Bowen Zheng

Learn More
The fabrication and initial applications of nanobubbles (NBs) have shown promising results in recent years. A small particle size is a basic requirement for ultrasound contrast-enhanced agents that penetrate tumor blood vessel pores to allow for targeted imaging and therapy. However, the nanoscale size of the particles used has the disadvantage of weakening(More)
The safety of real-time embedded systems relies on both functional and timing correctness. On the timing side, real-time constraints are set on task executions, and missing them may lead to system failure. On the functional side, soft errors have become a major concern. Various soft error tolerance strategies are proposed for soft error detection and(More)
Cyber-security has emerged as a pressing issue for transportation systems. Studies have shown that attackers can attack modern vehicles from a variety of interfaces and gain access to the most safety-critical components. Such threats become even broader and more challenging with the emergence of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I)(More)
The aim of this study was to establish a murine protothecal mastitis model and to evaluate the treatment efficiency of gentamicin. Challenge routes were determined with a pathogenic Prototheca zopfii genotype 2 (P. zopfii) strain. 25 BALB/c mice were inoculated in mammary glands with graded dosages (103, 104, 105, 106, 107 CFU of P. zopfii) and killed on(More)
Demand response (DR) is an effective mechanism in improving power system efficiency and reducing energy cost for customers. However, DR processes might be vulnerable to cyber attacks from the usage of advanced metering infrastructure and wide-area network to exchange information. In this paper, we study potential attacks for a proactive demand participation(More)
In this article, we address both security and safety requirements and solve security-aware design problems for the controller area network (CAN) protocol and time division multiple access (TDMA)-based protocols. To provide insights and guidelines for other similar security problems with limited resources and strict timing constraints, we propose a general(More)
In this article, we propose a new lifetime task optimization technique for real-time embedded processors considering the electromigration-induced reliability. The new approach is based on a recently proposed physics-based electromigration (EM) model for more accurate EM assessment of a power grid network at the chip level. We apply the dynamic voltage and(More)
We have studied the stress wave propagation in one-dimensional (1-D) nanoscopic buckyball (C60) system by molecular dynamics (MD) simulation and quantitative modeling. Simulation results have shown that solitary waves are generated and propagating in the buckyball system through impacting one buckyball at one end of the buckyball chain. We have found the(More)
The most important blocks in the digital part of a RFID reader are the MCU which controls all the system work in an efficient way and the modulator which is used to accomplish the digital signal processing. As now most commercial RFID readers are discrete component design and researching on implementation of single chip RFID reader is few, this paper point(More)