Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,inclu...Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios.展开更多
Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-len...Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results.展开更多
“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of F...“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research.展开更多
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade...Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols.展开更多
UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect ...UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect jamming, leading to long sensing time and thus slow routing recovery. To address the issues raised by jamming attacks, we propose a new routing protocol, Electromagnetic Spectrum situation awareness Optimized Link State Routing (ESOLSR) protocol, to improve the existing OLSRv2 protocol. ESOLSR utilizes the spectrum situation awareness capability from the physical layer, and adopts joint-updating of link status, updating of interface functions, and adaptive adjustment of parameters. Our simulation results show that the improved protocol, ESOLSR, can recover routing and resume normal communication 26.6% faster compared to the existing protocols.展开更多
Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajecto...Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade.展开更多
Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi...Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi-stego images provides good image quality but often results in low embedding capability.To address these challenges,this paper proposes a high-capacity RDH scheme based on PVO that generates three stego images from a single cover image.The cover image is partitioned into non-overlapping blocks with pixels sorted in ascending order.Four secret bits are embedded into each block’s maximum pixel value,while three additional bits are embedded into the second-largest value when the pixel difference exceeds a predefined threshold.A similar embedding strategy is also applied to the minimum side of the block,including the second-smallest pixel value.This design enables each block to embed up to 14 bits of secret data.Experimental results demonstrate that the proposed method achieves significantly higher embedding capacity and improved visual quality compared to existing triple-stego RDH approaches,advancing the field of reversible steganography.展开更多
Traveling wave(TW)fault location technology has been widely used in transmission systems due to its high accuracy and simplicity.Recently,there has been growing interest in applying this technology to medium voltage(M...Traveling wave(TW)fault location technology has been widely used in transmission systems due to its high accuracy and simplicity.Recently,there has been growing interest in applying this technology to medium voltage(MV)distribution lines.However,current practices in its deployment,signal measurement,and threshold setting are usually from the application experiences in transmission lines,despite significant differences in fault-induced wave characteristics between transmission and distribution systems.To address these issues,this paper investigates the feasibility and applicability of TW fault technology in MV overhead distribution lines through characteristic analysis of fault-induced TWs.The propagation characteristics of aerial mode and zero mode TWs on overhead distribution lines are studied.Furthermore,it evaluates the influence of critical distri-bution network components including distribution transformers,multi-branch configurations,and busbar structures on wave propagation characteristics.Deployment strategies for traveling wave fault location(TWFL)devices is proposed to address the unique challenges of distribution networks,while the fault location method is also improved.Field test results demonstrate the effectiveness of the proposed methodology,showing improved fault detection accuracy and system reliability in distri-bution network applications.This research provides practical implementation suggestions for TWFL technology in distribution networks.展开更多
Tau plays a crucial role in several neurodegenerative diseases,collectively referred to as tauopathies.Therefore,targeting potential pathological changes in tau could enable useful therapeutic interventions.However,ta...Tau plays a crucial role in several neurodegenerative diseases,collectively referred to as tauopathies.Therefore,targeting potential pathological changes in tau could enable useful therapeutic interventions.However,tau is not an easy target because it dynamically interacts with microtubules and other cellular components,which presents a challenge for tau-targeted drugs.New cellular models could aid the development of mechanism-based tau-targeted therapies.展开更多
Correction to:Journal of Forestry Research(2025)36:124 https://doi.org/10.1007/s11676-025-01918-8 In this article the author’s name Yasutomo Hoshika was incorrectly written as Yasutoma Hoshika.The original article ha...Correction to:Journal of Forestry Research(2025)36:124 https://doi.org/10.1007/s11676-025-01918-8 In this article the author’s name Yasutomo Hoshika was incorrectly written as Yasutoma Hoshika.The original article has been corrected.展开更多
