Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-len...Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results.展开更多
“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of F...“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research.展开更多
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade...Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols.展开更多
UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect ...UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect jamming, leading to long sensing time and thus slow routing recovery. To address the issues raised by jamming attacks, we propose a new routing protocol, Electromagnetic Spectrum situation awareness Optimized Link State Routing (ESOLSR) protocol, to improve the existing OLSRv2 protocol. ESOLSR utilizes the spectrum situation awareness capability from the physical layer, and adopts joint-updating of link status, updating of interface functions, and adaptive adjustment of parameters. Our simulation results show that the improved protocol, ESOLSR, can recover routing and resume normal communication 26.6% faster compared to the existing protocols.展开更多
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effect...Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods.展开更多
This paper investigates the problem of global/semi-global finite-time consensus for integrator-type multi-agent sys-tems.New hyperbolic tangent function-based protocols are pro-posed to achieve global and semi-global ...This paper investigates the problem of global/semi-global finite-time consensus for integrator-type multi-agent sys-tems.New hyperbolic tangent function-based protocols are pro-posed to achieve global and semi-global finite-time consensus for both single-integrator and double-integrator multi-agent systems with leaderless undirected and leader-following directed commu-nication topologies.These new protocols not only provide an explicit upper-bound estimate for the settling time,but also have a user-prescribed bounded control level.In addition,compared to some existing results based on the saturation function,the pro-posed approach considerably simplifies the protocol design and the stability analysis.Illustrative examples and an application demonstrate the effectiveness of the proposed protocols.展开更多
In recent years,many unknown protocols are constantly emerging,and they bring severe challenges to network security and network management.Existing unknown protocol recognition methods suffer from weak feature extract...In recent years,many unknown protocols are constantly emerging,and they bring severe challenges to network security and network management.Existing unknown protocol recognition methods suffer from weak feature extraction ability,and they cannot mine the discriminating features of the protocol data thoroughly.To address the issue,we propose an unknown application layer protocol recognition method based on deep clustering.Deep clustering which consists of the deep neural network and the clustering algorithm can automatically extract the features of the input and cluster the data based on the extracted features.Compared with the traditional clustering methods,deep clustering boasts of higher clustering accuracy.The proposed method utilizes network-in-network(NIN),channel attention,spatial attention and Bidirectional Long Short-term memory(BLSTM)to construct an autoencoder to extract the spatial-temporal features of the protocol data,and utilizes the unsupervised clustering algorithm to recognize the unknown protocols based on the features.The method firstly extracts the application layer protocol data from the network traffic and transforms the data into one-dimensional matrix.Secondly,the autoencoder is pretrained,and the protocol data is compressed into low dimensional latent space by the autoencoder and the initial clustering is performed with K-Means.Finally,the clustering loss is calculated and the classification model is optimized according to the clustering loss.The classification results can be obtained when the classification model is optimal.Compared with the existing unknown protocol recognition methods,the proposed method utilizes deep clustering to cluster the unknown protocols,and it can mine the key features of the protocol data and recognize the unknown protocols accurately.Experimental results show that the proposed method can effectively recognize the unknown protocols,and its performance is better than other methods.展开更多
Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and elec...Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and electronic contract signing,ensuring the reliability and security of network transactions.In order to address the limitations of current research methods and enhance the analytical capabilities for fair exchange protocols,this paper proposes a formal model for analyzing such protocols.The proposed model begins with a thorough analysis of fair exchange protocols,followed by the formal definition of fairness.This definition accurately captures the inherent requirements of fair exchange protocols.Building upon event logic,the model incorporates the time factor into predicates and introduces knowledge set axioms.This enhancement empowers the improved logic to effectively describe the state and knowledge of protocol participants at different time points,facilitating reasoning about their acquired knowledge.To maximize the intruder’s capabilities,channel errors are translated into the behaviors of the intruder.The participants are further categorized into honest participants and malicious participants,enabling a comprehensive evaluation of the intruder’s potential impact.By employing a typical fair exchange protocol as an illustrative example,this paper demonstrates the detailed steps of utilizing the proposed model for protocol analysis.The entire process of protocol execution under attack scenarios is presented,shedding light on the underlying reasons for the attacks and proposing corresponding countermeasures.The developedmodel enhances the ability to reason about and evaluate the security properties of fair exchange protocols,thereby contributing to the advancement of secure network transactions.展开更多
