This paper investigates the hydrodynamic characteristics of floating truncated cylinders undergoing horizontal and vertical motions due to earthquake excitations in the finite water depth.The governing equation of the...This paper investigates the hydrodynamic characteristics of floating truncated cylinders undergoing horizontal and vertical motions due to earthquake excitations in the finite water depth.The governing equation of the hydrodynamic pressure acting on the cylinder is derived based on the radiation theory with the inviscid and incompressible assumptions.The governing equation is solved by using the method of separating variables and analytical solutions are obtained by assigning reasonable boundary conditions.The analytical result is validated by a numerical model using the exact artificial boundary simulation of the infinite water.The main variation and distribution characteristics of the hydrodynamic pressure acting on the side and bottom of the cylinder are analyzed for different combinations of wide-height and immersion ratios.The added mass coefficient of the cylinder is calculated by integrating the hydrodynamic pressure and simplified formulas are proposed for engineering applications.The calculation results show that the simplified formulas are in good agreement with the analytical solutions.展开更多
This study presents a method for the inverse analysis of fluid flow problems.The focus is put on accurately determining boundary conditions and characterizing the physical properties of granular media,such as permeabi...This study presents a method for the inverse analysis of fluid flow problems.The focus is put on accurately determining boundary conditions and characterizing the physical properties of granular media,such as permeability,and fluid components,like viscosity.The primary aim is to deduce either constant pressure head or pressure profiles,given the known velocity field at a steady-state flow through a conduit containing obstacles,including walls,spheres,and grains.The lattice Boltzmann method(LBM)combined with automatic differentiation(AD)(AD-LBM)is employed,with the help of the GPU-capable Taichi programming language.A lightweight tape is used to generate gradients for the entire LBM simulation,enabling end-to-end backpropagation.Our AD-LBM approach accurately estimates the boundary conditions for complex flow paths in porous media,leading to observed steady-state velocity fields and deriving macro-scale permeability and fluid viscosity.The method demonstrates significant advantages in terms of prediction accuracy and computational efficiency,making it a powerful tool for solving inverse fluid flow problems in various applications.展开更多
Alzheimer’s disease (AD) is caused by synaptic failure and the excessive accumulation of misfolded proteins especially Aβ and tau, and associated with memory loss and cognitive impairment. Treatment of AD mainly con...Alzheimer’s disease (AD) is caused by synaptic failure and the excessive accumulation of misfolded proteins especially Aβ and tau, and associated with memory loss and cognitive impairment. Treatment of AD mainly consists of symptomatic therapy and disease-modifying therapy (DMT). Several monotherapies including small molecules or antibodies have been evaluated through multiple clinical trials, but a very few have been approved by the USFDA to intervene the disease’s pathogenesis. Past research has shown multifactorial nature of AD, therefore, multi-target drugs were proposed to target different pathways at the same time, however, currently no rationally designed multi-target directed ligand (MTDL) has been clinically approved. Different combinations and bispecific antibodies are also under development. Novel approaches like stem cell-based therapies, microRNAs, peptides, ADCs and vaccines cast a new hope for AD treatment, however, a number of questions remained to be answered prior to their safe and effective clinical translation. This review explores the small molecules, MTDL, and antibodies (monospecific and bispecific) for the treatment of AD. Finally, future perspectives (stem cell therapy, PROTAC approaches, microRNAs, ADC, peptides and vaccines) are also discussed with regard to their clinical applications and feasibility.展开更多