This study investigated biomass allocation in young stands of European beech(Fagus sylvatica L.)and Norway spruce(Picea abies(L.)Karst.)across 31 forest sites in the Western Carpathians,Slovakia.A total of 541 trees a...This study investigated biomass allocation in young stands of European beech(Fagus sylvatica L.)and Norway spruce(Picea abies(L.)Karst.)across 31 forest sites in the Western Carpathians,Slovakia.A total of 541 trees aged 2–10 years,originating from natural regeneration and planting,were destructively sampled to quantify biomass in four components:foliage,branches,stems,and roots.Generalized non-linear least squares(GNLS)models with a weighing variance function outperformed log-transformed seemingly unrelated regression(SUR)models in terms of accuracy and robustness,especially for foliage and branch biomass.When using height as the predictor,SUR models tended to underestimate biomass in planted beech,leading to notable underprediction of aboveground and total biomass.Biomass allocation patterns varied significantly by species and regeneration origin.Using a non-linear system of equations and component ratio modelling,we found out that planted spruce displayed low variability and a consistent dominance of needle biomass,while naturally regenerated beech showed greater variability and a higher proportion of stem biomass,reflecting stronger competition-driven vertical growth.Interspecific differences in total biomass were more pronounced when using tree height,with spruce generally exhibiting greater biomass than beech at equivalent heights.Overall,stem base diameter marginally outperformed tree height as a predictor of biomass.However,tree height-based models showed strong performance and are particularly suitable for integration with remote sensing applications.These findings can directly support forest managers and modellers in comparing regeneration methods and biomass estimation approaches for early-stage stand development,carbon accounting,and remote sensing calibration.展开更多
Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work pr...Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work proposes Secured-FL,a blockchain-based defensive framework that combines smart contract-based authentication,clustering-driven outlier elimination,and dynamic threshold adjustment to defend against adversarial attacks.The framework was implemented on a private Ethereum network with a Proof-of-Authority consensus algorithm to ensure tamper-resistant and auditable model updates.Large-scale simulation on the Cyber Data dataset,under up to 50%malicious client settings,demonstrates Secured-FL achieves 6%-12%higher accuracy,9%-15%lower latency,and approximately 14%less computational expense compared to the PPSS benchmark framework.Additional tests,including confusion matrices,ROC and Precision-Recall curves,and ablation tests,confirm the interpretability and robustness of the defense.Tests for scalability also show consistent performance up to 500 clients,affirming appropriateness to reasonably large deployments.These results make Secured-FL a feasible,adversarially resilient FL paradigm with promising potential for application in smart cities,medicine,and other mission-critical IoT deployments.展开更多
Chalcogenide perovskites(CPs)based on zirconium(Zr)and hafnium(Hf)are becoming increasingly attractive as a new class of materials for next-generation solar cells.CPs with the ABX_(3) structure stand out due to their ...Chalcogenide perovskites(CPs)based on zirconium(Zr)and hafnium(Hf)are becoming increasingly attractive as a new class of materials for next-generation solar cells.CPs with the ABX_(3) structure stand out due to their attractive optical and electrical properties,such as efficient light absorption,direct bandgaps in the range of 1.1–2.1 eV,and remarkable defect tolerance,making them a compelling alternative to hybrid and double perovskites for solar energy conversion.Although theoretical studies have progressed rapidly,experimental verification still faces challenges such as the high synthesis temperatures required(>900℃),particularly in producing high-quality,phase-pure thin films and scalable solution-based processes.In this review,we aim to provide a comprehensive overview of the progress and remaining obstacles in advancing CP-based materials and devices.First,we describe the structure and composition as well as the different CPs in which the B site is occupied by Zr and Hf.Second,we summarize the methods used and the challenges that researchers face in producing an effective device.We highlight the main features that make CPs a preferred option for photovoltaic and other applications.Third,we look at the progress made in simulating solar cells that can achieve a power conversion efficiency(PCE)of over 30%using SCAPS-1D software.In the end,challenges and future research directions toward the development of CP materials and devices are provided.Overall,this review will serve as a valuable resource for researchers in selecting suitable strategies to achieve high-performance optoelectronic devices.展开更多
Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to thei...Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center.展开更多
