期刊文献+
共找到42,326篇文章
< 1 2 250 >
每页显示 20 50 100
基于802.11be的LSTF和LLTF联合估计IQ不平衡方法
1
作者 徐俊 许虎 +1 位作者 张煜 李明福 《移动信息》 2026年第1期330-332,共3页
802.11be系统中IQ不平衡对信号解调性能影响较大,针对IQ不平衡中的两个主要部分,即幅度不平衡和相位不平衡,文中提出了一种基于802.11be的LSTF和LLTF联合估计IQ不平衡的方法。首先,将原始IQ数据变采样到协议规定的采样率后,并按照IEEE 8... 802.11be系统中IQ不平衡对信号解调性能影响较大,针对IQ不平衡中的两个主要部分,即幅度不平衡和相位不平衡,文中提出了一种基于802.11be的LSTF和LLTF联合估计IQ不平衡的方法。首先,将原始IQ数据变采样到协议规定的采样率后,并按照IEEE 802.11be协议标准,生成理想LSTF序列和LLTF序列。然后,利用理想LSTF序列和变采样后的数据进行相关运算,找出相关峰值,获取到接收序列的LSTF同步起始位置。再将理想发送的LSTF序列和同步后的接收LSTF序列进行前后项联合,建立方程组,通过求解方程组的形式,计算幅度不平衡和相位不平衡。最后,再将补偿幅度不平衡后的接收LLTF序列和理想LLTF序列进行联合,二次计算相位不平衡估计值。 展开更多
关键词 802.11b iQ不平衡 LSTF LLTF
在线阅读 下载PDF
ProRE:A Protocol Message Structure Reconstruction Method Based on Execution Slice Embedding
2
作者 Yuyao Huang Hui Shu Fei Kang 《Computers, Materials & Continua》 2026年第3期936-960,共25页
Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,inclu... Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios. 展开更多
关键词 protocol reverse engineering program slicing code embedding hierarchical clustering
在线阅读 下载PDF
Fresh Arrival--Rwanda-China avocado export protocol is a milestone in growing agricultural partnership
3
作者 ALAFATI MUGABO 《ChinAfrica》 2026年第1期46-47,共2页
Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajecto... Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade. 展开更多
关键词 China trade protocol Rwanda agricultural partnership fresh avocado exports
原文传递
Robust Hyper-Polarization Protocol of Nuclear Spins via Magic Sequence
4
作者 Haiyang Li Yongju Li +1 位作者 Hao Liao Ping Wang 《Chinese Physics Letters》 2026年第1期105-128,共24页
Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to thei... Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center. 展开更多
关键词 transferring polarization electrons hyperpolarization protocols quantum information technologiesas nuclear spins pulse polarization nuclear spin polarization magic sequences nuclear magnetic resonance
原文传递
基于软件无线电模块的IEEE 802.11a接收机同步单元实验设计
5
作者 王莹 宋沛豪 《实验科学与技术》 2025年第5期1-7,共7页
针对“新工科”建设对大学生实践能力培养的要求,在通信原理实验教学中提出基于软件无线电模块的IEEE802.11a接收机OFDM同步算法教学实验,并给出帧同步、符号同步和频率同步的实验原理。在MATLAB开发环境下,进行OFDM同步单元程序设计和... 针对“新工科”建设对大学生实践能力培养的要求,在通信原理实验教学中提出基于软件无线电模块的IEEE802.11a接收机OFDM同步算法教学实验,并给出帧同步、符号同步和频率同步的实验原理。在MATLAB开发环境下,进行OFDM同步单元程序设计和软件无线电模块PLUTO配置。从而,利用PLUTO完成通带信号收发,并进行同步单元功能验证。学生通过该实验,能更好地掌握通信原理有关同步的理论知识,提升工程实践能力。 展开更多
关键词 软件无线电 iEEE 802.11a OFDM 同步算法
在线阅读 下载PDF
基于事件逻辑的改进型Helsinki协议的形式化分析
6
作者 肖美华 罗运先 钟小妹 《计算机应用与软件》 北大核心 2026年第1期325-332,共8页
安全协议是现代网络通信的基础,证明协议的安全性问题是当今研究热点之一。事件逻辑是一种基于事件系统证明协议安全属性的形式化方法,结合事件类以及事件序语言,利用原子类型表示随机数、密钥等不可猜测的数据,能有效刻画协议系统。针... 安全协议是现代网络通信的基础,证明协议的安全性问题是当今研究热点之一。事件逻辑是一种基于事件系统证明协议安全属性的形式化方法,结合事件类以及事件序语言,利用原子类型表示随机数、密钥等不可猜测的数据,能有效刻画协议系统。针对改进型Helsinki协议的安全性问题,对事件逻辑扩充谓词Fresh和FirstSend及其推理规则,利用扩充后的事件逻辑对协议进行形式化分析,首先对协议构建基本序列,然后通过事件逻辑对协议的认证性以及秘密性进行形式化规约,最后利用公理系统和推理规则证明改进型Helsinki协议满足认证性和秘密性。结果表明事件逻辑理论能有效证明安全协议的认证性和秘密性。 展开更多
关键词 安全协议 事件逻辑 形式化方法 Helsinki协议
在线阅读 下载PDF
基于时间-事件逻辑的ID-AOFE协议形式化分析
7
作者 肖美华 乔珊珊 杨科 《郑州大学学报(理学版)》 北大核心 2026年第2期48-54,共7页