Introduction The main objective of any healthcare establishment must be to ensure the quality of patient care and customer satisfaction. It is necessary to regularly assess patient satisfaction. The aim of this study ...Introduction The main objective of any healthcare establishment must be to ensure the quality of patient care and customer satisfaction. It is necessary to regularly assess patient satisfaction. The aim of this study was to assess the level of satisfaction of customers aged over 18 years attending the emergency department of the health center. Methodology This was a descriptive and analytical cross-sectional study of patients aged 18 years and over, who attended the Samu Municipal emergency department between 02 and 30 May 2023. The satisfaction index was determined using the adapted 2009 SAPHORA-MCO questionnaire and the Likert satisfaction scale. Results A total of 400 patients were surveyed. The average age was 35 years, with a standard deviation of 14.7. Of those surveyed, 51% were women, 87% were educated, 50% lived in Grand Yoff and 59.5% were unemployed. Satisfaction levels linked to perception of the cost of care (72%), waiting time (64.3%), information given to patients (69.1%) and pain management (74 .5%) are fair. On the other hand, the levels of satisfaction linked to administrative procedures (82.5%), staff attitudes towards patients (84%), staff availability (86.4%), patient privacy (89.2%), general atmosphere (87.2%), staff competence (87.3%), and the effectiveness of care (89.4%) were satisfactory. The average waiting time was 38 minutes. However, 32% of patients waited less than 30 minutes and 92% less than an hour. The satisfaction index linked to administration and reception was 72.9% and 79.85%, respectively. The satisfaction index linked to the administration and technical quality of care is equal to 85.8% and 83.7%, respectively. The overall satisfaction index is equal to 80.6%;the level of satisfaction of users of the health structure is satisfactory. Conclusion Patient satisfaction is an essential part of quality care. Patient satisfaction must be based on effective communication from the healthcare team and the creation of a patient-caregiver relationship.展开更多
Wireless Ad Hoc Networks consist of devices that are wirelessly connected.Mobile Ad Hoc Networks(MANETs),Internet of Things(IoT),and Vehicular Ad Hoc Networks(VANETs)are the main domains of wireless ad hoc network.Int...Wireless Ad Hoc Networks consist of devices that are wirelessly connected.Mobile Ad Hoc Networks(MANETs),Internet of Things(IoT),and Vehicular Ad Hoc Networks(VANETs)are the main domains of wireless ad hoc network.Internet is used in wireless ad hoc network.Internet is based on Transmission Control Protocol(TCP)/Internet Protocol(IP)network where clients and servers interact with each other with the help of IP in a pre-defined environment.Internet fetches data from a fixed location.Data redundancy,mobility,and location dependency are the main issues of the IP network paradigm.All these factors result in poor performance of wireless ad hoc networks.The main disadvantage of IP is that,it does not provide in-network caching.Therefore,there is a need to move towards a new network that overcomes these limitations.Named Data Network(NDN)is a network that overcomes these limitations.NDN is a project of Information-centric Network(ICN).NDN provides in-network caching which helps in fast response to user queries.Implementing NDN in wireless ad hoc network provides many benefits such as caching,mobility,scalability,security,and privacy.By considering the certainty,in this survey paper,we present a comprehensive survey on Caching Strategies in NDN-based Wireless AdHocNetwork.Various cachingmechanism-based results are also described.In the last,we also shed light on the challenges and future directions of this promising field to provide a clear understanding of what caching-related problems exist in NDN-based wireless ad hoc networks.展开更多
Enhancement-mode(E-mode)GaN-on-Si radio-frequency(RF)high-electron-mobility transistors(HEMTs)were fabri-cated on an ultrathin-barrier(UTB)AlGaN(<6 nm)/GaN heterostructure featuring a naturally depleted 2-D electro...Enhancement-mode(E-mode)GaN-on-Si radio-frequency(RF)high-electron-mobility transistors(HEMTs)were fabri-cated on an ultrathin-barrier(UTB)AlGaN(<6 nm)/GaN heterostructure featuring a naturally depleted 2-D electron gas(2DEG)channel.The fabricated E-mode HEMTs exhibit a relatively high threshold voltage(VTH)of+1.1 V with good uniformity.A maxi-mum current/power gain cut-off frequency(fT/fMAX)of 31.3/99.6 GHz with a power added efficiency(PAE)of 52.47%and an out-put power density(Pout)of 1.0 W/mm at 3.5 GHz were achieved on the fabricated E-mode HEMTs with 1-μm gate and Au-free ohmic contact.展开更多
Wireless technology is transforming the future of transportation through the development of the Internet of Vehicles(IoV).However,intricate security challenges are intertwinedwith technological progress:Vehicular ad h...Wireless technology is transforming the future of transportation through the development of the Internet of Vehicles(IoV).However,intricate security challenges are intertwinedwith technological progress:Vehicular ad hoc Networks(VANETs),a core component of IoV,face security issues,particularly the Black Hole Attack(BHA).This malicious attack disrupts the seamless flow of data and threatens the network’s overall reliability;also,BHA strategically disrupts communication pathways by dropping data packets from legitimate nodes altogether.Recognizing