BACKGROUND The discovery of induced pluripotent stem cells revolutionized regenerative medicine,providing a source for generating induced pluripotent stem cell-derived mesenchymal stem cells(iMSCs).AIM To evaluate and...BACKGROUND The discovery of induced pluripotent stem cells revolutionized regenerative medicine,providing a source for generating induced pluripotent stem cell-derived mesenchymal stem cells(iMSCs).AIM To evaluate and compare five iMSC differentiation protocols,assessing their efficiency,phenotypic characteristics,and functional properties relative to primary mesenchymal stem cells(MSCs).METHODS Five iMSC differentiation protocols were assessed:SB431542-based differentiation(iMSC1,iMSC3),an iMatrix-free method(iMSC2),growth factor supplementation(iMSC4),and embryoid body formation with retinoic acid(EB-iMSC).iMSC identity was confirmed according to the International Society for Cell&Gene Therapy 2006 criteria,requiring expression of surface markers(CD105,CD73,CD90)and absence of pluripotency markers.Functional assays were conducted to evaluate differentiation potential(osteogenic and adipogenic),proliferation,mitochondrial function,reactive oxygen species,senescence,and migration.RESULTS All iMSC types expressed MSC markers and lacked pluripotency markers.EBiMSC and iMSC2 showed enhanced osteogenesis(runt-related transcription factor 2;P≤0.01 and P≤0.0001,respectively),while adipogenic potential was reduced in iMSC2(Adipsin;P≤0.01)and EB-iMSC(Adipsin and peroxisome proliferatoractivated receptor gamma;P≤0.0001 and P≤0.01,respectively).Proliferation was comparable or superior to bone marrow MSCs,except in iMSC1,with iMSC4 showing the highest rate(MTT assay;P values ranged from 0.01 to 0.001).Despite reduced mitochondrial health in iMSC3 and iMSC4(P≤0.001),reactive oxygen species levels were lower in all iMSCs(P values ranged from 0.001 to 0.0001),and senescence was significantly reduced in all iMSCs with the exception of iMSC1(P values ranged from 0.01 to 0.0001).Migration was most reduced in iMSC4(P≤0.001 at 24 hours and P≤0.0001 at 48 hours).CONCLUSION While all protocols generated functional iMSCs,variations in differentiation,proliferation,and function emphasize the impact of protocol selection.These findings contribute to optimizing iMSC generation for research and clinical applications.展开更多
Focusing on the ultralow expansion functionality of the crystalized glass containing the cordierite crystal phase with the molar composition 20.7MgO·20.7Al_(2)O_(3)·51.6SiO_(2)·7.0TiO_(2),we systematica...Focusing on the ultralow expansion functionality of the crystalized glass containing the cordierite crystal phase with the molar composition 20.7MgO·20.7Al_(2)O_(3)·51.6SiO_(2)·7.0TiO_(2),we systematically investigated impacts of thermal treatment protocols on T dependence of coefficients of thermal expansion(CTE).Except for the phase compositions,morphology is identified as another important factor to control the T dependence of CTE.By using X-ray diffraction and scanning electron microscope,various modes of T dependence of CTE for crystallized glasses are ascribed to their different phase compositions and microstructure with finely dispersed nanoparticles.These understanding contributes to the further modification of CTE of the crystalized glass by altering their thermal treatment scenarios.展开更多
BACKGROUND Diabetes mellitus has become one of the major pandemics of the 21st century.In this scenario,nursing interventions are essential for improving self-care and quality of life in patients with type 2 diabetes ...BACKGROUND Diabetes mellitus has become one of the major pandemics of the 21st century.In this scenario,nursing interventions are essential for improving self-care and quality of life in patients with type 2 diabetes mellitus.Nursing interventions are crucial for managing the disease and preventing complications.AIM To analyse nursing interventions in recent years through a systematic review and meta-analysis and to propose improvements in care plans.METHODS This study conducted a systematic review and meta-analysis of the impact of nursing interventions on quantitative glycaemic variables,such as glycated haemoglobin and fasting plasma glucose.RESULTS After confirming that the combined effect of all studies from the past 5 years positively impacts quantitative variables,a descriptive analysis of the studies with the most significant changes was conducted.Based on this,an improvement in diabetic patient care protocols has been proposed through follow-up plans tailored to the patient’s technological skills.CONCLUSION The combined results obtained and the proposal for improvement developed in this manuscript could help to improve the quality of life of many people around the world.展开更多
