological basis of the heart qi deficiency(HQD)pattern,an in-depth understanding of which is essential for improving clinical herbal therapy.Methods: We predicted and characterized HQD patt... Objective:To elucidate the biological basis of the heart qi deficiency(HQD)pattern,an in-depth understanding of which is essential for improving clinical herbal therapy.Methods: We predicted and characterized HQD pattern genes using the new strategy,TCM-HIN2Vec,which involves heterogeneous network embedding and transcriptomic experiments.First,a heterogeneous network of traditional Chinese medicine(TCM)patterns was constructed using public databases.Next,we predicted HQD pattern genes using a heterogeneous network-embedding algorithm.We then analyzed the functional characteristics of HQD pattern genes using gene enrichment analysis and examined gene expression levels using RNA-seq.Finally,we identified TCM herbs that demonstrated enriched interactions with HQD pattern genes via herbal enrichment analysis.Results: Our TCM-HIN2Vec strategy revealed that candidate genes associated with HQD pattern were significantly enriched in energy metabolism,signal transduction pathways,and immune processes.Moreover,we found that these candidate genes were significantly differentially expressed in the transcriptional profile of mice model with heart failure with a qi deficiency pattern.Furthermore,herbal enrichment analysis identified TCM herbs that demonstrated enriched interactions with the top 10 candidate genes and could potentially serve as drug candidates for treating HQD.Conclusion: Our results suggested that TCM-HIN2Vec is capable of not only accurately identifying HQD pattern genes,but also deciphering the basis of HQD pattern.Furthermore our finding indicated that TCM-HIN2Vec may be further expanded to develop other patterns,leading to a new approach aimed at elucidating general TCM patterns and developing precision medicine. 展开更多
关键词 Qi deficiency pattern Heart failure Biological basis Network embedding Transcriptome
下载PDF
Insider threat detection approach for tobacco industry based on heterogeneous graph embedding
13
作者 季琦 LI Wei +2 位作者 PAN Bailin XUE Hongkai QIU Xiang 《High Technology Letters》 EI CAS 2024年第2期199-210,共12页
In the tobacco industry,insider employee attack is a thorny problem that is difficult to detect.To solve this issue,this paper proposes an insider threat detection method based on heterogeneous graph embedding.First,t... In the tobacco industry,insider employee attack is a thorny problem that is difficult to detect.To solve this issue,this paper proposes an insider threat detection method based on heterogeneous graph embedding.First,the interrelationships between logs are fully considered,and log entries are converted into heterogeneous graphs based on these relationships.Second,the heterogeneous graph embedding is adopted and each log entry is represented as a low-dimensional feature vector.Then,normal logs and malicious logs are classified into different clusters by clustering algorithm to identify malicious logs.Finally,the effectiveness and superiority of the method is verified through experiments on the CERT dataset.The experimental results show that this method has better performance compared to some baseline methods. 展开更多
关键词 insider threat detection advanced persistent threats graph construction heterogeneous graph embedding
下载PDF
Hybrid Scalable Researcher Recommendation System Using Azure Data Lake Analytics
14
作者 Dinesh Kalla Nathan Smith +1 位作者 Fnu Samaah Kiran Polimetla 《Journal of Data Analysis and Information Processing》 2024年第1期76-88,共13页
This research paper has provided the methodology and design for implementing the hybrid author recommender system using Azure Data Lake Analytics and Power BI. It offers a recommendation for the top 1000 Authors of co... This research paper has provided the methodology and design for implementing the hybrid author recommender system using Azure Data Lake Analytics and Power BI. It offers a recommendation for the top 1000 Authors of computer science in different fields of study. The technique used in this paper is handling the inadequate Information for citation;it removes the problem of cold start, which is encountered by very many other recommender systems. In this paper, abstracts, the titles, and the Microsoft academic graphs have been used in coming up with the recommendation list for every document, which is used to combine the content-based approaches and the co-citations. Prioritization and the blending of every technique have been allowed by the tuning system parameters, allowing for the authority in results of recommendation versus the paper novelty. In the end, we do observe that there is a direct correlation between the similarity rankings that have been produced by the system and the scores of the participant. The results coming from the associated scrips of analysis and the user survey have been made available through the recommendation system. Managers must gain the required expertise to fully utilize the benefits that come with business intelligence systems [1]. Data mining has become an important tool for managers that provides insights about their daily operations and leverage the information provided by decision support systems to improve customer relationships [2]. Additionally, managers require business intelligence systems that can rank the output in the order of priority. Ranking algorithm can replace the traditional data mining algorithms that will be discussed in-depth in the literature review [3]. 展开更多
