期刊文献+
共找到280,345篇文章
< 1 2 250 >
每页显示 20 50 100
ProRE:A Protocol Message Structure Reconstruction Method Based on Execution Slice Embedding
1
作者 Yuyao Huang Hui Shu Fei Kang 《Computers, Materials & Continua》 2026年第3期936-960,共25页
Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,inclu... Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios. 展开更多
关键词 protocol reverse engineering program slicing code embedding hierarchical clustering
在线阅读 下载PDF
SegInfer:Binary Network Protocol Segmentation Based on Probabilistic Inference
2
作者 Guo Maohua Zhu Yuefei Fei Jinlong 《China Communications》 2025年第6期334-354,共21页
Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-len... Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results. 展开更多
关键词 binary protocol probabilistic inference protocol field segmentation protocol reverse engineering related construction
在线阅读 下载PDF
Machine Learning-Based Routing Protocol in Flying Ad Hoc Networks: A Review
3
作者 Priyanka Manjit Kaur +2 位作者 Deepak Prashar Leo Mrsic Arfat Ahmad Khan 《Computers, Materials & Continua》 2025年第2期1615-1643,共29页
“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of F... “Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research. 展开更多
关键词 FANET protocol machine learning
在线阅读 下载PDF
Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol(iSTSP)for Security-Critical Time-Sensitive WSNs
4
作者 Ramadan Abdul-Rashid Mohd Amiruddin Abd Rahman Abdulaziz Yagoub Barnawi 《Computer Modeling in Engineering & Sciences》 2025年第9期3213-3250,共38页
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade... Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols. 展开更多
关键词 Time-sensitive wireless sensor networks(TS-WSNs) secure time synchronization protocol trust-based authentication autoencoder model deep learning malicious node detection Internet of Things energyefficient communication protocols
在线阅读 下载PDF
Multi-radio fast routing recovery protocol based on spectrum situation awareness
5
作者 Chuanxin ZHOU Chao DONG +3 位作者 Xiaojun ZHU Fuhui ZHOU Qihui WU Zhengrui QIN 《Chinese Journal of Aeronautics》 2025年第3期435-446,共12页
UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect ... UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect jamming, leading to long sensing time and thus slow routing recovery. To address the issues raised by jamming attacks, we propose a new routing protocol, Electromagnetic Spectrum situation awareness Optimized Link State Routing (ESOLSR) protocol, to improve the existing OLSRv2 protocol. ESOLSR utilizes the spectrum situation awareness capability from the physical layer, and adopts joint-updating of link status, updating of interface functions, and adaptive adjustment of parameters. Our simulation results show that the improved protocol, ESOLSR, can recover routing and resume normal communication 26.6% faster compared to the existing protocols. 展开更多
关键词 UAV ad hoc network OLSR protocol Routing recovery Electromagnetic spectrum situation awareness MULTI-RADIO
原文传递
Fresh Arrival--Rwanda-China avocado export protocol is a milestone in growing agricultural partnership
6
作者 ALAFATI MUGABO 《ChinAfrica》 2026年第1期46-47,共2页
Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajecto... Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade. 展开更多
关键词 China trade protocol Rwanda agricultural partnership fresh avocado exports
原文传递
Enhanced Capacity Reversible Data Hiding Based on Pixel Value Ordering in Triple Stego Images
7
作者 Kim Sao Nguyen Ngoc Dung Bui 《Computers, Materials & Continua》 2026年第1期1571-1586,共16页
Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi... Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi-stego images provides good image quality but often results in low embedding capability.To address these challenges,this paper proposes a high-capacity RDH scheme based on PVO that generates three stego images from a single cover image.The cover image is partitioned into non-overlapping blocks with pixels sorted in ascending order.Four secret bits are embedded into each block’s maximum pixel value,while three additional bits are embedded into the second-largest value when the pixel difference exceeds a predefined threshold.A similar embedding strategy is also applied to the minimum side of the block,including the second-smallest pixel value.This design enables each block to embed up to 14 bits of secret data.Experimental results demonstrate that the proposed method achieves significantly higher embedding capacity and improved visual quality compared to existing triple-stego RDH approaches,advancing the field of reversible steganography. 展开更多
