Objective The aim of the study was to investigate the effects of Chinese herbal formula Weichang’an(WCA)on the proliferation and mitochondria-mediated apoptosis of human gastric cancer cells.Methods Cell Counting Kit...Objective The aim of the study was to investigate the effects of Chinese herbal formula Weichang’an(WCA)on the proliferation and mitochondria-mediated apoptosis of human gastric cancer cells.Methods Cell Counting Kit-8(CCK8)was used to evaluate the antiproliferative activity ofWCA on MKN45 cells;Giemsa staining was used to investigate cell colony formation;flow cytometry was used to analyze cell cycle,apoptosis rate,and caspases activation;and Hoechst staining was used to analyze the morphology of cell nuclei.The mitochondrial membrane potential was analyzed by both flow cytometric measurements and fluorescence microscopy.Western blot was used to analyze the protein levels of pro-caspase-3,Bcl-2,Bax,and Bcl-X.MKN45 cells were subcutaneously injected into the right forelimb of 16 nude mice to establish the tumor xenograft model,and a total of 12 nude mouse tumor xenograft models were successfully created.The nude mice were divided into the control group and the WCA-treated group.The two groups received normal saline and WCA treatment at 35.49 g/kg by a single daily oral gavage for 21 days.The body weight and tumor size of the nude mice were measured twice a week.The ultrastructural changes of subcutaneous tumors were observed by a transmission electron microscope.Results WCA can suppress cell proliferation and colony formation.It can also induce changes in the mitochondrial membrane potential and increase the activities of caspases-3,caspases-8,and caspases-9 in MKN45 cells.WCA induced S-phase arrest and apoptosis in MKN45 cells,and decreased the expression levels of antiapoptotic proteins Bcl-2 and Bcl-X in MKN45 cells,while increasing the expression levels of the proapoptotic proteins Bax and pro-caspase-3 compared with the control group.WCA inhibited the growth of a xenografted MKN45 tumor in nude mice,and the protein levels of Bax and pro-caspase-3 were significantly increased,while Bcl-X and Bcl-2 were reduced compared with the control group.The differences are statistically significant(p<0.05).Conclusion WCA could suppress the proliferation of gastric cancer cells via mitochondrial apoptosis.展开更多
The in-situ instrumentation technique for measuring mercury and itsspeciation downstream a utility 100 MW pulverized coal (PC) fired boiler system was developed andconducted by the use of the Ontario hydro method (OHM...The in-situ instrumentation technique for measuring mercury and itsspeciation downstream a utility 100 MW pulverized coal (PC) fired boiler system was developed andconducted by the use of the Ontario hydro method (OHM) consistent with American standard test methodtogether with the semi-continuous emissions monitoring (SCEM) system as well as a mobile laboratoryfor mercury monitoring. The mercury and its speciation concentrations including participate mercuryat three locations of before air preheater, before electrostatic precipitator (ESP) and after ESPwere measured using the OHM and SCEM methods under normal operation conditions of the boiler systemas a result of firing a bituminous coal. The vapor-phase total mercury Hg(VT) concentration declinedwith the decrease of flue gas temperature because of mercury species transformation from oxidizedmercury to particulate mercury as the flue gas moved downstream from the air preheater to the ESPand after the ESP. A good agreement for Hg°, Hg^(2+) and Hg( VT) was obtained between the twomethods in the ash-free area. But in the dense particle-laden flue gas area, there appeared to be abig bias for mercury speciation owing to dust cake formed in the filter of OHM sampling probe. Theparticulateaffinity to the flue gas mercury and the impacts of sampling condition to accuracy ofmeasure were discussed.展开更多
Objective] This study was conducted to evaluate the product quality and safety of Peristrophe roxburghiana_ col ected from different places in Hechi City, northwest of Gunagxi, so as to provide basic data for further ...Objective] This study was conducted to evaluate the product quality and safety of Peristrophe roxburghiana_ col ected from different places in Hechi City, northwest of Gunagxi, so as to provide basic data for further development and uti-lization of the characteristic plant resource P. roxburghiana. [Method] Contents of 9 kinds of heavy metals including Cd, Mn, Pb, Zn and Cu in the herb were deter-mined by the method of wet digestion-flame atomic absorption spectrophotometry and atomic fluorescence spectrometry, respectively. [Results] Heavy metal contents of Cd, Mn, Pb, Fe, Cu, Zn, As, Hg and Se were 1.62-17.25, 8.93-142.53, 4.37-18.43, 103.7-242.81, 2.55-5.35, 85.40-146.30, 0.07-0.54, 0.00-0.08 and 0.00-0.47 mg/kg, respectively. According to the national food safety standards and Green Trade Standards of lmporting &amp; Exporting Medicinal plants &amp; Preparations, the heavy metal contents of the P. roxburghiana_samples col ected from different coun-ties in Hechi City exceeded standards or at the critical values. Among which, Cd, Pb and Zn contents of the samples are seriously higher than the standards. [Con-clusion] Therefore, the impact of soil heavy metal pol ution on the safety of edible plants in the northwest of Guangxi should be highly concerned.展开更多
