The design and evaluation of accelerated transmission (AT) systems in peer-to-peer networks for data transmission are introduced. Based on transfer control protocol (TCP) and peer-to-peer (P2P) substrate network...The design and evaluation of accelerated transmission (AT) systems in peer-to-peer networks for data transmission are introduced. Based on transfer control protocol (TCP) and peer-to-peer (P2P) substrate networks, AT can select peers of high performance quality, monitor the transfer status of each peer, dynamically adjust the transmission velocity and react to connection degradation with high accuracy and low overhead. The system performance is evaluated by simulations, and the interrelationship between network flow, bandwidth utilities and network throughput is analyzed. Owing to the collaborative operation of neighboring peers, AT accelerates the process of data transmission and the collective network performance is much more satisfactory.展开更多
In the traditional Intemet Protocol (IP) architecture, there is an overload of IP sermntic problems. Existing solutions focused mainly on the infrastructure for the fixed network, and there is a lack of support for ...In the traditional Intemet Protocol (IP) architecture, there is an overload of IP sermntic problems. Existing solutions focused mainly on the infrastructure for the fixed network, and there is a lack of support for Mobile Ad Hoc Networks (MANETs). To improve scalability, a routing protocol for MANETs is presented based on a locator named Tree-structure Locator Distance Vector (TLDV). The hard core of this routing method is the identifier/locator split by the Distributed Hash Table (DHT) method, which provides a scalable routing service. The node locator indicates its relative location in the network and should be updated whenever topology changes, kocator space ks organized as a tree-structure, and the basic routing operation of the TLDV protocol is presented. TLDV protocol is compared to some classical routing protocols for MANETs on the NS2 platform Results show that TLDV has better scalability. Key words:展开更多
Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHo...Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHorne -Zeilinger(GHZ) states.This protocol is robust against eavesdropping and could be used for the circumstance of many parties.展开更多
Background Cardiac rehabilitation (CR) protocols have diversified to include home-based cardiac tele-rehabilitation (HBCTR) as an alternative to hospital-based or center-based CR. To adopt the use of home-based ca...Background Cardiac rehabilitation (CR) protocols have diversified to include home-based cardiac tele-rehabilitation (HBCTR) as an alternative to hospital-based or center-based CR. To adopt the use of home-based cardiac tele-rehabilitation, it is necessary to assess cardiac patients' attitudes towards acceptance of such e-health technology, especially in China where knowledge of such technology is deficient. Methods Interviews were conducted in the First Affiliated Hospital of Shantou University Medical College, Shantou, China. After percutaneous coronary interventional (PCI) surgery, patients completed the survey. Results Among the 150 patients, only 13% had ever heard of HBCTR. After an introduction of our HBCTR program, 60% of patients were willing to participate in the program. From our multivariate analysis of questionnaire data, age (OR: 0.92, 95% CI: 0.864).98; P = 0.007), average family monthly income (OR: 0.13, 95% CI: 0.05-0.341 P 〈 0.001), education level (OR: 0.24, 95% CI: 0.10-0.59; P = 0.002) and physical exercise time (OR: 0.19, 95% CI: 0.06-0.56; P = 0.003) were independent predictors for acceptance of HBCTR. From the reasons for participation, patients selected: enhanced safety and independ ence (28.3%), ability to self-monitor physical conditions daily (25 A%), and having automatic and emergency alert (23.1%). Reasons for refusal were: too cumbersome operation (34.3%) and unnecessary protocol (19.4%). Conclusions Most patients lacked knowledge about HBCTR but volunteered to participate after they have learned about the program. Several personal and life-style factors influenced their acceptance of the program. These indicate that both improvement of technology and better understanding of the program will enhance active participation.展开更多
Background To report quality control methods and baseline reproducibility data of the ultrasound measurements of carotid artery intima-media thickness in the project of Establishment of an Integrated System for Corona...Background To report quality control methods and baseline reproducibility data of the ultrasound measurements of carotid artery intima-media thickness in the project of Establishment of an Integrated System for Coronary Heart Disease Prevention and Treatment. Methods Standard ultrasound scanning and measuring protocols were established by the study group. All sonographers and readers were trained by the carotid ultrasound core lab and all digital ultrasound images were centrally read. Ten subjects were scanned twice (with 1 week interval) by 2 sonographers independently and images were read by a single reader to evaluate the sonographer variability. Twenty subjects' images were read twice (with 1 week interval) by a single reader to assess the reader variability and the reproducibility of IMT measured at different carotid segments. Results The intraclass correlation (ICC) of intra- and inter-sonographer and intra- reader for mean IMT measurements was 0.99, 0.98 and 0.97 respectively; while for max IMT, it was 0.97, 0.99 and 0.95 respectively. Among different carotid segments and sites, ICC for mean 1MT measurements of common carotid (CCA), carotid artery bulb (Bulb), internal carotid artery (ICA), overall near wall and overall far wall was 0.97, 0.99, 0.89, 0.93 and 0.98 respectively. Conclusion The reproducibility of IMT measurements according to our protocol is acceptable, although better reproducibility is found when measuring the mean IMT than max IMT, CCA and Bulb IMT than ICA IMT, and far wall IMT than near wall IMT.展开更多
