Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,inclu...Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios.展开更多
Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-len...Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results.展开更多
“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of F...“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research.展开更多
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade...Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols.展开更多
UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect ...UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect jamming, leading to long sensing time and thus slow routing recovery. To address the issues raised by jamming attacks, we propose a new routing protocol, Electromagnetic Spectrum situation awareness Optimized Link State Routing (ESOLSR) protocol, to improve the existing OLSRv2 protocol. ESOLSR utilizes the spectrum situation awareness capability from the physical layer, and adopts joint-updating of link status, updating of interface functions, and adaptive adjustment of parameters. Our simulation results show that the improved protocol, ESOLSR, can recover routing and resume normal communication 26.6% faster compared to the existing protocols.展开更多
Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajecto...Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade.展开更多
Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi...Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi-stego images provides good image quality but often results in low embedding capability.To address these challenges,this paper proposes a high-capacity RDH scheme based on PVO that generates three stego images from a single cover image.The cover image is partitioned into non-overlapping blocks with pixels sorted in ascending order.Four secret bits are embedded into each block’s maximum pixel value,while three additional bits are embedded into the second-largest value when the pixel difference exceeds a predefined threshold.A similar embedding strategy is also applied to the minimum side of the block,including the second-smallest pixel value.This design enables each block to embed up to 14 bits of secret data.Experimental results demonstrate that the proposed method achieves significantly higher embedding capacity and improved visual quality compared to existing triple-stego RDH approaches,advancing the field of reversible steganography.展开更多
Tau plays a crucial role in several neurodegenerative diseases,collectively referred to as tauopathies.Therefore,targeting potential pathological changes in tau could enable useful therapeutic interventions.However,ta...Tau plays a crucial role in several neurodegenerative diseases,collectively referred to as tauopathies.Therefore,targeting potential pathological changes in tau could enable useful therapeutic interventions.However,tau is not an easy target because it dynamically interacts with microtubules and other cellular components,which presents a challenge for tau-targeted drugs.New cellular models could aid the development of mechanism-based tau-targeted therapies.展开更多
Correction to:Journal of Forestry Research(2025)36:124 https://doi.org/10.1007/s11676-025-01918-8 In this article the author’s name Yasutomo Hoshika was incorrectly written as Yasutoma Hoshika.The original article ha...Correction to:Journal of Forestry Research(2025)36:124 https://doi.org/10.1007/s11676-025-01918-8 In this article the author’s name Yasutomo Hoshika was incorrectly written as Yasutoma Hoshika.The original article has been corrected.展开更多
This study investigated biomass allocation in young stands of European beech(Fagus sylvatica L.)and Norway spruce(Picea abies(L.)Karst.)across 31 forest sites in the Western Carpathians,Slovakia.A total of 541 trees a...This study investigated biomass allocation in young stands of European beech(Fagus sylvatica L.)and Norway spruce(Picea abies(L.)Karst.)across 31 forest sites in the Western Carpathians,Slovakia.A total of 541 trees aged 2–10 years,originating from natural regeneration and planting,were destructively sampled to quantify biomass in four components:foliage,branches,stems,and roots.Generalized non-linear least squares(GNLS)models with a weighing variance function outperformed log-transformed seemingly unrelated regression(SUR)models in terms of accuracy and robustness,especially for foliage and branch biomass.When using height as the predictor,SUR models tended to underestimate biomass in planted beech,leading to notable underprediction of aboveground and total biomass.Biomass allocation patterns varied significantly by species and regeneration origin.Using a non-linear system of equations and component ratio modelling,we found out that planted spruce displayed low variability and a consistent dominance of needle biomass,while naturally regenerated beech showed greater variability and a higher proportion of stem biomass,reflecting stronger competition-driven vertical growth.Interspecific differences in total biomass were more pronounced when using tree height,with spruce generally exhibiting greater biomass than beech at equivalent heights.Overall,stem base diameter marginally outperformed tree height as a predictor of biomass.However,tree height-based models showed strong performance and are particularly suitable for integration with remote sensing applications.These findings can directly support forest managers and modellers in comparing regeneration methods and biomass estimation approaches for early-stage stand development,carbon accounting,and remote sensing calibration.展开更多
Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work pr...Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work proposes Secured-FL,a blockchain-based defensive framework that combines smart contract-based authentication,clustering-driven outlier elimination,and dynamic threshold adjustment to defend against adversarial attacks.The framework was implemented on a private Ethereum network with a Proof-of-Authority consensus algorithm to ensure tamper-resistant and auditable model updates.Large-scale simulation on the Cyber Data dataset,under up to 50%malicious client settings,demonstrates Secured-FL achieves 6%-12%higher accuracy,9%-15%lower latency,and approximately 14%less computational expense compared to the PPSS benchmark framework.Additional tests,including confusion matrices,ROC and Precision-Recall curves,and ablation tests,confirm the interpretability and robustness of the defense.Tests for scalability also show consistent performance up to 500 clients,affirming appropriateness to reasonably large deployments.These results make Secured-FL a feasible,adversarially resilient FL paradigm with promising potential for application in smart cities,medicine,and other mission-critical IoT deployments.展开更多
Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to thei...Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center.展开更多
The original online version of this article was revised:Several errors occurred in the published version of the article.These have now been corrected as follows:Page 2,section"2.2 Laser Texturing Procedure of Sur...The original online version of this article was revised:Several errors occurred in the published version of the article.These have now been corrected as follows:Page 2,section"2.2 Laser Texturing Procedure of Surfaces",line 2:The device name was corrected from"YDFLP-E-50-M8"to"YDFLP-50-M8."Page 3,Section 2.4:The phrase"95%confidence interval"has been corrected to"95%confidence level."Page 3,Figure 1 caption:The phrase"fandg"has been corrected to"f and g."The order"C4 and C12"has been reversed to"C12 and C4,"in accordance with the display order in the figure.Page 4,Figure reference:The phrase"Figs.4c and d"has been corrected to"Figs.5b and c."Page 5,paragraph starting with"The ANOVA results are presented...":The phrase"95%confidence interval"has been corrected to"95%confidence level."展开更多
Hebei Province has incorporated targeted assistance services for people with disabilities into livelihood projects,upgrading the quality and efficiency of support services for disadvantaged groups.THE living and nursi...Hebei Province has incorporated targeted assistance services for people with disabilities into livelihood projects,upgrading the quality and efficiency of support services for disadvantaged groups.THE living and nursing allowances provided by the Chinese government for people with disabilities who are unable to work are not only important components of China’s social security system which provide for the needs of its disabled,but also show China’s ability to guarantee the basic living standard and social fairness and justice for this group of people.展开更多
The brain atlas,or parcellation-delineating spatial partitions,organizes the brain's structure and function[1].The spatial arrangements of highly heterogeneous landscapes represent specialized functional regions f...The brain atlas,or parcellation-delineating spatial partitions,organizes the brain's structure and function[1].The spatial arrangements of highly heterogeneous landscapes represent specialized functional regions for investigating their interactions.Early efforts to parcellate the mammalian brain,using histological cytoarchitecture and myeloarchitecture,as well as recent in vivo magnetic resonance imaging(MRl)[2,3],have primarily involved cortical areas,subcortical structures,and cerebellar nuclei.Human brain parcellations primarily focus on grey matter(GM),which purposefully excludes white matter(WM),hindering the development of next-generation brain atlases.展开更多
Relying on CMPP (China Mobile Peer to Peer) protocol,we propose and design SMS (Short Message Service) gateway interface for early warning plan based on real-time meteorological database application,in order to form t...Relying on CMPP (China Mobile Peer to Peer) protocol,we propose and design SMS (Short Message Service) gateway interface for early warning plan based on real-time meteorological database application,in order to form the meteorological mobile internet service system which is 'One point connect,service the whole province' for short.Accessing interface system to each city's SMG (Short Message Gateway) through standard protocol,we establish the information transmitting channel of short message platform and mobile SMG to realize the store-forward and flow control of short message.In addition,the stable and dependable communication connect of interface system and mobile SMG should be ensure,and the connect could be reconstructed while encountering any error,as well as committing short message would be stopped due to interruption of connect.展开更多
To cope with the problem of low protocol efficiency of the standard ad hoc on-demand distance vector (AODV) routing protocol with the periodic Hello message broadcast mechanism, a new link availability prediction ba...To cope with the problem of low protocol efficiency of the standard ad hoc on-demand distance vector (AODV) routing protocol with the periodic Hello message broadcast mechanism, a new link availability prediction based strategy is introduced to reduce the amount of Hello messages. In this strategy, a novel wireless link availability prediction model under line-of-sight (LOS) propagation environments is proposed based on which the parameter of Hello Interval in AODV can be dynamically adjusted to achieve the goal of changing the frequency of Hello message broadcasts under different link stability degrees. Simulation results demonstrate that, compared with the standard AODV with the periodic Hello message broadcast mechanism, the proposed protocol effectively reduces unnecessary control message overhead and greatly improves the performance in terms of end-to-end delay and efficiency.展开更多