[Objective] The aim was to test the controlling effect of cleaning steriliza- tion system, material conveying system, and fermentation jar cooling system with equip- ments of fruit wine production line introduced in t...[Objective] The aim was to test the controlling effect of cleaning steriliza- tion system, material conveying system, and fermentation jar cooling system with equip- ments of fruit wine production line introduced in this study and its auto-control sys- tem field assembled and debugged. [Method] Based on controlling equipment and setting parameters on the configuration interface, the operation state of the control equipments could be real-time monitored and controlled with the help of configura- tion software. [Result] The result showed that the equipment system could reduce the temperature into 12 ℃ with the error of +0.5 ℃within 110 minutes when the fermentation temperature is set at 12 ℃ in real production. [Conclusion] The auto- control system of fruit wine production line was easy to be assembled and de- bugged to meet demands of different fruit wine productions.展开更多
In order to search for a suitable anode material used in zinc electrowinning in place of Pb-Ag alloy,Al/Pb-PANI(polyaniline)-WC(tungsten carbide) composite inert anodes were prepared on aluminum alloy substrate by...In order to search for a suitable anode material used in zinc electrowinning in place of Pb-Ag alloy,Al/Pb-PANI(polyaniline)-WC(tungsten carbide) composite inert anodes were prepared on aluminum alloy substrate by double pulse electrodeposition(DPE) of PANI and WC particles with Pb2+ from an original plating bath.Thereafter,anodic polarization curves,cyclic voltammetry curves and Tafel polarization curves for the composite inert anodes obtained under different PANI concentrations in the original plating bath were measured,and the microstructural features were also investigated by scanning electron microscopy(SEM).The results show that Al/Pb-PANI-WC composite inert anode obtained under PANI concentration of 20 g/L in the original plating bath possesses uniform microstructures and composition distributions,higher electrocatalytic activity,better reversibility of electrode reaction and corrosion resistance in a synthetic zinc electrowinning electrolyte of 50 g/L Zn2+,150 g/L H2SO4 at 35 °C.Compared with Pb-1%Ag alloy,the overpotential of oxygen evolutions for the composite inert anode are decreased by 185 mV and 166 mV,respectively,under 500 A/m2 and 1000 A/m2.展开更多
The current-voltage(I-V) characteristics of cBN crystal sandwiched between two metallic electrodes are measured and found to be nonlinear. Over 20 samples are measured at room temperature with various electrodes, an...The current-voltage(I-V) characteristics of cBN crystal sandwiched between two metallic electrodes are measured and found to be nonlinear. Over 20 samples are measured at room temperature with various electrodes, and the resulting curves are all similar in shape. When a voltage of about 560V is applied to the cBN crystal, the emitted light is visible to the naked eye in a dark room. We explain these phenomena by the space charge limited current and the electronic transition between the X and Г valleys of the conduction band.展开更多
The electrochemical synthesis silicon wires by electrorefining metallurgical grade silicon in thermally dried and pre-electrolyzed molten KF-NaF eutectic were studied at temperatures 800-900 ℃ using cyclic voltammetr...The electrochemical synthesis silicon wires by electrorefining metallurgical grade silicon in thermally dried and pre-electrolyzed molten KF-NaF eutectic were studied at temperatures 800-900 ℃ using cyclic voltammetry and ac impedance. One oxidation peak at -0.14 V could be attributed to the reaction of Si to Si4+. A cathodic peak occurred at -0.56 V in the cyclic voltammogram and one response semicircle in the ac impedance spectrum was observed, supporting a one-step electrochemical reduction process of Si4+-→Si. The electrochemical reaction of silicon was controlled by the diffusion process. The purity of electrorefined silicon wires was up to 99.999% by ICP-MS analysis.展开更多
This paper is devoted to study the following the singularly perturbed fourth-order ordinary differential equation ∈y(4) =f(t,y',y'',y'''),0t1,0ε1 with the nonlinear boundary conditions y(0)=y'(1)=0,p...This paper is devoted to study the following the singularly perturbed fourth-order ordinary differential equation ∈y(4) =f(t,y',y'',y'''),0t1,0ε1 with the nonlinear boundary conditions y(0)=y'(1)=0,p(y''(0),y'''(0))=0,q(y''(1),y'''(1))=0 where f:[0,1]×R3→R is continuous,p,q:R2→R are continuous.Under certain conditions,by introducing an appropriate stretching transformation and constructing boundary layer corrective terms,an asymptotic expansion for the solution of the problem is obtained.And then the uniformly validity of solution is proved by using the differential inequalities.展开更多
