This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, system...This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, systematic construction and state transition of EABM. Then , it describes the channels and the process of state transition of EABM in terms of ESTELLE. At last, it offers a verification of the accuracy of the EABM model.展开更多
Since azoxymethane(AOM)-dextran sodium sulfate(DSS)induced tumorigenesis was used to explore inflammation-associated carcinogenesis of sporadic colorectal cancer(CRC),different administration modes of AOM or DSS have ...Since azoxymethane(AOM)-dextran sodium sulfate(DSS)induced tumorigenesis was used to explore inflammation-associated carcinogenesis of sporadic colorectal cancer(CRC),different administration modes of AOM or DSS have been reported.In this article we optimized the protocol of the AOM-DSS modeling using C57BL/6 mice for study on sporadic CRC by intraperitoneal injecting AOM solution at a proper concentration with a 100μl sterile syringe once,feeding with DSS solution for 7 days in a roll and change DSS solution every day.More than 100 C57BL/6 mice had been treated with the optimized protocol,and all mice were demonstrated suffering from colorectal tumors when sacrificed in 8 to 20 weeks after AOM injection.These tumors mainly occurred in distal segment of colorectum with an increase in tumor density,which was similar to CRC in human beings.Tumor per mouse was high,and variation of tumor number per mouse was low.The histology of tumor developed through the defined stage ranged from precursor lesions,adenomatous lesions,adenomas to adenocarcinomas.The modified protocol of AOM-DSS model is easy,cheap,with high tumor formation rate of colorectal tumors.展开更多
The need of communication protocols in today’s environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, security, etc., are being developed day-to-day which of...The need of communication protocols in today’s environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, security, etc., are being developed day-to-day which often leads to rapid, premature developments. Many protocols have not scaled to satisfy important properties like deadlock and livelock freedom, since MDA focuses on the rapid development rather than on the quality of the developed models. In order to fix the above, we introduce a 2-Phase strategy based on the UML state machine and sequence diagram. The state machine is converted into PROMELA code as a protocol model and its properties are derived from the sequence diagram as Linear Temporal Logic (LTL) through automation. The PROMELA code is interpreted through the SPIN model checker, which helps to simulate the behavior of protocol. Later the automated LTL properties are supplemented to the SPIN for the verification of protocol properties. The results are compared with the developed UML model and SPIN simulated model. Our test results impress the designer to verify the expected results with the system design and to identify the errors which are unnoticed during the design phase.展开更多
In this paper, we conduct research on the computer network protocol test model based on genetic and random walk algorithm.Network protocol is the abstract concept, is important in the process of the development of net...In this paper, we conduct research on the computer network protocol test model based on genetic and random walk algorithm.Network protocol is the abstract concept, is important in the process of the development of network system. Fully understand and grasp of thenetwork protocols for managers is there is a big diffi cult. Network covert channel is the evaluation of intrusion detection system and fi rewallsecurity performance of an important means, the paper will start from the angle of the attacker, the fl aws of the research, and use this kind ofdefect to realize network covert channel, the random walk algorithm will be feasible for dealing with this issue. For achieving this, we integratethe genetic and random walk algorithm for systematic optimization.展开更多