The control and data planes are decoupled in software-defined networking(SDN),which enables both planes to evolve independently,and brings about many advantages such as high flexibility,programmability,and rapid imple...The control and data planes are decoupled in software-defined networking(SDN),which enables both planes to evolve independently,and brings about many advantages such as high flexibility,programmability,and rapid implementation of new network protocols.However,in order to improve the scalability of the control plane at present,some control functionalities are added to the data plane,which is probably to impact on the generality of the data plane.The key challenge of adding control functionalities to the data plane is to strike a careful balance between the generality of the data plane and the scalability of the control plane.We propose some basic principles that both control and data planes should comply with,based on the evolutionary trend of SDN.Moreover,we take two approaches for reference according to the principles,viewed from the control messages in OpenFlow-based SDN.Our evaluations demonstrate that the approaches can maintain the generality of the data plane and improve the scalability of the control plane.展开更多
Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collabo...Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical proved to be secure even with a compromised arbitrator. messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator.展开更多
Social capital has been recognised as a factor affecting sustainable development in every discipline. A network or a partnership is identified as a "structural" form of social capital and a tool to empower participa...Social capital has been recognised as a factor affecting sustainable development in every discipline. A network or a partnership is identified as a "structural" form of social capital and a tool to empower participants in the networks. There is a belief that social networks can be initiated or created at every level of social capital, from micro to macro. However, the concept of community is the key component of social capital, creating both physical ties (geographical locality) and normative behaviours (sense of belonging). Therefore, this study is intended to enhance social capital at the community or micro-level, in order to sustain tourism development in those areas, and networking is initiated to enhance social capital. Participatory Action Research (PAR) was applied to tourism development in Kon Kaen Province. Tools and techniques used during this study included: observations, preliminary meetings, community meetings, tourism audits, workshops, and network meetings. Eleven districts in Khon Kaen were actively involved in the planning process.展开更多
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmissio...A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmission connections can switch smoothly among the multiple proxies by maint aining a coherent connection context.The mechanism is transparent to application programs and can support th e building of VPN.With the cooperation of some other security components,the mechanism guarantees the reso urce availability and reliability of the end system against some attacks to the specific ports or hosts.展开更多
With the increasing importance of cloud services worldwide, the cloud infrastructure and platform management has become critical for cloud service providers. In this paper, a novel architecture of intelligent server m...With the increasing importance of cloud services worldwide, the cloud infrastructure and platform management has become critical for cloud service providers. In this paper, a novel architecture of intelligent server management framework is proposed. In this framework, the communication layer is based on the Extensible Messaging and Presence Protocol (XMPP), which was developed for instant messaging and has been proven to be highly mature and suitable for mobile and large scalable deployment due to its extensibility and efficiency. The proposed architecture can simplify server management and increase flexibility and scalability when managing hundreds of thousands of servers in the cloud era.展开更多
By reviewing the current status and progress made by China and EU in ocean related fields in the changing world,this paper tries to identify the needs,characteristics and strategic importance of the China-EU Blue Part...By reviewing the current status and progress made by China and EU in ocean related fields in the changing world,this paper tries to identify the needs,characteristics and strategic importance of the China-EU Blue Partnership.The Blue Partnership proposed by the Chinese government is open and inclusive.It values mutual beneficial,and calls for broader cooperation.China-EU Blue Partnership is not only related to the development of both China and EU,but also will significantly contribute to the implementation of the UN 2030 Agenda for Sustainable Development.Some suggestions on the further development of the Partnership are proposed to facilitate the implementation.展开更多
Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In...Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack.展开更多
We propose a deterministic quantum secure direct two check photon sequences are used to check the securities of the communication protocol by using dense coding. The channels between the message sender and the receive...We propose a deterministic quantum secure direct two check photon sequences are used to check the securities of the communication protocol by using dense coding. The channels between the message sender and the receiver. The continuous variable operations instead of the usual discrete unitary operations are performed on the travel photons so that the security of the present protocol can be enhanced. Therefore some specific attacks such as denial-of-service attack, intercept-measure-resend attack and invisible photon attack can be prevented in ideal quantum channel. In addition, the scheme is still secure in noise channel. Furthurmore, this protocol has the advantage of high capacity and can be realized in the experiment.展开更多
基金The National Natural Science Foundation of China(No60573133)the National Basic Research Program of China (973Program) (No2003CB314801)
文摘The design and evaluation of accelerated transmission (AT) systems in peer-to-peer networks for data transmission are introduced. Based on transfer control protocol (TCP) and peer-to-peer (P2P) substrate networks, AT can select peers of high performance quality, monitor the transfer status of each peer, dynamically adjust the transmission velocity and react to connection degradation with high accuracy and low overhead. The system performance is evaluated by simulations, and the interrelationship between network flow, bandwidth utilities and network throughput is analyzed. Owing to the collaborative operation of neighboring peers, AT accelerates the process of data transmission and the collective network performance is much more satisfactory.
