-
81
Design of 433 MHz Communication Protocol and Implementation of Gateway in Intelligence Home
Published 2015-09-01“…According to the network establishing demands of the internal network of intelligent home, such as low cost, low data rate, short distance communication, a type of 433 MHz RF communication protocol stack based on CC1101 was created and a gateway based upon the embedded operating system called μC/OS-II and micro controller called STM32F407 was implemented. …”
Get full text
Article -
82
Research on the trusted environment of container cloud based on the TPCM
Published 2021-08-01“…Container technology is a lightweight operating system virtualization technology that is widely used in cloud computing environments and is a research hotspot in the field of cloud computing.The security of container technology has attracted much attention.A method for constructing a trusted environment of container cloud using active immune trusted computing was proposed, and its security meet the requirements of network security level protection standards.First, container cloud servers were measured through the TPCM and a trust chain from the TPCM to the container's operating environment was established.Then, by adding the trusted measurement agent of the container to the TSB, the trusted measurement and trusted remote attestation of the running process of the container were realized.Finally, an experimental prototype based on Docker and Kubernetes and conduct experiments were built.The experimental results show that the proposed method can ensure the credibility of the boot process of the cloud server and the running process of the container and meet the requirements of the network security level protection standard evaluation.…”
Get full text
Article -
83
Port Contention Aware Task Scheduling for SIMD Applications
Published 2025-01-01“…The proposed method features a core allocation policy to avoid port contention, identify SIMD applications, and coordinate with the operating system (OS) scheduler. Through evaluation, we find that the proposed method can reduce the processing time for some tasks in virtual radio access networks was reduced by 13.3%.…”
Get full text
Article -
84
Teleoperation Robot Control of a Hybrid EEG-Based BCI Arm Manipulator Using ROS
Published 2022-01-01“…To create the environment and user interface, a robot operating system (ROS) is used. Live brain computer interface (BCI) commands from a trained user are successfully harvested and used as an input signal to pick a goal point from 3D point cloud data and calculate the goal position of the robots’ mobile base, placing the goal point in the robot arms workspace. …”
Get full text
Article -
85
Narrowing the semantic gap in virtual machine introspection
Published 2015-08-01“…Virtual machine introspection(VMI)has been widely used in areas such as intrusion detection and malware analysis.However,due to the existence of semantic gap,the generality and the efficiency of VMI were partly influenced while getting internal information of a virtual machine.By analyzing the deficiencies of existing technology of semantic gap restoration,a method called ModSG was proposed to bridge the semantic gap.ModSG was a modularity system,it divided semantic restoration into two parts.One was online phase that interact directly with user to construct semantic views,the other was offline phase that only interact with operating system to parse high-level semantic knowledge.Both were implemented via independent module,and the latter provided the former with necessary kernel information during semantic view construction.Experiments on different virtual machine states and different kernel versions show that the ModSG is accurate and efficient in narrowing semantic gap.The modular design and deployment also make ModSG easily to be extended to other operating systems and virtualization platforms.…”
Get full text
Article -
86
FPGA-Jetson based hardware real-time co-simulation for smart grid
Published 2021-12-01“…Smart grid is a power-communication coupled cyber-physical power system (CPPS), where the two-domain coupling features make the real-time simulation difficult.Different from the existing software-based co-simulation methods, a FPGA-Jetson based real-time co-simulation platform for smart grid by leveraging the FPGA’'s programmable computation capability and Jetson’s real-time operating system was designed.The power system simulation was carried out on the FPGA board, the information communication system simulation was completed on Jetson platform, and the two-domain information interaction was simulated through the PCIe channel.By making full use of the computing and data transmission capabilities of each module, the real-time simulation of the combination of power grid and communication network was realized.Finally, the corresponding specific modeling and parameters were designed for the two representative smart grid scenarios: hybrid AC-DC transmission network and micro-grid, the validity and scalability of the proposed real-time co-simulation architecture were verified.…”
Get full text
Article -
87
Dual-verified secure localization method for unmanned intelligent vehicles
Published 2024-06-01“…Unmanned intelligent vehicles are exposed to high risks of network attack, hardware attack, operating system attack and software attack. They are susceptible to physical or remote security attacks, causing it to deviate from the delivery trajectory and fail the delivery task, or even be manipulated to disrupt normal operation of the factory. …”