Mobile ad hoc networks (MANETs) have become a hot issue in the area of wireless networks for their non-infrastructure and mobile features. In this paper, a MANET is modeled so that the length of each link in the net...Mobile ad hoc networks (MANETs) have become a hot issue in the area of wireless networks for their non-infrastructure and mobile features. In this paper, a MANET is modeled so that the length of each link in the network is considered as a birthdeath process and the space is reused for n times in the flooding process, which is named as an n-spatiai reuse birth-death model (n-SRBDM). We analyze the performance of the network under the dynamic source routing protocol (DSR) which is a famous reactive routing protocol. Some performance parameters of the route discovery are studied such as the probability distribution and the expectation of the flooding distance, the probability that a route is discovered by a query packet with a hop limit, the probability that a request packet finds a τ-time-valid route or a symmetric-valid route, and the average time needed to discover a valid route. For the route maintenance, some parameters are introduced and studied such as the average frequency of route recovery and the average time of a route to be valid. We compare the two models with spatial reuse and without spatial reuse by evaluating these parameters. It is shown that the spatial reuse model is much more effective in routing.展开更多
A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects- non-repudiat...A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects- non-repudiation and fairness using SME. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker.展开更多
This paper deals with the proposal of a new model based on Agent Petri Nets (APN) to specify interactions among agents in Multi Agents System (MAS). Indeed, an agent approach requires a powerful and expressive formali...This paper deals with the proposal of a new model based on Agent Petri Nets (APN) to specify interactions among agents in Multi Agents System (MAS). Indeed, an agent approach requires a powerful and expressive formalism that allows him to model the behavior of a set of agents that interact. We are modeling some variants of FIPA standard protocols. Our Models are found based on communicating cognitive agents. Each Agent is capable of perceiving their environment partly and building, sending and receiving messages.展开更多
智能合约作为区块链核心的可编程组件,承担了资产管理和复杂业务逻辑处理的功能,它们共同构成了去中心化金融(decentralized finance,DeFi)协议.然而,随着区块链的快速发展,智能合约和DeFi协议的安全问题日益凸显,吸引了大量攻击者利用...智能合约作为区块链核心的可编程组件,承担了资产管理和复杂业务逻辑处理的功能,它们共同构成了去中心化金融(decentralized finance,DeFi)协议.然而,随着区块链的快速发展,智能合约和DeFi协议的安全问题日益凸显,吸引了大量攻击者利用其漏洞牟取利益.近年来,多起涉及智能合约和DeFi协议的重大安全事件强调了漏洞检测技术研究的必要性,已成为安全防护的重中之重.系统性地总结了现有工作,提出了智能合约与DeFi协议漏洞检测技术研究框架,分别从智能合约和DeFi协议两个层面对漏洞类型和检测技术进行梳理.在智能合约方面,重点分析了大语言模型(large language model,LLM)作为主要检测引擎和与传统方法结合的漏洞检测技术应用情况;在DeFi协议方面,系统性地分类并整理了DeFi协议层的漏洞及其检测方法,并探讨了攻击发生前后检测方法的优势与局限性,弥补了现有综述在DeFi协议漏洞检测方面的不足.最后,对现有检测方法面临的挑战进行总结,并展望了未来的研究方向,旨在为智能合约与DeFi协议的安全检测提供新的思路和理论支持.展开更多
为了能够更加准确地评价语音包丢失对基于IP的语音传输(voice over internet protocol,Vo IP)的语音质量的损伤,对ITU-T G.107建议书提出的语音质量预测模型E-Model中计算丢包与编码造成的损伤Ie-eff的方法作出改进,在综合考虑语音包的...为了能够更加准确地评价语音包丢失对基于IP的语音传输(voice over internet protocol,Vo IP)的语音质量的损伤,对ITU-T G.107建议书提出的语音质量预测模型E-Model中计算丢包与编码造成的损伤Ie-eff的方法作出改进,在综合考虑语音包的内部特性和存在突发连续丢包情况后,提出利用在固定语音长度下,语音实际损失时间Tloss来衡量语音包丢失造成的语音损伤。仿真结果表明,相比原有模型,改进后的模型得到的语音质量评分同主观语音质量评估方法(perceptual evaluation of speech quality,PESQ)评分相比,皮尔森相关系数平均提高了0.045 8,均方根误差平均降低了0.053 4,改进后的E-Model模型在评价语音质量时与PESQ更具有一致性,可以更为准确地预测Vo IP通信的语音质量。展开更多
在5G与数字生态融合背景下,GSMA Open Gateway通过标准化API与统一接入框架,实现应用在全球运营商网络的可移植与规模化部署,降低开发与适配成本,推动运营商能力开放。然而,跨运营商能力调用仍是关键瓶颈。因此,梳理了CAMARA 4类应用程...在5G与数字生态融合背景下,GSMA Open Gateway通过标准化API与统一接入框架,实现应用在全球运营商网络的可移植与规模化部署,降低开发与适配成本,推动运营商能力开放。然而,跨运营商能力调用仍是关键瓶颈。因此,梳理了CAMARA 4类应用程序编程接口(API)分发模式,对比分析了国内外实践差异。其中,国内运营商针对国内5G网络按需质量保障(QoD)3网互通中聚合平台(Aggregator)面临的痛点,提出了以软件开发工具包(SDK)为核心的解决方案。这一方案通过了统一认证和中国香港商用案例的可行性验证。此外,我国还提出了“SDK+Open Gateway”全球推广与模型上下文协议(MCP)模式演进路径,为全球运营商跨网协同提供中国经验,推动生态从技术框架迈向规模商用,助力数字经济高质量发展。展开更多
文摘This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, systematic construction and state transition of EABM. Then , it describes the channels and the process of state transition of EABM in terms of ESTELLE. At last, it offers a verification of the accuracy of the EABM model.