基金Acknowledgements This work was supported by the Hi-Tech Research and Development Program of China under Grant No.2007AA01Z407 the Co-Funding Project of Beijing Municipal education Commission under Grant No.JD100060630+3 种基金 National Foundation Research Project the National Natural Science Foundation Project under Grant No. 61170295 the Project of Aeronautical Science Foundation of China under Caant No.2011ZC51024 and the Fundamental Research Funds for the Central Universities.
文摘In the traditional Intemet Protocol (IP) architecture, there is an overload of IP sermntic problems. Existing solutions focused mainly on the infrastructure for the fixed network, and there is a lack of support for Mobile Ad Hoc Networks (MANETs). To improve scalability, a routing protocol for MANETs is presented based on a locator named Tree-structure Locator Distance Vector (TLDV). The hard core of this routing method is the identifier/locator split by the Distributed Hash Table (DHT) method, which provides a scalable routing service. The node locator indicates its relative location in the network and should be updated whenever topology changes, kocator space ks organized as a tree-structure, and the basic routing operation of the TLDV protocol is presented. TLDV protocol is compared to some classical routing protocols for MANETs on the NS2 platform Results show that TLDV has better scalability. Key words:
基金Supported by National Natural Science Foundation of China under Grant Nos.60878059,11004033Natural Science Foundation of Fujian Province under Grant No.2010J01002
文摘Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHorne -Zeilinger(GHZ) states.This protocol is robust against eavesdropping and could be used for the circumstance of many parties.
文摘Background Cardiac rehabilitation (CR) protocols have diversified to include home-based cardiac tele-rehabilitation (HBCTR) as an alternative to hospital-based or center-based CR. To adopt the use of home-based cardiac tele-rehabilitation, it is necessary to assess cardiac patients' attitudes towards acceptance of such e-health technology, especially in China where knowledge of such technology is deficient. Methods Interviews were conducted in the First Affiliated Hospital of Shantou University Medical College, Shantou, China. After percutaneous coronary interventional (PCI) surgery, patients completed the survey. Results Among the 150 patients, only 13% had ever heard of HBCTR. After an introduction of our HBCTR program, 60% of patients were willing to participate in the program. From our multivariate analysis of questionnaire data, age (OR: 0.92, 95% CI: 0.864).98; P = 0.007), average family monthly income (OR: 0.13, 95% CI: 0.05-0.341 P 〈 0.001), education level (OR: 0.24, 95% CI: 0.10-0.59; P = 0.002) and physical exercise time (OR: 0.19, 95% CI: 0.06-0.56; P = 0.003) were independent predictors for acceptance of HBCTR. From the reasons for participation, patients selected: enhanced safety and independ ence (28.3%), ability to self-monitor physical conditions daily (25 A%), and having automatic and emergency alert (23.1%). Reasons for refusal were: too cumbersome operation (34.3%) and unnecessary protocol (19.4%). Conclusions Most patients lacked knowledge about HBCTR but volunteered to participate after they have learned about the program. Several personal and life-style factors influenced their acceptance of the program. These indicate that both improvement of technology and better understanding of the program will enhance active participation.
文摘Background To report quality control methods and baseline reproducibility data of the ultrasound measurements of carotid artery intima-media thickness in the project of Establishment of an Integrated System for Coronary Heart Disease Prevention and Treatment. Methods Standard ultrasound scanning and measuring protocols were established by the study group. All sonographers and readers were trained by the carotid ultrasound core lab and all digital ultrasound images were centrally read. Ten subjects were scanned twice (with 1 week interval) by 2 sonographers independently and images were read by a single reader to evaluate the sonographer variability. Twenty subjects' images were read twice (with 1 week interval) by a single reader to assess the reader variability and the reproducibility of IMT measured at different carotid segments. Results The intraclass correlation (ICC) of intra- and inter-sonographer and intra- reader for mean IMT measurements was 0.99, 0.98 and 0.97 respectively; while for max IMT, it was 0.97, 0.99 and 0.95 respectively. Among different carotid segments and sites, ICC for mean 1MT measurements of common carotid (CCA), carotid artery bulb (Bulb), internal carotid artery (ICA), overall near wall and overall far wall was 0.97, 0.99, 0.89, 0.93 and 0.98 respectively. Conclusion The reproducibility of IMT measurements according to our protocol is acceptable, although better reproducibility is found when measuring the mean IMT than max IMT, CCA and Bulb IMT than ICA IMT, and far wall IMT than near wall IMT.