The paper investigates a semi on-line scheduling problem wherein the largest processing time of jobs done by three uniform machines M1, M2, M3 is known in advance. A speed si (s1=1, s2=r, s3=s, 1≤r≤s) is associated ...The paper investigates a semi on-line scheduling problem wherein the largest processing time of jobs done by three uniform machines M1, M2, M3 is known in advance. A speed si (s1=1, s2=r, s3=s, 1≤r≤s) is associated with machine Mi. Our goal is to maximize Cmin?the minimum workload of the three machines. We present a min3 algorithm and prove its competitive ratio is max{r+1,(3s+r+1)/(1+r+s)}, with the lower bound being at least max{2,r}. We also claim the competitive ratio of min3 algo- rithm cannot be improved and is the best possible for 1≤s≤2, r=1.展开更多
Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applicatio...Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications.展开更多
The vehicle routing and scheduling (VRS) problem with multi-objective and multi-constraint is analyzed, considering the complexity of the modern logistics in city economy and daily life based on the system engineering...The vehicle routing and scheduling (VRS) problem with multi-objective and multi-constraint is analyzed, considering the complexity of the modern logistics in city economy and daily life based on the system engineering. The objective and constraint includes loading, the dispatch and arrival time, transportation conditions,total cost,etc. An information model and a mathematical model are built,and a method based on knowledge and biologic immunity is put forward for optimizing and evaluating the programs dimensions in vehicle routing and scheduling with multi-objective and multi-constraints. The proposed model and method are illustrated in a case study concerning a transport network, and the result shows that more optimization solutions can be easily obtained and the method is efficient and feasible. Comparing with the standard GA and the standard GA without time constraint,the computational time of the algorithm is less in this paper. And the probability of gaining optimal solution is bigger and the result is better under the condition of multi-constraint.展开更多
Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accor...Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accordingly, leading to a similar rise in methods of resistance. Limitations in computational and battery power in sensor nodes are constraints on the diversity of security mechanisms. We must apply only suitable mechanisms to WSN where our approach was motivated by the application of an improved Feistel scheme. The modified accelerated-cipher design uses data-dependent permutations, and can be used for fast hardware, firmware, software and WSN encryption systems. The approach presented showed that ciphers using this approach are less likely to suffer intrusion of differential cryptanalysis than currently used popular WSN ciphers like DES, Camellia and so on.展开更多
The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to t...The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to the serious secure leak in IEEES02.11 standards, it is impossible to utterly solve the problem by simply adding some remedies. Based on the analysis on the security mechanism of WLAN and the latest techniques of WI.AN security, a solution to WLAN security was presented. The solution makes preparation for the further combination of WLAN and Internet.展开更多
Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws ...Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future.展开更多
Traditional coal mine safety prediction methods are off-line and do not have dynamic prediction functions.The Support Vector Machine(SVM) is a new machine learning algorithm that has excellent properties.The least squ...Traditional coal mine safety prediction methods are off-line and do not have dynamic prediction functions.The Support Vector Machine(SVM) is a new machine learning algorithm that has excellent properties.The least squares support vector machine(LS-SVM) algorithm is an improved algorithm of SVM.But the common LS-SVM algorithm,used directly in safety predictions,has some problems.We have first studied gas prediction problems and the basic theory of LS-SVM.Given these problems,we have investigated the affect of the time factor about safety prediction and present an on-line prediction algorithm,based on LS-SVM.Finally,given our observed data,we used the on-line algorithm to predict gas emissions and used other related algorithm to compare its performance.The simulation results have verified the validity of the new algorithm.展开更多
基金funded by the Three-Year Plan of Action for the Development of Traditional Chinese Medicine in Shanghai(ZY3-CCCX-3-2003)State Administration of Traditional Chinese Medicine(TCM)Clinical Research Base of China(JDZX2015068)+1 种基金the Key and Promotion Special Topics of Henan(202102310164)Henan Province Traditional Chinese Medicine Scientific Research Special Project(2022ZY2031).