the importance of this challenge,we have introduced a new solution called ad hoc On-Demand Distance Vector-Reputation-based mechanism Local Outlier Factor(AODV-RL).The significance of AODVRL lies in its unique approach:it verifies and confirms the trustworthiness of network components,providing robust protection against BHA.An additional safety layer is established by implementing the Local Outlier Factor(LOF),which detects and addresses abnormal network behaviors.Rigorous testing of our solution has revealed its remarkable ability to enhance communication in VANETs.Specifically,Our experimental results achieve message delivery ratios of up to 94.25%andminimal packet loss ratios of just 0.297%.Based on our experimental results,the proposedmechanismsignificantly improves VANET communication reliability and security.These results promise a more secure and dependable future for IoV,capable of transforming transportation safety and efficiency.展开更多
This study investigated the growth of forecast errors stemming from initial conditions(ICs),lateral boundary conditions(LBCs),and model(MO)perturbations,as well as their interactions,by conducting seven 36 h convectio...This study investigated the growth of forecast errors stemming from initial conditions(ICs),lateral boundary conditions(LBCs),and model(MO)perturbations,as well as their interactions,by conducting seven 36 h convectionallowing ensemble forecast(CAEF)experiments.Two cases,one with strong-forcing(SF)and the other with weak-forcing(WF),occurred over the Yangtze-Huai River basin(YHRB)in East China,were selected to examine the sources of uncertainties associated with perturbation growth under varying forcing backgrounds and the influence of these backgrounds on growth.The perturbations exhibited distinct characteristics in terms of temporal evolution,spatial propagation,and vertical distribution under different forcing backgrounds,indicating a dependence between perturbation growth and forcing background.A comparison of the perturbation growth in different precipitation areas revealed that IC and LBC perturbations were significantly influenced by the location of precipitation in the SF case,while MO perturbations were more responsive to convection triggering and dominated in the WF case.The vertical distribution of perturbations showed that the sources of uncertainties and the performance of perturbations varied between SF and WF cases,with LBC perturbations displaying notable case dependence.Furthermore,the interactions between perturbations were considered by exploring the added values of different source perturbations.For the SF case,the added values of IC,LBC,and MO perturbations were reflected in different forecast periods and different source uncertainties,suggesting that the combination of multi-source perturbations can yield positive interactions.In the WF case,MO perturbations provided a more accurate estimation of uncertainties downstream of the Dabie Mountain and need to be prioritized in the research on perturbation development.展开更多
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages ov...Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations.To address these challenges,several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently.However,most of these schemes are limited by a long execution time and massive communication costs,which make them inefficient for on-board units(OBUs).Additionally,some of them are still susceptible to many attacks.As such,this study presents a novel protocol based on the fusion of elliptic curve cryptography(ECC)and bilinear pairing(BP)operations.The formal security analysis is accomplished using the Burrows–Abadi–Needham(BAN)logic,demonstrating that our scheme is verifiably secure.The proposed scheme’s informal security assessment also shows that it provides salient security features,such as non-repudiation,anonymity,and unlinkability.Moreover,the scheme is shown to be resilient against attacks,such as packet replays,forgeries,message falsifications,and impersonations.From the performance perspective,this protocol yields a 37.88%reduction in communication overheads and a 44.44%improvement in the supported security features.Therefore,the proposed scheme can be deployed in VANETs to provide robust security at low overheads.展开更多
Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate w...Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods.展开更多