3D (Three-dimensional) Caco-2 spheroids closely recapitulating in vivo physiological organization of intestinal epithelial cells, provide an excellent in vitro model system to study their pathophysiology and their r...3D (Three-dimensional) Caco-2 spheroids closely recapitulating in vivo physiological organization of intestinal epithelial cells, provide an excellent in vitro model system to study their pathophysiology and their response to stressful stimuli. The objective of this technical note is to provide optimized in vitro experimental protocols for culturing 3D Caco-2 spheroids and for analyzing their cell growth features. An optimized 3D Caco-2 spheroid culturing technique based on a new configuration of the culture medium is provided A methodological approach to determine the distribution of the cell cycle phases in disaggregated Caco-2 spheroids by using cytofluorimetric analysis is also described. The optimized culturing protocol favors 3D Caco-2 spheroid differentiation process, as evaluated by the number of well-differentiated spheroids with a single hollow lumen. The cytofluorimetric analysis allows rapid collection of cell cycle phase data from high numbers of spheroid samples, thus, permitting to estimate their growth dynamics in a relatively short time. The optimized technical approaches described here can be applied in systematic manner to a variety of research activities utilizing 3D Caco-2 spheroids. Ease of use, time and economic saving advantages deriving from these protocols further highlight their potential.展开更多
The NSC-34 cell line is a widely recognized motor neuron model and various neuronal differentiation protocols have been exploited. Under previously reported experimental conditions, only part of the cells resemble dif...The NSC-34 cell line is a widely recognized motor neuron model and various neuronal differentiation protocols have been exploited. Under previously reported experimental conditions, only part of the cells resemble differentiated neurons;however, they do not exhibit extensive and time-prolonged neuritogenesis, and maintain their duplication capacity in culture. The aim of the present work was to facilitate long-term and more homogeneous neuronal differentiation in motor neuron–like NSC-34 cells. We found that the antimitotic drug cytosine arabinoside promoted robust and persistent neuronal differentiation in the entire cell population. Long and interconnecting neuronal processes with abundant growth cones were homogeneously induced and were durable for up to at least 6 weeks in culture. Moreover, cytosine arabinoside was permissive, dispensable, and mostly irreversible in priming NSC-34 cells for neurite initiation and regeneration after mechanical dislodgement. Finally, the expression of the cell proliferation antigen Ki67 was inhibited by cytosine arabinoside, whereas the expression levels of neuronal growth associated protein 43, vimentin, and motor neuron–specific p75, Islet2, homeobox 9 markers were upregulated, as confirmed by western blot and/or confocal immunofluorescence analysis. Overall, these findings support the use of NSC-34 cells as a motor neuron model for properly investigating neurodegenerative mechanisms and prospectively identifying neuroprotective strategies.展开更多
Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajecto...Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade.展开更多
The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model ...The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided.展开更多
Radio frequency identification(RFID) is a new type of non-contact automatic identification technology.Due to its low energy consumption,low cost,and its adaptability to harsh environments,it has been applied to many f...Radio frequency identification(RFID) is a new type of non-contact automatic identification technology.Due to its low energy consumption,low cost,and its adaptability to harsh environments,it has been applied to many fields.In the RFID systems,data collision is inevitable when the reader sends a communication request and multiple tags respond with simultaneous data transmission.Data collision is prone to causing problems such as:identification delay,spectrum resource waste,a decreased system throughput rate,etc.Therefore,an efficient,stable anti-collision protocol is crucial for RFID systems.This research analysed the current research into RFID anticollision protocols and summarised means for its improvement through the mechanism of implementation of different types anticollision protocols.Finally,a new direction is proposed for the future development of RFID anti-collision protocol systems.展开更多
There is a lack of appropriate guidelines for realistic user traces, mobility models, routing protocols, considerations of real-life challenges, etc. for general-purpose mobile ad hoc networks (MANET). In this paper...There is a lack of appropriate guidelines for realistic user traces, mobility models, routing protocols, considerations of real-life challenges, etc. for general-purpose mobile ad hoc networks (MANET). In this paper, four laptops are used in an open field environment in four scenarios to evaluate the performances of Internet control message protocol (ICMP) based ping and transmission control protocol (TCP) based streaming video applications using optimised link state routing (OLSR) implementation in an IEEE 802.11g wireless network. Corresponding simulations are developed in Network Simulator ns-2 by setting simulation parameters according to the real experiments. Difficulties faced to regenerate real-life scenarios have been discussed and the gaps between reality and simulation are identified. A setup guideline to produce realistic simulation results has been established.展开更多