公平交换协议旨在为数字信息交换提供安全、公平的机制,分析该类协议的公平性是信息安全领域中一个重要的研究内容。时间-事件逻辑具有描述协议主体知识和状态随时间变化的机制,是一种分析协议安全属性的有效方法。基于时间-事件逻辑针... 公平交换协议旨在为数字信息交换提供安全、公平的机制,分析该类协议的公平性是信息安全领域中一个重要的研究内容。时间-事件逻辑具有描述协议主体知识和状态随时间变化的机制,是一种分析协议安全属性的有效方法。基于时间-事件逻辑针对公平交换协议中主体互不信任、存在欺骗行为的特点,通过分析当协议结束运行时,是否存在使不诚实主体获得额外优势的策略来分析协议的公平性。以一个基于身份的混淆乐观公平交换(identity based-ambiguous optimistic fair exchange,ID-AOFE)协议为例进行分析,定义了一种规范的消息交互过程,对ID-AOFE协议消息交互过程中的时间进行了细粒度分析,发现协议中存在两个公平性漏洞,结合图形描述方式给出了攻击发生的全过程,说明了时间-事件逻辑理论的有效性。 展开更多
关键词 形式化方法 时间事件逻辑 iD-AOFE协议 公平性分析
在线阅读 下载PDF
Evaluation of Energy Consumption of Proactive, Reactive, and Hybrid Routing Protocols in Wireless Mesh Networks Using 802.11 Standards 被引量:2
8
作者 Sidoine D. Samo Jean Louis E. K. Fendji 《Journal of Computer and Communications》 2018年第4期1-30,共30页
This paper provides a deep evaluation of the energy consumption of routing protocols. The evaluation is done along with other metrics such as throughput and packet delivery ratio (PDR). We introduce two more metrics t... This paper provides a deep evaluation of the energy consumption of routing protocols. The evaluation is done along with other metrics such as throughput and packet delivery ratio (PDR). We introduce two more metrics to capture the efficiency of the energy consumption: e-throughput and e-PDR. Both are ratios in relation to the energy. We consider the three low layers of the stack. Three types of routing protocols are used: proactive, reactive, and hybrid. At the MAC and PHY layer, three radio types are considered: 802.11a/b/g. Finally, the number of nodes is varying in random topologies, with nodes being static or mobile. Simulations are conducted using NS3. The parameters of a real network interface card are used. From the results in mobile position scenarios, no protocol is outperforming the others;even if OLSR has the lowest energy consumption, most of the time. However, in constant position scenarios, AODV consumed a lower energy, apart from the scenarios using the 802.11a standard where HWMP energy consumption is the lowest. Regarding the energy efficiency, AODV protocols provided the best e-throughput and OLSR the best e-PDR in overall configurations. A framework for selecting energy-efficient routing protocol depending on network characteristics is proposed at the end. 展开更多
关键词 Energy CONSUMPTiON Routing protocols Wireless MESH Networks e-Throughput e-PDR
在线阅读 下载PDF
Adaptive Backoff Algorithm for IEEE 802.11 MAC Protocol 被引量:1
9
作者 Maali ALBALT Qassim NASIR 《International Journal of Communications, Network and System Sciences》 2009年第4期300-317,共18页
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that can communicate directly over wireless media, without the need for a preconfigured infrastructure. Several approaches have been suggested to improve... A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that can communicate directly over wireless media, without the need for a preconfigured infrastructure. Several approaches have been suggested to improve Quality of Service (QoS) in IEEE 802.11-based MANETs through modifying some of the IEEE 802.11 Medium Access Control (MAC) algorithms, such as the backoff algorithm that is used to control the packets collision aftermath. In this work, an adaptive IEEE 802.11 backoff algorithm to improve QoS is de-veloped and tested in simulations as well as in testbed implementation. While the Binary Exponential Backoff (BEB) algorithm deployed by IEEE 802.11 reacts based on