Internet of Things(IoT)networks are characterized by a multitude of wireless,interconnected devices that can dynamically join or exit the network without centralized administration or fixed infrastructure for routing....Internet of Things(IoT)networks are characterized by a multitude of wireless,interconnected devices that can dynamically join or exit the network without centralized administration or fixed infrastructure for routing.While multipath routing in IoT networks can improve data transmission reliability and load balancing by establishing multiple paths between source and destination nodes,these networks are susceptible to security threats due to their wireless nature.Traditional security solutions developed for conventional networks are often ill-suited to the unique challenges posed by IoT environments.In response to these challenges,this paper proposes the integration of the Ad hoc On-demand Multipath Distance Vector(AOMDV)routing protocol with a trust model to enhance network performance.Key findings from this research demonstrate the successful fusion of AOMDV with a trust model,resulting in tangible improvements in network performance.The assessment of trustworthiness bolsters both security and routing capabilities in IoT networks.The trust model plays a crucial role in mitigating black hole attacks in IoT networks by evaluating the trustworthiness of nodes and helping in the identification and avoidance of malicious nodes that may act as black holes.Simulation results validate the efficacy of the proposed trust-based routing mechanism in achieving its objectives.Trust plays a pivotal role in decision-making and in the creation of secure distribution systems.By assessing the trustworthiness of nodes,both network security and routing efficiency can be enhanced.The effectiveness of the proposed trust-based routing mechanism is scrutinized through simulations,offering insights into its potential advantages in terms of improved network security and routing performance in the context of the IoT.展开更多
In the present study, analyzed are the variation of added mass for a circular cylinder in the lock-in (synchronization) range of vortex-induced vibration (VIV) and the relationship between added mass and natural f...In the present study, analyzed are the variation of added mass for a circular cylinder in the lock-in (synchronization) range of vortex-induced vibration (VIV) and the relationship between added mass and natural frequency. A theoretical minimum value of the added mass coefficient for a circular cylinder at lock-in is given. Developed are semi-empirical formulas for the added mass of a circular cylinder at lock-in as a function of flow speed and mass ratio. A comparison between experiments and numerical simulations shows that the semi-empirical formulas describing the variation of the added mass for a cireular cylinder at lock-in are better than the ideal added mass. In addition, computation models such as the wake oscillator model using the present formulas can predict the amplitude response of a circular cylinder at lock-in more accurately than those using the ideal added mass.展开更多
In this paper, added resistances acting on a hull of non ballast water ship(NBS) in high waves is discussed. The non ballast water ships were developed at the laboratory of the authors at Osaka Prefecture University, ...In this paper, added resistances acting on a hull of non ballast water ship(NBS) in high waves is discussed. The non ballast water ships were developed at the laboratory of the authors at Osaka Prefecture University, Japan. In the present paper, the performances of three kinds of bow shapes developed for the NBS were theoretically and experimentally investigated to find the best one in high waves. In previous papers, an optimum bow shape for the NBS was developed in calm water and in moderated waves. For a 2 m model for experiments and computations, the wave height is 0.02 m. This means that the wave height is 15% of the draft of the ship in full load conditions. In this paper, added resistances in high waves up to 0.07 m for a 2 m model or 53% of the full load draft are investigated. In such high waves linear wave theories which have been used in the design stage of a ship for a long time may not work well anymore, and experiments are the only effective tool to predict the added resistance in high waves. With the computations for waves, the ship is in a fully captured condition because shorter waves, λ/Lpp<0.6, are assumed.展开更多
An integral equation approach is utilized to in- vestigate the added mass and damping of floating produc- tion, storage and offloading system (FPSO system). Finite water depth Green function and higher-order boundar...An integral equation approach is utilized to in- vestigate the added mass and damping of floating produc- tion, storage and offloading system (FPSO system). Finite water depth Green function and higher-order boundary ele- ment method are used to solve integral equation. Numeri- cal results about added mass and damping are presented for odd and even mode motions of FPSO. The results show ro- bust convergence in high frequency range and can be used in wave load analysis for FPSO designing and operation.展开更多
基金financially supported by the National Natural Science Foundation of China(Grant Nos.52078010 and 52101321)the National Key Research and Development Program of China(Grant No.2022YFC3004300).