As the main communication mediums in industrial control networks,industrial communication protocols are always vulnerable to extreme exploitations,and it is very difficult to take protective measures due to their seri...As the main communication mediums in industrial control networks,industrial communication protocols are always vulnerable to extreme exploitations,and it is very difficult to take protective measures due to their serious privacy.Based on the SDN(Software Defined Network)technology,this paper proposes a novel event-based anomaly detection approach to identify misbehaviors using non-public industrial communication protocols,and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems.Furthermore,aiming at the unknown protocol specification and message format,this approach first restructures the industrial communication sessions and merges the payloads from industrial communication packets.After that,the feature selection and event sequence extraction can be carried out by using the N-gram model and K-means algorithm.Based on the obtained event sequences,this approach finally trains an event-based HMM(Hidden Markov Model)to identify aberrant industrial communication behaviors.Experimental results clearly show that the proposed approach has obvious advantages of classification accuracy and detection efficiency.展开更多
The Internet of Things(IoT)has been growing over the past few years due to its flexibility and ease of use in real-time applications.The IoT's foremost task is ensuring that there is proper communication among dif...The Internet of Things(IoT)has been growing over the past few years due to its flexibility and ease of use in real-time applications.The IoT's foremost task is ensuring that there is proper communication among different types of applications and devices,and that the application layer protocols fulfill this necessity.However,as the number of applications grows,it is necessary to modify or enhance the application layer protocols according to specific IoT applications,allowing specific issues to be addressed,such as dynamic adaption to network conditions and interoperability.Recently,several IoT application layer protocols have been enhanced and modified according to application requirements.However,no existing survey articles focus on these protocols.In this article,we survey traditional and recent advances in IoT application layer protocols,as well as relevant real-time applications and their adapted application layer protocols for improving performance.As changing the nature of protocols for each application is unrealistic,machine learning offers means of making protocols intelligent and is able to adapt dynamically.In this context,we focus on providing open challenges to drive IoT application layer protocols in such a direction.展开更多
Recently, location-based routings in wireless sensor networks (WSNs) are attracting a lot of interest in the research community, especially because of its scalability. In location-based routing, the network size is sc...Recently, location-based routings in wireless sensor networks (WSNs) are attracting a lot of interest in the research community, especially because of its scalability. In location-based routing, the network size is scalable without increasing the signalling overhead as routing decisions are inherently localized. Here, each node is aware of its position in the network through some positioning device like GPS and uses this information in the routing mechanism. In this paper, we first discuss the basics of WSNs including the architecture of the network, energy consumption for the components of a typical sensor node, and draw a detailed picture of classification of location-based routing protocols. Then, we present a systematic and comprehensive taxonomy of location-based routing protocols, mostly for sensor networks. All the schemes are subsequently discussed in depth. Finally, we conclude the paper with some insights on potential research directions for location-based routing in WSNs.展开更多
Most knowledgeable people agree that networking and routing technologies have been around about 25 years. Routing is simultaneously the most complicated function of a network and the most important. It is of the same ...Most knowledgeable people agree that networking and routing technologies have been around about 25 years. Routing is simultaneously the most complicated function of a network and the most important. It is of the same kind that more than 70% of computer application fields are MIS applications. So the challenge in building and using a MIS in the network is developing the means to find, access, and communicate large databases or multi databases systems. Because general databases are not time continuous, in fact, they can not be streaming, so we can't obtain reliable and secure quality of service by deleting some unimportant datagrams in the databases transmission. In this article, we will discuss which kind of routing protocol is the best type for large databases or multi databases systems transmission in the networks.展开更多