Federated learning is a decentralized model training paradigm with significant potential.However,the quality of Federated Network’s client updates can vary due to non-IID data distributions,leading to suboptimal glob...Federated learning is a decentralized model training paradigm with significant potential.However,the quality of Federated Network’s client updates can vary due to non-IID data distributions,leading to suboptimal global models.To address this issue,we propose a novel client selection strategy called FedPA(Performance-Based Federated Averaging).This proposed model selectively aggregates client updates based on a predefined performance threshold.Only clients whose local models achieve an F1 score of 70%or higher after training are included in the aggregation process.Clients below this threshold receive the updated global model but do not contribute their parameters.In this way,the low-performance clients are still in the process of learning and,after some rounds,will be able to contribute.If no client meets the performance threshold in a given round,the system falls back to standard FedAvg aggregation.This ensures the global model continues to improve even when most clients perform poorly.We evaluate FedPA on a subset of the MURA dataset for abnormality detection in radiographs of four bone types.Compared to baseline federated learning algorithms such as Federated Averaging(FedAvg),Federated Proximal(FedProx),Federated Stochastic Gradient Descent(FedSGD),and Federated Batch Normalization(FedBN),FedPA consistently ranks first or second across key performance metrics,particularly in accuracy,F1 score,and recall.Moreover,FedPA demonstrates notable efficiency,achieving the lowest average round time(≈2270 s)and minimal memory usage(≈645.58 MB),all without relying on GPU resources.These results highlight FedPA’s effectiveness in improving global model quality while reducing computational overhead,positioning it as a promising approach for real-world federated learning applications in resource-constrained environments.展开更多
The original online version of this article was revised:Several errors occurred in the published version of the article.These have now been corrected as follows:Page 2,section"2.2 Laser Texturing Procedure of Sur...The original online version of this article was revised:Several errors occurred in the published version of the article.These have now been corrected as follows:Page 2,section"2.2 Laser Texturing Procedure of Surfaces",line 2:The device name was corrected from"YDFLP-E-50-M8"to"YDFLP-50-M8."Page 3,Section 2.4:The phrase"95%confidence interval"has been corrected to"95%confidence level."Page 3,Figure 1 caption:The phrase"fandg"has been corrected to"f and g."The order"C4 and C12"has been reversed to"C12 and C4,"in accordance with the display order in the figure.Page 4,Figure reference:The phrase"Figs.4c and d"has been corrected to"Figs.5b and c."Page 5,paragraph starting with"The ANOVA results are presented...":The phrase"95%confidence interval"has been corrected to"95%confidence level."展开更多
Both large-scale prospective randomized controlled trials(RCTs)and smaller investigator-initiated trials are essential for evaluating the efficacy and safety of medical interventions.Robust protocols and statistical d...Both large-scale prospective randomized controlled trials(RCTs)and smaller investigator-initiated trials are essential for evaluating the efficacy and safety of medical interventions.Robust protocols and statistical designs ensure the reliability of trial outcomes and improve the credibility of research findings.By reviewing the statistical approaches used in the TORCHLIGHT,NCC2167,and NeoTENNIS trials,this article illustrates the principles underlying large-sample confirmatory RCTs,small-sample exploratory adaptive designs,and single-arm two-stage designs.This discussion is aimed at helping researchers apply these design methods more effectively,to increase the likelihood of success in clinical studies.展开更多
Hebei Province has incorporated targeted assistance services for people with disabilities into livelihood projects,upgrading the quality and efficiency of support services for disadvantaged groups.THE living and nursi...Hebei Province has incorporated targeted assistance services for people with disabilities into livelihood projects,upgrading the quality and efficiency of support services for disadvantaged groups.THE living and nursing allowances provided by the Chinese government for people with disabilities who are unable to work are not only important components of China’s social security system which provide for the needs of its disabled,but also show China’s ability to guarantee the basic living standard and social fairness and justice for this group of people.展开更多
Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the correspond...Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the corresponding stealthiness condition is analyzed.To enhance system security,we advocate for a single-dimensional encryption method,showing that securing a singular data element is sufficient to shield the system from the perils of stealthy attacks.展开更多
文摘Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios.
文摘Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results.
基金support the findings of this study are openly available in(Scopus database)at www.scopus.com(accessed on 07 January 2025).
文摘“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research.
基金this project under Geran Putra Inisiatif(GPI)with reference of GP-GPI/2023/976210。
文摘Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols.