文摘Objective The aim of the study was to investigate the effects of Chinese herbal formula Weichang’an(WCA)on the proliferation and mitochondria-mediated apoptosis of human gastric cancer cells.Methods Cell Counting Kit-8(CCK8)was used to evaluate the antiproliferative activity ofWCA on MKN45 cells;Giemsa staining was used to investigate cell colony formation;flow cytometry was used to analyze cell cycle,apoptosis rate,and caspases activation;and Hoechst staining was used to analyze the morphology of cell nuclei.The mitochondrial membrane potential was analyzed by both flow cytometric measurements and fluorescence microscopy.Western blot was used to analyze the protein levels of pro-caspase-3,Bcl-2,Bax,and Bcl-X.MKN45 cells were subcutaneously injected into the right forelimb of 16 nude mice to establish the tumor xenograft model,and a total of 12 nude mouse tumor xenograft models were successfully created.The nude mice were divided into the control group and the WCA-treated group.The two groups received normal saline and WCA treatment at 35.49 g/kg by a single daily oral gavage for 21 days.The body weight and tumor size of the nude mice were measured twice a week.The ultrastructural changes of subcutaneous tumors were observed by a transmission electron microscope.Results WCA can suppress cell proliferation and colony formation.It can also induce changes in the mitochondrial membrane potential and increase the activities of caspases-3,caspases-8,and caspases-9 in MKN45 cells.WCA induced S-phase arrest and apoptosis in MKN45 cells,and decreased the expression levels of antiapoptotic proteins Bcl-2 and Bcl-X in MKN45 cells,while increasing the expression levels of the proapoptotic proteins Bax and pro-caspase-3 compared with the control group.WCA inhibited the growth of a xenografted MKN45 tumor in nude mice,and the protein levels of Bax and pro-caspase-3 were significantly increased,while Bcl-X and Bcl-2 were reduced compared with the control group.The differences are statistically significant(p<0.05).Conclusion WCA could suppress the proliferation of gastric cancer cells via mitochondrial apoptosis.
文摘The in-situ instrumentation technique for measuring mercury and itsspeciation downstream a utility 100 MW pulverized coal (PC) fired boiler system was developed andconducted by the use of the Ontario hydro method (OHM) consistent with American standard test methodtogether with the semi-continuous emissions monitoring (SCEM) system as well as a mobile laboratoryfor mercury monitoring. The mercury and its speciation concentrations including participate mercuryat three locations of before air preheater, before electrostatic precipitator (ESP) and after ESPwere measured using the OHM and SCEM methods under normal operation conditions of the boiler systemas a result of firing a bituminous coal. The vapor-phase total mercury Hg(VT) concentration declinedwith the decrease of flue gas temperature because of mercury species transformation from oxidizedmercury to particulate mercury as the flue gas moved downstream from the air preheater to the ESPand after the ESP. A good agreement for Hg°, Hg^(2+) and Hg( VT) was obtained between the twomethods in the ash-free area. But in the dense particle-laden flue gas area, there appeared to be abig bias for mercury speciation owing to dust cake formed in the filter of OHM sampling probe. Theparticulateaffinity to the flue gas mercury and the impacts of sampling condition to accuracy ofmeasure were discussed.
