Search results for: Zhi-Wei Zheng
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 186

Search results for: Zhi-Wei Zheng

186 Optimization of Commercial Gray Space along the Street from the Perspective of Vitality Construction

Authors: Mengjiao Hu

Abstract:

Nowadays, China's consumption pattern is entering the "experience era"; people's consumption behavior is no longer simply "buy, buy, buy" but the transition from "consumption in space" to "consumption of space". The street is a basic public product and an important public space in the city, and commerce along the street is an important space for people to consume in the "experience era". Therefore, in this way, it is particularly important to create the vitality of the gray space along the street. From the perspective of vitality construction, this paper takes Sha Zheng Street in Chongqing as the empirical object, combined with the theoretical knowledge of behavioral architecture, and based on the current situation of the commercial gray space along Sha Zheng Street, this paper explores the influence factors and the constraints behind the spatial vitality and then puts forward a general strategy to improve the spatial vitality of the commercial gray space along the street. The author hopes that through the exploration of the vitality of commercial gray space along the street, environmental design can be introduced into the integrated design vision of the urban public environment, and the urban designers can be inspired to create a street environment with a living atmosphere with a small start.

Keywords: vitality creation, gray space, street commerce, sha zheng street

Procedia PDF Downloads 99
185 A Sustainable Society and Its Order Principles: Implications of Common Grace and the Man as the Image of God

Authors: Wenfu Zheng, Guanghe Zheng

Abstract:

The discussion on the social sustainability in existing literature is limited to two-dimension epistemology space with only two elements: the human and nature. Using the revelation of the Bible God, the paper adds a moral component to the two-dimension space. With the new variable being introduced, the authors formulate a to three-dimension epistemology space and discuss its implications. Based on the space, the authors explore the hierarchical structure of order principles for a sustainable society. The social order principle system hierarchically consists of three principles: moral, relational, and rational. The justification of every principle is analyzed briefly. The paper concluded that all these order principles are necessary assurance of building a sustainable society.

Keywords: common grace, saving grace, sustainable society, the image of God

Procedia PDF Downloads 190
184 An Investigation of the Pharmacomechanisms of Shang-Han Lun Formulas as Elucidated in the Qing Dynasty Classic 'Ben-Jing Shu-Zheng'

Authors: William Ceurvels, Dong-Di Zhang

Abstract:

The true nature of the mechanism by which the pharmaceuticals of the Shang-Han Lun act has been a topic of debate since Wuji Cheng published the first commentary during the Northern Song. Subsequent commentaries employed a number of methodologies in their analysis of pharmaceutical mechanisms, but no commentator was able to garner universal acceptance. During the Qing Dynasty, the proliferation and development of Neo-Confucian scholarship produced a new generation of scholars possessed of rigorous and inventive research methods, one of whom was the famed materia medica scholar, Run-an Zou. Run-an Zou and his successor Zhou Yan advocated analyzing the mechanism of Treatise pharmaceuticals based upon the understanding of those pharmaceuticals during the time period in which the Treatise was written and thereby focused on the Han Dynasty materia medica tract Shen-nong Ben-cao Jing (The Divine Husbandman’s Herbal Foundation Canon). Zou Run-an’s commentary, Ben-jing Shu-zheng won nearly universal praise among materia medica scholars for its scholastic rigor and innovative research methods. However, because Ben-jing Shu-zheng only focuses on individual herbs, as opposed to formulas, its value in analyzing the Shang-Han Lun has limitations. The purpose of this study is to combine Zou Run-an’s single-pharmaceutical commentaries to generate theoretical full formula analyses to gain a fuller picture of Zou’s understanding of the healing mechanism of Shang-Han Lun formulas. Commentaries were gathered from Ben-jing Shu-zheng and Zhou Yan’s Ben-cao Si-bian Lun and combined to produce theoretical full formula model mechanisms of Treatise formulas. Through this study, a new picture of the mechanistic basis of Shang-han formulas emerges, which is based on qi-xue changes as opposed to organ or meridian theory. The author hopes that this modest research study will be of service to scholars of the Shang-han and clinical doctors alike in their pursuit of the true pharmacomechanisms of this great Han dynasty tome.

