The accurate prediction of renewable energy consumption (REC) is of great significance to ensure energy security, reduce dependence on fossil energy, and promote sustainable economic and social ...development. In this paper, a novel grey model with conformable fractional opposite-direction accumulation (CFOA), abbreviated as the CFOGM (1,1) model, is proposed to forecast REC in Australia. The new model is discussed in detail with a new CFOA operation and the GM (1,1) model and can take full advantage of the information carried by the original data. The CFOGM (1,1) model has lower modeling error and better fitting and forecasting accuracy than other grey, Holt, and ARM models and can better capture the change trend of REC and achieve accurate prediction. The forecasting results present that the REC in Australia is 497–581 petajoules in 2021, 596–728 petajoules in 2022, and 715–912 petajoules in 2023, indicating that the REC in Australia is still accelerating.
Full text
Available for:
EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
Embedded systems are increasingly applied in numerous security-sensitive applications, such as industrial controls, railway transports, intelligent vehicles, avionics and aerospace. However, embedded ...systems are compromised in the execution of untrusted programs, where the instructions could be maliciously tampered with to cause unintended behaviors or program execution failures. Particularly for remote-controlled embedded systems, program execution monitoring and instruction fault self-repair are important to avoid unintended behaviors and execution interruptions. Therefore, this paper presents a hardware-enhanced embedded system with the integration of a Security Processing Unit (SPU) in which integrity signature checking and checkpoint-rollback mechanisms are coupled to achieve real-time program execution monitoring and instruction fault self-repairing. This System-on-Chip (SoC) design was implemented and validated on the Xilinx Virtex-5 FPGA development platform. Based on the evaluation of the SPU in terms of the performance overhead, security capability, and resource consumption, the experimental results show that, while the CPU executes different benchmarks, the average performance overhead of the SPU lowers to 1.92% at typical 8-KB I/D caches, and it provides both program monitoring and fault self-repairing capabilities. Unlike conventional hardware detection technologies that require manual handling to recovery program executions, the CPU–SPU collaborative SoC is a resilient architecture equipped with instruction tampering detection and a post-detection strategy of instruction fault self-repairing. Moreover, the embedded system satisfies a good balance between high security and resource consumption.
Abstract Our study aimed to evaluate the association of lipoprotein(a)Lp(a) and prognosis in patients with nonobstructive coronary artery disease(CAD). A total of 4254 symptomatic patients with ...suspected CAD referred for coronary angiography were analyzed and 451 patients (250women, average age 58±9 years) with nonobstructive CAD(defined as no angiographic stenosis≥50% in any major epicardial artery) were finally included in our cohort. Subjects were categorized into tertile groups according to Lp(a) levels on admission. The primary endpoint was major adverse cardiovascular events(MACE), defined as cardiac death and incident acute coronary syndrome(ACS). Over a mean follow-up period of 32±22 months, 37(8%) MACE(15 cases of cardiac death and 22 cases of ACS) occurred. Kaplan-Meier analysis revealed that elevated Lp(a) level was associated with worse prognosis(p=0.001). After Cox multivariate adjustment for other clinical confounders, an elevated Lp(a) level remained an independent predictor of MACE either as a continuous variable hazard ratio(HR): 1.031, 95% confidence interval(CI):1.019-1.043, p<0.001 or as a categorical variable (HR:3.155, 95% CI:1.599-6.229, p=0.001). Furthermore, addition of Lp(a) to established coronary risk factors significantly improved the predictive value of reference models for MACE. In conclusion, an elevated Lp(a) level is independently associated with worse prognosis and may provide useful risk stratification in symptomatic patients with nonobstructive CAD.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
Accurate predictions of CO2 emissions have important practical significance for determining the best measures for reducing CO2 emissions and accomplishing the target of reaching a carbon peak. ...Although some existing models have good modeling accuracy, the improvement of model specifications can provide a more accurate grasp of a system’s future and thus help relevant departments develop more effective targeting measures. Therefore, considering the shortcomings of the existing grey Bernoulli model, in this paper, the traditional model is optimized from the perspectives of the accumulation mode and background value optimization, and the novel grey Bernoulli model NFOGBM(1,1,α,β) is constructed. The effectiveness of the model is verified by using CO2 emissions data from seven major industries in Shaanxi Province, China, and future trends are predicted. The conclusions are as follows. First, the new fractional opposite-directional accumulation and optimization methods for background value determination are effective and reasonable, and the prediction performance can be enhanced. Second, the prediction accuracy of the NFOGBM(1,1,α,β) is higher than that of the NGBM(1,1) and FANGBM(1,1). Third, the forecasting results show that under the current conditions, the CO2 emissions generated by the production and supply of electricity and heat are expected to increase by 23.8% by 2030, and the CO2 emissions of the other six examined industries will decline.