This work aims to examine the vulnerabilities and threats in the applications of intelligent transport systems,especially collision avoidance protocols.It focuses on achieving the availability of network communication...This work aims to examine the vulnerabilities and threats in the applications of intelligent transport systems,especially collision avoidance protocols.It focuses on achieving the availability of network communication among traveling vehicles.Finally,it aims to find a secure solution to prevent blackhole attacks on vehicular network communications.The proposed solution relies on authenticating vehicles by joining a blockchain network.This technology provides identification information and receives cryptography keys.Moreover,the ad hoc on-demand distance vector(AODV)protocol is used for route discovery and ensuring reliable node communication.The system activates an adaptive mode for monitoring communications and continually adjusts trust scores based on packet delivery performance.From the experimental study,we can infer that the proposed protocol has successfully detected and prevented blackhole attacks for different numbers of simulated vehicles and at different traveling speeds.This reduces accident rates by 60%and increases the packet delivery ratio and the throughput of the connecting network by 40%and 20%,respectively.However,extra overheads in delay and memory are required to create and initialize the blockchain network.展开更多
Objective:To determine the efficacy and safety of the Yinmei Kuijie decoction combined with 5-ami-nosalicylic acid(5-ASA)in treating mildly to moderately active ulcerative colitis(UC)under real-world conditions.Method...Objective:To determine the efficacy and safety of the Yinmei Kuijie decoction combined with 5-ami-nosalicylic acid(5-ASA)in treating mildly to moderately active ulcerative colitis(UC)under real-world conditions.Methods:This multicenter,prospective,non-randomized,observational study will be conducted in real-world settings.A total of 204 eligible patients will be consecutively enrolled in the study.Patients in the combination treatment group will receive Yinmei Kuijie decoction in combination with 5-ASA,whereas those in the control group will be treated with 5-ASA alone.The primary endpoint will be a clinical response at week 12,defined as a≥3 point and≥30%reduction from baseline in the Mayo total score with≥1 reduction in rectal bleeding or rectal bleeding score=0 or 1.Secondary efficacy endpoints at week 12 will include health-related quality of life,mucosal healing,and inflammation indicators.Conclusion:The results of this study may provide evidence of the efficacy and safety of Yinmei Kuijie decoction combined with 5-ASA in treating patients with mildly to moderately active UC under real-world principles.The results will provide a basis for further confirmatory studies on the efficacy of Yinmei Kuijie decoction.展开更多
Wireless Body Area Network(WBAN)is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body.WBAN is a collection of in-body and on-body sensors that monitor ...Wireless Body Area Network(WBAN)is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body.WBAN is a collection of in-body and on-body sensors that monitor human physical parameters such as temperature,blood pressure,pulse rate,oxygen level,body motion,and so on.They sense the data and communicate it to the Body Area Network(BAN)Coordinator.The main challenge for the WBAN is energy consumption.These issues can be addressed by implementing an effective Medium Access Control(MAC)protocol that reduces energy consumption and increases network lifetime.The purpose of the study is to minimize the energy consumption and minimize the delay using IEEE 802.15.4 standard.In our proposed work,if any critical events have occurred the proposed work is to classify and prioritize the data.We gave priority to the highly critical data to get the Guarantee Tine Slots(GTS)in IEEE 802.15.4 standard superframe to achieve greater energy efficiency.The proposed MAC provides higher data rates for critical data based on the history and current condition and also provides the best reliable service to high critical data and critical data by predicting node similarity.As an outcome,we proposed a MAC protocol for Variable Data Rates(MVDR).When compared to existing MAC protocols,the MVDR performed very well with low energy intake,less interruption,and an enhanced packet-sharing ratio.展开更多
Bacterial blight(BB),caused by Xanthomonas oryzae pathovar oryzae(Xoo),poses a significant threat to rice production,particularly in Asia and West Africa.Breeding resistance against BB in elite rice varieties is cruci...Bacterial blight(BB),caused by Xanthomonas oryzae pathovar oryzae(Xoo),poses a significant threat to rice production,particularly in Asia and West Africa.Breeding resistance against BB in elite rice varieties is crucial to advancing rice breeding program and supporting smallholder farmers.Transcription Activator-Like effectors(TALes)are key virulence factors in Xoo,with some targeting the susceptibility(S)genes such as the sugar transporter SWEET genes in rice.Among these,SWEET14 is an important S gene,with its promoter bound by the TALe TalC which exists across all sequenced African Xoo isolates.In the present study,we utilized CRISPR/Cas9-based cytidine and adenine base editors to alter the effector binding element(EBE)of TalC in the promoter of SWEET14 in rice cultivars Kitaake,IR24,and Zhonghua 11.Mutations with C to T changes in EBE led to reduced SWEET14 induction by TalC-containing Xoo strains,resulting in resistance to African Xoo isolates reliant on TalC for virulence.Conversely,A to G changes retained SWEET14 inducibility and susceptibility to Xoo in edited lines.Importantly,no off-target mutations were detected at predicted sites,and the edited lines exhibited no obvious defects in major agronomic traits in Kitaake.These results underscore the effectiveness of base editing systems for both molecular biology research and crop improvement endeavors.展开更多