Keywords: Materia medica, Shang-han Lun, Shen-nong Ben-cao Jing, neo-Confucian scholarship

Procedia PDF Downloads 317
183 Awareness of 'Psychosocial Restraint': A Proper Caring Attitude and Truly Listening to People with Dementia in the Hong Kong’S Residential Care Homes

Authors: Kenny Chi Man Chui

Abstract:

Background: In Chinese culture, the traditional equivalent term for English dementia is chi dai zheng, which, whether translated as ‘insanity’ or ‘idiocy’ carries a sharply negative connotation. In fact, even though the traditional name for dementia has evolved, from chi dai zheng to shi zhi zheng, nao tui hua zheng or ren zhi zhang ai zheng, educating the population about more respectful terms for the condition and promoting a positive understanding about people with dementia in society have proven to be time-intensive endeavors. By extension, the use of such terms promotes the perception that people with dementia undergo a ‘total loss of self’ or experience a ‘living death’ or ‘social death’. Both in Asia and elsewhere, the appropriate nomenclature for dementia remains controversial, and different medical and healthcare professionals in Hong Kong have taken various stances on how to refer to the condition there. Indeed, how this negative perception affects the interaction between people with dementia and the surrounding others? Methodology: Qualitative research with the concept of postmodernism, interpretivism, and Foucauldian theory was adopted as frameworks in applying participatory observations, in-depth interviews, and other qualitative methods. First, ten people with dementia—one man and nine women—living in two residential care homes in Hong Kong were interviewed, as were ten members of the care staff, all of whom were women. Next, to coach the staff in understanding the feelings and self-perceptions of people with dementia, two reflective training sessions were provided. Afterward, to assess the impact of the training sessions on the staff, two focus groups were held. Findings: The findings revealed that residents with dementia did not perceive themselves as being ‘demented’ and were confused by not getting responses from the others. From the understanding of care staff, they perceived the residents as being ‘demented’, desolate troublemakers. They described people with dementia as ‘naughty children’ who should be controlled and be punished while treated them as ‘psychiatric patients’ who could be ignored and be mute. “Psychosocial restraint” happened regarding the discrepancy of perception between people with dementia and the care staff. People with dementia did not think that their confusion of memory was related to dementia or, frankly speaking, they did not know what dementia was. When others treated them as ‘demented patients, the residents with mild to moderate dementia fiercely rejected that designation and reported a host of negative feelings, hence the fluctuations of mood and emotion noted by the care staff. Conclusion: As the findings revealed, the people with dementia were also discontent with the care arrangements in the care homes, felt abandoned by others and worried about bothering others. Their shifting emotional states and moods were treated as the Behavioral and Psychological symptoms of Dementia (BPSD), which nothing can do reported by the care staff in the residential care homes. People with dementia become social withdrawal or isolated in daily living, which should be alert and be changed by the social work professionals about the occurrence of “psychosocial restraint” in dementia care.

Keywords: psychosocial restraint, qualitative research, social work with dementitude, voice of people with dementia

Procedia PDF Downloads 176
182 Fault Study and Reliability Analysis of Rotative Machine

Authors: Guang Yang, Zhiwei Bai, Bo Sun

Abstract:

This paper analyzes the influence of failure mode and harmfulness of rotative machine according to FMECA (Failure Mode, Effects, and Criticality Analysis) method, and finds out the weak links that affect the reliability of this equipment. Also in this paper, fault tree analysis software is used for quantitative and qualitative analysis, pointing out the main factors of failure of this equipment. Based on the experimental results, this paper puts forward corresponding measures for prevention and improvement, and fundamentally improves the inherent reliability of this rotative machine, providing the basis for the formulation of technical conditions for the safe operation of industrial applications.