关键词 RDH reversible data hiding PVO RDH base three stego images
在线阅读 下载PDF
Improvement of Traveling Wave-based Fault Location Method for Overhead Distribution Lines
8
作者 Xinyi Zhang Bingyin Xu +1 位作者 Zhaoru Han Fang Shi 《Protection and Control of Modern Power Systems》 2026年第1期157-172,共16页
Traveling wave(TW)fault location technology has been widely used in transmission systems due to its high accuracy and simplicity.Recently,there has been growing interest in applying this technology to medium voltage(M... Traveling wave(TW)fault location technology has been widely used in transmission systems due to its high accuracy and simplicity.Recently,there has been growing interest in applying this technology to medium voltage(MV)distribution lines.However,current practices in its deployment,signal measurement,and threshold setting are usually from the application experiences in transmission lines,despite significant differences in fault-induced wave characteristics between transmission and distribution systems.To address these issues,this paper investigates the feasibility and applicability of TW fault technology in MV overhead distribution lines through characteristic analysis of fault-induced TWs.The propagation characteristics of aerial mode and zero mode TWs on overhead distribution lines are studied.Furthermore,it evaluates the influence of critical distri-bution network components including distribution transformers,multi-branch configurations,and busbar structures on wave propagation characteristics.Deployment strategies for traveling wave fault location(TWFL)devices is proposed to address the unique challenges of distribution networks,while the fault location method is also improved.Field test results demonstrate the effectiveness of the proposed methodology,showing improved fault detection accuracy and system reliability in distri-bution network applications.This research provides practical implementation suggestions for TWFL technology in distribution networks. 展开更多
关键词 Branch lines distribution network overhead lines propagation characteristics traveling wave based fault location
在线阅读 下载PDF
Towards mechanism-based tau-targeted therapies
9
作者 Lidia Bakota Roland Brandt 《Neural Regeneration Research》 2026年第2期687-688,共2页
Tau plays a crucial role in several neurodegenerative diseases,collectively referred to as tauopathies.Therefore,targeting potential pathological changes in tau could enable useful therapeutic interventions.However,ta... Tau plays a crucial role in several neurodegenerative diseases,collectively referred to as tauopathies.Therefore,targeting potential pathological changes in tau could enable useful therapeutic interventions.However,tau is not an easy target because it dynamically interacts with microtubules and other cellular components,which presents a challenge for tau-targeted drugs.New cellular models could aid the development of mechanism-based tau-targeted therapies. 展开更多
关键词 tau targeted therapies cellular components mechanism based therapies cellular componentswhich cellular models MICROTUBULES TAUOPATHIES neurodegenerative diseasescollectively
暂未订购
Correction:Flux‑based assessment of ozone visible foliar injury in Southern Alps
10
作者 Elena Marra Alessandra De Marco +8 位作者 Andrea Ebone Anna Maria Ferrara Fabio Giannetti Francesco Tagliaferro Pierre Sicard Andrei Popa Ionel Popa Elena Paoletti Yasutomo Hoshika 《Journal of Forestry Research》 2026年第2期305-305,共1页
Correction to:Journal of Forestry Research(2025)36:124 https://doi.org/10.1007/s11676-025-01918-8 In this article the author’s name Yasutomo Hoshika was incorrectly written as Yasutoma Hoshika.The original article ha... Correction to:Journal of Forestry Research(2025)36:124 https://doi.org/10.1007/s11676-025-01918-8 In this article the author’s name Yasutomo Hoshika was incorrectly written as Yasutoma Hoshika.The original article has been corrected. 展开更多
关键词 visible foliar injury southern Alps flux based assessment yasutomo hoshika journal forestry research yasutoma hoshikathe OZONE
在线阅读 下载PDF
Height-based biomass models differ for naturally regenerated and planted young trees
11
作者 Peter Marcis Jozef Pajtík +1 位作者 Bohdan Konôpka Martin Lukac 《Forest Ecosystems》 2026年第1期178-187,共10页