individual packet transmit trials, the new algo-rithm takes the history of successive packet transmit trials into account to provide a better QoS performance. The new algorithm has been tested against the legacy IEEE 802.11 through simulations using QualNet and a Linux-based testbed comprising a number of stations. The performed tests have shown significant im-provements in performance, with up to 33.51% improvement in delay and 7.36% improvement in packet delivery fraction compared to the original IEEE 802.11. 展开更多
关键词 MANETS AD-HOC Networks Quality of Service BACKOFF Algorithm iEEE 802.11
在线阅读 下载PDF
Real-life practice of Kelleni’s protocol in treatment and post exposure prophylaxis of SARS-CoV-2 HV.1 and JN.1 subvariants 被引量:1
10
作者 Mina Thabet Kelleni 《World Journal of Virology》 2025年第3期1-5,共5页
This article discusses the evolving real-world practice using nitazoxanide,nonsteroidal anti-inflammatory drugs(NSAIDs)and/or azithromycin(Kelleni’s protocol)to manage the evolving manifestations of severe acute resp... This article discusses the evolving real-world practice using nitazoxanide,nonsteroidal anti-inflammatory drugs(NSAIDs)and/or azithromycin(Kelleni’s protocol)to manage the evolving manifestations of severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)Omicron EG.5.1,its descendant HV.1 as well as BA.2.86 and its descendant JN.1 subvariants in Egypt in 2024.These subvariants are well-known for their highly evolved immune-evasive properties and the manifestations include some peculiar manifestations as persistent cough besides high fever in young children as well as high fever,persistent severe cough,change of voice,loss of taste and smell,epigastric pain,nausea,vomiting,diarrhea,generalized malaise and marked bone aches in adults including the high-risk groups.It’s suggested that the ongoing SARS-CoV-2 evolution is continuing to mostly affect the high-risk groups of patients,to some of whom we’ve also successfully prescribed nitazoxanide and/or NSAIDs for post-exposure prophylaxis of all household contacts.We also continue to recommend starting the immune-modulatory antiviral Kelleni’s protocol as soon as possible in the course of infection and adjusting it in a personalized manner to be more aggressive from the beginning for the high risk patients,at least until the currently encountered surge of infections subsides. 展开更多
关键词 SARS-CoV-2 HV.1 JN.1 Post exposure prophylaxis Kelleni’s protocol NiTAZOXANiDE Non-steroidal anti-inflammatory drugs
暂未订购
RATE ADAPTIVE PROTOCOL FOR MULTIRATE IEEE 802.11 NETWORKS 被引量:1
11
作者 Xi Yong Huang Qingyan +1 位作者 Wei Jibo Zhao Haitao 《Journal of Electronics(China)》 2007年第3期289-295,共7页
In this paper, a rate adaptive protocol AMARF (Adaptive Multirate Auto Rate Fallback) for multirate IEEE 802.11 networks is proposed. In AMARF, each data rate is assigned a unique success threshold, which is a criteri... In this paper, a rate adaptive protocol AMARF (Adaptive Multirate Auto Rate Fallback) for multirate IEEE 802.11 networks is proposed. In AMARF, each data rate is assigned a unique success threshold, which is a criterion to judge when to switch a rate to the next higher one, and the success thresholds can be adjusted dynamically in an adaptive manner according to the running conditions, such as packet length and channel parameters. Moreover, the proposed protocol can be implemented by software without any change to the current IEEE 802.11 standards. Simulation result shows that AMARF yields significantly higher throughput than other existing schemes including ARF and its variants, in various running conditions. 展开更多