Keywords: rotative machine, reliability test, fault tree analysis, FMECA

Procedia PDF Downloads 153
181 Adaptive Motion Planning for 6-DOF Robots Based on Trigonometric Functions

Authors: Jincan Li, Mingyu Gao, Zhiwei He, Yuxiang Yang, Zhongfei Yu, Yuanyuan Liu

Abstract:

Building an appropriate motion model is crucial for trajectory planning of robots and determines the operational quality directly. An adaptive acceleration and deceleration motion planning based on trigonometric functions for the end-effector of 6-DOF robots in Cartesian coordinate system is proposed in this paper. This method not only achieves the smooth translation motion and rotation motion by constructing a continuous jerk model, but also automatically adjusts the parameters of trigonometric functions according to the variable inputs and the kinematic constraints. The results of computer simulation show that this method is correct and effective to achieve the adaptive motion planning for linear trajectories.

Keywords: kinematic constraints, motion planning, trigonometric function, 6-DOF robots

Procedia PDF Downloads 270
180 A Prediction Model of Tornado and Its Impact on Architecture Design

Authors: Jialin Wu, Zhiwei Lian, Jieyu Tang, Jingyun Shen

Abstract:

Tornado is a serious and unpredictable natural disaster, which has an important impact on people's production and life. The probability of being hit by tornadoes in China was analyzed considering the principles of tornado formation. Then some suggestions on layout and shapes for newly-built buildings were provided combined with the characteristics of tornado wind fields. Fuzzy clustering and inverse closeness methods were used to evaluate the probability levels of tornado risks in various provinces based on classification and ranking. GIS was adopted to display the results. Finally, wind field single-vortex tornado was studied to discuss the optimized design of rural low-rise houses in Yancheng, Jiangsu as an example. This paper may provide enough data to support building and urban design in some specific regions.

Keywords: tornado probability, computational fluid dynamics, fuzzy mathematics, optimal design

Procedia PDF Downloads 135
179 Network Mobility Support in Content-Centric Internet

Authors: Zhiwei Yan, Jong-Hyouk Lee, Yong-Jin Park, Xiaodong Lee

Abstract:

In this paper, we analyze NEtwork MObility (NEMO) supporting problems in Content-Centric Networking (CCN), and propose the CCN-NEMO which can well support the deployment of the content-centric paradigm in large-scale mobile Internet. The CCN-NEMO extends the signaling message of the basic CCN protocol, to support the mobility discovery and fast trigger of Interest re-issuing during the network mobility. Besides, the Mobile Router (MR) is extended to optimize the content searching and relaying in the local subnet. These features can be employed by the nested NEMO to maximize the advantages of content retrieving with CCN. Based on the analysis, we compare the performance on handover latency between the basic CCN and our proposed CCN-NEMO. The results show that our scheme can facilitate the content-retrieving in the NEMO scenario with improved performance.

Keywords: NEMO, CCN, mobility, handover latency

Procedia PDF Downloads 468
178 Robust Fault Diagnosis for Wind Turbine Systems Subjected to Multi-Faults

Authors: Sarah Odofin, Zhiwei Gao, Sun Kai

Abstract:

Operations, maintenance and reliability of wind turbines have received much attention over the years due to rapid expansion of wind farms. This paper explores early fault diagnosis scale technique based on a unique scheme of a 5MW wind turbine system that is optimized by genetic algorithm to be very sensitive to faults and resilient to disturbances. A quantitative model based analysis is pragmatic for primary fault diagnosis monitoring assessment to minimize downtime mostly caused by components breakdown and exploit productivity consistency. Simulation results are computed validating the wind turbine model which demonstrates system performance in a practical application of fault type examples. The results show the satisfactory effectiveness of the applied performance investigated in a Matlab/Simulink/Gatool environment.