The performance of ALOHA, Non-Persistent CSMA protocols and their slotted versions in Packet Radio Network is analyzed in consideration of the time of propagation delay, the time of radio transformation from receiving...The performance of ALOHA, Non-Persistent CSMA protocols and their slotted versions in Packet Radio Network is analyzed in consideration of the time of propagation delay, the time of radio transformation from receiving state to transmitting state, and the time for the radio to sense the carrier. The analysis shows that these parameters are the main factors deteriorating the performance of the protocols, especially for CSMA. The multichannel mode efficiently decreases the effects of these factors and the system capacity is changeable conveniently. Comparing curves and some simulation results are given.展开更多
Nonlinear consensus protocols for dynamic directed networks of multi-agent systems with fixed and switching topologies are investigated separately in this paper. Based on the centre manifold reduction technique, nonli...Nonlinear consensus protocols for dynamic directed networks of multi-agent systems with fixed and switching topologies are investigated separately in this paper. Based on the centre manifold reduction technique, nonlinear consensus protocols are presented. We prove that a group of agents can reach a β-consensus, the value of which is the group decision value varying from the minimum and the maximum values of the initial states of the agents. Moreover, we derive the conditions to guarantee that all the agents reach a β-consensus on a desired group decision value. Finally, a simulation study concerning the vertical alignment manoeuvere of a team of unmanned air vehicles is performed. Simulation results show that the nonlinear consensus protocols proposed are more effective than the linear protocols for the formation control of the agents and they are an improvement over existing protocols.展开更多
Brain computer interface(BCI)systems permit individuals with motor disorders to utilize their thoughts as a mean to control external devices.BCI is a promising interdisciplinary field that gained the attention of many...Brain computer interface(BCI)systems permit individuals with motor disorders to utilize their thoughts as a mean to control external devices.BCI is a promising interdisciplinary field that gained the attention of many researchers.Yet,the development of BCI systems is facing several challenges,such as network lifetime.The Medium Access Control(MAC)Protocol is the bottle-neck of network reliability.There are many MAC protocols that can be utilized for dependable transmission in BCI applications by altering their control parameters.However,modifying these parameters is another source of concern due to the scarcity in knowledge about the effect of modification.Also,there is still no instrument that can receive and actualize these parameters on transmitters embedded inside the cerebrum.In this paper,we propose two novel MAC protocols using passive UHF-RFID,the proposed protocols provide efficient and reliable communication between the transmitters and the receiver.The UHF-RFID transmitters were used because they are energy efficient which makes them compatible with BCI application.The first protocol is designed for the EEG signals.While the second protocol was designed for the ECoG signals.The evaluation results showed the validity of the proposed protocols in terms of network performance.The results also proved that the protocols are suitable and reliable for designing efficient BCI applications.展开更多
Relay attack is one of the most threatening challenges against radio frequency identification(RFID) now. Distance bounding protocols have been introduced to thwart relay attacks. They form a family of challenge-resp...Relay attack is one of the most threatening challenges against radio frequency identification(RFID) now. Distance bounding protocols have been introduced to thwart relay attacks. They form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We design an effective attack against a family of such protocols to launch the spoofing attacks within effective distance successfully, which demonstrates that existing protocols cannot eliminate such attacks completely. The thesis proposes a new program with time- stamping verification to correct the defect and verify the effectiveness.展开更多
The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols. In today's technology ecosystem, I...The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols. In today's technology ecosystem, IoT interacts with many application areas such as smart city, smart building, security, traffic, remote monitoring, health, energy, disaster, agriculture, industry. The IoT network in these scenarios comprises tiny devices, gateways, and cloud platforms. An IoT network is able to keep these fundamental components in transmission under many conditions with lightweight communication protocols taking into account the limited hardware features (memory, processor, energy, etc.) of tiny devices. These lightweight communication protocols affect the network traffic, reliability, bandwidth, and energy consumption of the IoT application. Therefore, determining the most proper communication protocol for application developers emerges as an important engineering problem. This paper presents a straightforward overview of the lightweight communication protocols, technological advancements in application layer for the IoT ecosystem. The survey then analyzes various recent lightweight communication protocols and reviews their strengths and limitations. In addition, the paper explains the experimental comparison of Constrained Applications Protocol (CoAP), Message Queuing Telemetry (MQTT), and WebSocket protocols, more convenient for tiny IoT devices. Finally, we discuss future research directions of communication protocols for IoT.展开更多