关键词 Azure Data Lake U-SQL Author Recommendation system Power BI Microsoft Academic Big Data Word embedding
下载PDF
Thin-Shell Wormholes Admitting Conformal Motions in Spacetimes of Embedding Class One
15
作者 Peter K. F. Kuhfittig 《International Journal of Astronomy and Astrophysics》 2024年第3期162-171,共10页
This paper discusses the feasibility of thin-shell wormholes in spacetimes of embedding class one admitting a one-parameter group of conformal motions. It is shown that the surface energy density σis positive, while ... This paper discusses the feasibility of thin-shell wormholes in spacetimes of embedding class one admitting a one-parameter group of conformal motions. It is shown that the surface energy density σis positive, while the surface pressure is negative, resulting in , thereby signaling a violation of the null energy condition, a necessary condition for holding a wormhole open. For a Morris-Thorne wormhole, matter that violates the null energy condition is referred to as “exotic”. For the thin-shell wormholes in this paper, however, the violation has a physical explanation since it is a direct consequence of the embedding theory in conjunction with the assumption of conformal symmetry. These properties avoid the need to hypothesize the existence of the highly problematical exotic matter. 展开更多
关键词 Thin-Shell Wormholes Conformal Symmetry embedding Class One Exotic Matter
下载PDF
Embedded Data Acquisition in Vehicle Electronic System 被引量:3
16
作者 王建群 陈铁 《Journal of Beijing Institute of Technology》 EI CAS 2000年第4期403-407,共5页
The embedded data acquistition technology in vehicle electronic system was discussed. This technology adopts the parallel working mode, gets vehicle electronic system data by communication. This technology can provide... The embedded data acquistition technology in vehicle electronic system was discussed. This technology adopts the parallel working mode, gets vehicle electronic system data by communication. This technology can provide us a lot of information on the electronic control unit, is very useful for the development of the vehicle electronic system, and can be used in diagnosis. The key points to this technology are the timer interrupt, A/D interrupt, communication interrupt and real time operation. This technology has been validated by the application in the electronic control mechanism transmission shifting system of the tank. 展开更多
关键词 embedded data acquisition INTERRUPT COMMUNICATION VEHICLE
下载PDF
Design of fuzzy number recognition based on embedded system platform 被引量:1
17
作者 戴明 刘嘉华 邓建明 《Journal of Southeast University(English Edition)》 EI CAS 2007年第2期232-235,共4页
A system of number recognition with a graphic user interface (GUI) is implemented on the embedded development platform by using the fuzzy pattern recognition method. An application interface (API) of uC/ OS-Ⅱ is ... A system of number recognition with a graphic user interface (GUI) is implemented on the embedded development platform by using the fuzzy pattern recognition method. An application interface (API) of uC/ OS-Ⅱ is used to implement the features of multi-task concurrency and the communications among tasks. Handwriting function is implemented by the improvement of the interface provided by the platform. Fuzzy pattern recognition technology based on fuzzy theory is used to analyze the input of handwriting. A primary system for testing is implemented. It can receive and analyze user inputs from both keyboard and touch-screen. The experimental results show that the embedded fuzzy recognition system which uses the technology which integrates two ways of fuzzy recognition can retain a high recognition rate and reduce hardware requirements. 展开更多
关键词 embedded system multi-task concurrency number recognition fuzzy position transformation
下载PDF
Key Technology of Embedded System Implementation for Software-based CNC System 被引量:3
18
作者 WAN Jiafu LI Di ZHANG Ping 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2010年第2期217-224,共8页