The wireless signals emitted by base stations serve as a vital link connecting people in today’s society and have been occupying an increasingly important role in real life.The development of the Internet of Things(I...The wireless signals emitted by base stations serve as a vital link connecting people in today’s society and have been occupying an increasingly important role in real life.The development of the Internet of Things(IoT)relies on the support of base stations,which provide a solid foundation for achieving a more intelligent way of living.In a specific area,achieving higher signal coverage with fewer base stations has become an urgent problem.Therefore,this article focuses on the effective coverage area of base station signals and proposes a novel Evolutionary Particle Swarm Optimization(EPSO)algorithm based on collective prediction,referred to herein as ECPPSO.Introducing a new strategy called neighbor-based evolution prediction(NEP)addresses the issue of premature convergence often encountered by PSO.ECPPSO also employs a strengthening evolution(SE)strategy to enhance the algorithm’s global search capability and efficiency,ensuring enhanced robustness and a faster convergence speed when solving complex optimization problems.To better adapt to the actual communication needs of base stations,this article conducts simulation experiments by changing the number of base stations.The experimental results demonstrate thatunder the conditionof 50 ormore base stations,ECPPSOconsistently achieves the best coverage rate exceeding 95%,peaking at 99.4400%when the number of base stations reaches 80.These results validate the optimization capability of the ECPPSO algorithm,proving its feasibility and effectiveness.Further ablative experiments and comparisons with other algorithms highlight the advantages of ECPPSO.展开更多
The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation...The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation of a patient in the emergency department(ED),Code Crimson activation facilitates rapid decisionmaking by multi-disciplinary specialists for definitive haemorrhage control in operating theatre(OT)and/or interventional radiology(IR)suite.Once this decision has been made,there may still be various factors that lead to delay in transporting the patient from ED to OT/IR.Red Blanket protocol identifies and addresses these factors and processes which cause delay,and aims to facilitate rapid and safe transport of the haemodynamically unstable patient from ED to OT,while minimizing delay in resuscitation during the transfer.The two processes,Code Crimson and Red Blanket,complement each other.It would be ideal to merge the two processes into a single protocol rather than having two separate workflows.Introducing these quality improvement strategies and coor-dinated processes within the trauma framework of the hospitals/healthcare systems will help in further improving the multi-disciplinary care for the complex trauma patients requiring rapid and definitive haemorrhage control.展开更多
Two new complexes,[Zn_(2)(L1)(HL1)(NO_(3))]·CH_(3)OH(1)and[Zn_(3)(L2)(L3)_(3)Cl]·CH_(3)OH(2),were successfully synthesized by‘one-pot’method based on cinnoline-3-ylhydrazine ligand and zinc with 2-hydroxy-...Two new complexes,[Zn_(2)(L1)(HL1)(NO_(3))]·CH_(3)OH(1)and[Zn_(3)(L2)(L3)_(3)Cl]·CH_(3)OH(2),were successfully synthesized by‘one-pot’method based on cinnoline-3-ylhydrazine ligand and zinc with 2-hydroxy-4-methoxybenzaldehyde and 2-hydroxy-3-methoxybenzaldehyde ligands,respectively,where H_(2)L1=5-methoxy-2-(phthalazin-1-ylhydrazonomethyl)-phenol,H_(2)L2=2-methoxy-6-(phthalazin-1-yl-hydrazonomethyl)-phenol,HL3=2-(1,8-dihydro-[1,2,4]triazolo[3,4-α]phthalazin-3-yl)-6-methoxy-phenol.Complexes 1 and 2 were characterized by infrared spectroscopy,elemental analysis,single-crystal X-ray diffraction,powder X-ray diffraction,etc.It is worth noting that the cinnolin-3-yl-hydrazine ligand and 2-hydroxy-3-methoxybenzaldehyde form two types of Schiff bases(H_(2)L2 and HL3)when in situ reacting and coordinating with Zn(Ⅱ),and HL3 also has two coordination modes.In addition,the fluorescence performance showed that complex 1 can achieve selective and sensitive sensing of Al^(3+)in water with a detection limit of 6.37μmol·L^(-1).CCDC:2413978,1;2413979,2.展开更多