This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, pro...This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, proves its correctness and analyses its complexity. Finally, it also verifies the availability and efficiency of the algorithm by illustrating an example protocol with multi-processes.展开更多
文摘BACKGROUND The discovery of induced pluripotent stem cells revolutionized regenerative medicine,providing a source for generating induced pluripotent stem cell-derived mesenchymal stem cells(iMSCs).AIM To evaluate and compare five iMSC differentiation protocols,assessing their efficiency,phenotypic characteristics,and functional properties relative to primary mesenchymal stem cells(MSCs).METHODS Five iMSC differentiation protocols were assessed:SB431542-based differentiation(iMSC1,iMSC3),an iMatrix-free method(iMSC2),growth factor supplementation(iMSC4),and embryoid body formation with retinoic acid(EB-iMSC).iMSC identity was confirmed according to the International Society for Cell&Gene Therapy 2006 criteria,requiring expression of surface markers(CD105,CD73,CD90)and absence of pluripotency markers.Functional assays were conducted to evaluate differentiation potential(osteogenic and adipogenic),proliferation,mitochondrial function,reactive oxygen species,senescence,and migration.RESULTS All iMSC types expressed MSC markers and lacked pluripotency markers.EBiMSC and iMSC2 showed enhanced osteogenesis(runt-related transcription factor 2;P≤0.01 and P≤0.0001,respectively),while adipogenic potential was reduced in iMSC2(Adipsin;P≤0.01)and EB-iMSC(Adipsin and peroxisome proliferatoractivated receptor gamma;P≤0.0001 and P≤0.01,respectively).Proliferation was comparable or superior to bone marrow MSCs,except in iMSC1,with iMSC4 showing the highest rate(MTT assay;P values ranged from 0.01 to 0.001).Despite reduced mitochondrial health in iMSC3 and iMSC4(P≤0.001),reactive oxygen species levels were lower in all iMSCs(P values ranged from 0.001 to 0.0001),and senescence was significantly reduced in all iMSCs with the exception of iMSC1(P values ranged from 0.01 to 0.0001).Migration was most reduced in iMSC4(P≤0.001 at 24 hours and P≤0.0001 at 48 hours).CONCLUSION While all protocols generated functional iMSCs,variations in differentiation,proliferation,and function emphasize the impact of protocol selection.These findings contribute to optimizing iMSC generation for research and clinical applications.
基金Funded by National Natural Science Foundation of China(No.52172007)Jiangsu Science and Technology Innovation Project for Carbon Peaking and Carbon Neutrality(No.BE2022035)。
文摘Focusing on the ultralow expansion functionality of the crystalized glass containing the cordierite crystal phase with the molar composition 20.7MgO·20.7Al_(2)O_(3)·51.6SiO_(2)·7.0TiO_(2),we systematically investigated impacts of thermal treatment protocols on T dependence of coefficients of thermal expansion(CTE).Except for the phase compositions,morphology is identified as another important factor to control the T dependence of CTE.By using X-ray diffraction and scanning electron microscope,various modes of T dependence of CTE for crystallized glasses are ascribed to their different phase compositions and microstructure with finely dispersed nanoparticles.These understanding contributes to the further modification of CTE of the crystalized glass by altering their thermal treatment scenarios.
文摘BACKGROUND Diabetes mellitus has become one of the major pandemics of the 21st century.In this scenario,nursing interventions are essential for improving self-care and quality of life in patients with type 2 diabetes mellitus.Nursing interventions are crucial for managing the disease and preventing complications.AIM To analyse nursing interventions in recent years through a systematic review and meta-analysis and to propose improvements in care plans.METHODS This study conducted a systematic review and meta-analysis of the impact of nursing interventions on quantitative glycaemic variables,such as glycated haemoglobin and fasting plasma glucose.RESULTS After confirming that the combined effect of all studies from the past 5 years positively impacts quantitative variables,a descriptive analysis of the studies with the most significant changes was conducted.Based on this,an improvement in diabetic patient care protocols has been proposed through follow-up plans tailored to the patient’s technological skills.CONCLUSION The combined results obtained and the proposal for improvement developed in this manuscript could help to improve the quality of life of many people around the world.
