In the fight against cancer, controlled drug delivery systems have emerged to enhance the therapeutic efficacy and safety of anti-cancer drugs. Among these systems, mesoporous silica nanoparticles(MSNs) with a functio...In the fight against cancer, controlled drug delivery systems have emerged to enhance the therapeutic efficacy and safety of anti-cancer drugs. Among these systems, mesoporous silica nanoparticles(MSNs) with a functional surface possess obvious advantages and were thus rapidly developed for cancer treatment. Many stimuli-responsive materials, such as nanoparticles, polymers, and inorganic materials, have been applied as caps and gatekeepers to control drug release from MSNs. This review presents an overview of the recent progress in the production of pH-responsive MSNs based on the pH gradient between normal tissues and the tumor microenvironment. Four main categories of gatekeepers can respond to acidic conditions. These categories will be described in detail.展开更多
Demand response has been intensively studied in recent years. It can motivate customers to change their consumption patterns according to the dynamic(time-varying) electricity price, which is considered to be the most...Demand response has been intensively studied in recent years. It can motivate customers to change their consumption patterns according to the dynamic(time-varying) electricity price, which is considered to be the most cost-effective and reliable solution for smoothing the demand curve. However, many existing schemes, based on users' demand request in each period, require users to consume their requested electricity exactly, which sometimes causes inconvenience and losses to the utility, because customers cannot always be able to consume the accurate electricity demand due to various personal reasons. In this paper, we tackle this problem in a novel approach. Instead of charging after consumption, we adopt the prepayment mechanism to implement power request. Furthermore, we propose a trading market running by the control center to cope with the users' dynamic demand. It is noteworthy that both users' original demand and trading records are protected against potential adversaries including the curious control center. Through the numerical simulation, we demonstrate that our scheme is highly efficient in both computation and communication.展开更多
Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the existence of other principals and fulfill some data negotiation such as session keys. Most of the e...Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the existence of other principals and fulfill some data negotiation such as session keys. Most of the existing analysis methods, which either adopt theorem proving techniques such as state exploration or logic reasoning techniques such as authentication logic, face the conflicts between analysis power and operability. To solve the problem, a new efficient method is proposed that provides SSM semantics-based definition of secrecy and authentication goals and applies authentication logic as fundamental analysis techniques, in which secrecy analysis is split into two parts: Explicit-lnformaUon-Leakage and Implicit-Information-Leakage, and correspondence analysis is concluded as the analysis of the existence relationship of Strands and the agreement of Strand pa- rameters. This new method owns both the power of the Strand Space Model and concision of authentication logic.展开更多
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor...Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.展开更多
团队是动态不可预测性环境下协作问题求解的有效方式,联合意图是团队联合求解的关键.因此,主体在团队活动中如何采用言语动作形成、维护、解除联合意图,是一个值得研究的重要问题.旨在设计一种基于主体通信语言FIPA(foundation for inte...团队是动态不可预测性环境下协作问题求解的有效方式,联合意图是团队联合求解的关键.因此,主体在团队活动中如何采用言语动作形成、维护、解除联合意图,是一个值得研究的重要问题.旨在设计一种基于主体通信语言FIPA(foundation for intelligent physical Agent) ACL(Agent communication language)的多主体团队交互协议.首先,分析了现有FIPA ACL支持团队联合求解的充分性问题.在概念上明确区分了联合请求与委托请求,指出委托请求言语动作不能充分支持团队协作.并扩展定义了联合请求,讨论了相关定理.然后,基于联合请求动作,提出一种主体团队交互协议,并给出了协议的形式化语义,最后讨论了协议的实际应用.区别于现有的基本动作请求协议、合同网协议以及拍卖协议,团队交互协议描述了另一类主体交互模式,对主体交互模块的设计具有指导意义.展开更多
基金supported by the Chinese Natural Science Foundation Project (Grant No. 30970784 and 81171455)a National Distinguished Young Scholars Grant (Grant No. 31225009) from the National Natural Science Foundation of China+5 种基金the National Key Basic Research Program of China (Grant No. 2009CB930200)the Chinese Academy of Sciences (CAS) ‘Hundred Talents Program’ (Grant No. 07165111ZX)the CAS Knowledge Innovation Program, and the State HighTech Development Plan (Grant No. 2012AA020804)the ‘Strategic Priority Research Program’ of the Chinese Academy of Sciences (Grant No. XDA09030301)NIH/NIMHD 8 G12 MD007597USAMRMC W81XWH-10-1-0767 grants
文摘In the fight against cancer, controlled drug delivery systems have emerged to enhance the therapeutic efficacy and safety of anti-cancer drugs. Among these systems, mesoporous silica nanoparticles(MSNs) with a functional surface possess obvious advantages and were thus rapidly developed for cancer treatment. Many stimuli-responsive materials, such as nanoparticles, polymers, and inorganic materials, have been applied as caps and gatekeepers to control drug release from MSNs. This review presents an overview of the recent progress in the production of pH-responsive MSNs based on the pH gradient between normal tissues and the tumor microenvironment. Four main categories of gatekeepers can respond to acidic conditions. These categories will be described in detail.