This study investigated biomass allocation in young stands of European beech(Fagus sylvatica L.)and Norway spruce(Picea abies(L.)Karst.)across 31 forest sites in the Western Carpathians,Slovakia.A total of 541 trees a... This study investigated biomass allocation in young stands of European beech(Fagus sylvatica L.)and Norway spruce(Picea abies(L.)Karst.)across 31 forest sites in the Western Carpathians,Slovakia.A total of 541 trees aged 2–10 years,originating from natural regeneration and planting,were destructively sampled to quantify biomass in four components:foliage,branches,stems,and roots.Generalized non-linear least squares(GNLS)models with a weighing variance function outperformed log-transformed seemingly unrelated regression(SUR)models in terms of accuracy and robustness,especially for foliage and branch biomass.When using height as the predictor,SUR models tended to underestimate biomass in planted beech,leading to notable underprediction of aboveground and total biomass.Biomass allocation patterns varied significantly by species and regeneration origin.Using a non-linear system of equations and component ratio modelling,we found out that planted spruce displayed low variability and a consistent dominance of needle biomass,while naturally regenerated beech showed greater variability and a higher proportion of stem biomass,reflecting stronger competition-driven vertical growth.Interspecific differences in total biomass were more pronounced when using tree height,with spruce generally exhibiting greater biomass than beech at equivalent heights.Overall,stem base diameter marginally outperformed tree height as a predictor of biomass.However,tree height-based models showed strong performance and are particularly suitable for integration with remote sensing applications.These findings can directly support forest managers and modellers in comparing regeneration methods and biomass estimation approaches for early-stage stand development,carbon accounting,and remote sensing calibration. 展开更多
关键词 European beech Norway spruce Allometric relations Tree height Diameter at base Whole-tree biomass Tree components
在线阅读 下载PDF
Secured-FL:Blockchain-Based Defense against Adversarial Attacks on Federated Learning Models
12
作者 Bello Musa Yakubu Nor Shahida Mohd Jamail +1 位作者 Rabia Latif Seemab Latif 《Computers, Materials & Continua》 2026年第3期734-757,共24页
Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work pr... Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work proposes Secured-FL,a blockchain-based defensive framework that combines smart contract-based authentication,clustering-driven outlier elimination,and dynamic threshold adjustment to defend against adversarial attacks.The framework was implemented on a private Ethereum network with a Proof-of-Authority consensus algorithm to ensure tamper-resistant and auditable model updates.Large-scale simulation on the Cyber Data dataset,under up to 50%malicious client settings,demonstrates Secured-FL achieves 6%-12%higher accuracy,9%-15%lower latency,and approximately 14%less computational expense compared to the PPSS benchmark framework.Additional tests,including confusion matrices,ROC and Precision-Recall curves,and ablation tests,confirm the interpretability and robustness of the defense.Tests for scalability also show consistent performance up to 500 clients,affirming appropriateness to reasonably large deployments.These results make Secured-FL a feasible,adversarially resilient FL paradigm with promising potential for application in smart cities,medicine,and other mission-critical IoT deployments. 展开更多
关键词 Federated learning(FL) blockchain FL based privacy model defense FL model security ethereum smart contract
在线阅读 下载PDF
Zirconium-and hafnium-based chalcogenide perovskites:From materials to devices and applications
13
作者 Hicham Zalrhi Salma Daim +4 位作者 Mohammed Makha Nelson Yaw Dzade Abdelkader Outzourhit Mohammed Abd-lefdil Lahoucine Atourki 《Journal of Energy Chemistry》 2026年第3期448-472,共25页