文摘The control and data planes are decoupled in software-defined networking(SDN),which enables both planes to evolve independently,and brings about many advantages such as high flexibility,programmability,and rapid implementation of new network protocols.However,in order to improve the scalability of the control plane at present,some control functionalities are added to the data plane,which is probably to impact on the generality of the data plane.The key challenge of adding control functionalities to the data plane is to strike a careful balance between the generality of the data plane and the scalability of the control plane.We propose some basic principles that both control and data planes should comply with,based on the evolutionary trend of SDN.Moreover,we take two approaches for reference according to the principles,viewed from the control messages in OpenFlow-based SDN.Our evaluations demonstrate that the approaches can maintain the generality of the data plane and improve the scalability of the control plane.
基金Supported by the National High-Tech Research,Development Plan of China under Grant Nos.2006AA01Z440,2009AA012441,2009AA012437National Basic Research Program of China (973 Program 2007CB311100)+4 种基金the National Natural Science Foundation of China under Grant Nos.60873191 and 60821001Specialized Research Fund for the Doctoral Program of Higher Education under Grant Nos.20091103120014,20090005110010Beijing Natural Science Foundation under Grant Nos.1093015,1102004the Scientific Research Common Program of Beijing Municipal Commission of Education under Grant No.KM200810005004the ISN Open Foundation
文摘Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical proved to be secure even with a compromised arbitrator. messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator.
文摘Social capital has been recognised as a factor affecting sustainable development in every discipline. A network or a partnership is identified as a "structural" form of social capital and a tool to empower participants in the networks. There is a belief that social networks can be initiated or created at every level of social capital, from micro to macro. However, the concept of community is the key component of social capital, creating both physical ties (geographical locality) and normative behaviours (sense of belonging). Therefore, this study is intended to enhance social capital at the community or micro-level, in order to sustain tourism development in those areas, and networking is initiated to enhance social capital. Participatory Action Research (PAR) was applied to tourism development in Kon Kaen Province. Tools and techniques used during this study included: observations, preliminary meetings, community meetings, tourism audits, workshops, and network meetings. Eleven districts in Khon Kaen were actively involved in the planning process.
基金National Natural Science Foundation ofChina (No.90104029)
文摘A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmission connections can switch smoothly among the multiple proxies by maint aining a coherent connection context.The mechanism is transparent to application programs and can support th e building of VPN.With the cooperation of some other security components,the mechanism guarantees the reso urce availability and reliability of the end system against some attacks to the specific ports or hosts.
文摘With the increasing importance of cloud services worldwide, the cloud infrastructure and platform management has become critical for cloud service providers. In this paper, a novel architecture of intelligent server management framework is proposed. In this framework, the communication layer is based on the Extensible Messaging and Presence Protocol (XMPP), which was developed for instant messaging and has been proven to be highly mature and suitable for mobile and large scalable deployment due to its extensibility and efficiency. The proposed architecture can simplify server management and increase flexibility and scalability when managing hundreds of thousands of servers in the cloud era.
基金supported by Project of study of the blue economic passage under the framework of global ocean governance(2019)at National Marine Data and Information ServiceSocial Science Foundation Project(18JZD059)supported by the Ministry of Education,China.
文摘By reviewing the current status and progress made by China and EU in ocean related fields in the changing world,this paper tries to identify the needs,characteristics and strategic importance of the China-EU Blue Partnership.The Blue Partnership proposed by the Chinese government is open and inclusive.It values mutual beneficial,and calls for broader cooperation.China-EU Blue Partnership is not only related to the development of both China and EU,but also will significantly contribute to the implementation of the UN 2030 Agenda for Sustainable Development.Some suggestions on the further development of the Partnership are proposed to facilitate the implementation.
基金Supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD)the National Natural Science Foundation of China (No.60903181)Nanjing University of Posts and Telecommunications Funds (No.NY208072)
文摘Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack.
基金supported by the Natural Science Research Programme of the Education Department of Anhui Province under Grant No. KJ2009B039Zthe Municipal Level Research Project from Lu'an City directive entrusted to West Anhui University under Grant No. 2008lw004
文摘We propose a deterministic quantum secure direct two check photon sequences are used to check the securities of the communication protocol by using dense coding. The channels between the message sender and the receiver. The continuous variable operations instead of the usual discrete unitary operations are performed on the travel photons so that the security of the present protocol can be enhanced. Therefore some specific attacks such as denial-of-service attack, intercept-measure-resend attack and invisible photon attack can be prevented in ideal quantum channel. In addition, the scheme is still secure in noise channel. Furthurmore, this protocol has the advantage of high capacity and can be realized in the experiment.