Keywords: disturbance robustness, fault monitoring and detection, genetic algorithm, observer technique

Procedia PDF Downloads 378
177 Viable Use of Natural Extract Solutions from Tuberous and Cereals to Enhance the Synthesis of Activated Carbon-Graphene Composite

Authors: Pamphile Ndagijimana, Xuejiao Liu, Zhiwei Li, Yin Wang

Abstract:

Enhancing the properties of activated carbon is very imperative for various applications. Indeed, the activated carbon has promising physicochemical properties desired for a considerable number of applications. In this regard, we are proposing an enhanced and green technology for increasing the efficiency and performance of the activated carbon to various applications. The technique poses on the use of natural extracts from tuberous and cereals based-solutions. These solutions showed high potentiality to be used in the synthesis of activated carbon-graphene composite with only 3 mL. The extracted liquid from tuberous sourcing was enough to induce precipitation within a fraction of a minute in contrast to that from cereal sourced. Using these extracts, a synthesis of activated carbon-graphene composite was successful. Different characterization techniques such as XRD, SEM, FTIR, BET, and Raman spectroscopy were performed to investigate the composite materials. The results confirmed a conjugation between activated carbon and graphene material.

Keywords: activated carbon, cereals, extract solution, graphene, tuberous

Procedia PDF Downloads 144
176 Observer-based Robust Diagnosis for Wind Turbine System

Authors: Sarah Odofin, Zhiwei Gao

Abstract:

Operations and maintenance of wind turbine have received much attention by researcher due to rapid expansion of wind farms. This paper explores a novel fault diagnosis that is designed and optimized to be very sensitive to faults and robust to disturbances. The faults considered are the sensor faults of which the augmented observer is considered to enlarge faults and to be robust to disturbance. A qualitative model based analysis is proposed for early fault diagnosis to minimize downtime mostly caused by components breakdown and exploit productivity. Simulation results are computed validating the models provided which demonstrates system performance using practical application of fault type examples. The results demonstrate the effectiveness of the developed techniques investigated in a Matlab/Simulink environment.

Keywords: wind turbine, condition monitoring, genetic algorithm, fault diagnosis, augmented observer, disturbance robustness, fault estimation, sensor monitoring

Procedia PDF Downloads 497
175 Preliminary Study on the Removal of Solid Uranium Compound in Nuclear Fuel Production System

Authors: Bai Zhiwei, Zhang Shuxia

Abstract:

By sealing constraint, the system of nuclear fuel production penetrates a trace of air in during its service. The vapor in the air can react with material in the system and generate solid uranium compounds. These solid uranium compounds continue to accumulate and attached to the production equipment and pipeline of system, which not only affects the operation reliability of production equipment and give off radiation hazard as well after system retired. Therefore, it is necessary to select a reasonable method to remove it. Through the analysis of physicochemical properties of solid uranium compounds, halogenated fluoride compounds are selected as a cleaning agent, which can remove solid uranium compounds effectively. This paper studied the related chemical reaction under the condition of static test and results show that the selection of high fluoride halogen compounds can be removed solid uranium compounds completely. The study on the influence of reaction pressure with the reaction rate discovered a phenomenon that the higher the pressure, the faster the reaction rate.

Keywords: fluoride halogen compound, remove, radiation, solid uranium compound

Procedia PDF Downloads 302
174 Research and Development of Net-Centric Information Sharing Platform

Authors: Wang Xiaoqing, Fang Youyuan, Zheng Yanxing, Gu Tianyang, Zong Jianjian, Tong Jinrong

Abstract:

Compared with traditional distributed environment, the net-centric environment brings on more demanding challenges for information sharing with the characteristics of ultra-large scale and strong distribution, dynamic, autonomy, heterogeneity, redundancy. This paper realizes an information sharing model and a series of core services, through which provides an open, flexible and scalable information sharing platform.