基金supported in part by National Natural Science Foundation of China(Nos.61931011 and 62372230)the Jiangsu Provincial Key Research and Development Program,China(No.BE2021013-4).
文摘UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect jamming, leading to long sensing time and thus slow routing recovery. To address the issues raised by jamming attacks, we propose a new routing protocol, Electromagnetic Spectrum situation awareness Optimized Link State Routing (ESOLSR) protocol, to improve the existing OLSRv2 protocol. ESOLSR utilizes the spectrum situation awareness capability from the physical layer, and adopts joint-updating of link status, updating of interface functions, and adaptive adjustment of parameters. Our simulation results show that the improved protocol, ESOLSR, can recover routing and resume normal communication 26.6% faster compared to the existing protocols.
文摘Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade.
基金funded by University of Transport and Communications(UTC)under grant number T2025-CN-004.
文摘Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi-stego images provides good image quality but often results in low embedding capability.To address these challenges,this paper proposes a high-capacity RDH scheme based on PVO that generates three stego images from a single cover image.The cover image is partitioned into non-overlapping blocks with pixels sorted in ascending order.Four secret bits are embedded into each block’s maximum pixel value,while three additional bits are embedded into the second-largest value when the pixel difference exceeds a predefined threshold.A similar embedding strategy is also applied to the minimum side of the block,including the second-smallest pixel value.This design enables each block to embed up to 14 bits of secret data.Experimental results demonstrate that the proposed method achieves significantly higher embedding capacity and improved visual quality compared to existing triple-stego RDH approaches,advancing the field of reversible steganography.
基金supported by the National Natural Sci-ence Foundation of China(No.52107109).
文摘Traveling wave(TW)fault location technology has been widely used in transmission systems due to its high accuracy and simplicity.Recently,there has been growing interest in applying this technology to medium voltage(MV)distribution lines.However,current practices in its deployment,signal measurement,and threshold setting are usually from the application experiences in transmission lines,despite significant differences in fault-induced wave characteristics between transmission and distribution systems.To address these issues,this paper investigates the feasibility and applicability of TW fault technology in MV overhead distribution lines through characteristic analysis of fault-induced TWs.The propagation characteristics of aerial mode and zero mode TWs on overhead distribution lines are studied.Furthermore,it evaluates the influence of critical distri-bution network components including distribution transformers,multi-branch configurations,and busbar structures on wave propagation characteristics.Deployment strategies for traveling wave fault location(TWFL)devices is proposed to address the unique challenges of distribution networks,while the fault location method is also improved.Field test results demonstrate the effectiveness of the proposed methodology,showing improved fault detection accuracy and system reliability in distri-bution network applications.This research provides practical implementation suggestions for TWFL technology in distribution networks.
文摘Tau plays a crucial role in several neurodegenerative diseases,collectively referred to as tauopathies.Therefore,targeting potential pathological changes in tau could enable useful therapeutic interventions.However,tau is not an easy target because it dynamically interacts with microtubules and other cellular components,which presents a challenge for tau-targeted drugs.New cellular models could aid the development of mechanism-based tau-targeted therapies.
文摘Correction to:Journal of Forestry Research(2025)36:124 https://doi.org/10.1007/s11676-025-01918-8 In this article the author’s name Yasutomo Hoshika was incorrectly written as Yasutoma Hoshika.The original article has been corrected.