基金Supported by the Hebei Provincial Research Foundation of Health and Family Planning Commission(No.20180688)~~
文摘Since azoxymethane(AOM)-dextran sodium sulfate(DSS)induced tumorigenesis was used to explore inflammation-associated carcinogenesis of sporadic colorectal cancer(CRC),different administration modes of AOM or DSS have been reported.In this article we optimized the protocol of the AOM-DSS modeling using C57BL/6 mice for study on sporadic CRC by intraperitoneal injecting AOM solution at a proper concentration with a 100μl sterile syringe once,feeding with DSS solution for 7 days in a roll and change DSS solution every day.More than 100 C57BL/6 mice had been treated with the optimized protocol,and all mice were demonstrated suffering from colorectal tumors when sacrificed in 8 to 20 weeks after AOM injection.These tumors mainly occurred in distal segment of colorectum with an increase in tumor density,which was similar to CRC in human beings.Tumor per mouse was high,and variation of tumor number per mouse was low.The histology of tumor developed through the defined stage ranged from precursor lesions,adenomatous lesions,adenomas to adenocarcinomas.The modified protocol of AOM-DSS model is easy,cheap,with high tumor formation rate of colorectal tumors.
文摘The need of communication protocols in today’s environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, security, etc., are being developed day-to-day which often leads to rapid, premature developments. Many protocols have not scaled to satisfy important properties like deadlock and livelock freedom, since MDA focuses on the rapid development rather than on the quality of the developed models. In order to fix the above, we introduce a 2-Phase strategy based on the UML state machine and sequence diagram. The state machine is converted into PROMELA code as a protocol model and its properties are derived from the sequence diagram as Linear Temporal Logic (LTL) through automation. The PROMELA code is interpreted through the SPIN model checker, which helps to simulate the behavior of protocol. Later the automated LTL properties are supplemented to the SPIN for the verification of protocol properties. The results are compared with the developed UML model and SPIN simulated model. Our test results impress the designer to verify the expected results with the system design and to identify the errors which are unnoticed during the design phase.
文摘In this paper, we conduct research on the computer network protocol test model based on genetic and random walk algorithm.Network protocol is the abstract concept, is important in the process of the development of network system. Fully understand and grasp of thenetwork protocols for managers is there is a big diffi cult. Network covert channel is the evaluation of intrusion detection system and fi rewallsecurity performance of an important means, the paper will start from the angle of the attacker, the fl aws of the research, and use this kind ofdefect to realize network covert channel, the random walk algorithm will be feasible for dealing with this issue. For achieving this, we integratethe genetic and random walk algorithm for systematic optimization.
基金Project supported by the National Natural Science Foundation of China (Nos.10471088 and 60572126)the Science Foundation of Shanghai Municipal Commission of Education (No.06ZZ84)
文摘Mobile ad hoc networks (MANETs) have become a hot issue in the area of wireless networks for their non-infrastructure and mobile features. In this paper, a MANET is modeled so that the length of each link in the network is considered as a birthdeath process and the space is reused for n times in the flooding process, which is named as an n-spatiai reuse birth-death model (n-SRBDM). We analyze the performance of the network under the dynamic source routing protocol (DSR) which is a famous reactive routing protocol. Some performance parameters of the route discovery are studied such as the probability distribution and the expectation of the flooding distance, the probability that a route is discovered by a query packet with a hop limit, the probability that a request packet finds a τ-time-valid route or a symmetric-valid route, and the average time needed to discover a valid route. For the route maintenance, some parameters are introduced and studied such as the average frequency of route recovery and the average time of a route to be valid. We compare the two models with spatial reuse and without spatial reuse by evaluating these parameters. It is shown that the spatial reuse model is much more effective in routing.