基金Supported by Fund for Key Laboratories in Guangxi Universities-Featured Resource Research and Development Laboratory of Northwest of Guangxi(GJKY 2010[6])Fund for Platform Built by University and Local Government or University and EnterpriseLocal Resource Protection and Utilization Engineering Center of Northwest of Guangxi(GJKY 2010[9])~~
文摘Objective] This study was conducted to evaluate the product quality and safety of Peristrophe roxburghiana_ col ected from different places in Hechi City, northwest of Gunagxi, so as to provide basic data for further development and uti-lization of the characteristic plant resource P. roxburghiana. [Method] Contents of 9 kinds of heavy metals including Cd, Mn, Pb, Zn and Cu in the herb were deter-mined by the method of wet digestion-flame atomic absorption spectrophotometry and atomic fluorescence spectrometry, respectively. [Results] Heavy metal contents of Cd, Mn, Pb, Fe, Cu, Zn, As, Hg and Se were 1.62-17.25, 8.93-142.53, 4.37-18.43, 103.7-242.81, 2.55-5.35, 85.40-146.30, 0.07-0.54, 0.00-0.08 and 0.00-0.47 mg/kg, respectively. According to the national food safety standards and Green Trade Standards of lmporting &amp; Exporting Medicinal plants &amp; Preparations, the heavy metal contents of the P. roxburghiana_samples col ected from different coun-ties in Hechi City exceeded standards or at the critical values. Among which, Cd, Pb and Zn contents of the samples are seriously higher than the standards. [Con-clusion] Therefore, the impact of soil heavy metal pol ution on the safety of edible plants in the northwest of Guangxi should be highly concerned.
基金Supported by Fundamental Research Foundation of GXAAS(GNK2013YM02)~~
文摘[Objective] The aim was to test the controlling effect of cleaning steriliza- tion system, material conveying system, and fermentation jar cooling system with equip- ments of fruit wine production line introduced in this study and its auto-control sys- tem field assembled and debugged. [Method] Based on controlling equipment and setting parameters on the configuration interface, the operation state of the control equipments could be real-time monitored and controlled with the help of configura- tion software. [Result] The result showed that the equipment system could reduce the temperature into 12 ℃ with the error of +0.5 ℃within 110 minutes when the fermentation temperature is set at 12 ℃ in real production. [Conclusion] The auto- control system of fruit wine production line was easy to be assembled and de- bugged to meet demands of different fruit wine productions.
基金Project (51004056) supported by the National Natural Science Foundation of ChinaProject (KKZ6201152009) supported by the Opening Foundation of Key Laboratory of Inorganic Coating Materials, ChinaProjects (2011239, 2011240) supported by Analysis and Measurement Research Fund of Kunming University of Science and Technology,China
文摘In order to search for a suitable anode material used in zinc electrowinning in place of Pb-Ag alloy,Al/Pb-PANI(polyaniline)-WC(tungsten carbide) composite inert anodes were prepared on aluminum alloy substrate by double pulse electrodeposition(DPE) of PANI and WC particles with Pb2+ from an original plating bath.Thereafter,anodic polarization curves,cyclic voltammetry curves and Tafel polarization curves for the composite inert anodes obtained under different PANI concentrations in the original plating bath were measured,and the microstructural features were also investigated by scanning electron microscopy(SEM).The results show that Al/Pb-PANI-WC composite inert anode obtained under PANI concentration of 20 g/L in the original plating bath possesses uniform microstructures and composition distributions,higher electrocatalytic activity,better reversibility of electrode reaction and corrosion resistance in a synthetic zinc electrowinning electrolyte of 50 g/L Zn2+,150 g/L H2SO4 at 35 °C.Compared with Pb-1%Ag alloy,the overpotential of oxygen evolutions for the composite inert anode are decreased by 185 mV and 166 mV,respectively,under 500 A/m2 and 1000 A/m2.
文摘The current-voltage(I-V) characteristics of cBN crystal sandwiched between two metallic electrodes are measured and found to be nonlinear. Over 20 samples are measured at room temperature with various electrodes, and the resulting curves are all similar in shape. When a voltage of about 560V is applied to the cBN crystal, the emitted light is visible to the naked eye in a dark room. We explain these phenomena by the space charge limited current and the electronic transition between the X and Г valleys of the conduction band.
文摘The electrochemical synthesis silicon wires by electrorefining metallurgical grade silicon in thermally dried and pre-electrolyzed molten KF-NaF eutectic were studied at temperatures 800-900 ℃ using cyclic voltammetry and ac impedance. One oxidation peak at -0.14 V could be attributed to the reaction of Si to Si4+. A cathodic peak occurred at -0.56 V in the cyclic voltammogram and one response semicircle in the ac impedance spectrum was observed, supporting a one-step electrochemical reduction process of Si4+-→Si. The electrochemical reaction of silicon was controlled by the diffusion process. The purity of electrorefined silicon wires was up to 99.999% by ICP-MS analysis.