基金funded by the grant“EVA4.0”,No.Z.02.1.01/0.0/0.0/16_019/0000803 supported by OP RDE as well as by the projects APVV-19-0387,APVV-22-0056,and APVV-23-0293 from the Slovak Research and Development Agencyco-funded by the European Commission under the Horizon Europe Teaming for Excellence action+1 种基金project Ligno Silvagrant agreement No.101059552。
文摘This study investigated biomass allocation in young stands of European beech(Fagus sylvatica L.)and Norway spruce(Picea abies(L.)Karst.)across 31 forest sites in the Western Carpathians,Slovakia.A total of 541 trees aged 2–10 years,originating from natural regeneration and planting,were destructively sampled to quantify biomass in four components:foliage,branches,stems,and roots.Generalized non-linear least squares(GNLS)models with a weighing variance function outperformed log-transformed seemingly unrelated regression(SUR)models in terms of accuracy and robustness,especially for foliage and branch biomass.When using height as the predictor,SUR models tended to underestimate biomass in planted beech,leading to notable underprediction of aboveground and total biomass.Biomass allocation patterns varied significantly by species and regeneration origin.Using a non-linear system of equations and component ratio modelling,we found out that planted spruce displayed low variability and a consistent dominance of needle biomass,while naturally regenerated beech showed greater variability and a higher proportion of stem biomass,reflecting stronger competition-driven vertical growth.Interspecific differences in total biomass were more pronounced when using tree height,with spruce generally exhibiting greater biomass than beech at equivalent heights.Overall,stem base diameter marginally outperformed tree height as a predictor of biomass.However,tree height-based models showed strong performance and are particularly suitable for integration with remote sensing applications.These findings can directly support forest managers and modellers in comparing regeneration methods and biomass estimation approaches for early-stage stand development,carbon accounting,and remote sensing calibration.
文摘Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work proposes Secured-FL,a blockchain-based defensive framework that combines smart contract-based authentication,clustering-driven outlier elimination,and dynamic threshold adjustment to defend against adversarial attacks.The framework was implemented on a private Ethereum network with a Proof-of-Authority consensus algorithm to ensure tamper-resistant and auditable model updates.Large-scale simulation on the Cyber Data dataset,under up to 50%malicious client settings,demonstrates Secured-FL achieves 6%-12%higher accuracy,9%-15%lower latency,and approximately 14%less computational expense compared to the PPSS benchmark framework.Additional tests,including confusion matrices,ROC and Precision-Recall curves,and ablation tests,confirm the interpretability and robustness of the defense.Tests for scalability also show consistent performance up to 500 clients,affirming appropriateness to reasonably large deployments.These results make Secured-FL a feasible,adversarially resilient FL paradigm with promising potential for application in smart cities,medicine,and other mission-critical IoT deployments.
基金the“Initiative on Energy Research”,founded by the University Mohammed VI Polytechnic,for the financial support through the project“Toward efficient,stable,environmentally friendly,and scalable Perovskite Solar Cells”the financial support from DAAD and BMZ through the WE-AFRICA project+1 种基金the U.S.Department of Energy,Office of Science,Basic Energy Sciences,Early Career Program,under Award No.DOE DESC0025350the National Academies of Sciences,Engineering,and Medicine for their support through the U.S.-Africa Frontiers Fellowship。
文摘Chalcogenide perovskites(CPs)based on zirconium(Zr)and hafnium(Hf)are becoming increasingly attractive as a new class of materials for next-generation solar cells.CPs with the ABX_(3) structure stand out due to their attractive optical and electrical properties,such as efficient light absorption,direct bandgaps in the range of 1.1–2.1 eV,and remarkable defect tolerance,making them a compelling alternative to hybrid and double perovskites for solar energy conversion.Although theoretical studies have progressed rapidly,experimental verification still faces challenges such as the high synthesis temperatures required(>900℃),particularly in producing high-quality,phase-pure thin films and scalable solution-based processes.In this review,we aim to provide a comprehensive overview of the progress and remaining obstacles in advancing CP-based materials and devices.First,we describe the structure and composition as well as the different CPs in which the B site is occupied by Zr and Hf.Second,we summarize the methods used and the challenges that researchers face in producing an effective device.We highlight the main features that make CPs a preferred option for photovoltaic and other applications.Third,we look at the progress made in simulating solar cells that can achieve a power conversion efficiency(PCE)of over 30%using SCAPS-1D software.In the end,challenges and future research directions toward the development of CP materials and devices are provided.Overall,this review will serve as a valuable resource for researchers in selecting suitable strategies to achieve high-performance optoelectronic devices.