Two Gd_(2)complexes,namely[Gd_(2)(dbm)_(2)(HL_(1))_(2)(CH_(3)OH)_(2)]·4CH_(3)OH(1)and[Gd_(2)(dbm)_(2)(L_(2))_(2)(CH_(3)OH)_(2)]·2CH_(3)OH(2),where H_(3)L_(1)=(Z)-N'-[4-(diethylamino)-2-hydroxybenzylidene...Two Gd_(2)complexes,namely[Gd_(2)(dbm)_(2)(HL_(1))_(2)(CH_(3)OH)_(2)]·4CH_(3)OH(1)and[Gd_(2)(dbm)_(2)(L_(2))_(2)(CH_(3)OH)_(2)]·2CH_(3)OH(2),where H_(3)L_(1)=(Z)-N'-[4-(diethylamino)-2-hydroxybenzylidene]-2-hydroxyacetohydrazide,H_(2)L_(2)=(E)-N'-(5-bromo-2-hydroxy-3-methoxybenzylidene)nicotinohydrazide,Hdbm=dibenzoylmethane,have been constructed by adopting the solvothermal method.Structural characterization unveils that both complexes 1 and 2 are constituted by two Gd^(3+)ions,two dbm-ions,two CH_(3)OH molecules,and two polydentate Schiff-base ligands(HL_(1)^(2-)or L_(2)^(2-)).In addition,complex 1 contains four free methanol molecules,whereas complex 2 harbors two free methanol molecules.By investigating the interactions between complexes 1 and 2 and four types of bacteria(Bacillus subtilis,Escherichia coli,Staphylococcus aureus,Candida albicans),it was found that both complexes 1 and 2 exhibited potent antibacte-rial activities.The interaction mechanisms between the ligands H_(3)L_(1),H_(2)L_(2),complexes 1 and 2,and calf thymus DNA(CT-DNA)were studied using ultraviolet-visible spectroscopy,fluorescence titration,and cyclic voltammetry.The results demonstrated that both complexes 1 and 2 can intercalate into CT-DNA molecules,thereby inhibiting bacterial proliferation to achieve the antibacterial effects.CCDC:2401116,1;2401117,2.展开更多
There is curiosity and awareness throughout the world regarding the role of Information and Communication technologies. This is felt in each and every section of society. Several studies have confirmed and considered ...There is curiosity and awareness throughout the world regarding the role of Information and Communication technologies. This is felt in each and every section of society. Several studies have confirmed and considered information and communication technology’s significance in the field of education. It has not only affected learners but also to the teachers. This paper explores how ICT-based projects affect teachers’ and students’ attitudes. The data was collected through self-prepared attitude scale. It was distributed among the teachers and students of various schools. Two hundred students and one hundred twenty teachers responded to the questionnaire. Analysis was done through the data collected from the teachers as well as from students. The study’s conclusions demonstrated that while there was no significant variation in the attitudes of teachers utilizing different ICT-based programs, there was a substantial difference in the students’ attitude toward learning with different ICT-based programs.展开更多
Target-based and phenotype-based methods are the two main approaches for drug screening.Target-based drug screening focuses on specific targets CPA highly correlated with disease mechanisms,by detecting protein-ligand...Target-based and phenotype-based methods are the two main approaches for drug screening.Target-based drug screening focuses on specific targets CPA highly correlated with disease mechanisms,by detecting protein-ligand binding structure,dynamics and affinity.Currently,the four mainstream drug targets are G protein-coupled receptors(GPCRs),kinases,ion channels,and nuclear receptors,accounting for over 70%of effective drug targets,most of which are membrane proteins and enzymes.In recent years,various new drug targets have been continuously discovered,and the research focus has shifted from simple affinity analysis to high-throughput and high-content screening,as well as exploring drug-target interaction modes.These deepen reliance on the analytical techniques to have higher sensitivity,recognition specificity,and applicability to diversified target structures,which promoting the rapid development of novel screening methods.展开更多
A tetranuclear Ln(Ⅲ)-based complex:[Dy_(4)(dbm)_(4)(L)_(6)(μ_(3)-OH)_(2)]·CH_(3)CN(1)(HL=5-[(4-methylbenzylidene)amino]quinolin-8-ol,Hdbm=dibenzoylmethane)was manufactured and its structure was characterized in...A tetranuclear Ln(Ⅲ)-based complex:[Dy_(4)(dbm)_(4)(L)_(6)(μ_(3)-OH)_(2)]·CH_(3)CN(1)(HL=5-[(4-methylbenzylidene)amino]quinolin-8-ol,Hdbm=dibenzoylmethane)was manufactured and its structure was characterized in detail.Xray diffraction analysis shows that complex 1 belongs to the monoclinic crystal system and its space group is P2_1/n,which contains a rhombic Dy_(4)core.Magnetic measurements of 1 suggest it possesses extraordinary single-molecule magnet(SMM)behavior.Its energy barrier U_(eff)/k_(B)was 116.7 K,and the pre-exponential coefficient τ_(0)=1.05×10~(-8)s.CCDC:2359322.展开更多
In the context of power generation companies, vast amounts of specialized data and expert knowledge have been accumulated. However, challenges such as data silos and fragmented knowledge hinder the effective utilizati...In the context of power generation companies, vast amounts of specialized data and expert knowledge have been accumulated. However, challenges such as data silos and fragmented knowledge hinder the effective utilization of this information. This study proposes a novel framework for intelligent Question-and-Answer (Q&A) systems based on Retrieval-Augmented Generation (RAG) to address these issues. The system efficiently acquires domain-specific knowledge by leveraging external databases, including Relational Databases (RDBs) and graph databases, without additional fine-tuning for Large Language Models (LLMs). Crucially, the framework integrates a Dynamic Knowledge Base Updating Mechanism (DKBUM) and a Weighted Context-Aware Similarity (WCAS) method to enhance retrieval accuracy and mitigate inherent limitations of LLMs, such as hallucinations and lack of specialization. Additionally, the proposed DKBUM dynamically adjusts knowledge weights within the database, ensuring that the most recent and relevant information is utilized, while WCAS refines the alignment between queries and knowledge items by enhanced context understanding. Experimental validation demonstrates that the system can generate timely, accurate, and context-sensitive responses, making it a robust solution for managing complex business logic in specialized industries.展开更多
文摘Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results.