Background: Idiopathic pulmonary fibrosis(IPF) has a poor prognosis and is often a kind of heavy financial burden to patients. Currently, few treatments are available for IPF. Clinical practice of traditional Chinese ...Background: Idiopathic pulmonary fibrosis(IPF) has a poor prognosis and is often a kind of heavy financial burden to patients. Currently, few treatments are available for IPF. Clinical practice of traditional Chinese medicine(TCM), using a syndrome differentiation approach, offers some treatment success in IPF. However, there is no sufficient evidence-based study of the role of TCM in IPF management to make strong conclusions. This study evaluates the efficacy and safety of TCM in the treatment of IPF.Methods and design: A multicenter, exploratory, randomized, double-blind and placebo-controlled trial is planned. A total of 80 patients will be enrolled in the study, which will include 26 weeks of treatment.Participants will be randomly assigned into TCM group or control group in a 1:1 ratio. The TCM group will be given TCM granules based on syndrome differentiation. Formulae include Bao-fei Hua-xian granule for lung qi deficiency, Jin-shui Huan-xian granule for lung-kidney qi deficiency and Yang-qing Kang-xian granule for yin deficiency and inner heat. The control group will be given a corresponding TCM granule placebo. The efficacy and safety of interventions will be evaluated by the outcome variables,including frequencies of acute exacerbations, pulmonary function, clinical symptoms, dyspnea, healthrelated quality of life(HRQo L), 6-minute walk distance and safety indicators.Discussion: It is hypothesized that TCM will decrease the frequency of adverse events, improve pulmonary function and HRQo L, based on our clinical experience. This trial is the first study of TCM treatment in IPF that is based on syndrome differentiation and will evaluate the efficacy and safety of TCM in IPF.展开更多
Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the m...Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy.展开更多
文摘Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios.
文摘Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results.
基金support the findings of this study are openly available in(Scopus database)at www.scopus.com(accessed on 07 January 2025).
文摘“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research.
基金this project under Geran Putra Inisiatif(GPI)with reference of GP-GPI/2023/976210。
文摘Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols.
基金supported in part by National Natural Science Foundation of China(Nos.61931011 and 62372230)the Jiangsu Provincial Key Research and Development Program,China(No.BE2021013-4).
文摘UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect jamming, leading to long sensing time and thus slow routing recovery. To address the issues raised by jamming attacks, we propose a new routing protocol, Electromagnetic Spectrum situation awareness Optimized Link State Routing (ESOLSR) protocol, to improve the existing OLSRv2 protocol. ESOLSR utilizes the spectrum situation awareness capability from the physical layer, and adopts joint-updating of link status, updating of interface functions, and adaptive adjustment of parameters. Our simulation results show that the improved protocol, ESOLSR, can recover routing and resume normal communication 26.6% faster compared to the existing protocols.
文摘Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade.
基金funded by University of Transport and Communications(UTC)under grant number T2025-CN-004.
文摘Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi-stego images provides good image quality but often results in low embedding capability.To address these challenges,this paper proposes a high-capacity RDH scheme based on PVO that generates three stego images from a single cover image.The cover image is partitioned into non-overlapping blocks with pixels sorted in ascending order.Four secret bits are embedded into each block’s maximum pixel value,while three additional bits are embedded into the second-largest value when the pixel difference exceeds a predefined threshold.A similar embedding strategy is also applied to the minimum side of the block,including the second-smallest pixel value.This design enables each block to embed up to 14 bits of secret data.Experimental results demonstrate that the proposed method achieves significantly higher embedding capacity and improved visual quality compared to existing triple-stego RDH approaches,advancing the field of reversible steganography.
文摘Tau plays a crucial role in several neurodegenerative diseases,collectively referred to as tauopathies.Therefore,targeting potential pathological changes in tau could enable useful therapeutic interventions.However,tau is not an easy target because it dynamically interacts with microtubules and other cellular components,which presents a challenge for tau-targeted drugs.New cellular models could aid the development of mechanism-based tau-targeted therapies.
文摘Correction to:Journal of Forestry Research(2025)36:124 https://doi.org/10.1007/s11676-025-01918-8 In this article the author’s name Yasutomo Hoshika was incorrectly written as Yasutoma Hoshika.The original article has been corrected.