文摘3D (Three-dimensional) Caco-2 spheroids closely recapitulating in vivo physiological organization of intestinal epithelial cells, provide an excellent in vitro model system to study their pathophysiology and their response to stressful stimuli. The objective of this technical note is to provide optimized in vitro experimental protocols for culturing 3D Caco-2 spheroids and for analyzing their cell growth features. An optimized 3D Caco-2 spheroid culturing technique based on a new configuration of the culture medium is provided A methodological approach to determine the distribution of the cell cycle phases in disaggregated Caco-2 spheroids by using cytofluorimetric analysis is also described. The optimized culturing protocol favors 3D Caco-2 spheroid differentiation process, as evaluated by the number of well-differentiated spheroids with a single hollow lumen. The cytofluorimetric analysis allows rapid collection of cell cycle phase data from high numbers of spheroid samples, thus, permitting to estimate their growth dynamics in a relatively short time. The optimized technical approaches described here can be applied in systematic manner to a variety of research activities utilizing 3D Caco-2 spheroids. Ease of use, time and economic saving advantages deriving from these protocols further highlight their potential.
基金supported by FATALSDrug Project [Progetti di Ricerca@CNR SAC.AD002.173.058] from National Research Council,Italy (to CV)。
文摘The NSC-34 cell line is a widely recognized motor neuron model and various neuronal differentiation protocols have been exploited. Under previously reported experimental conditions, only part of the cells resemble differentiated neurons;however, they do not exhibit extensive and time-prolonged neuritogenesis, and maintain their duplication capacity in culture. The aim of the present work was to facilitate long-term and more homogeneous neuronal differentiation in motor neuron–like NSC-34 cells. We found that the antimitotic drug cytosine arabinoside promoted robust and persistent neuronal differentiation in the entire cell population. Long and interconnecting neuronal processes with abundant growth cones were homogeneously induced and were durable for up to at least 6 weeks in culture. Moreover, cytosine arabinoside was permissive, dispensable, and mostly irreversible in priming NSC-34 cells for neurite initiation and regeneration after mechanical dislodgement. Finally, the expression of the cell proliferation antigen Ki67 was inhibited by cytosine arabinoside, whereas the expression levels of neuronal growth associated protein 43, vimentin, and motor neuron–specific p75, Islet2, homeobox 9 markers were upregulated, as confirmed by western blot and/or confocal immunofluorescence analysis. Overall, these findings support the use of NSC-34 cells as a motor neuron model for properly investigating neurodegenerative mechanisms and prospectively identifying neuroprotective strategies.
文摘Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade.
文摘The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided.
基金The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped improve the quality of this paper. This paper is supported by the National Natural Science Founda- tion of China (No. 61371092), the Doctoral Fund of Ministry of Education of China (No.20130061120062), and the China Postdoc- toral Science Foundation (No. 2014M551184).
文摘Radio frequency identification(RFID) is a new type of non-contact automatic identification technology.Due to its low energy consumption,low cost,and its adaptability to harsh environments,it has been applied to many fields.In the RFID systems,data collision is inevitable when the reader sends a communication request and multiple tags respond with simultaneous data transmission.Data collision is prone to causing problems such as:identification delay,spectrum resource waste,a decreased system throughput rate,etc.Therefore,an efficient,stable anti-collision protocol is crucial for RFID systems.This research analysed the current research into RFID anticollision protocols and summarised means for its improvement through the mechanism of implementation of different types anticollision protocols.Finally,a new direction is proposed for the future development of RFID anti-collision protocol systems.
