Modem information technology has been utilized progressively to store and distribute a large amount of healthcare data to reduce costs and improve medical facilities.In this context,the emergence of e-Health clouds of...Modem information technology has been utilized progressively to store and distribute a large amount of healthcare data to reduce costs and improve medical facilities.In this context,the emergence of e-Health clouds offers novel opportunities,like easy and remote accessibility of medical data.However,this achievement produces plenty of new risks and challenges like how to provide integrity,security,and confidentiality to the highly susceptible e-Health data.Among these challenges,authentication is a major issue that ensures that the susceptible medical data in clouds is not available to illegal participants.The smart card,password and biometrics are three factors of authentication which fulfill the requirement of giving high security.Numerous three-factor ECC-based authentication protocols on e-Health clouds have been presented so far.However,most of the protocols have serious security flaws and produce high computation and communication overheads.Therefore,we introduce a novel protocol for the e-Health cloud,which thwarts some major attacks,such as user anonymity,offline password guessing,impersonation,and stolen smart card attacks.Moreover,we evaluate our protocol through formal security analysis using the Random Oracle Model(ROM).The analysis shows that our proposed protocol is more efficient than many existing protocols in terms of computation and communication costs.Thus,our proposed protocol is proved to be more efficient,robust and secure.展开更多
Nowadays,the widespread application of 5G has promoted rapid development in different areas,particularly in the Internet of Things(IoT),where 5G provides the advantages of higher data transfer rate,lower latency,and w...Nowadays,the widespread application of 5G has promoted rapid development in different areas,particularly in the Internet of Things(IoT),where 5G provides the advantages of higher data transfer rate,lower latency,and widespread connections.Wireless sensor networks(WSNs),which comprise various sensors,are crucial components of IoT.The main functions of WSN include providing users with real-time monitoring information,deploying regional information collection,and synchronizing with the Internet.Security in WSNs is becoming increasingly essential because of the across-the-board nature of wireless technology in many fields.Recently,Yu et al.proposed a user authentication protocol forWSN.However,their design is vulnerable to sensor capture and temporary information disclosure attacks.Thus,in this study,an improved protocol called PSAP-WSNis proposed.The security of PSAP-WSN is demonstrated by employing the ROR model,BAN logic,and ProVerif tool for the analysis.The experimental evaluation shows that our design is more efficient and suitable forWSN environments.展开更多
Objective:To determine the efficacy and safety of the Yinmei Kuijie decoction combined with 5-ami-nosalicylic acid(5-ASA)in treating mildly to moderately active ulcerative colitis(UC)under real-world conditions.Method...Objective:To determine the efficacy and safety of the Yinmei Kuijie decoction combined with 5-ami-nosalicylic acid(5-ASA)in treating mildly to moderately active ulcerative colitis(UC)under real-world conditions.Methods:This multicenter,prospective,non-randomized,observational study will be conducted in real-world settings.A total of 204 eligible patients will be consecutively enrolled in the study.Patients in the combination treatment group will receive Yinmei Kuijie decoction in combination with 5-ASA,whereas those in the control group will be treated with 5-ASA alone.The primary endpoint will be a clinical response at week 12,defined as a≥3 point and≥30%reduction from baseline in the Mayo total score with≥1 reduction in rectal bleeding or rectal bleeding score=0 or 1.Secondary efficacy endpoints at week 12 will include health-related quality of life,mucosal healing,and inflammation indicators.Conclusion:The results of this study may provide evidence of the efficacy and safety of Yinmei Kuijie decoction combined with 5-ASA in treating patients with mildly to moderately active UC under real-world principles.The results will provide a basis for further confirmatory studies on the efficacy of Yinmei Kuijie decoction.展开更多
It is extremely challenging for the 5G User Equipment(UE)to meet the requirement of low-latency data transmission with higher achievable data rates.And user plane processing of 5G protocol stack(PS)is one of the domin...It is extremely challenging for the 5G User Equipment(UE)to meet the requirement of low-latency data transmission with higher achievable data rates.And user plane processing of 5G protocol stack(PS)is one of the dominating components for end-to-end data transmission in the network system.In this paper,a cross-layer buffer management scheme(CLBM)is proposed.CLBM adopts a zero-copy technique for protocol data unit(PDU)processing between protocol layers and allows to improve the memory operation efficiency significantly with reduced processing latency and CPU usage.Moreover,the PS performance profiling(PSperf)tool,a general evaluation framework for the performance measurement and analysis of PS,is implemented based on the OpenAirInterface(OAI)5G platform.The evaluation result shows that compared with the PS of OAI the CLBM strategy reduces the CPU usage of RLC,PDCP,and MAC layer processing significantly up to 20.6%,63.4%,and 38.8%,respectively.In result,the processing delay of the whole user plane of PS also has been reduced distinctly at various offered traffic load.展开更多
文摘Modem information technology has been utilized progressively to store and distribute a large amount of healthcare data to reduce costs and improve medical facilities.In this context,the emergence of e-Health clouds offers novel opportunities,like easy and remote accessibility of medical data.However,this achievement produces plenty of new risks and challenges like how to provide integrity,security,and confidentiality to the highly susceptible e-Health data.Among these challenges,authentication is a major issue that ensures that the susceptible medical data in clouds is not available to illegal participants.The smart card,password and biometrics are three factors of authentication which fulfill the requirement of giving high security.Numerous three-factor ECC-based authentication protocols on e-Health clouds have been presented so far.However,most of the protocols have serious security flaws and produce high computation and communication overheads.Therefore,we introduce a novel protocol for the e-Health cloud,which thwarts some major attacks,such as user anonymity,offline password guessing,impersonation,and stolen smart card attacks.Moreover,we evaluate our protocol through formal security analysis using the Random Oracle Model(ROM).The analysis shows that our proposed protocol is more efficient than many existing protocols in terms of computation and communication costs.Thus,our proposed protocol is proved to be more efficient,robust and secure.