基金support the findings of this study are openly available in(Scopus database)at www.scopus.com(accessed on 07 January 2025).
文摘“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research.
基金this project under Geran Putra Inisiatif(GPI)with reference of GP-GPI/2023/976210。
文摘Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols.
基金supported in part by National Natural Science Foundation of China(Nos.61931011 and 62372230)the Jiangsu Provincial Key Research and Development Program,China(No.BE2021013-4).
文摘UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect jamming, leading to long sensing time and thus slow routing recovery. To address the issues raised by jamming attacks, we propose a new routing protocol, Electromagnetic Spectrum situation awareness Optimized Link State Routing (ESOLSR) protocol, to improve the existing OLSRv2 protocol. ESOLSR utilizes the spectrum situation awareness capability from the physical layer, and adopts joint-updating of link status, updating of interface functions, and adaptive adjustment of parameters. Our simulation results show that the improved protocol, ESOLSR, can recover routing and resume normal communication 26.6% faster compared to the existing protocols.
文摘Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods.
基金supported by the National Natural Science Foundation of China(62073019)。
文摘This paper investigates the problem of global/semi-global finite-time consensus for integrator-type multi-agent sys-tems.New hyperbolic tangent function-based protocols are pro-posed to achieve global and semi-global finite-time consensus for both single-integrator and double-integrator multi-agent systems with leaderless undirected and leader-following directed commu-nication topologies.These new protocols not only provide an explicit upper-bound estimate for the settling time,but also have a user-prescribed bounded control level.In addition,compared to some existing results based on the saturation function,the pro-posed approach considerably simplifies the protocol design and the stability analysis.Illustrative examples and an application demonstrate the effectiveness of the proposed protocols.
基金This work is supported by the National Key R&D Program of China(2017YFB0802900).
文摘In recent years,many unknown protocols are constantly emerging,and they bring severe challenges to network security and network management.Existing unknown protocol recognition methods suffer from weak feature extraction ability,and they cannot mine the discriminating features of the protocol data thoroughly.To address the issue,we propose an unknown application layer protocol recognition method based on deep clustering.Deep clustering which consists of the deep neural network and the clustering algorithm can automatically extract the features of the input and cluster the data based on the extracted features.Compared with the traditional clustering methods,deep clustering boasts of higher clustering accuracy.The proposed method utilizes network-in-network(NIN),channel attention,spatial attention and Bidirectional Long Short-term memory(BLSTM)to construct an autoencoder to extract the spatial-temporal features of the protocol data,and utilizes the unsupervised clustering algorithm to recognize the unknown protocols based on the features.The method firstly extracts the application layer protocol data from the network traffic and transforms the data into one-dimensional matrix.Secondly,the autoencoder is pretrained,and the protocol data is compressed into low dimensional latent space by the autoencoder and the initial clustering is performed with K-Means.Finally,the clustering loss is calculated and the classification model is optimized according to the clustering loss.The classification results can be obtained when the classification model is optimal.Compared with the existing unknown protocol recognition methods,the proposed method utilizes deep clustering to cluster the unknown protocols,and it can mine the key features of the protocol data and recognize the unknown protocols accurately.Experimental results show that the proposed method can effectively recognize the unknown protocols,and its performance is better than other methods.
基金the National Natural Science Foundation of China(Nos.61562026,61962020)Academic and Technical Leaders of Major Disciplines in Jiangxi Province(No.20172BCB22015)+1 种基金Special Fund Project for Postgraduate Innovation in Jiangxi Province(No.YC2020-B1141)Jiangxi Provincial Natural Science Foundation(No.20224ACB202006).
文摘Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and electronic contract signing,ensuring the reliability and security of network transactions.In order to address the limitations of current research methods and enhance the analytical capabilities for fair exchange protocols,this paper proposes a formal model for analyzing such protocols.The proposed model begins with a thorough analysis of fair exchange protocols,followed by the formal definition of fairness.This definition accurately captures the inherent requirements of fair exchange protocols.Building upon event logic,the model incorporates the time factor into predicates and introduces knowledge set axioms.This enhancement empowers the improved logic to effectively describe the state and knowledge of protocol participants at different time points,facilitating reasoning about their acquired knowledge.To maximize the intruder’s capabilities,channel errors are translated into the behaviors of the intruder.The participants are further categorized into honest participants and malicious participants,enabling a comprehensive evaluation of the intruder’s potential impact.By employing a typical fair exchange protocol as an illustrative example,this paper demonstrates the detailed steps of utilizing the proposed model for protocol analysis.The entire process of protocol execution under attack scenarios is presented,shedding light on the underlying reasons for the attacks and proposing corresponding countermeasures.The developedmodel enhances the ability to reason about and evaluate the security properties of fair exchange protocols,thereby contributing to the advancement of secure network transactions.