Keywords: net-centric environment, information sharing, metadata registry and catalog, cross-domain data access control

Procedia PDF Downloads 568
173 Triggering Supersonic Boundary-Layer Instability by Small-Scale Vortex Shedding

Authors: Guohua Tu, Zhi Fu, Zhiwei Hu, Neil D Sandham, Jianqiang Chen

Abstract:

Tripping of boundary-layers from laminar to turbulent flow, which may be necessary in specific practical applications, requires high amplitude disturbances to be introduced into the boundary layers without large drag penalties. As a possible improvement on fixed trip devices, a technique based on vortex shedding for enhancing supersonic flow transition is demonstrated in the present paper for a Mach 1.5 boundary layer. The compressible Navier-Stokes equations are solved directly using a high-order (fifth-order in space and third-order in time) finite difference method for small-scale cylinders suspended transversely near the wall. For cylinders with proper diameter and mount location, asymmetry vortices shed within the boundary layer are capable of tripping laminar-turbulent transition. Full three-dimensional simulations showed that transition was enhanced. A parametric study of the size and mounting location of the cylinder is carried out to identify the most effective setup. It is also found that the vortex shedding can be suppressed by some factors such as wall effect.

Keywords: boundary layer instability, boundary layer transition, vortex shedding, supersonic flows, flow control

Procedia PDF Downloads 365
172 Synthesis of Monocyclic, Bicyclic, and Benzocyclobutene Amino Endoperoxides through Visible Light Catalysis

Authors: Enoch Kudoahor, Nan Zheng

Abstract:

We describe the use of readily available self-doped TiO2 and visible light, under a mild condition to synthesize a class of monocyclic, bicyclic, and benzocyclobutene amino compounds containing the endoperoxide bridges; their derivatives and further test their effective clinical activities against malaria, cancer, and their resistances. Considering their stable under photooxidation conditions and recyclability, we use a self-doped TiO2 under a visible condition to synthesize these classes of amino endoperoxides. These amino endoperoxides are stable over a period compared to classes of endoperoxides.

Keywords: catalysis, endoperoxides, titanium dioxide, visible light

Procedia PDF Downloads 153
171 Research on Urban Design Method of Ancient City Guided by Catalyst Theory

Authors: Wang Zhiwei, Wang Weiwu

Abstract:

The process of urbanization in China has entered a critical period of transformation from urban expansion and construction to delicate urban design, thus forming a new direction in the field of urban design. So far, catalyst theory has become a prominent guiding strategy in urban planning and design. In this paper, under the background of urban renewal, catalyst theory is taken as the guiding ideology to explore the method of urban design in shouxian county. Firstly, this study briefly introduces and analyzes the catalyst theory. Through field investigation, it is found that the city has a large number of idle Spaces, such as abandoned factories and schools. In the design, the idle Spaces in the county town are utilized and interlinked in space, and functional interaction is carried out from the pattern of the county town. On the one hand, the results showed that the catalyst theory can enhance the vitality of the linear street space with a small amount of monomer construction. On the other hand, the city can also increase the cultural and economic sites of the city without damaging the historical relics and the sense of alterations of the ancient city, to improve the quality of life and quality of life of citizens. The city micro-transformation represented by catalyst theory can help ancient cities like shouxian to realize the activation of the old city and realize the gradual development.

Keywords: catalytic theory, urban design, China's ancient city, Renaissance

Procedia PDF Downloads 124
170 Intellectual Property Protection of CRISPR Related Technologies

Authors: Zheng Miao, Dennis Fernandez

Abstract:

CRISPR research has the potential to completely transform life science, agriculture, live-stock and the health care industry. The Intellectual Property derived from its research has raised significant attention in the academic as well as the biopharmaceutical industry culminating an urgent need for strategic IP protection. We review the rudimentary concepts and key competitors of CRISPR technologies as well as the paramount strategies for intellectual property protection. Further, we elaborate on prosecution issues related to CRISPR patents as well as possible solutions to various patent laws, interferences and litigation. Finally, we address how the bioinformatics of the CRISPR technology begs an inquiry into issues of privacy and a host of ethical concerns.