文摘This paper investigates the hydrodynamic characteristics of floating truncated cylinders undergoing horizontal and vertical motions due to earthquake excitations in the finite water depth.The governing equation of the hydrodynamic pressure acting on the cylinder is derived based on the radiation theory with the inviscid and incompressible assumptions.The governing equation is solved by using the method of separating variables and analytical solutions are obtained by assigning reasonable boundary conditions.The analytical result is validated by a numerical model using the exact artificial boundary simulation of the infinite water.The main variation and distribution characteristics of the hydrodynamic pressure acting on the side and bottom of the cylinder are analyzed for different combinations of wide-height and immersion ratios.The added mass coefficient of the cylinder is calculated by integrating the hydrodynamic pressure and simplified formulas are proposed for engineering applications.The calculation results show that the simplified formulas are in good agreement with the analytical solutions.
文摘This study presents a method for the inverse analysis of fluid flow problems.The focus is put on accurately determining boundary conditions and characterizing the physical properties of granular media,such as permeability,and fluid components,like viscosity.The primary aim is to deduce either constant pressure head or pressure profiles,given the known velocity field at a steady-state flow through a conduit containing obstacles,including walls,spheres,and grains.The lattice Boltzmann method(LBM)combined with automatic differentiation(AD)(AD-LBM)is employed,with the help of the GPU-capable Taichi programming language.A lightweight tape is used to generate gradients for the entire LBM simulation,enabling end-to-end backpropagation.Our AD-LBM approach accurately estimates the boundary conditions for complex flow paths in porous media,leading to observed steady-state velocity fields and deriving macro-scale permeability and fluid viscosity.The method demonstrates significant advantages in terms of prediction accuracy and computational efficiency,making it a powerful tool for solving inverse fluid flow problems in various applications.
文摘Alzheimer’s disease (AD) is caused by synaptic failure and the excessive accumulation of misfolded proteins especially Aβ and tau, and associated with memory loss and cognitive impairment. Treatment of AD mainly consists of symptomatic therapy and disease-modifying therapy (DMT). Several monotherapies including small molecules or antibodies have been evaluated through multiple clinical trials, but a very few have been approved by the USFDA to intervene the disease’s pathogenesis. Past research has shown multifactorial nature of AD, therefore, multi-target drugs were proposed to target different pathways at the same time, however, currently no rationally designed multi-target directed ligand (MTDL) has been clinically approved. Different combinations and bispecific antibodies are also under development. Novel approaches like stem cell-based therapies, microRNAs, peptides, ADCs and vaccines cast a new hope for AD treatment, however, a number of questions remained to be answered prior to their safe and effective clinical translation. This review explores the small molecules, MTDL, and antibodies (monospecific and bispecific) for the treatment of AD. Finally, future perspectives (stem cell therapy, PROTAC approaches, microRNAs, ADC, peptides and vaccines) are also discussed with regard to their clinical applications and feasibility.