文摘There is a lack of appropriate guidelines for realistic user traces, mobility models, routing protocols, considerations of real-life challenges, etc. for general-purpose mobile ad hoc networks (MANET). In this paper, four laptops are used in an open field environment in four scenarios to evaluate the performances of Internet control message protocol (ICMP) based ping and transmission control protocol (TCP) based streaming video applications using optimised link state routing (OLSR) implementation in an IEEE 802.11g wireless network. Corresponding simulations are developed in Network Simulator ns-2 by setting simulation parameters according to the real experiments. Difficulties faced to regenerate real-life scenarios have been discussed and the gaps between reality and simulation are identified. A setup guideline to produce realistic simulation results has been established.
基金This work is supported by the Hainan Provincial Natural Science Foundation of China(618QN219)the National Natural Science Foundation of China(Grant No.61501447)the General Project of Scientific Research of Liaoning Provincial Department of Education(LYB201616).
文摘As the main communication mediums in industrial control networks,industrial communication protocols are always vulnerable to extreme exploitations,and it is very difficult to take protective measures due to their serious privacy.Based on the SDN(Software Defined Network)technology,this paper proposes a novel event-based anomaly detection approach to identify misbehaviors using non-public industrial communication protocols,and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems.Furthermore,aiming at the unknown protocol specification and message format,this approach first restructures the industrial communication sessions and merges the payloads from industrial communication packets.After that,the feature selection and event sequence extraction can be carried out by using the N-gram model and K-means algorithm.Based on the obtained event sequences,this approach finally trains an event-based HMM(Hidden Markov Model)to identify aberrant industrial communication behaviors.Experimental results clearly show that the proposed approach has obvious advantages of classification accuracy and detection efficiency.
基金The authors would like to thank DST(SERB),Government of India for grant No.EEQ/2018/000888The work was also supported by the Archimedes Foundation under the Dora plus Grant 11-15/OO/11476We also acknowledge financial support to UoH-IoE by MHRD(F11/9/2019-U3(A)).
文摘The Internet of Things(IoT)has been growing over the past few years due to its flexibility and ease of use in real-time applications.The IoT's foremost task is ensuring that there is proper communication among different types of applications and devices,and that the application layer protocols fulfill this necessity.However,as the number of applications grows,it is necessary to modify or enhance the application layer protocols according to specific IoT applications,allowing specific issues to be addressed,such as dynamic adaption to network conditions and interoperability.Recently,several IoT application layer protocols have been enhanced and modified according to application requirements.However,no existing survey articles focus on these protocols.In this article,we survey traditional and recent advances in IoT application layer protocols,as well as relevant real-time applications and their adapted application layer protocols for improving performance.As changing the nature of protocols for each application is unrealistic,machine learning offers means of making protocols intelligent and is able to adapt dynamically.In this context,we focus on providing open challenges to drive IoT application layer protocols in such a direction.
文摘Recently, location-based routings in wireless sensor networks (WSNs) are attracting a lot of interest in the research community, especially because of its scalability. In location-based routing, the network size is scalable without increasing the signalling overhead as routing decisions are inherently localized. Here, each node is aware of its position in the network through some positioning device like GPS and uses this information in the routing mechanism. In this paper, we first discuss the basics of WSNs including the architecture of the network, energy consumption for the components of a typical sensor node, and draw a detailed picture of classification of location-based routing protocols. Then, we present a systematic and comprehensive taxonomy of location-based routing protocols, mostly for sensor networks. All the schemes are subsequently discussed in depth. Finally, we conclude the paper with some insights on potential research directions for location-based routing in WSNs.
基金Supported by National Natural Science Foundation of China(6 98730 2 7)
文摘Most knowledgeable people agree that networking and routing technologies have been around about 25 years. Routing is simultaneously the most complicated function of a network and the most important. It is of the same kind that more than 70% of computer application fields are MIS applications. So the challenge in building and using a MIS in the network is developing the means to find, access, and communicate large databases or multi databases systems. Because general databases are not time continuous, in fact, they can not be streaming, so we can't obtain reliable and secure quality of service by deleting some unimportant datagrams in the databases transmission. In this article, we will discuss which kind of routing protocol is the best type for large databases or multi databases systems transmission in the networks.