关键词 iEEE 802.11 Rate adaptive MULTiRATE
在线阅读 下载PDF
Incorporating red blanket protocol within code crimson:Streamlining definitive trauma care amid the chaos
12
作者 Sohil Pothiawala Savitha Bhagvan Andrew MacCormick 《World Journal of Critical Care Medicine》 2025年第1期14-19,共6页
The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation... The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation of a patient in the emergency department(ED),Code Crimson activation facilitates rapid decisionmaking by multi-disciplinary specialists for definitive haemorrhage control in operating theatre(OT)and/or interventional radiology(IR)suite.Once this decision has been made,there may still be various factors that lead to delay in transporting the patient from ED to OT/IR.Red Blanket protocol identifies and addresses these factors and processes which cause delay,and aims to facilitate rapid and safe transport of the haemodynamically unstable patient from ED to OT,while minimizing delay in resuscitation during the transfer.The two processes,Code Crimson and Red Blanket,complement each other.It would be ideal to merge the two processes into a single protocol rather than having two separate workflows.Introducing these quality improvement strategies and coor-dinated processes within the trauma framework of the hospitals/healthcare systems will help in further improving the multi-disciplinary care for the complex trauma patients requiring rapid and definitive haemorrhage control. 展开更多
关键词 Red blanket protocol Code crimson HAEMORRHAGE Trauma
暂未订购
SegInfer:Binary Network Protocol Segmentation Based on Probabilistic Inference
13
作者 Guo Maohua Zhu Yuefei Fei Jinlong 《China Communications》 2025年第6期334-354,共21页
Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-len... Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results. 展开更多
关键词 binary protocol probabilistic inference protocol field segmentation protocol reverse engineering related construction
在线阅读 下载PDF
MAC Frame Resolution and PHY Protocol Type Detection of IEEE 802.11
14
作者 Ling Li Shi Peng +5 位作者 June Li Kai Yuan Zhihao Wang Yinbin Liu Ping Chen Xianbing Wang 《International Journal of Communications, Network and System Sciences》 2017年第5期43-53,共11页
Frame resolution and physical layer (PHY) protocol type detection are the basis of research and development of intrusion prevention systems for IEEE 802.11 wireless network. Aiming at the problems which cannot be solv... Frame resolution and physical layer (PHY) protocol type detection are the basis of research and development of intrusion prevention systems for IEEE 802.11 wireless network. Aiming at the problems which cannot be solved by the specifications export, this paper proposed a MAC frame analytical method and a PHY protocol type detection algorithm based on parsing the IEEE 802.11packets captured by the library Libpcap. The packet structure and the length of the frame preamble (18 or 26 bytes) are presented. Then the methods of transforming byte-order and resolving sub-fields are given. A detection algorithm of PHY protocol type is proposed based on the experiments and examples are given to verify these methods. This work can be a reference for the R & D related to link layer frame analysis. 展开更多