文摘Introduction The main objective of any healthcare establishment must be to ensure the quality of patient care and customer satisfaction. It is necessary to regularly assess patient satisfaction. The aim of this study was to assess the level of satisfaction of customers aged over 18 years attending the emergency department of the health center. Methodology This was a descriptive and analytical cross-sectional study of patients aged 18 years and over, who attended the Samu Municipal emergency department between 02 and 30 May 2023. The satisfaction index was determined using the adapted 2009 SAPHORA-MCO questionnaire and the Likert satisfaction scale. Results A total of 400 patients were surveyed. The average age was 35 years, with a standard deviation of 14.7. Of those surveyed, 51% were women, 87% were educated, 50% lived in Grand Yoff and 59.5% were unemployed. Satisfaction levels linked to perception of the cost of care (72%), waiting time (64.3%), information given to patients (69.1%) and pain management (74 .5%) are fair. On the other hand, the levels of satisfaction linked to administrative procedures (82.5%), staff attitudes towards patients (84%), staff availability (86.4%), patient privacy (89.2%), general atmosphere (87.2%), staff competence (87.3%), and the effectiveness of care (89.4%) were satisfactory. The average waiting time was 38 minutes. However, 32% of patients waited less than 30 minutes and 92% less than an hour. The satisfaction index linked to administration and reception was 72.9% and 79.85%, respectively. The satisfaction index linked to the administration and technical quality of care is equal to 85.8% and 83.7%, respectively. The overall satisfaction index is equal to 80.6%;the level of satisfaction of users of the health structure is satisfactory. Conclusion Patient satisfaction is an essential part of quality care. Patient satisfaction must be based on effective communication from the healthcare team and the creation of a patient-caregiver relationship.
基金supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(No.2022R1A2C1003549).
文摘Wireless Ad Hoc Networks consist of devices that are wirelessly connected.Mobile Ad Hoc Networks(MANETs),Internet of Things(IoT),and Vehicular Ad Hoc Networks(VANETs)are the main domains of wireless ad hoc network.Internet is used in wireless ad hoc network.Internet is based on Transmission Control Protocol(TCP)/Internet Protocol(IP)network where clients and servers interact with each other with the help of IP in a pre-defined environment.Internet fetches data from a fixed location.Data redundancy,mobility,and location dependency are the main issues of the IP network paradigm.All these factors result in poor performance of wireless ad hoc networks.The main disadvantage of IP is that,it does not provide in-network caching.Therefore,there is a need to move towards a new network that overcomes these limitations.Named Data Network(NDN)is a network that overcomes these limitations.NDN is a project of Information-centric Network(ICN).NDN provides in-network caching which helps in fast response to user queries.Implementing NDN in wireless ad hoc network provides many benefits such as caching,mobility,scalability,security,and privacy.By considering the certainty,in this survey paper,we present a comprehensive survey on Caching Strategies in NDN-based Wireless AdHocNetwork.Various cachingmechanism-based results are also described.In the last,we also shed light on the challenges and future directions of this promising field to provide a clear understanding of what caching-related problems exist in NDN-based wireless ad hoc networks.
基金supported in part by the National Key Research and Development Program of China under Grant 2022YFB3604400in part by the Youth Innovation Promotion Association of Chinese Academy Sciences(CAS)+4 种基金in part by CAS-Croucher Funding Scheme under Grant CAS22801in part by National Natural Science Foundation of China under Grant 62074161,Grant 62004213,and Grant U20A20208in part by the Beijing Municipal Science and Technology Commission project under Grant Z201100008420009 and Grant Z211100007921018in part by the University of CASin part by IMECAS-HKUST-Joint Laboratory of Microelectronics.
文摘Enhancement-mode(E-mode)GaN-on-Si radio-frequency(RF)high-electron-mobility transistors(HEMTs)were fabri-cated on an ultrathin-barrier(UTB)AlGaN(<6 nm)/GaN heterostructure featuring a naturally depleted 2-D electron gas(2DEG)channel.The fabricated E-mode HEMTs exhibit a relatively high threshold voltage(VTH)of+1.1 V with good uniformity.A maxi-mum current/power gain cut-off frequency(fT/fMAX)of 31.3/99.6 GHz with a power added efficiency(PAE)of 52.47%and an out-put power density(Pout)of 1.0 W/mm at 3.5 GHz were achieved on the fabricated E-mode HEMTs with 1-μm gate and Au-free ohmic contact.