基金Supported by the Natural Science Foundation of Guizhou Province(No.20050119)the Natural Science Foundation of Guizhou Education(No.2004219)
文摘A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects- non-repudiation and fairness using SME. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker.
文摘This paper deals with the proposal of a new model based on Agent Petri Nets (APN) to specify interactions among agents in Multi Agents System (MAS). Indeed, an agent approach requires a powerful and expressive formalism that allows him to model the behavior of a set of agents that interact. We are modeling some variants of FIPA standard protocols. Our Models are found based on communicating cognitive agents. Each Agent is capable of perceiving their environment partly and building, sending and receiving messages.
文摘智能合约作为区块链核心的可编程组件,承担了资产管理和复杂业务逻辑处理的功能,它们共同构成了去中心化金融(decentralized finance,DeFi)协议.然而,随着区块链的快速发展,智能合约和DeFi协议的安全问题日益凸显,吸引了大量攻击者利用其漏洞牟取利益.近年来,多起涉及智能合约和DeFi协议的重大安全事件强调了漏洞检测技术研究的必要性,已成为安全防护的重中之重.系统性地总结了现有工作,提出了智能合约与DeFi协议漏洞检测技术研究框架,分别从智能合约和DeFi协议两个层面对漏洞类型和检测技术进行梳理.在智能合约方面,重点分析了大语言模型(large language model,LLM)作为主要检测引擎和与传统方法结合的漏洞检测技术应用情况;在DeFi协议方面,系统性地分类并整理了DeFi协议层的漏洞及其检测方法,并探讨了攻击发生前后检测方法的优势与局限性,弥补了现有综述在DeFi协议漏洞检测方面的不足.最后,对现有检测方法面临的挑战进行总结,并展望了未来的研究方向,旨在为智能合约与DeFi协议的安全检测提供新的思路和理论支持.
文摘为了能够更加准确地评价语音包丢失对基于IP的语音传输(voice over internet protocol,Vo IP)的语音质量的损伤,对ITU-T G.107建议书提出的语音质量预测模型E-Model中计算丢包与编码造成的损伤Ie-eff的方法作出改进,在综合考虑语音包的内部特性和存在突发连续丢包情况后,提出利用在固定语音长度下,语音实际损失时间Tloss来衡量语音包丢失造成的语音损伤。仿真结果表明,相比原有模型,改进后的模型得到的语音质量评分同主观语音质量评估方法(perceptual evaluation of speech quality,PESQ)评分相比,皮尔森相关系数平均提高了0.045 8,均方根误差平均降低了0.053 4,改进后的E-Model模型在评价语音质量时与PESQ更具有一致性,可以更为准确地预测Vo IP通信的语音质量。
文摘在5G与数字生态融合背景下,GSMA Open Gateway通过标准化API与统一接入框架,实现应用在全球运营商网络的可移植与规模化部署,降低开发与适配成本,推动运营商能力开放。然而,跨运营商能力调用仍是关键瓶颈。因此,梳理了CAMARA 4类应用程序编程接口(API)分发模式,对比分析了国内外实践差异。其中,国内运营商针对国内5G网络按需质量保障(QoD)3网互通中聚合平台(Aggregator)面临的痛点,提出了以软件开发工具包(SDK)为核心的解决方案。这一方案通过了统一认证和中国香港商用案例的可行性验证。此外,我国还提出了“SDK+Open Gateway”全球推广与模型上下文协议(MCP)模式演进路径,为全球运营商跨网协同提供中国经验,推动生态从技术框架迈向规模商用,助力数字经济高质量发展。