基金funded by the grant“EVA4.0”,No.Z.02.1.01/0.0/0.0/16_019/0000803 supported by OP RDE as well as by the projects APVV-19-0387,APVV-22-0056,and APVV-23-0293 from the Slovak Research and Development Agencyco-funded by the European Commission under the Horizon Europe Teaming for Excellence action+1 种基金project Ligno Silvagrant agreement No.101059552。
文摘This study investigated biomass allocation in young stands of European beech(Fagus sylvatica L.)and Norway spruce(Picea abies(L.)Karst.)across 31 forest sites in the Western Carpathians,Slovakia.A total of 541 trees aged 2–10 years,originating from natural regeneration and planting,were destructively sampled to quantify biomass in four components:foliage,branches,stems,and roots.Generalized non-linear least squares(GNLS)models with a weighing variance function outperformed log-transformed seemingly unrelated regression(SUR)models in terms of accuracy and robustness,especially for foliage and branch biomass.When using height as the predictor,SUR models tended to underestimate biomass in planted beech,leading to notable underprediction of aboveground and total biomass.Biomass allocation patterns varied significantly by species and regeneration origin.Using a non-linear system of equations and component ratio modelling,we found out that planted spruce displayed low variability and a consistent dominance of needle biomass,while naturally regenerated beech showed greater variability and a higher proportion of stem biomass,reflecting stronger competition-driven vertical growth.Interspecific differences in total biomass were more pronounced when using tree height,with spruce generally exhibiting greater biomass than beech at equivalent heights.Overall,stem base diameter marginally outperformed tree height as a predictor of biomass.However,tree height-based models showed strong performance and are particularly suitable for integration with remote sensing applications.These findings can directly support forest managers and modellers in comparing regeneration methods and biomass estimation approaches for early-stage stand development,carbon accounting,and remote sensing calibration.
文摘Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work proposes Secured-FL,a blockchain-based defensive framework that combines smart contract-based authentication,clustering-driven outlier elimination,and dynamic threshold adjustment to defend against adversarial attacks.The framework was implemented on a private Ethereum network with a Proof-of-Authority consensus algorithm to ensure tamper-resistant and auditable model updates.Large-scale simulation on the Cyber Data dataset,under up to 50%malicious client settings,demonstrates Secured-FL achieves 6%-12%higher accuracy,9%-15%lower latency,and approximately 14%less computational expense compared to the PPSS benchmark framework.Additional tests,including confusion matrices,ROC and Precision-Recall curves,and ablation tests,confirm the interpretability and robustness of the defense.Tests for scalability also show consistent performance up to 500 clients,affirming appropriateness to reasonably large deployments.These results make Secured-FL a feasible,adversarially resilient FL paradigm with promising potential for application in smart cities,medicine,and other mission-critical IoT deployments.
基金supported by the National Natural Science Foundation of China (Grant Nos.12475012,62461160263 for P.W.,and 62276171 for H.L.)Quantum Science and Technology-National Science and Technology Major Project of China (Project No.2023ZD0300600 for P.W.)+3 种基金Guangdong Provincial Quantum Science Strategic Initiative (Grant Nos.GDZX240-3009 and GDZX2303005 for P.W.)Guangdong Basic and Applied Basic Research Foundation (Grant No.2024-A1515011938 for H.L.)Shenzhen Fundamental ResearchGeneral Project (Grant No.JCYJ20240813141503005 for H.L.)the Talents Introduction Foundation of Beijing Normal University (Grant No.310432106 for P.W.)。
文摘Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center.
文摘The original online version of this article was revised:Several errors occurred in the published version of the article.These have now been corrected as follows:Page 2,section"2.2 Laser Texturing Procedure of Surfaces",line 2:The device name was corrected from"YDFLP-E-50-M8"to"YDFLP-50-M8."Page 3,Section 2.4:The phrase"95%confidence interval"has been corrected to"95%confidence level."Page 3,Figure 1 caption:The phrase"fandg"has been corrected to"f and g."The order"C4 and C12"has been reversed to"C12 and C4,"in accordance with the display order in the figure.Page 4,Figure reference:The phrase"Figs.4c and d"has been corrected to"Figs.5b and c."Page 5,paragraph starting with"The ANOVA results are presented...":The phrase"95%confidence interval"has been corrected to"95%confidence level."
文摘Hebei Province has incorporated targeted assistance services for people with disabilities into livelihood projects,upgrading the quality and efficiency of support services for disadvantaged groups.THE living and nursing allowances provided by the Chinese government for people with disabilities who are unable to work are not only important components of China’s social security system which provide for the needs of its disabled,but also show China’s ability to guarantee the basic living standard and social fairness and justice for this group of people.