文摘Wireless technology is transforming the future of transportation through the development of the Internet of Vehicles(IoV).However,intricate security challenges are intertwinedwith technological progress:Vehicular ad hoc Networks(VANETs),a core component of IoV,face security issues,particularly the Black Hole Attack(BHA).This malicious attack disrupts the seamless flow of data and threatens the network’s overall reliability;also,BHA strategically disrupts communication pathways by dropping data packets from legitimate nodes altogether.Recognizing the importance of this challenge,we have introduced a new solution called ad hoc On-Demand Distance Vector-Reputation-based mechanism Local Outlier Factor(AODV-RL).The significance of AODVRL lies in its unique approach:it verifies and confirms the trustworthiness of network components,providing robust protection against BHA.An additional safety layer is established by implementing the Local Outlier Factor(LOF),which detects and addresses abnormal network behaviors.Rigorous testing of our solution has revealed its remarkable ability to enhance communication in VANETs.Specifically,Our experimental results achieve message delivery ratios of up to 94.25%andminimal packet loss ratios of just 0.297%.Based on our experimental results,the proposedmechanismsignificantly improves VANET communication reliability and security.These results promise a more secure and dependable future for IoV,capable of transforming transportation safety and efficiency.
基金Key Project of the National Natural Science Foundation of China (42330611)National Natural Science Foundation of China (42105008)。
文摘This study investigated the growth of forecast errors stemming from initial conditions(ICs),lateral boundary conditions(LBCs),and model(MO)perturbations,as well as their interactions,by conducting seven 36 h convectionallowing ensemble forecast(CAEF)experiments.Two cases,one with strong-forcing(SF)and the other with weak-forcing(WF),occurred over the Yangtze-Huai River basin(YHRB)in East China,were selected to examine the sources of uncertainties associated with perturbation growth under varying forcing backgrounds and the influence of these backgrounds on growth.The perturbations exhibited distinct characteristics in terms of temporal evolution,spatial propagation,and vertical distribution under different forcing backgrounds,indicating a dependence between perturbation growth and forcing background.A comparison of the perturbation growth in different precipitation areas revealed that IC and LBC perturbations were significantly influenced by the location of precipitation in the SF case,while MO perturbations were more responsive to convection triggering and dominated in the WF case.The vertical distribution of perturbations showed that the sources of uncertainties and the performance of perturbations varied between SF and WF cases,with LBC perturbations displaying notable case dependence.Furthermore,the interactions between perturbations were considered by exploring the added values of different source perturbations.For the SF case,the added values of IC,LBC,and MO perturbations were reflected in different forecast periods and different source uncertainties,suggesting that the combination of multi-source perturbations can yield positive interactions.In the WF case,MO perturbations provided a more accurate estimation of uncertainties downstream of the Dabie Mountain and need to be prioritized in the research on perturbation development.
基金supported by Teaching Reform Project of Shenzhen University of Technology under Grant No.20231016.
文摘Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations.To address these challenges,several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently.However,most of these schemes are limited by a long execution time and massive communication costs,which make them inefficient for on-board units(OBUs).Additionally,some of them are still susceptible to many attacks.As such,this study presents a novel protocol based on the fusion of elliptic curve cryptography(ECC)and bilinear pairing(BP)operations.The formal security analysis is accomplished using the Burrows–Abadi–Needham(BAN)logic,demonstrating that our scheme is verifiably secure.The proposed scheme’s informal security assessment also shows that it provides salient security features,such as non-repudiation,anonymity,and unlinkability.Moreover,the scheme is shown to be resilient against attacks,such as packet replays,forgeries,message falsifications,and impersonations.From the performance perspective,this protocol yields a 37.88%reduction in communication overheads and a 44.44%improvement in the supported security features.Therefore,the proposed scheme can be deployed in VANETs to provide robust security at low overheads.