文摘The performance of ALOHA, Non-Persistent CSMA protocols and their slotted versions in Packet Radio Network is analyzed in consideration of the time of propagation delay, the time of radio transformation from receiving state to transmitting state, and the time for the radio to sense the carrier. The analysis shows that these parameters are the main factors deteriorating the performance of the protocols, especially for CSMA. The multichannel mode efficiently decreases the effects of these factors and the system capacity is changeable conveniently. Comparing curves and some simulation results are given.
基金supported by the National Natural Science Foundation of China (Grant No 60525303)the Natural Science Foundation of Hebei Province,China (Grant No 2006000270)
文摘Nonlinear consensus protocols for dynamic directed networks of multi-agent systems with fixed and switching topologies are investigated separately in this paper. Based on the centre manifold reduction technique, nonlinear consensus protocols are presented. We prove that a group of agents can reach a β-consensus, the value of which is the group decision value varying from the minimum and the maximum values of the initial states of the agents. Moreover, we derive the conditions to guarantee that all the agents reach a β-consensus on a desired group decision value. Finally, a simulation study concerning the vertical alignment manoeuvere of a team of unmanned air vehicles is performed. Simulation results show that the nonlinear consensus protocols proposed are more effective than the linear protocols for the formation control of the agents and they are an improvement over existing protocols.
文摘Brain computer interface(BCI)systems permit individuals with motor disorders to utilize their thoughts as a mean to control external devices.BCI is a promising interdisciplinary field that gained the attention of many researchers.Yet,the development of BCI systems is facing several challenges,such as network lifetime.The Medium Access Control(MAC)Protocol is the bottle-neck of network reliability.There are many MAC protocols that can be utilized for dependable transmission in BCI applications by altering their control parameters.However,modifying these parameters is another source of concern due to the scarcity in knowledge about the effect of modification.Also,there is still no instrument that can receive and actualize these parameters on transmitters embedded inside the cerebrum.In this paper,we propose two novel MAC protocols using passive UHF-RFID,the proposed protocols provide efficient and reliable communication between the transmitters and the receiver.The UHF-RFID transmitters were used because they are energy efficient which makes them compatible with BCI application.The first protocol is designed for the EEG signals.While the second protocol was designed for the ECoG signals.The evaluation results showed the validity of the proposed protocols in terms of network performance.The results also proved that the protocols are suitable and reliable for designing efficient BCI applications.
基金Supported by the National Natural Science Foundation of China(61332019)
文摘Relay attack is one of the most threatening challenges against radio frequency identification(RFID) now. Distance bounding protocols have been introduced to thwart relay attacks. They form a family of challenge-response authentication protocols and confirm the round-trip time at the Rapid Bit Exchange phase. They enable a reader to authenticate and to establish an upper bound on the physical distance to an entrusted tag. We design an effective attack against a family of such protocols to launch the spoofing attacks within effective distance successfully, which demonstrates that existing protocols cannot eliminate such attacks completely. The thesis proposes a new program with time- stamping verification to correct the defect and verify the effectiveness.
文摘The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols. In today's technology ecosystem, IoT interacts with many application areas such as smart city, smart building, security, traffic, remote monitoring, health, energy, disaster, agriculture, industry. The IoT network in these scenarios comprises tiny devices, gateways, and cloud platforms. An IoT network is able to keep these fundamental components in transmission under many conditions with lightweight communication protocols taking into account the limited hardware features (memory, processor, energy, etc.) of tiny devices. These lightweight communication protocols affect the network traffic, reliability, bandwidth, and energy consumption of the IoT application. Therefore, determining the most proper communication protocol for application developers emerges as an important engineering problem. This paper presents a straightforward overview of the lightweight communication protocols, technological advancements in application layer for the IoT ecosystem. The survey then analyzes various recent lightweight communication protocols and reviews their strengths and limitations. In addition, the paper explains the experimental comparison of Constrained Applications Protocol (CoAP), Message Queuing Telemetry (MQTT), and WebSocket protocols, more convenient for tiny IoT devices. Finally, we discuss future research directions of communication protocols for IoT.
基金National Natural Science Foundation of China and NSF of Hubei Province.
文摘This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, proves its correctness and analyses its complexity. Finally, it also verifies the availability and efficiency of the algorithm by illustrating an example protocol with multi-processes.