文摘This work aims to examine the vulnerabilities and threats in the applications of intelligent transport systems,especially collision avoidance protocols.It focuses on achieving the availability of network communication among traveling vehicles.Finally,it aims to find a secure solution to prevent blackhole attacks on vehicular network communications.The proposed solution relies on authenticating vehicles by joining a blockchain network.This technology provides identification information and receives cryptography keys.Moreover,the ad hoc on-demand distance vector(AODV)protocol is used for route discovery and ensuring reliable node communication.The system activates an adaptive mode for monitoring communications and continually adjusts trust scores based on packet delivery performance.From the experimental study,we can infer that the proposed protocol has successfully detected and prevented blackhole attacks for different numbers of simulated vehicles and at different traveling speeds.This reduces accident rates by 60%and increases the packet delivery ratio and the throughput of the connecting network by 40%and 20%,respectively.However,extra overheads in delay and memory are required to create and initialize the blockchain network.
基金supported by the Key Project of Traditional Chinese Medicine in Anhui Province(202303a07020003)Basic Research Expenses of Beijing University of Chinese Medicine(2024-JYB-JBZD-044)Vertical Development Fund of Beijing University of Chinese Medicine(2023-ZXFZJJ-005).
文摘Objective:To determine the efficacy and safety of the Yinmei Kuijie decoction combined with 5-ami-nosalicylic acid(5-ASA)in treating mildly to moderately active ulcerative colitis(UC)under real-world conditions.Methods:This multicenter,prospective,non-randomized,observational study will be conducted in real-world settings.A total of 204 eligible patients will be consecutively enrolled in the study.Patients in the combination treatment group will receive Yinmei Kuijie decoction in combination with 5-ASA,whereas those in the control group will be treated with 5-ASA alone.The primary endpoint will be a clinical response at week 12,defined as a≥3 point and≥30%reduction from baseline in the Mayo total score with≥1 reduction in rectal bleeding or rectal bleeding score=0 or 1.Secondary efficacy endpoints at week 12 will include health-related quality of life,mucosal healing,and inflammation indicators.Conclusion:The results of this study may provide evidence of the efficacy and safety of Yinmei Kuijie decoction combined with 5-ASA in treating patients with mildly to moderately active UC under real-world principles.The results will provide a basis for further confirmatory studies on the efficacy of Yinmei Kuijie decoction.
文摘Wireless Body Area Network(WBAN)is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body.WBAN is a collection of in-body and on-body sensors that monitor human physical parameters such as temperature,blood pressure,pulse rate,oxygen level,body motion,and so on.They sense the data and communicate it to the Body Area Network(BAN)Coordinator.The main challenge for the WBAN is energy consumption.These issues can be addressed by implementing an effective Medium Access Control(MAC)protocol that reduces energy consumption and increases network lifetime.The purpose of the study is to minimize the energy consumption and minimize the delay using IEEE 802.15.4 standard.In our proposed work,if any critical events have occurred the proposed work is to classify and prioritize the data.We gave priority to the highly critical data to get the Guarantee Tine Slots(GTS)in IEEE 802.15.4 standard superframe to achieve greater energy efficiency.The proposed MAC provides higher data rates for critical data based on the history and current condition and also provides the best reliable service to high critical data and critical data by predicting node similarity.As an outcome,we proposed a MAC protocol for Variable Data Rates(MVDR).When compared to existing MAC protocols,the MVDR performed very well with low energy intake,less interruption,and an enhanced packet-sharing ratio.
基金supported by a sub-award to the University of Missouri from the Heinrich Heine University of Dusseldorf funded by the Bill&Melinda Gates Foundation(OPP1155704)(Bing Yang)and the China Scholar Council(Chenhao Li,as a joint Ph.D.student).
文摘Bacterial blight(BB),caused by Xanthomonas oryzae pathovar oryzae(Xoo),poses a significant threat to rice production,particularly in Asia and West Africa.Breeding resistance against BB in elite rice varieties is crucial to advancing rice breeding program and supporting smallholder farmers.Transcription Activator-Like effectors(TALes)are key virulence factors in Xoo,with some targeting the susceptibility(S)genes such as the sugar transporter SWEET genes in rice.Among these,SWEET14 is an important S gene,with its promoter bound by the TALe TalC which exists across all sequenced African Xoo isolates.In the present study,we utilized CRISPR/Cas9-based cytidine and adenine base editors to alter the effector binding element(EBE)of TalC in the promoter of SWEET14 in rice cultivars Kitaake,IR24,and Zhonghua 11.Mutations with C to T changes in EBE led to reduced SWEET14 induction by TalC-containing Xoo strains,resulting in resistance to African Xoo isolates reliant on TalC for virulence.Conversely,A to G changes retained SWEET14 inducibility and susceptibility to Xoo in edited lines.Importantly,no off-target mutations were detected at predicted sites,and the edited lines exhibited no obvious defects in major agronomic traits in Kitaake.These results underscore the effectiveness of base editing systems for both molecular biology research and crop improvement endeavors.