基金Dr.Arshiya Sajid Ansari would like to thank the Deanship of Scientific Research at Majmaah University for supporting this work under Project No.R-2023-910.
文摘Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods.
文摘Internet of Things(IoT)networks are characterized by a multitude of wireless,interconnected devices that can dynamically join or exit the network without centralized administration or fixed infrastructure for routing.While multipath routing in IoT networks can improve data transmission reliability and load balancing by establishing multiple paths between source and destination nodes,these networks are susceptible to security threats due to their wireless nature.Traditional security solutions developed for conventional networks are often ill-suited to the unique challenges posed by IoT environments.In response to these challenges,this paper proposes the integration of the Ad hoc On-demand Multipath Distance Vector(AOMDV)routing protocol with a trust model to enhance network performance.Key findings from this research demonstrate the successful fusion of AOMDV with a trust model,resulting in tangible improvements in network performance.The assessment of trustworthiness bolsters both security and routing capabilities in IoT networks.The trust model plays a crucial role in mitigating black hole attacks in IoT networks by evaluating the trustworthiness of nodes and helping in the identification and avoidance of malicious nodes that may act as black holes.Simulation results validate the efficacy of the proposed trust-based routing mechanism in achieving its objectives.Trust plays a pivotal role in decision-making and in the creation of secure distribution systems.By assessing the trustworthiness of nodes,both network security and routing efficiency can be enhanced.The effectiveness of the proposed trust-based routing mechanism is scrutinized through simulations,offering insights into its potential advantages in terms of improved network security and routing performance in the context of the IoT.
基金This work is financially supported by Projects 863(2006AA09Z301)NSF(10532070)KJCX2-YW-L02
文摘In the present study, analyzed are the variation of added mass for a circular cylinder in the lock-in (synchronization) range of vortex-induced vibration (VIV) and the relationship between added mass and natural frequency. A theoretical minimum value of the added mass coefficient for a circular cylinder at lock-in is given. Developed are semi-empirical formulas for the added mass of a circular cylinder at lock-in as a function of flow speed and mass ratio. A comparison between experiments and numerical simulations shows that the semi-empirical formulas describing the variation of the added mass for a cireular cylinder at lock-in are better than the ideal added mass. In addition, computation models such as the wake oscillator model using the present formulas can predict the amplitude response of a circular cylinder at lock-in more accurately than those using the ideal added mass.
文摘In this paper, added resistances acting on a hull of non ballast water ship(NBS) in high waves is discussed. The non ballast water ships were developed at the laboratory of the authors at Osaka Prefecture University, Japan. In the present paper, the performances of three kinds of bow shapes developed for the NBS were theoretically and experimentally investigated to find the best one in high waves. In previous papers, an optimum bow shape for the NBS was developed in calm water and in moderated waves. For a 2 m model for experiments and computations, the wave height is 0.02 m. This means that the wave height is 15% of the draft of the ship in full load conditions. In this paper, added resistances in high waves up to 0.07 m for a 2 m model or 53% of the full load draft are investigated. In such high waves linear wave theories which have been used in the design stage of a ship for a long time may not work well anymore, and experiments are the only effective tool to predict the added resistance in high waves. With the computations for waves, the ship is in a fully captured condition because shorter waves, λ/Lpp<0.6, are assumed.
基金supported by the Fundamental Research Funds forthe Central Universities (DVT10LK43)the Returned Overseas Chinese Scholars,State Education Ministry (2007[24])
文摘An integral equation approach is utilized to in- vestigate the added mass and damping of floating produc- tion, storage and offloading system (FPSO system). Finite water depth Green function and higher-order boundary ele- ment method are used to solve integral equation. Numeri- cal results about added mass and damping are presented for odd and even mode motions of FPSO. The results show ro- bust convergence in high frequency range and can be used in wave load analysis for FPSO designing and operation.