文摘This paper is devoted to study the following the singularly perturbed fourth-order ordinary differential equation ∈y(4) =f(t,y',y'',y'''),0t1,0ε1 with the nonlinear boundary conditions y(0)=y'(1)=0,p(y''(0),y'''(0))=0,q(y''(1),y'''(1))=0 where f:[0,1]×R3→R is continuous,p,q:R2→R are continuous.Under certain conditions,by introducing an appropriate stretching transformation and constructing boundary layer corrective terms,an asymptotic expansion for the solution of the problem is obtained.And then the uniformly validity of solution is proved by using the differential inequalities.
文摘The paper investigates a semi on-line scheduling problem wherein the largest processing time of jobs done by three uniform machines M1, M2, M3 is known in advance. A speed si (s1=1, s2=r, s3=s, 1≤r≤s) is associated with machine Mi. Our goal is to maximize Cmin?the minimum workload of the three machines. We present a min3 algorithm and prove its competitive ratio is max{r+1,(3s+r+1)/(1+r+s)}, with the lower bound being at least max{2,r}. We also claim the competitive ratio of min3 algo- rithm cannot be improved and is the best possible for 1≤s≤2, r=1.
基金the Iran Telecommunication Research Center (ITRC)
文摘Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications.
基金National natural science foundation (No:70371040)
文摘The vehicle routing and scheduling (VRS) problem with multi-objective and multi-constraint is analyzed, considering the complexity of the modern logistics in city economy and daily life based on the system engineering. The objective and constraint includes loading, the dispatch and arrival time, transportation conditions,total cost,etc. An information model and a mathematical model are built,and a method based on knowledge and biologic immunity is put forward for optimizing and evaluating the programs dimensions in vehicle routing and scheduling with multi-objective and multi-constraints. The proposed model and method are illustrated in a case study concerning a transport network, and the result shows that more optimization solutions can be easily obtained and the method is efficient and feasible. Comparing with the standard GA and the standard GA without time constraint,the computational time of the algorithm is less in this paper. And the probability of gaining optimal solution is bigger and the result is better under the condition of multi-constraint.
文摘Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accordingly, leading to a similar rise in methods of resistance. Limitations in computational and battery power in sensor nodes are constraints on the diversity of security mechanisms. We must apply only suitable mechanisms to WSN where our approach was motivated by the application of an improved Feistel scheme. The modified accelerated-cipher design uses data-dependent permutations, and can be used for fast hardware, firmware, software and WSN encryption systems. The approach presented showed that ciphers using this approach are less likely to suffer intrusion of differential cryptanalysis than currently used popular WSN ciphers like DES, Camellia and so on.
基金The National Natural Science Foundation ofChina(No60703031)The Natural Science Foundation of Shaanxi Province ( No2007F50)
文摘The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to the serious secure leak in IEEES02.11 standards, it is impossible to utterly solve the problem by simply adding some remedies. Based on the analysis on the security mechanism of WLAN and the latest techniques of WI.AN security, a solution to WLAN security was presented. The solution makes preparation for the further combination of WLAN and Internet.
基金supported in part by the Natioual Natural Science Foundation of China(Grant No.60933003)the High Technical Research and Development Program of China(Grant No.2006AA01Z101)+1 种基金Shaanxi ISTC(Grant No.2008KW-02)IBM Joint Project
文摘Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future.
文摘Traditional coal mine safety prediction methods are off-line and do not have dynamic prediction functions.The Support Vector Machine(SVM) is a new machine learning algorithm that has excellent properties.The least squares support vector machine(LS-SVM) algorithm is an improved algorithm of SVM.But the common LS-SVM algorithm,used directly in safety predictions,has some problems.We have first studied gas prediction problems and the basic theory of LS-SVM.Given these problems,we have investigated the affect of the time factor about safety prediction and present an on-line prediction algorithm,based on LS-SVM.Finally,given our observed data,we used the on-line algorithm to predict gas emissions and used other related algorithm to compare its performance.The simulation results have verified the validity of the new algorithm.