基金supported by the National Natural Science Foundation of China(Nos.62272418,62102058)Basic Public Welfare Research Program of Zhejiang Province(No.LGG18E050011)the Major Open Project of Key Laboratory for Advanced Design and Intelligent Computing of the Ministry of Education under Grant ADIC2023ZD001,National Undergraduate Training Program on Innovation and Entrepreneurship(No.202410345054).
文摘The wireless signals emitted by base stations serve as a vital link connecting people in today’s society and have been occupying an increasingly important role in real life.The development of the Internet of Things(IoT)relies on the support of base stations,which provide a solid foundation for achieving a more intelligent way of living.In a specific area,achieving higher signal coverage with fewer base stations has become an urgent problem.Therefore,this article focuses on the effective coverage area of base station signals and proposes a novel Evolutionary Particle Swarm Optimization(EPSO)algorithm based on collective prediction,referred to herein as ECPPSO.Introducing a new strategy called neighbor-based evolution prediction(NEP)addresses the issue of premature convergence often encountered by PSO.ECPPSO also employs a strengthening evolution(SE)strategy to enhance the algorithm’s global search capability and efficiency,ensuring enhanced robustness and a faster convergence speed when solving complex optimization problems.To better adapt to the actual communication needs of base stations,this article conducts simulation experiments by changing the number of base stations.The experimental results demonstrate thatunder the conditionof 50 ormore base stations,ECPPSOconsistently achieves the best coverage rate exceeding 95%,peaking at 99.4400%when the number of base stations reaches 80.These results validate the optimization capability of the ECPPSO algorithm,proving its feasibility and effectiveness.Further ablative experiments and comparisons with other algorithms highlight the advantages of ECPPSO.
文摘The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation of a patient in the emergency department(ED),Code Crimson activation facilitates rapid decisionmaking by multi-disciplinary specialists for definitive haemorrhage control in operating theatre(OT)and/or interventional radiology(IR)suite.Once this decision has been made,there may still be various factors that lead to delay in transporting the patient from ED to OT/IR.Red Blanket protocol identifies and addresses these factors and processes which cause delay,and aims to facilitate rapid and safe transport of the haemodynamically unstable patient from ED to OT,while minimizing delay in resuscitation during the transfer.The two processes,Code Crimson and Red Blanket,complement each other.It would be ideal to merge the two processes into a single protocol rather than having two separate workflows.Introducing these quality improvement strategies and coor-dinated processes within the trauma framework of the hospitals/healthcare systems will help in further improving the multi-disciplinary care for the complex trauma patients requiring rapid and definitive haemorrhage control.
文摘Two new complexes,[Zn_(2)(L1)(HL1)(NO_(3))]·CH_(3)OH(1)and[Zn_(3)(L2)(L3)_(3)Cl]·CH_(3)OH(2),were successfully synthesized by‘one-pot’method based on cinnoline-3-ylhydrazine ligand and zinc with 2-hydroxy-4-methoxybenzaldehyde and 2-hydroxy-3-methoxybenzaldehyde ligands,respectively,where H_(2)L1=5-methoxy-2-(phthalazin-1-ylhydrazonomethyl)-phenol,H_(2)L2=2-methoxy-6-(phthalazin-1-yl-hydrazonomethyl)-phenol,HL3=2-(1,8-dihydro-[1,2,4]triazolo[3,4-α]phthalazin-3-yl)-6-methoxy-phenol.Complexes 1 and 2 were characterized by infrared spectroscopy,elemental analysis,single-crystal X-ray diffraction,powder X-ray diffraction,etc.It is worth noting that the cinnolin-3-yl-hydrazine ligand and 2-hydroxy-3-methoxybenzaldehyde form two types of Schiff bases(H_(2)L2 and HL3)when in situ reacting and coordinating with Zn(Ⅱ),and HL3 also has two coordination modes.In addition,the fluorescence performance showed that complex 1 can achieve selective and sensitive sensing of Al^(3+)in water with a detection limit of 6.37μmol·L^(-1).CCDC:2413978,1;2413979,2.