Keywords: bioinformatics, CRISPR, biotechnology, intellectual property

Procedia PDF Downloads 251
169 Damage Strain Analysis of Parallel Fiber Eutectic

Authors: Jian Zheng, Xinhua Ni, Xiequan Liu

Abstract:

According to isotropy of parallel fiber eutectic, the no- damage strain field in parallel fiber eutectic is obtained from the flexibility tensor of parallel fiber eutectic. Considering the damage behavior of parallel fiber eutectic, damage variables are introduced to determine the strain field of parallel fiber eutectic. The damage strains in the matrix, interphase, and fiber of parallel fiber eutectic are quantitatively analyzed. Results show that damage strains are not only associated with the fiber volume fraction of parallel fiber eutectic, but also with the damage degree.

Keywords: damage strain, initial strain, fiber volume fraction, parallel fiber eutectic

Procedia PDF Downloads 575
168 Visual Search Based Indoor Localization in Low Light via RGB-D Camera

Authors: Yali Zheng, Peipei Luo, Shinan Chen, Jiasheng Hao, Hong Cheng

Abstract:

Most of traditional visual indoor navigation algorithms and methods only consider the localization in ordinary daytime, while we focus on the indoor re-localization in low light in the paper. As RGB images are degraded in low light, less discriminative infrared and depth image pairs are taken, as the input, by RGB-D cameras, the most similar candidates, as the output, are searched from databases which is built in the bag-of-word framework. Epipolar constraints can be used to relocalize the query infrared and depth image sequence. We evaluate our method in two datasets captured by Kinect2. The results demonstrate very promising re-localization results for indoor navigation system in low light environments.

Keywords: indoor navigation, low light, RGB-D camera, vision based

Procedia PDF Downloads 459
167 Optimal Decisions for Personalized Products with Demand Information Updating and Limited Capacity

Authors: Meimei Zheng

Abstract:

Product personalization could not only bring new profits to companies but also provide the direction of long-term development for companies. However, the characteristics of personalized product cause some new problems. This paper investigates how companies make decisions on the supply of personalized products when facing different customer attitudes to personalized product and service, constraints due to limited capacity and updates of personalized demand information. This study will provide optimal decisions for companies to develop personalized markets, resulting in promoting business transformation and improving business competitiveness.

Keywords: demand forecast updating, limited capacity, personalized products, optimization

Procedia PDF Downloads 261
166 Towards Developing a Self-Explanatory Scheduling System Based on a Hybrid Approach

Authors: Jian Zheng, Yoshiyasu Takahashi, Yuichi Kobayashi, Tatsuhiro Sato

Abstract:

In the study, we present a conceptual framework for developing a scheduling system that can generate self-explanatory and easy-understanding schedules. To this end, a user interface is conceived to help planners record factors that are considered crucial in scheduling, as well as internal and external sources relating to such factors. A hybrid approach combining machine learning and constraint programming is developed to generate schedules and the corresponding factors, and accordingly display them on the user interface. Effects of the proposed system on scheduling are discussed, and it is expected that scheduling efficiency and system understandability will be improved, compared with previous scheduling systems.

Keywords: constraint programming, factors considered in scheduling, machine learning, scheduling system

Procedia PDF Downloads 323
165 Failure Localization of Bipolar Integrated Circuits by Implementing Active Voltage Contrast

Authors: Yiqiang Ni, Xuanlong Chen, Enliang Li, Linting Zheng, Shizheng Yang

Abstract:

Bipolar ICs are playing an important role in military applications, mainly used in logic gates, such as inverter and NAND gate. The defect of metal break located on the step is one of the main failure mechanisms of bipolar ICs, resulting in open-circuit or functional failure. In this situation, general failure localization methods like optical beam-induced resistance change (OBIRCH) and photon emission microscopy (PEM) might not be fully effective. However, active voltage contrast (AVC) can be used as a voltage probe, which may pinpoint the incorrect potential and thus locate the failure position. Two case studies will be present in this paper on how to implement AVC for failure localization, and the detailed failure mechanism will be discussed.

