A design scheme of plug-in key intelligent lock with unique identity authentication ID

2021 ◽  
Author(s):  
Xiuying Mo ◽  
YanFang Liu
2021 ◽  
Vol 11 (6) ◽  
pp. 2803
Author(s):  
Jae-Woo Kim ◽  
Dong-Seong Kim ◽  
Seung-Hwan Kim ◽  
Sang-Moon Shin

A quad, small form-factor pluggable 28 Gbps optical transceiver design scheme is proposed. It is capable of transmitting 50 Gbps of data up to a distance of 40 km using modulation signals with a level-four pulse-amplitude. The proposed scheme is designed using a combination of electro-absorption-modulated lasers, transmitter optical sub-assembly, low-cost positive-intrinsic-native photodiodes, and receiver optical sub-assembly to achieve standard performance and low cost. Moreover, the hardware and firmware design schemes to implement the optical transceiver are presented. The results confirm the effectiveness of the proposed scheme and the performance of the manufactured optical transceiver, thereby confirming its applicability to real industrial sites.


2021 ◽  
Vol 1812 (1) ◽  
pp. 012027
Author(s):  
Wanli Ma ◽  
Qi Zhang ◽  
Junwei Ma ◽  
Honglin Xue ◽  
Xiaowei Hao ◽  
...  

Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4393
Author(s):  
JongHyup Lee ◽  
Taekyoung Kwon

The Industrial Internet of Things (IIoT) could enhance automation and analytics in industrial environments. Despite the promising benefits of IIoT, securely managing software updates is a challenging problem for those critical applications. This is due to at least the intrinsic lack of software protection mechanisms in legacy industrial systems. In this paper, to address the challenges in building a secure software supply chain for industrial environments, we propose a new approach that leverages distributed watchdogs with blockchain systems in protecting software supply chains. For this purpose, we bind every entity with a unique identity in the blockchain and employ the blockchain as a delegated authenticator by mapping every reporting action to a non-fungible token transfer. Moreover, we present a detailed specification to clearly define the behavior of systems and to apply model checking.


2021 ◽  
Vol 1804 (1) ◽  
pp. 012144
Author(s):  
Hesham Hashim Mohammed ◽  
Shatha A. Baker ◽  
Ahmed S. Nori

Societies ◽  
2021 ◽  
Vol 11 (3) ◽  
pp. 77
Author(s):  
Tyler Horan

Social media influencers-individuals who utilize various forms of network power on social networks occupy a unique identity space. On the one hand, their network power is often tied to their social identity as creators of engaging material. On the other hand, their ability to promote commercial products and services steps outside the traditionally distinct commercial–social, occupational–personal divides. In this work, the network morphologies of influencers are explored in relation to their delivery of sponsored and non-sponsored content. This article explores how the disclosure of content as ‘sponsored’ affects audience reception. We show how that the promotion of content on social media often generates higher levels of engagement and receptiveness amongst their audience despite the platform’s assumption of organic non-commercial relationships. We find that engagement levels are highest among smaller out-degree networks. Additionally, we demonstrate that sponsored content not only returns a higher level of engagement, but that the effect of sponsorship is relatively consistent across out-degree network sizes. In sum, we suggest that social media audiences are not sensitive to commercial sponsorship when tied to identity, as long as that performance is convincing and consistent.


Sign in / Sign up

Export Citation Format

Share Document