The software-based computer numerical control(CNC) system includes three types of tasks: periodic real-time tasks, aperiodic real-time tasks, and non-real-time tasks. The tasks are characterized by concurrency, hyb... The software-based computer numerical control(CNC) system includes three types of tasks: periodic real-time tasks, aperiodic real-time tasks, and non-real-time tasks. The tasks are characterized by concurrency, hybridization, and correlation, which make system implementation difficult. The conventional scheduling algorithm can not meet the demands of system implementation in the software-based CNC system completely. The uncertainty factors when running real-time tasks affect control performance by degrading manufacturing accuracy as a result of system resource and processor use restrictions. To address the technical difficulty of embedded system implementation, a novel fuzzy feedback scheduling algorithm based on output jitter of key real-time tasks for a software-based CNC system is proposed. Time characteristics, such as sampling jitter, input-output jitter, and non-schedulability are discussed, followed by quantification through simulations of the impact of time characteristics on manufacturing accuracy. On the basis of this research, the scheduler architecture is designed, and then the algorithm table is calculated. When the system resource changes, the key periodic real-time tasks meet their deadlines by means of dynamically adjusting the task period. The simulated results show that the machining precision rises by an order of magnitude for the proposed scheduler in resource-constrained software-based CNC systems. Moreover, unlike conventional feedback scheduling methods, the algorithm in this paper does not rely on the availability of task execution times and is easy to implement while incurring only a small overhead. 展开更多
关键词 software-based CNC system embedded system implementation output jitter fuzzy feedback scheduling manufacturing accuracy
下载PDF
Modeling and Analysis of Scheduling for Distributed Real-time Embedded Systems 被引量:2
19
作者 Hai-Tao Zhang Gui-Fang Wu 《International Journal of Automation and computing》 EI 2010年第4期525-530,共6页
Aimed at the deficiencies of resources based time Petri nets (RBTPN) in doing scheduling analysis for distributed real-time embedded systems, the assemblage condition of complex scheduling sequences is presented to ... Aimed at the deficiencies of resources based time Petri nets (RBTPN) in doing scheduling analysis for distributed real-time embedded systems, the assemblage condition of complex scheduling sequences is presented to easily compute scheduling length and simplify scheduling analysis. Based on this, a new hierarchical RBTPN model is proposed. The model introduces the definition of transition border set, and represents it as an abstract transition. The abstract transition possesses all resources of the set, and has the highest priority of each resource; the cxecution time of abstract transition is the longest time of all possible scheduling sequences. According to the characteristics and assemblage condition of RBTPN, the refinement conditions of transition border set are given, and the conditions ensure the correction of scheduling analysis. As a result, it is easy for us to understand the scheduling model and perform scheduling analysis. 展开更多
关键词 embedded systems MODELING time Petri nets scheduling analysis
下载PDF
Digital Synthetic-heterodyne Interferometric Demodulation Based on Embedded System 被引量:4
20
作者 MENG Ju WANG Jin-hai +1 位作者 CHEN Cai-he ZHANG Cheng 《Semiconductor Photonics and Technology》 CAS 2006年第3期194-199,共6页
Optical fiber acceleration seismometer as an important instrument can offer high sensitivity, anti-jamming and non-touched advantage which has an extensive application field. Its signal processing ability will decide ... Optical fiber acceleration seismometer as an important instrument can offer high sensitivity, anti-jamming and non-touched advantage which has an extensive application field. Its signal processing ability will decide whole system’s performance to some extent because it will affect directly the factors such as resolving power, precision and dynamic range. The signal processing is usually realized by analog circuits which was more inferior in stability, flexibility and anti-jamming to digital processing system. A digital processing system of optical fiber acceleration seismometer has been designed based on the embedded system design scheme. Synthetic-heterodyne demodulation has been studied, and signal processing has been realized. The double processors of ARM and DSP are employed to implement respectively the system control and signal processing, and to provide the output interfaces such as LCD, DAC and Ethernet interface. This system can vary with the measured signal in real time and linearly, and its work frequency bandwidth is between 10Hz and 1kHz. The system has better anti-jamming ability and can work normally when the SNR is 40dB. 展开更多
关键词 Synthetic-heterodyne Optical fiber sensor embedded system Digital signal processing
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部