Chalcogenide perovskites(CPs)based on zirconium(Zr)and hafnium(Hf)are becoming increasingly attractive as a new class of materials for next-generation solar cells.CPs with the ABX_(3) structure stand out due to their ... Chalcogenide perovskites(CPs)based on zirconium(Zr)and hafnium(Hf)are becoming increasingly attractive as a new class of materials for next-generation solar cells.CPs with the ABX_(3) structure stand out due to their attractive optical and electrical properties,such as efficient light absorption,direct bandgaps in the range of 1.1–2.1 eV,and remarkable defect tolerance,making them a compelling alternative to hybrid and double perovskites for solar energy conversion.Although theoretical studies have progressed rapidly,experimental verification still faces challenges such as the high synthesis temperatures required(>900℃),particularly in producing high-quality,phase-pure thin films and scalable solution-based processes.In this review,we aim to provide a comprehensive overview of the progress and remaining obstacles in advancing CP-based materials and devices.First,we describe the structure and composition as well as the different CPs in which the B site is occupied by Zr and Hf.Second,we summarize the methods used and the challenges that researchers face in producing an effective device.We highlight the main features that make CPs a preferred option for photovoltaic and other applications.Third,we look at the progress made in simulating solar cells that can achieve a power conversion efficiency(PCE)of over 30%using SCAPS-1D software.In the end,challenges and future research directions toward the development of CP materials and devices are provided.Overall,this review will serve as a valuable resource for researchers in selecting suitable strategies to achieve high-performance optoelectronic devices. 展开更多
关键词 Chalcogenide perovskites Lead-free perovskites Solar energy conversion Thin-film fabrication Photovoltaic materials Perovskite based solar cells
在线阅读 下载PDF
Robust Hyper-Polarization Protocol of Nuclear Spins via Magic Sequence
14
作者 Haiyang Li Yongju Li +1 位作者 Hao Liao Ping Wang 《Chinese Physics Letters》 2026年第1期105-128,共24页
Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to thei... Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center. 展开更多
关键词 transferring polarization electrons hyperpolarization protocols quantum information technologiesas nuclear spins pulse polarization nuclear spin polarization magic sequences nuclear magnetic resonance
原文传递
FedPA:Federated Learning with Performance-Based Averaging for Efficient Medical Image Classification
15
作者 Atif Mahmood Yasin Saleem +2 位作者 Usman Tariq Yousef Ibrahim Daradkeh Adnan N.Qureshi 《Computer Modeling in Engineering & Sciences》 2026年第3期1077-1101,共25页
Federated learning is a decentralized model training paradigm with significant potential.However,the quality of Federated Network’s client updates can vary due to non-IID data distributions,leading to suboptimal glob... Federated learning is a decentralized model training paradigm with significant potential.However,the quality of Federated Network’s client updates can vary due to non-IID data distributions,leading to suboptimal global models.To address this issue,we propose a novel client selection strategy called FedPA(Performance-Based Federated Averaging).This proposed model selectively aggregates client updates based on a predefined performance threshold.Only clients whose local models achieve an F1 score of 70%or higher after training are included in the aggregation process.Clients below this threshold receive the updated global model but do not contribute their parameters.In this way,the low-performance clients are still in the process of learning and,after some rounds,will be able to contribute.If no client meets the performance threshold in a given round,the system falls back to standard FedAvg aggregation.This ensures the global model continues to improve even when most clients perform poorly.We evaluate FedPA on a subset of the MURA dataset for abnormality detection in radiographs of four bone types.Compared to baseline federated learning algorithms such as Federated Averaging(FedAvg),Federated Proximal(FedProx),Federated Stochastic Gradient Descent(FedSGD),and Federated Batch Normalization(FedBN),FedPA consistently ranks first or second across key performance metrics,particularly in accuracy,F1 score,and recall.Moreover,FedPA demonstrates notable efficiency,achieving the lowest average round time(≈2270 s)and minimal memory usage(≈645.58 MB),all without relying on GPU resources.These results highlight FedPA’s effectiveness in improving global model quality while reducing computational overhead,positioning it as a promising approach for real-world federated learning applications in resource-constrained environments. 展开更多
关键词 Performance based federated learning(FedPA) distributed machine learning industrial growth public health
在线阅读 下载PDF
Erratum:Marine Shell-Inspired Laser Surface Texturing:Characterizing the Surface Properties of Co-Based Alloy
16