文摘Two Gd_(2)complexes,namely[Gd_(2)(dbm)_(2)(HL_(1))_(2)(CH_(3)OH)_(2)]·4CH_(3)OH(1)and[Gd_(2)(dbm)_(2)(L_(2))_(2)(CH_(3)OH)_(2)]·2CH_(3)OH(2),where H_(3)L_(1)=(Z)-N'-[4-(diethylamino)-2-hydroxybenzylidene]-2-hydroxyacetohydrazide,H_(2)L_(2)=(E)-N'-(5-bromo-2-hydroxy-3-methoxybenzylidene)nicotinohydrazide,Hdbm=dibenzoylmethane,have been constructed by adopting the solvothermal method.Structural characterization unveils that both complexes 1 and 2 are constituted by two Gd^(3+)ions,two dbm-ions,two CH_(3)OH molecules,and two polydentate Schiff-base ligands(HL_(1)^(2-)or L_(2)^(2-)).In addition,complex 1 contains four free methanol molecules,whereas complex 2 harbors two free methanol molecules.By investigating the interactions between complexes 1 and 2 and four types of bacteria(Bacillus subtilis,Escherichia coli,Staphylococcus aureus,Candida albicans),it was found that both complexes 1 and 2 exhibited potent antibacte-rial activities.The interaction mechanisms between the ligands H_(3)L_(1),H_(2)L_(2),complexes 1 and 2,and calf thymus DNA(CT-DNA)were studied using ultraviolet-visible spectroscopy,fluorescence titration,and cyclic voltammetry.The results demonstrated that both complexes 1 and 2 can intercalate into CT-DNA molecules,thereby inhibiting bacterial proliferation to achieve the antibacterial effects.CCDC:2401116,1;2401117,2.
文摘There is curiosity and awareness throughout the world regarding the role of Information and Communication technologies. This is felt in each and every section of society. Several studies have confirmed and considered information and communication technology’s significance in the field of education. It has not only affected learners but also to the teachers. This paper explores how ICT-based projects affect teachers’ and students’ attitudes. The data was collected through self-prepared attitude scale. It was distributed among the teachers and students of various schools. Two hundred students and one hundred twenty teachers responded to the questionnaire. Analysis was done through the data collected from the teachers as well as from students. The study’s conclusions demonstrated that while there was no significant variation in the attitudes of teachers utilizing different ICT-based programs, there was a substantial difference in the students’ attitude toward learning with different ICT-based programs.
文摘Target-based and phenotype-based methods are the two main approaches for drug screening.Target-based drug screening focuses on specific targets CPA highly correlated with disease mechanisms,by detecting protein-ligand binding structure,dynamics and affinity.Currently,the four mainstream drug targets are G protein-coupled receptors(GPCRs),kinases,ion channels,and nuclear receptors,accounting for over 70%of effective drug targets,most of which are membrane proteins and enzymes.In recent years,various new drug targets have been continuously discovered,and the research focus has shifted from simple affinity analysis to high-throughput and high-content screening,as well as exploring drug-target interaction modes.These deepen reliance on the analytical techniques to have higher sensitivity,recognition specificity,and applicability to diversified target structures,which promoting the rapid development of novel screening methods.
文摘A tetranuclear Ln(Ⅲ)-based complex:[Dy_(4)(dbm)_(4)(L)_(6)(μ_(3)-OH)_(2)]·CH_(3)CN(1)(HL=5-[(4-methylbenzylidene)amino]quinolin-8-ol,Hdbm=dibenzoylmethane)was manufactured and its structure was characterized in detail.Xray diffraction analysis shows that complex 1 belongs to the monoclinic crystal system and its space group is P2_1/n,which contains a rhombic Dy_(4)core.Magnetic measurements of 1 suggest it possesses extraordinary single-molecule magnet(SMM)behavior.Its energy barrier U_(eff)/k_(B)was 116.7 K,and the pre-exponential coefficient τ_(0)=1.05×10~(-8)s.CCDC:2359322.
文摘In the context of power generation companies, vast amounts of specialized data and expert knowledge have been accumulated. However, challenges such as data silos and fragmented knowledge hinder the effective utilization of this information. This study proposes a novel framework for intelligent Question-and-Answer (Q&A) systems based on Retrieval-Augmented Generation (RAG) to address these issues. The system efficiently acquires domain-specific knowledge by leveraging external databases, including Relational Databases (RDBs) and graph databases, without additional fine-tuning for Large Language Models (LLMs). Crucially, the framework integrates a Dynamic Knowledge Base Updating Mechanism (DKBUM) and a Weighted Context-Aware Similarity (WCAS) method to enhance retrieval accuracy and mitigate inherent limitations of LLMs, such as hallucinations and lack of specialization. Additionally, the proposed DKBUM dynamically adjusts knowledge weights within the database, ensuring that the most recent and relevant information is utilized, while WCAS refines the alignment between queries and knowledge items by enhanced context understanding. Experimental validation demonstrates that the system can generate timely, accurate, and context-sensitive responses, making it a robust solution for managing complex business logic in specialized industries.