The 2023 National Cybersecurity Strategy has recommended a transition to secure-by-design methodologies in critical infrastructure. This paper presents the adoption of the National Cyber-Informed engineering (CIE) Str...
详细信息
Under the BD-driven research on multimodal data analysis and intelligentsystemdesign, the work focuses on multimodal data analysis and intelligentsystemdesign, with BD-driven as the core. The system consumes a var...
详细信息
We discuss an observer design for nonlinear descriptor systems described by Takagi-Sugeno fuzzy descriptor system, which can represent a broader class of systems, including not only differential equations but also alg...
详细信息
In recent years, with the development of artificial intelligence technology, intelligent robots are more and more widely used in many fields. In this paper, an intelligent patrol wheeled robot based on image recogniti...
详细信息
With the continuous improvement of the application of artificial intelligence theory and intelligent hardware processing capabilities, the application of machine vision and unmanned technology is becoming more and mor...
详细信息
As chip architectures become more and more complex, traditional system-level and function-level simulation brings problems such as difficulty in debugging and slow speed in execution. In this paper, we propose an abst...
详细信息
ISBN:
(纸本)9798350386783;9798350386776
As chip architectures become more and more complex, traditional system-level and function-level simulation brings problems such as difficulty in debugging and slow speed in execution. In this paper, we propose an abstract-level simulation model for a network processor, which ignores most hardware and functional details. It only focuses on the components that are decisive for network system performance. As a result, we significantly reduced the modeling complexity of network processors and accelerated simulations by 5 to 8 times. This provides an efficient approach for agile hardware design and architecture exploration of network processors.
In this paper, STM 32 single-chip microcomputer is the control core with environmental temperature and humidity sensor environment sensor, soil humidity sensor and light sensitivity sensor to realize the real-time det...
详细信息
As the development of large language models and generative artificial intelligence technologies continues to advance, the application of digital teaching resources is exhibiting a new trend of human-machine collaborat...
详细信息
Current power supply methods struggle to meet the needs for lightweight, isolated power delivery in high-voltage environments. To address this challenge, this paper proposes an Inductive Wireless Power Transmission De...
详细信息
ISBN:
(纸本)9798350374995;9798350374988
Current power supply methods struggle to meet the needs for lightweight, isolated power delivery in high-voltage environments. To address this challenge, this paper proposes an Inductive Wireless Power Transmission Device design for High-Voltage systems. Initially, the design of the system is elaborated, utilizing an LC topology circuit to enhance both output power and efficiency. The reliability of the design was confirmed through simulation calculations. Subsequently, a prototype was developed that successfully delivered 75.5 W of output power with an efficiency of 94.3%. The experimental results indicate that the wireless power transfer system, as designed, successfully achieves high-power transmission with high efficiency while maintaining a high tolerance for insulation.
One of the most essential subfields of modern IT is undoubtedly cybersecurity. The cybersecurity practice, also known as cryptology, combines various disciplines like computer science, computer engineering, and mathem...
详细信息
ISBN:
(纸本)9798350367607;9798350367591
One of the most essential subfields of modern IT is undoubtedly cybersecurity. The cybersecurity practice, also known as cryptology, combines various disciplines like computer science, computer engineering, and mathematics to create complex algorithms. In our work, we combine cryptology with the field of genetics algorithms to develop new encryption algorithms. Firstly, we introduced the fundamental theories of these two fields. It aims to teach basic knowledge of using genetic algorithms to select specific parts of encryption algorithms (chromosomes) and combine them to produce new encryption algorithms (offspring). The standard flow of the genetic algorithm is divided into the initial population's creation process, evaluation, fitness score assignments, selection, crossover, and mutation. We will take a deeper look at the process of assignments of fitness score and crossover. These processes ' new design, implementation, and testing allow us to reach the results presented.
暂无评论