Keywords: bipolar IC, failure localization, metal break, open failure, voltage contrast

Procedia PDF Downloads 289
164 DNA Prime/MVTT Boost Enhances Broadly Protective Immune Response against Mosaic HIV-1 Gag

Authors: Wan Liu, Haibo Wang, Cathy Huang, Zhiwu Tan, Zhiwei Chen

Abstract:

The tremendous diversity of HIV-1 has been a major challenge for an effective AIDS vaccine development. Mosaic approach presents the potential for vaccine design aiming for global protection. The mosaic antigen of HIV-1 Gag allows antigenic breadth for vaccine-elicited immune response against a wider spectrum of viral strains. However, the enhancement of immune response using vaccines is dependent on the strategy used. Heterologous prime/boost regimen has been shown to elicit high levels of immune responses. Here, we investigated whether priming using plasmid DNA with electroporation followed by boosting with the live replication-competent modified vaccinia virus vector TianTan (MVTT) combined with the mosaic antigenic sequence could elicit a greater and broader antigen-specific response against HIV-1 Gag in mice. When compared to DNA or MVTT alone, or MVTT/MVTT group, DNA/MVTT group resulted in coincidentally high frequencies of broadly reactive, Gag-specific, polyfunctional, long-lived, and cytotoxic CD8+ T cells and increased anti-Gag antibody titer. Meanwhile, the vaccination could upregulate PD-1+, and Tim-3+ CD8+ T cell, myeloid-derived suppressive cells and Treg cells to balance the stronger immune response induced. Importantly, the prime/boost vaccination could help control the EcoHIV and mesothelioma AB1-gag challenge. The stronger protective Gag-specific immunity induced by a Mosaic DNA/MVTT vaccine corroborate the promise of the mosaic approach, and the potential of two acceptably safe vectors to enhance anti-HIV immunity and cancer prevention.

Keywords: DNA/MVTT vaccine, EcoHIV, mosaic antigen, mesothelioma AB1-gag

Procedia PDF Downloads 240
163 Formal Verification for Ethereum Smart Contract Using Coq

Authors: Xia Yang, Zheng Yang, Haiyong Sun, Yan Fang, Jingyu Liu, Jia Song

Abstract:

The smart contract in Ethereum is a unique program deployed on the Ethereum Virtual Machine (EVM) to help manage cryptocurrency. The security of this smart contract is critical to Ethereum’s operation and highly sensitive. In this paper, we present a formal model for smart contract, using the separated term-obligation (STO) strategy to formalize and verify the smart contract. We use the IBM smart sponsor contract (SSC) as an example to elaborate the detail of the formalizing process. We also propose a formal smart sponsor contract model (FSSCM) and verify SSC’s security properties with an interactive theorem prover Coq. We found the 'Unchecked-Send' vulnerability in the SSC, using our formal model and verification method. Finally, we demonstrate how we can formalize and verify other smart contracts with this approach, and our work indicates that this formal verification can effectively verify the correctness and security of smart contracts.

Keywords: smart contract, formal verification, Ethereum, Coq

Procedia PDF Downloads 689
162 An Efficient Digital Baseband ASIC for Wireless Biomedical Signals Monitoring

Authors: Kah-Hyong Chang, Xin Liu, Jia Hao Cheong, Saisundar Sankaranarayanan, Dexing Pang, Hongzhao Zheng

Abstract:

A digital baseband Application-Specific Integrated Circuit (ASIC) is developed for a microchip transponder to transmit signals and temperature levels from biomedical monitoring devices. The transmission protocol is adapted from the ISO/IEC 11784/85 standard. The module has a decimation filter that employs only a single adder-subtractor in its datapath. The filtered output is coded with cyclic redundancy check and transmitted through backscattering Load Shift Keying (LSK) modulation to a reader. Fabricated using the 0.18-μm CMOS technology, the module occupies 0.116 mm² in chip area (digital baseband: 0.060 mm², decimation filter: 0.056 mm²), and consumes a total of less than 0.9 μW of power (digital baseband: 0.75 μW, decimation filter: 0.14 μW).