关键词 iEEE 802.11 MAC FRAME RESOLUTiON PHY protocols DETECTiON
暂未订购
Machine Learning-Based Routing Protocol in Flying Ad Hoc Networks: A Review
15
作者 Priyanka Manjit Kaur +2 位作者 Deepak Prashar Leo Mrsic Arfat Ahmad Khan 《Computers, Materials & Continua》 2025年第2期1615-1643,共29页
“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of F... “Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research. 展开更多
关键词 FANET protocol machine learning
在线阅读 下载PDF
智能合约与DeFi协议漏洞检测技术综述
16
作者 揭晚晴 邱望洁 +6 位作者 黄鑫鹏 杨浩甫 赵冠球 张沁楠 夏清 郑宏威 郑志明 《软件学报》 北大核心 2026年第1期344-377,共34页
智能合约作为区块链核心的可编程组件,承担了资产管理和复杂业务逻辑处理的功能,它们共同构成了去中心化金融(decentralized finance,DeFi)协议.然而,随着区块链的快速发展,智能合约和DeFi协议的安全问题日益凸显,吸引了大量攻击者利用... 智能合约作为区块链核心的可编程组件,承担了资产管理和复杂业务逻辑处理的功能,它们共同构成了去中心化金融(decentralized finance,DeFi)协议.然而,随着区块链的快速发展,智能合约和DeFi协议的安全问题日益凸显,吸引了大量攻击者利用其漏洞牟取利益.近年来,多起涉及智能合约和DeFi协议的重大安全事件强调了漏洞检测技术研究的必要性,已成为安全防护的重中之重.系统性地总结了现有工作,提出了智能合约与DeFi协议漏洞检测技术研究框架,分别从智能合约和DeFi协议两个层面对漏洞类型和检测技术进行梳理.在智能合约方面,重点分析了大语言模型(large language model,LLM)作为主要检测引擎和与传统方法结合的漏洞检测技术应用情况;在DeFi协议方面,系统性地分类并整理了DeFi协议层的漏洞及其检测方法,并探讨了攻击发生前后检测方法的优势与局限性,弥补了现有综述在DeFi协议漏洞检测方面的不足.最后,对现有检测方法面临的挑战进行总结,并展望了未来的研究方向,旨在为智能合约与DeFi协议的安全检测提供新的思路和理论支持. 展开更多
关键词 智能合约 DeFi协议 漏洞检测 大语言模型
在线阅读 下载PDF
Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol(iSTSP)for Security-Critical Time-Sensitive WSNs
17
作者 Ramadan Abdul-Rashid Mohd Amiruddin Abd Rahman Abdulaziz Yagoub Barnawi 《Computer Modeling in Engineering & Sciences》 2025年第9期3213-3250,共38页
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade... Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols. 展开更多
关键词 Time-sensitive wireless sensor networks(TS-WSNs) secure time synchronization protocol trust-based authentication autoencoder model deep learning malicious node detection internet of Things energyefficient communication protocols
在线阅读 下载PDF
Tuning the Coefficients of Thermal Expansion of the Crystallized Cordierite Glasses by Thermal Treatment Protocols
18
作者 DUAN Qiang KE Xuefei +1 位作者 QIAO Ang TAO Haizheng 《Journal of Wuhan University of Technology(Materials Science)》 2025年第5期1239-1243,共5页
Focusing on the ultralow expansion functionality of the crystalized glass containing the cordierite crystal phase with the molar composition 20.7MgO·20.7Al_(2)O_(3)·51.6SiO_(2)·7.0TiO_(2),we systematica... Focusing on the ultralow expansion functionality of the crystalized glass containing the cordierite crystal phase with the molar composition 20.7MgO·20.7Al_(2)O_(3)·51.6SiO_(2)·7.0TiO_(2),we systematically investigated impacts of thermal treatment protocols on T dependence of coefficients of thermal expansion(CTE).Except for the phase compositions,morphology is identified as another important factor to control the T dependence of CTE.By using X-ray diffraction and scanning electron microscope,various modes of T dependence of CTE for crystallized glasses are ascribed to their different phase compositions and microstructure with finely dispersed nanoparticles.These understanding contributes to the further modification of CTE of the crystalized glass by altering their thermal treatment scenarios. 展开更多