作者 Sefika Kasman Sertan Ozan 《Journal of Bionic Engineering》 2026年第1期551-551,共1页
The original online version of this article was revised:Several errors occurred in the published version of the article.These have now been corrected as follows:Page 2,section"2.2 Laser Texturing Procedure of Sur... The original online version of this article was revised:Several errors occurred in the published version of the article.These have now been corrected as follows:Page 2,section"2.2 Laser Texturing Procedure of Surfaces",line 2:The device name was corrected from"YDFLP-E-50-M8"to"YDFLP-50-M8."Page 3,Section 2.4:The phrase"95%confidence interval"has been corrected to"95%confidence level."Page 3,Figure 1 caption:The phrase"fandg"has been corrected to"f and g."The order"C4 and C12"has been reversed to"C12 and C4,"in accordance with the display order in the figure.Page 4,Figure reference:The phrase"Figs.4c and d"has been corrected to"Figs.5b and c."Page 5,paragraph starting with"The ANOVA results are presented...":The phrase"95%confidence interval"has been corrected to"95%confidence level." 展开更多
关键词 laser surface texturing surface properties marine shell inspired co based alloy laser texturing procedure confidence level ANOVA results
在线阅读 下载PDF
Protocol and statistical designs in classic clinical research—toripalimab series trial analysis
17
作者 Yingjian He Li Bian Zefei Jiang 《Cancer Biology & Medicine》 2026年第3期338-342,共5页
Both large-scale prospective randomized controlled trials(RCTs)and smaller investigator-initiated trials are essential for evaluating the efficacy and safety of medical interventions.Robust protocols and statistical d... Both large-scale prospective randomized controlled trials(RCTs)and smaller investigator-initiated trials are essential for evaluating the efficacy and safety of medical interventions.Robust protocols and statistical designs ensure the reliability of trial outcomes and improve the credibility of research findings.By reviewing the statistical approaches used in the TORCHLIGHT,NCC2167,and NeoTENNIS trials,this article illustrates the principles underlying large-sample confirmatory RCTs,small-sample exploratory adaptive designs,and single-arm two-stage designs.This discussion is aimed at helping researchers apply these design methods more effectively,to increase the likelihood of success in clinical studies. 展开更多
关键词 improve credibility evaluating efficacy safety medical interventionsrobust protocols statistical designs clinical research randomized controlled trials rcts statistical designs randomized controlled trials SAFETY EFFICACY
暂未订购
Home-Based Care Service
18
作者 XU JUNXING 《China Today》 2026年第3期70-72,共3页
Hebei Province has incorporated targeted assistance services for people with disabilities into livelihood projects,upgrading the quality and efficiency of support services for disadvantaged groups.THE living and nursi... Hebei Province has incorporated targeted assistance services for people with disabilities into livelihood projects,upgrading the quality and efficiency of support services for disadvantaged groups.THE living and nursing allowances provided by the Chinese government for people with disabilities who are unable to work are not only important components of China’s social security system which provide for the needs of its disabled,but also show China’s ability to guarantee the basic living standard and social fairness and justice for this group of people. 展开更多
关键词 livelihood projects home based care targeted assistance livelihood projectsupgrading people disabilities living nursing allowances targeted assistance services social security system
在线阅读 下载PDF
Single-Dimensional Encryption Against Stealthy Attacks on Stochastic Event-Based Estimation
19
作者 Jun Shang Di Zhao +1 位作者 Hanwen Zhang Dawei Shi 《IEEE/CAA Journal of Automatica Sinica》 2026年第1期233-235,共3页
Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the correspond... Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the corresponding stealthiness condition is analyzed.To enhance system security,we advocate for a single-dimensional encryption method,showing that securing a singular data element is sufficient to shield the system from the perils of stealthy attacks. 展开更多
关键词 enhance system securitywe securing singular data element single dimensional encryption stochastic event based estimation stealthiness condition security mitigation attack framework stealthy attacks
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部