Keywords: biomedical sensor, decimation filter, radio frequency integrated circuit (RFIC) baseband, temperature sensor

Procedia PDF Downloads 395
161 Frequency-Dependent and Full Range Tunable Phase Shifter

Authors: Yufu Yin, Tao Lin, Shanghong Zhao, Zihang Zhu, Xuan Li, Wei Jiang, Qiurong Zheng, Hui Wang

Abstract:

In this paper, a frequency-dependent and tunable phase shifter is proposed and numerically analyzed. The key devices are the dual-polarization binary phase shift keying modulator (DP-BPSK) and the fiber Bragg grating (FBG). The phase-frequency response of the FBG is employed to determine the frequency-dependent phase shift. The simulation results show that a linear phase shift of the recovered output microwave signal which depends on the frequency of the input RF signal is achieved. In addition, by adjusting the power of the RF signal, the full range phase shift from 0° to 360° can be realized. This structure shows the spurious free dynamic range (SFDR) of 70.90 dB·Hz2/3 and 72.11 dB·Hz2/3 under different RF powers.

Keywords: microwave photonics, phase shifter, spurious free dynamic range, frequency-dependent

Procedia PDF Downloads 294
160 A Comparison of YOLO Family for Apple Detection and Counting in Orchards

Authors: Yuanqing Li, Changyi Lei, Zhaopeng Xue, Zhuo Zheng, Yanbo Long

Abstract:

In agricultural production and breeding, implementing automatic picking robot in orchard farming to reduce human labour and error is challenging. The core function of it is automatic identification based on machine vision. This paper focuses on apple detection and counting in orchards and implements several deep learning methods. Extensive datasets are used and a semi-automatic annotation method is proposed. The proposed deep learning models are in state-of-the-art YOLO family. In view of the essence of the models with various backbones, a multi-dimensional comparison in details is made in terms of counting accuracy, mAP and model memory, laying the foundation for realising automatic precision agriculture.

Keywords: agricultural object detection, deep learning, machine vision, YOLO family

Procedia PDF Downloads 196
159 Surface to the Deeper: A Universal Entity Alignment Approach Focusing on Surface Information

Authors: Zheng Baichuan, Li Shenghui, Li Bingqian, Zhang Ning, Chen Kai

Abstract:

Entity alignment (EA) tasks in knowledge graphs often play a pivotal role in the integration of knowledge graphs, where structural differences often exist between the source and target graphs, such as the presence or absence of attribute information and the types of attribute information (text, timestamps, images, etc.). However, most current research efforts are focused on improving alignment accuracy, often along with an increased reliance on specific structures -a dependency that inevitably diminishes their practical value and causes difficulties when facing knowledge graph alignment tasks with varying structures. Therefore, we propose a universal knowledge graph alignment approach that only utilizes the common basic structures shared by knowledge graphs. We have demonstrated through experiments that our method achieves state-of-the-art performance in fair comparisons.

Keywords: knowledge graph, entity alignment, transformer, deep learning

Procedia PDF Downloads 43
158 Cells Detection and Recognition in Bone Marrow Examination with Deep Learning Method

Authors: Shiyin He, Zheng Huang

Abstract:

In this paper, deep learning methods are applied in bio-medical field to detect and count different types of cells in an automatic way instead of manual work in medical practice, specifically in bone marrow examination. The process is mainly composed of two steps, detection and recognition. Mask-Region-Convolutional Neural Networks (Mask-RCNN) was used for detection and image segmentation to extract cells and then Convolutional Neural Networks (CNN), as well as Deep Residual Network (ResNet) was used to classify. Result of cell detection network shows high efficiency to meet application requirements. For the cell recognition network, two networks are compared and the final system is fully applicable.

Keywords: cell detection, cell recognition, deep learning, Mask-RCNN, ResNet

Procedia PDF Downloads 186
157 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei

Abstract:

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.

Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence

Procedia PDF Downloads 449