Get full text
Article -
88
Integrating humanoid robots with human musicians for synchronized musical performances
Published 2025-01-01“…The technical implementation incorporated essential components such as visual servoing, human-robot interaction, and Robot Operating System (ROS), enabling seamless communication and coordination between the humanoid robots and the human musicians. …”
Get full text
Article -
89
EVALUATION OF DATA COLLECTION TREE ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS
Published 2024-12-01“…This paper focuses on the simulation and evaluation of data collection routing protocols in WSNs, specifically the Collection Tree Protocol (CTP) in mobile environments using the Contiki operating system and the Cooja simulator. Applications of data collection routing protocols in mobile environments include military surveillance and livestock monitoring. …”
Get full text
Article -
90
TSDSIR: multi-service concurrent message data flow scheduling in robotic systems
Published 2024-08-01“…Aiming at the characteristics of multi-service concurrency and multi-modal message data mixing faced in the robot cloud-edge-end collaboration scenarios, a multi-message dynamic scheduling method oriented to time-sensitive attributes was proposed based on the analysis of the message distribution mechanism in the robot operating system 2 (ROS2). Firstly, scheduling parameters, including message priority and transmission times, were defined based on multi-topic concurrency and real-time network state in ROS2, enabling real-time queue state characterization. …”
Get full text
Article -
91
The Navigation of Home Service Robot Based on Deep Learning and Machine Learning
Published 2024-01-01“…Following, the data come from the robot operating system topics are collected and cleaned, the linear regression, decision tree, and linear SVR algorithms are applied and compared to predict the power consumption of the robot, and a conclusion is obtained that liner movement will consume more power, which provides a reference for the path planning of the robot. …”
Get full text
Article -
92
The role of government in helping SMEs to access finance: An evolutionary game modeling and simulation approach.
Published 2024-01-01“…<h4>Purpose</h4>This study aims to delineate the operating system of a strategic game model involving three core financial actors-government, banks, and guarantee institutions, with a focus on their collective impact on system evolution towards sustainable SME financing.…”
Get full text
Article -
93
Validation Indicator Identification and Customer Ranking in Microloans: A Study at Middle East Bank in Iran
Published 2024-06-01“…Sixth, the person's score is above 40. Seventh, the operating system of the person's phone is not Android. …”
Get full text
Article -
94
Applying genetic algorithm to extreme learning machine in prediction of tumbler index with principal component analysis for iron ore sintering
Published 2025-02-01“…The tumbler index (TI) is one of the most important indices to characterize the quality of sinter, which depends on the raw materials proportion, operating system parameters and the chemical compositions. …”
Get full text
Article -
95
A prototype of a low-cost autonomous mini-vehicle
Published 2023-12-01“…In addition, we show the first server-client programming using the ROS (Robot Operating System) platform, which allows communication between a central computer and the ESP32 microcontroller. …”
Get full text
Article -
96
Lightweight anomaly detection model for UAV networks based on memory-enhanced autoencoders
Published 2024-04-01“…The message queue based on the operating system was used for data packet caching to achieve persistent processing of high-speed data streams, which effectively improved the stability and reliability of the model. …”
Get full text
Article -
97
Caractéristiques socio-démographiques et dynamique de la transhumance des bouviers peuls de la Nouhao au Burkina Faso
Published 2018-09-01“…Despite the availability of these pastoral infrastructures and arrangements, farmers have kept their traditional operating system of grazing resources and livestock. One of the traditional system elements is the practice of internal and external mobility to the pastoral zone. …”
Get full text
Article -
98
Pathways for the Improvement of Construction Productivity: A Perspective on the Adoption of Advanced Techniques
Published 2020-01-01“…This reinvention refers to not only inventing advanced materials and equipment but also developing new operating systems for construction projects. Inadequate application of advanced techniques impedes the operating system. …”
Get full text
Article -
99
LinRegDroid: Detection of Android Malware Using Multiple Linear Regression Models-Based Classifiers
Published 2022-01-01“…Application permissions, which are one of the most critical building blocks in the security of the Android operating system, are extracted through static analysis, and security analyzes of applications are carried out with machine learning techniques. …”
Get full text
Article -
100
Design and Monitoring Automatization Of Exhaust Fan Through Smartphone at PT Semen Tonasa
Published 2023-06-01“…The results of this study are to use the Microsoft Windows 2000 operating system and RS link to produce images and exhaust fan automation to prevent coal feeder trip pfister due to high temperatures is to monitor via a smartphone to monitor the function of existing tools.…”
Get full text
Article