文摘Nowadays,the widespread application of 5G has promoted rapid development in different areas,particularly in the Internet of Things(IoT),where 5G provides the advantages of higher data transfer rate,lower latency,and widespread connections.Wireless sensor networks(WSNs),which comprise various sensors,are crucial components of IoT.The main functions of WSN include providing users with real-time monitoring information,deploying regional information collection,and synchronizing with the Internet.Security in WSNs is becoming increasingly essential because of the across-the-board nature of wireless technology in many fields.Recently,Yu et al.proposed a user authentication protocol forWSN.However,their design is vulnerable to sensor capture and temporary information disclosure attacks.Thus,in this study,an improved protocol called PSAP-WSNis proposed.The security of PSAP-WSN is demonstrated by employing the ROR model,BAN logic,and ProVerif tool for the analysis.The experimental evaluation shows that our design is more efficient and suitable forWSN environments.
基金supported by the Key Project of Traditional Chinese Medicine in Anhui Province(202303a07020003)Basic Research Expenses of Beijing University of Chinese Medicine(2024-JYB-JBZD-044)Vertical Development Fund of Beijing University of Chinese Medicine(2023-ZXFZJJ-005).
文摘Objective:To determine the efficacy and safety of the Yinmei Kuijie decoction combined with 5-ami-nosalicylic acid(5-ASA)in treating mildly to moderately active ulcerative colitis(UC)under real-world conditions.Methods:This multicenter,prospective,non-randomized,observational study will be conducted in real-world settings.A total of 204 eligible patients will be consecutively enrolled in the study.Patients in the combination treatment group will receive Yinmei Kuijie decoction in combination with 5-ASA,whereas those in the control group will be treated with 5-ASA alone.The primary endpoint will be a clinical response at week 12,defined as a≥3 point and≥30%reduction from baseline in the Mayo total score with≥1 reduction in rectal bleeding or rectal bleeding score=0 or 1.Secondary efficacy endpoints at week 12 will include health-related quality of life,mucosal healing,and inflammation indicators.Conclusion:The results of this study may provide evidence of the efficacy and safety of Yinmei Kuijie decoction combined with 5-ASA in treating patients with mildly to moderately active UC under real-world principles.The results will provide a basis for further confirmatory studies on the efficacy of Yinmei Kuijie decoction.
基金Supported by the National Key R&D Project of China(No.2020YFB1807803)。
文摘It is extremely challenging for the 5G User Equipment(UE)to meet the requirement of low-latency data transmission with higher achievable data rates.And user plane processing of 5G protocol stack(PS)is one of the dominating components for end-to-end data transmission in the network system.In this paper,a cross-layer buffer management scheme(CLBM)is proposed.CLBM adopts a zero-copy technique for protocol data unit(PDU)processing between protocol layers and allows to improve the memory operation efficiency significantly with reduced processing latency and CPU usage.Moreover,the PS performance profiling(PSperf)tool,a general evaluation framework for the performance measurement and analysis of PS,is implemented based on the OpenAirInterface(OAI)5G platform.The evaluation result shows that compared with the PS of OAI the CLBM strategy reduces the CPU usage of RLC,PDCP,and MAC layer processing significantly up to 20.6%,63.4%,and 38.8%,respectively.In result,the processing delay of the whole user plane of PS also has been reduced distinctly at various offered traffic load.