基金supported by the National Natural Science Foundation of China (Grant Nos.12475012,62461160263 for P.W.,and 62276171 for H.L.)Quantum Science and Technology-National Science and Technology Major Project of China (Project No.2023ZD0300600 for P.W.)+3 种基金Guangdong Provincial Quantum Science Strategic Initiative (Grant Nos.GDZX240-3009 and GDZX2303005 for P.W.)Guangdong Basic and Applied Basic Research Foundation (Grant No.2024-A1515011938 for H.L.)Shenzhen Fundamental ResearchGeneral Project (Grant No.JCYJ20240813141503005 for H.L.)the Talents Introduction Foundation of Beijing Normal University (Grant No.310432106 for P.W.)。
文摘Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center.
文摘Federated learning is a decentralized model training paradigm with significant potential.However,the quality of Federated Network’s client updates can vary due to non-IID data distributions,leading to suboptimal global models.To address this issue,we propose a novel client selection strategy called FedPA(Performance-Based Federated Averaging).This proposed model selectively aggregates client updates based on a predefined performance threshold.Only clients whose local models achieve an F1 score of 70%or higher after training are included in the aggregation process.Clients below this threshold receive the updated global model but do not contribute their parameters.In this way,the low-performance clients are still in the process of learning and,after some rounds,will be able to contribute.If no client meets the performance threshold in a given round,the system falls back to standard FedAvg aggregation.This ensures the global model continues to improve even when most clients perform poorly.We evaluate FedPA on a subset of the MURA dataset for abnormality detection in radiographs of four bone types.Compared to baseline federated learning algorithms such as Federated Averaging(FedAvg),Federated Proximal(FedProx),Federated Stochastic Gradient Descent(FedSGD),and Federated Batch Normalization(FedBN),FedPA consistently ranks first or second across key performance metrics,particularly in accuracy,F1 score,and recall.Moreover,FedPA demonstrates notable efficiency,achieving the lowest average round time(≈2270 s)and minimal memory usage(≈645.58 MB),all without relying on GPU resources.These results highlight FedPA’s effectiveness in improving global model quality while reducing computational overhead,positioning it as a promising approach for real-world federated learning applications in resource-constrained environments.
文摘The original online version of this article was revised:Several errors occurred in the published version of the article.These have now been corrected as follows:Page 2,section"2.2 Laser Texturing Procedure of Surfaces",line 2:The device name was corrected from"YDFLP-E-50-M8"to"YDFLP-50-M8."Page 3,Section 2.4:The phrase"95%confidence interval"has been corrected to"95%confidence level."Page 3,Figure 1 caption:The phrase"fandg"has been corrected to"f and g."The order"C4 and C12"has been reversed to"C12 and C4,"in accordance with the display order in the figure.Page 4,Figure reference:The phrase"Figs.4c and d"has been corrected to"Figs.5b and c."Page 5,paragraph starting with"The ANOVA results are presented...":The phrase"95%confidence interval"has been corrected to"95%confidence level."
基金supported by a grant from the National Science and Technology Major Project(Grant No.2024ZD0519800).
文摘Both large-scale prospective randomized controlled trials(RCTs)and smaller investigator-initiated trials are essential for evaluating the efficacy and safety of medical interventions.Robust protocols and statistical designs ensure the reliability of trial outcomes and improve the credibility of research findings.By reviewing the statistical approaches used in the TORCHLIGHT,NCC2167,and NeoTENNIS trials,this article illustrates the principles underlying large-sample confirmatory RCTs,small-sample exploratory adaptive designs,and single-arm two-stage designs.This discussion is aimed at helping researchers apply these design methods more effectively,to increase the likelihood of success in clinical studies.
文摘Hebei Province has incorporated targeted assistance services for people with disabilities into livelihood projects,upgrading the quality and efficiency of support services for disadvantaged groups.THE living and nursing allowances provided by the Chinese government for people with disabilities who are unable to work are not only important components of China’s social security system which provide for the needs of its disabled,but also show China’s ability to guarantee the basic living standard and social fairness and justice for this group of people.
基金supported by the National Natural Science Foundation of China(62303353,62273030,62573320)。
文摘Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the corresponding stealthiness condition is analyzed.To enhance system security,we advocate for a single-dimensional encryption method,showing that securing a singular data element is sufficient to shield the system from the perils of stealthy attacks.