关键词 coefficients of thermal expansion crystalized glass CORDiERiTE thermal treatment protocols
原文传递
Efficacy and safety of acupoint application for gastrointestinal function in treating post-stroke depression:Protocol for a randomized controlled trial
19
作者 Xuan Zhang Shuhui Li +2 位作者 Juntao Wang Chung Tai Lau Jacky C.P.Chan 《Journal of Traditional Chinese Medical Sciences》 2025年第4期552-558,共7页
Objective:To evaluate the efficacy and safety of acupoint application for post-stroke depression(PSD)by regulating gastrointestinal function.A secondary objective is to explore the potential mechanism underlying this ... Objective:To evaluate the efficacy and safety of acupoint application for post-stroke depression(PSD)by regulating gastrointestinal function.A secondary objective is to explore the potential mechanism underlying this approach from the perspective of gut microbiota.Methods:This multicenter,randomized,double-blind(patients and assessors),placebo-controlled trial will enroll 80 patients with PSD,and include a 1-week run-in period,a 4-week treatment phase,and a 12-week follow-up.Eligible participants will randomly be assigned in a 1:1 ratio to either the acupoint application or placebo(non-acupoint)groups.Treatments will be administered thrice weekly for 4 weeks.The primary outcome is change in the Hamilton Rating Scale for Depression(HAMD)score.Secondary outcomes include the Beck Depression Inventory(BDI),36-Item Short-Form Health Survey(SF-36),Barthel Index of Activities of Daily Living,Social Adaptation Self-Evaluation Scale(SASS),and gut microbiota profiling.All outcomes will be assessed at baseline(prior to treatment),during treatment(weeks 2 and 4),and during follow-up(weeks 8,12,and 16).The Treatment Emergent Symptom Scale(TESS)will be used for evaluation throughout the 4-week treatment phase.Discussion:The results of this study will provide important evidence supporting a novel treatment strategy for PSD that targets gastrointestinal regulation,potentially informing future clinical practice. 展开更多
关键词 Acupoint application Gut microbiota Post-stroke depression protocol Randomized controlled trial
暂未订购
OpenID Connect协议的形式化分析与优化
20
作者 陈琼 缪祥华 袁梅宇 《计算机技术与发展》 2026年第2期195-200,214,共7页
OpenID Connect协议作为实现身份认证与授权的重要机制,其安全性备受关注。利用Scyther模型检测工具,在CK强安全模型约束下对该协议进行形式化分析。分析结果表明,OpenID Connect协议存在明显的安全漏洞,其中包括跨站请求伪造攻击、重... OpenID Connect协议作为实现身份认证与授权的重要机制,其安全性备受关注。利用Scyther模型检测工具,在CK强安全模型约束下对该协议进行形式化分析。分析结果表明,OpenID Connect协议存在明显的安全漏洞,其中包括跨站请求伪造攻击、重放攻击以及中间人攻击等问题。这些安全漏洞严重威胁着协议运行的安全性和用户信息的保密性。针对跨站请求伪造攻击,对state参数实施加盐哈希处理;针对重放攻击,引入时间戳校验机制,客户端请求时服务端生成精确时间戳,通过网络时间协议确保时间同步,仅处理处于预设时间窗口期内的请求;针对中间人攻击,采用SM2数字签名算法,客户端用私钥签名请求,服务器用公钥验证,服务器转发时附加自身签名,确保请求来源可信。改进后的协议在抵御上述安全攻击方面表现出色,经检验具备良好的安全性,能够为用户提供更为可靠的身份验证和授权服务,对于提升OpenID Connect协议在实际应用中的安全性具有重要意义。 展开更多
关键词 OpeniD Connect协议 形式化分析 CK安全模型 Scyther 协议分析 改进
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部