At present, the IoT devices face many kinds of software and hardware attacks, especially buffer overflow attacks. This paper presents an architectural-enhanced security hardware design to detect ...buffer overflow attacks. One part of the design is instructions monitoring and verification used to trace the execution behavior of programs. Another one is secure tag validation used to monitor the attributes of every memory segment. The automated extraction tools extract the monitoring model and secure tag of each memory segment at the compile time. At run-time, the designed hardware observes its dynamic execution trace and checks whether the trace conforms to the permissible behavior, if not the appropriate response mechanisms will be triggered. The proposed schemes don't change the compiler or the existing instruction set and imposes no restriction to the software developer. The architectural design is implemented on an actual OR1200-FPGA platform. The experimental analysis shows that the proposed techniques can detect a wide range of buffer overflow attacks. And it takes low performance penalties and minimal overheads.
Accurate predictions of CO
emissions have important practical significance for determining the best measures for reducing CO
emissions and accomplishing the target of reaching a carbon peak. Although ...some existing models have good modeling accuracy, the improvement of model specifications can provide a more accurate grasp of a system's future and thus help relevant departments develop more effective targeting measures. Therefore, considering the shortcomings of the existing grey Bernoulli model, in this paper, the traditional model is optimized from the perspectives of the accumulation mode and background value optimization, and the novel grey Bernoulli model NFOGBM(1,1,α,β) is constructed. The effectiveness of the model is verified by using CO
emissions data from seven major industries in Shaanxi Province, China, and future trends are predicted. The conclusions are as follows. First, the new fractional opposite-directional accumulation and optimization methods for background value determination are effective and reasonable, and the prediction performance can be enhanced. Second, the prediction accuracy of the NFOGBM(1,1,α,β) is higher than that of the NGBM(1,1) and FANGBM(1,1). Third, the forecasting results show that under the current conditions, the CO
emissions generated by the production and supply of electricity and heat are expected to increase by 23.8% by 2030, and the CO
emissions of the other six examined industries will decline.
Tumor growth cascade is a complicated and multistep process with numerous obstacles. Until recently, evidences have shown the involvement of microRNAs (miRNAs) in tumorigenesis and tumor progression ...of various cancers, including colorectal cancer (CRC). In this study, we explored the role of miR-194 and its downstream pathway in CRC. We acquired data through miRNA microarray profiles, showing that the expression of miR-194 was significantly suppressed in CRC tissues compared with corresponding noncancerous tissues. Decreased miR-194 expression was obviously associated with tumor size and tumor differentiation, as well as TNM stage. Both Kaplan-Meier and multivariate survival analysis showed that downregulated miR-194 was associated with overall survival. Moreover, functional assays indicated that overexpression of miR-194 in CRC cell lines inhibited cell proliferation both in vitro and in vivo. In addition, using dual-luciferase reporter gene assay, we found MAP4K4 was the direct target of miR-194. Silencing of MAP4K4 resulted in similar biological behavior changes to that of overexpression of miR-194. We also observed through Human Gene Expression Array that MDM2 was one of the downstream targets of MAP4K4. Knockdown of MAP4K4 downregulated MDM2 expression through transcription factor c-Jun binding to the -1063 to -1057 bp of the promoter. These results suggest that miR-194, regulating the MAP4K4/c-Jun/MDM2 signaling pathway, might act as a tumor suppressor and serve as a novel target for CRC prevention and therapy.
Full text
Available for:
BFBNIB, GIS, IJS, KISLJ, NUK, PNG, UL, UM, UPUK
Embedded systems are subjecting to various kinds of security threats. Some malicious attacks exploit valid code gadgets to launch destructive actions or to reveal critical details. Some previous ...memory encryption strategies aiming at this issue suffer from unacceptable performance overhead and resource consumption. This paper proposes a hardware based confidentiality protection method to secure the code and data stored and transferred in embedded systems. This method takes advantage of the I/D-cache structure to reduce the frequency of the cryptographic encryption and decryption processing. We implement the AES engine with composite field arithmetic to reduce the cost of hardware implementation. The proposed architecture is implemented on EP2C70 FPGA chip with OpenRisc 1200 based SoC. The experiment results show that the AES engine is required to work only in the case of I/D-cache miss and the hardware implementation overhead can save 53.24% and 13.39% for the AES engine and SoC respectively.