基金supported by the National Key Research and Development Plan of China under Grant No.2016YFB0800301the Fund of Science and Technology on Communication Networks Laboratory under Grant No.KX162600024Youth Innovation Promotion Association CAS under Grant No.2016394
文摘Demand response has been intensively studied in recent years. It can motivate customers to change their consumption patterns according to the dynamic(time-varying) electricity price, which is considered to be the most cost-effective and reliable solution for smoothing the demand curve. However, many existing schemes, based on users' demand request in each period, require users to consume their requested electricity exactly, which sometimes causes inconvenience and losses to the utility, because customers cannot always be able to consume the accurate electricity demand due to various personal reasons. In this paper, we tackle this problem in a novel approach. Instead of charging after consumption, we adopt the prepayment mechanism to implement power request. Furthermore, we propose a trading market running by the control center to cope with the users' dynamic demand. It is noteworthy that both users' original demand and trading records are protected against potential adversaries including the curious control center. Through the numerical simulation, we demonstrate that our scheme is highly efficient in both computation and communication.
基金National Natural Science Foundation of China (Grant Nos. 90412014 and 90604004)Jiangsu Provincial Key Laboratory of Network and Information Security (Grant No. BM2003201)Jiangsu Provincial High-Tech Research Program (Grant No. BG2004036)
文摘Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the existence of other principals and fulfill some data negotiation such as session keys. Most of the existing analysis methods, which either adopt theorem proving techniques such as state exploration or logic reasoning techniques such as authentication logic, face the conflicts between analysis power and operability. To solve the problem, a new efficient method is proposed that provides SSM semantics-based definition of secrecy and authentication goals and applies authentication logic as fundamental analysis techniques, in which secrecy analysis is split into two parts: Explicit-lnformaUon-Leakage and Implicit-Information-Leakage, and correspondence analysis is concluded as the analysis of the existence relationship of Strands and the agreement of Strand pa- rameters. This new method owns both the power of the Strand Space Model and concision of authentication logic.
文摘Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.
文摘团队是动态不可预测性环境下协作问题求解的有效方式,联合意图是团队联合求解的关键.因此,主体在团队活动中如何采用言语动作形成、维护、解除联合意图,是一个值得研究的重要问题.旨在设计一种基于主体通信语言FIPA(foundation for intelligent physical Agent) ACL(Agent communication language)的多主体团队交互协议.首先,分析了现有FIPA ACL支持团队联合求解的充分性问题.在概念上明确区分了联合请求与委托请求,指出委托请求言语动作不能充分支持团队协作.并扩展定义了联合请求,讨论了相关定理.然后,基于联合请求动作,提出一种主体团队交互协议,并给出了协议的形式化语义,最后讨论了协议的实际应用.区别于现有的基本动作请求协议、合同网协议以及拍卖协议,团队交互协议描述了另一类主体交互模式,对主体交互模块的设计具有指导意义.