基金supported by the National Natural Science Foundation of China(62473082,82202250,82121003,62036003,and 62333003)the Fundamental Research Funds for the Central Universities(ZYGX2022YGRH008 and ZYGX2024XJ054)the Medical-Engineering Cooperation Funds from the University of Electronic Science and Technology of China(ZYGX2021YGLH201).
文摘The brain atlas,or parcellation-delineating spatial partitions,organizes the brain's structure and function[1].The spatial arrangements of highly heterogeneous landscapes represent specialized functional regions for investigating their interactions.Early efforts to parcellate the mammalian brain,using histological cytoarchitecture and myeloarchitecture,as well as recent in vivo magnetic resonance imaging(MRl)[2,3],have primarily involved cortical areas,subcortical structures,and cerebellar nuclei.Human brain parcellations primarily focus on grey matter(GM),which purposefully excludes white matter(WM),hindering the development of next-generation brain atlases.
文摘Relying on CMPP (China Mobile Peer to Peer) protocol,we propose and design SMS (Short Message Service) gateway interface for early warning plan based on real-time meteorological database application,in order to form the meteorological mobile internet service system which is 'One point connect,service the whole province' for short.Accessing interface system to each city's SMG (Short Message Gateway) through standard protocol,we establish the information transmitting channel of short message platform and mobile SMG to realize the store-forward and flow control of short message.In addition,the stable and dependable communication connect of interface system and mobile SMG should be ensure,and the connect could be reconstructed while encountering any error,as well as committing short message would be stopped due to interruption of connect.
基金The National High Technology Research and Development Program of China (863Program)(No2006AA01Z268)
文摘To cope with the problem of low protocol efficiency of the standard ad hoc on-demand distance vector (AODV) routing protocol with the periodic Hello message broadcast mechanism, a new link availability prediction based strategy is introduced to reduce the amount of Hello messages. In this strategy, a novel wireless link availability prediction model under line-of-sight (LOS) propagation environments is proposed based on which the parameter of Hello Interval in AODV can be dynamically adjusted to achieve the goal of changing the frequency of Hello message broadcasts under different link stability degrees. Simulation results demonstrate that, compared with the standard AODV with the periodic Hello message broadcast mechanism, the proposed protocol effectively reduces unnecessary control message overhead and greatly improves the performance in terms of end-to-end delay and efficiency.
基金supported by Special Scientific Research Project of National Clinical Research Base of Traditional Chinese Medicine of China(JDZX2015155)the General Program of the National Natural Science Foundation of China(No.81674098)+1 种基金supported by Henan Provincial Special Support Program for High-level Talent(“Central Plains Thousand Talents Program”,194200510018,ZYQR201810159)provided by Henan Provincial Special Support Program for High-level Talent(Central Plains Thousand Talents Program,194200510018).
文摘Background: Idiopathic pulmonary fibrosis(IPF) has a poor prognosis and is often a kind of heavy financial burden to patients. Currently, few treatments are available for IPF. Clinical practice of traditional Chinese medicine(TCM), using a syndrome differentiation approach, offers some treatment success in IPF. However, there is no sufficient evidence-based study of the role of TCM in IPF management to make strong conclusions. This study evaluates the efficacy and safety of TCM in the treatment of IPF.Methods and design: A multicenter, exploratory, randomized, double-blind and placebo-controlled trial is planned. A total of 80 patients will be enrolled in the study, which will include 26 weeks of treatment.Participants will be randomly assigned into TCM group or control group in a 1:1 ratio. The TCM group will be given TCM granules based on syndrome differentiation. Formulae include Bao-fei Hua-xian granule for lung qi deficiency, Jin-shui Huan-xian granule for lung-kidney qi deficiency and Yang-qing Kang-xian granule for yin deficiency and inner heat. The control group will be given a corresponding TCM granule placebo. The efficacy and safety of interventions will be evaluated by the outcome variables,including frequencies of acute exacerbations, pulmonary function, clinical symptoms, dyspnea, healthrelated quality of life(HRQo L), 6-minute walk distance and safety indicators.Discussion: It is hypothesized that TCM will decrease the frequency of adverse events, improve pulmonary function and HRQo L, based on our clinical experience. This trial is the first study of TCM treatment in IPF that is based on syndrome differentiation and will evaluate the efficacy and safety of TCM in IPF.
基金The Natural Science Foundation of Jiangsu Province(No.BK2006108)
文摘Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy.