针对现有分级多PAN太赫兹无线网络MAC(Medium Access Control)协议中存在的子网形成方案不合理以及私有CTA(Channel Time Allocation)与子网内实际负载不匹配等问题,提出了一种高效低时延的MAC层优化协议.该协议采用基于泛听的按需形成...针对现有分级多PAN太赫兹无线网络MAC(Medium Access Control)协议中存在的子网形成方案不合理以及私有CTA(Channel Time Allocation)与子网内实际负载不匹配等问题,提出了一种高效低时延的MAC层优化协议.该协议采用基于泛听的按需形成子网机制避免了子网分布不均匀以及因子网形成后没有节点加入而造成的私有CTA资源浪费的问题.在子网形成后,子微微网协调器(Piconet Coordinator,PNC)根据子网内实际负载情况自适应选择私有CTA时隙资源优化机制,让有数据传输需求的节点及时将数据发出.仿真结果表明,所提出的方案能有效地降低数据帧平均接入时延,提高吞吐量以及数据帧的传输成功率.展开更多
电力线和无线混合通信可以优势互补提升电力物联网室内覆盖的综合性能。针对无线接入和电力线中继的混合通信场景,文章提出一种适用于两跳混合中继的通用MAC层算法。综合考虑物理层信道参数和MAC层的载波侦听多路访问(carrier sense mul...电力线和无线混合通信可以优势互补提升电力物联网室内覆盖的综合性能。针对无线接入和电力线中继的混合通信场景,文章提出一种适用于两跳混合中继的通用MAC层算法。综合考虑物理层信道参数和MAC层的载波侦听多路访问(carrier sense multiple access,CSMA)退避流程,建立了该MAC层算法的跨层性能分析模型,推导了两跳传输系统归一化吞吐量以及系统时延等性能;最后仿真验证了算法有效性和模型准确性,分析了物理层和MAC层关键参数影响系统性能的机理。与Basic-RTS/CTS算法相比,所提算法可有效提升系统吞吐量和时延性能。展开更多
IN recent years,the electrical machines and systems have grown so rapidly with more and more applications in emerging civilian industries as well as cutting-edge areas.A group of novel and exciting technologies have b...IN recent years,the electrical machines and systems have grown so rapidly with more and more applications in emerging civilian industries as well as cutting-edge areas.A group of novel and exciting technologies have been developed every year.First,the research of motors in new and extreme fields have constantly brought amazing progress to achieve better performance through new technologies such as digitalization,etc.Meanwhile,the fast development of power electronics in recent decades has also changed the overall system to be more flexible,and widely extent our boundary of research area.What is more.展开更多
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a s...Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV.展开更多
近年来,无人机群自组网(UAV Swarm Ad Hoc Network,UAVSNet)的单个UAV不断自主化与智能化,但UAV之间的协同通信仍存在挑战。媒体接入控制(Media Access Control,MAC)协议是其关键技术之一,并成为了新的研究热点。通过概述MAC协议的分类...近年来,无人机群自组网(UAV Swarm Ad Hoc Network,UAVSNet)的单个UAV不断自主化与智能化,但UAV之间的协同通信仍存在挑战。媒体接入控制(Media Access Control,MAC)协议是其关键技术之一,并成为了新的研究热点。通过概述MAC协议的分类及设计要点,对竞争类MAC协议、非竞争类MAC协议以及混合类MAC协议接入机制、性能表现及不足进行详细综述并提出展望。为UAVSNet的MAC协议的研究和应用提供了理论支持。展开更多
The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can le...The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can lead to wrong location reports and time indication.In order to deal with this threat,we proposed a scheme of anti-spoofing for BDⅡ-CNAV based on integrated information authentication.This scheme generates two type authentication information,one is authentication code information(ACI),which is applied to confirm the authenticity and reliability of satellite time information,and the other is signature information,which is used to authenticate the integrity of satellite location information and other information.Both authentication information is designed to embed into the reserved bits in BDⅡ-CNAV without changing the frame structure.In order to avoid authentication failure caused by public key error or key error,the key or public key prompt information(KPKPI)are designed to remind the receiver to update both keys in time.Experimental results indicate that the scheme can successfully detect spoofing attacks,and the authentication delay is less than 1%of the transmission delay,which meets the requirements of BDⅡ-CNAV information authentication.展开更多
Introduction: Cancer is a chronic debilitating disease that unnerves patients, communities, and nations. At some point in cancer patient’s disease experience, chemotherapy is used, and the patient is expected to adhe...Introduction: Cancer is a chronic debilitating disease that unnerves patients, communities, and nations. At some point in cancer patient’s disease experience, chemotherapy is used, and the patient is expected to adhere to treatment to improve survival and quality of life. Methods: This multisite Cluster Randomized Trial (CRT) evaluated the effectiveness of mobile phone Short Message Service (SMS) support on the adherence to treatment schedules among adult cancer patients in Kenya. Data was collected using questionnaires. Ethical approvals were obtained from relevant Ethical Review Boards (ERBs). Results: The mean adherence was 83%. There was a significant difference between treatment arms in relation to the adherence. The intervention arm had a higher mean adherence difference, M = 3.913, 95% CI 2.632-5.193, t (402) = 6.006, p ≤ 0.001), with Cohen’s d = 0.60. Although not significant, (χ<sup>2</sup>dd = 0.151, df = 1, p = 2.064), more women were perfect adheres than males. Perfect adherers were satisfied with SMS support (χ<sup>2</sup>dd = 7.620, df = 1, p = 0.06), were in the intervention arm (χ<sup>2</sup>dd = 22.942, df = 1, p ≤ 0.001), and had trust in the care provider (χ<sup>2</sup>dd = 10.591 p ≤ 0.001). SMS support was not significant in the multivariate analysis but had an estimated effect size of 0.958 (z = 1.424, p = 0.154, CI = 0.242-3.781), indicating that mean adherence was slightly better in the presence of the intervention. Conclusions: SMS-support intervention has demonstrated superiority in influencing adherence. Further, health system-related factors have a significant influence on the adherence to chemotherapy treatment. Interventions to re-design health systems that are responsive to unmet care needs of cancer patients must be explored. .展开更多
Introduction: The cicatricial acceleration method (MAC®) promotes photobiological effects of an anti-inflammatory and healing nature. Its therapeutic radiation is emitted, producing photobiostimulant effects that...Introduction: The cicatricial acceleration method (MAC®) promotes photobiological effects of an anti-inflammatory and healing nature. Its therapeutic radiation is emitted, producing photobiostimulant effects that result in rapid tissue repair and better tissue quality. The treatment of burns has always been a challenge, which involves both performing surgery and controlling and guiding scar regeneration, avoiding possible morbidities. Objective: To evaluate the effects of applying the MAC methodology with an AlGa (aluminum, gallium arsenide) laser on the time and quality of tissue repair in the skin of rats after induced chemical burns. Method: 22 adult male rats were subjected to a second-degree chemical burn on the back using 50% trichloroacetic acid. After the burns, the animals were randomly separated into 2 groups: control and experimental. The control group (G1) received placebo laser therapy and the laser group (G2) underwent laser irradiation with an energy density of 100 J/cm2. Histological analysis and macroscopic evaluation were carried out by means of the paper template method. Results: Group G1 showed (53%) of the necrosis area and group G2 showed (11%) necrosis area. Conclusion: The cicatricial acceleration method (MAC®) favored the repair of wounds caused by a 2nd-degree chemical burn, optimizing time and improving quality.展开更多
This study presents results from sentiment analysis of Dynamic message sign (DMS) message content, focusing on messages that include numbers of road fatalities. As a traffic management tool, DMS plays a role in influe...This study presents results from sentiment analysis of Dynamic message sign (DMS) message content, focusing on messages that include numbers of road fatalities. As a traffic management tool, DMS plays a role in influencing driver behavior and assisting transportation agencies in achieving safe and efficient traffic movement. However, the psychological and behavioral effects of displaying fatality numbers on DMS remain poorly understood;hence, it is important to know the potential impacts of displaying such messages. The Iowa Department of Transportation displays the number of fatalities on a first screen, followed by a supplemental message hoping to promote safe driving;an example is “19 TRAFFIC DEATHS THIS YEAR IF YOU HAVE A SUPER BOWL DON’T DRIVE HIGH.” We employ natural language processing to decode the sentiment and undertone of the supplementary message and investigate how they influence driving speeds. According to the results of a mixed effect model, drivers reduced speeds marginally upon encountering DMS fatality text with a positive sentiment with a neutral undertone. This category had the largest associated amount of speed reduction, while messages with negative sentiment with a negative undertone had the second largest amount of speed reduction, greater than other combinations, including positive sentiment with a positive undertone.展开更多
As an important application of intelligent transportation system,Internet of Vehicles(IoV)provides great convenience for users.Users can obtain real-time traffic conditions through the IoV’s services,plan users’trav...As an important application of intelligent transportation system,Internet of Vehicles(IoV)provides great convenience for users.Users can obtain real-time traffic conditions through the IoV’s services,plan users’travel routes,and improve travel efficiency.However,in the IoV system,there are always malicious vehicle nodes publishing false information.Therefore,it is essential to ensure the legitimacy of the source.In addition,during the peak period of vehicle travel,the vehicle releases a large number of messages,and IoV authentication efficiency is prone to performance bottlenecks.Most existing authentication schemes have the problem of low authentication efficiency in the scenario.To address the above problems,this paper designs a novel reliable anonymous authentication scheme in IoV for Rush-hour Traffic.Here,our scheme uses blockchain and elliptic curve cryptography(ECC)to design authentication algorithms for message authentication between vehicles and roadside units(RSU).Additionally,we introduce the idea of edge computing into the scheme,RSU will select themost suitable vehicle as the edge computing node for message authentication.In addition,we used the ProVerif tool for Internet security protocols and applications to test its security,ensuring that it is secure under different network attacks.In the simulation experiment,we compare our scheme with other existing works.Our scheme has a significant improvement in computational overhead,authentication efficiency and packet loss rate,and is suitable for traffic scenarios with large message volume.展开更多
This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst inte...This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst interference may occur only on data symbols but not on pilot symbols, which means that interference information cannot be premeasured. To cancel the burst interference, we first revisit the uplink multi-user system and develop a matrixform system model, where the covariance pattern and the low-rank property of the interference matrix is discussed. Then, we propose a turbo message passing based burst interference cancellation(TMP-BIC) algorithm to solve the data detection problem, where the constellation information of target data is fully exploited to refine its estimate. Furthermore, in the TMP-BIC algorithm, we design one module to cope with the interference matrix by exploiting its lowrank property. Numerical results demonstrate that the proposed algorithm can effectively mitigate the adverse effects of burst interference and approach the interference-free bound.展开更多
文摘电力线和无线混合通信可以优势互补提升电力物联网室内覆盖的综合性能。针对无线接入和电力线中继的混合通信场景,文章提出一种适用于两跳混合中继的通用MAC层算法。综合考虑物理层信道参数和MAC层的载波侦听多路访问(carrier sense multiple access,CSMA)退避流程,建立了该MAC层算法的跨层性能分析模型,推导了两跳传输系统归一化吞吐量以及系统时延等性能;最后仿真验证了算法有效性和模型准确性,分析了物理层和MAC层关键参数影响系统性能的机理。与Basic-RTS/CTS算法相比,所提算法可有效提升系统吞吐量和时延性能。
文摘IN recent years,the electrical machines and systems have grown so rapidly with more and more applications in emerging civilian industries as well as cutting-edge areas.A group of novel and exciting technologies have been developed every year.First,the research of motors in new and extreme fields have constantly brought amazing progress to achieve better performance through new technologies such as digitalization,etc.Meanwhile,the fast development of power electronics in recent decades has also changed the overall system to be more flexible,and widely extent our boundary of research area.What is more.
基金supported in part by the National Key R&D Program of China(No.2022YFB3904503)National Natural Science Foundation of China(No.62172418)the joint funds of National Natural Science Foundation of China and Civil Aviation Administration of China(No.U2133203).
文摘Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV.
文摘近年来,无人机群自组网(UAV Swarm Ad Hoc Network,UAVSNet)的单个UAV不断自主化与智能化,但UAV之间的协同通信仍存在挑战。媒体接入控制(Media Access Control,MAC)协议是其关键技术之一,并成为了新的研究热点。通过概述MAC协议的分类及设计要点,对竞争类MAC协议、非竞争类MAC协议以及混合类MAC协议接入机制、性能表现及不足进行详细综述并提出展望。为UAVSNet的MAC协议的研究和应用提供了理论支持。
基金supported in part by the National Key R&D Program of China(No.2022YFB3904503)National Natural Science Foundation of China(No.62172418)。
文摘The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can lead to wrong location reports and time indication.In order to deal with this threat,we proposed a scheme of anti-spoofing for BDⅡ-CNAV based on integrated information authentication.This scheme generates two type authentication information,one is authentication code information(ACI),which is applied to confirm the authenticity and reliability of satellite time information,and the other is signature information,which is used to authenticate the integrity of satellite location information and other information.Both authentication information is designed to embed into the reserved bits in BDⅡ-CNAV without changing the frame structure.In order to avoid authentication failure caused by public key error or key error,the key or public key prompt information(KPKPI)are designed to remind the receiver to update both keys in time.Experimental results indicate that the scheme can successfully detect spoofing attacks,and the authentication delay is less than 1%of the transmission delay,which meets the requirements of BDⅡ-CNAV information authentication.
文摘Introduction: Cancer is a chronic debilitating disease that unnerves patients, communities, and nations. At some point in cancer patient’s disease experience, chemotherapy is used, and the patient is expected to adhere to treatment to improve survival and quality of life. Methods: This multisite Cluster Randomized Trial (CRT) evaluated the effectiveness of mobile phone Short Message Service (SMS) support on the adherence to treatment schedules among adult cancer patients in Kenya. Data was collected using questionnaires. Ethical approvals were obtained from relevant Ethical Review Boards (ERBs). Results: The mean adherence was 83%. There was a significant difference between treatment arms in relation to the adherence. The intervention arm had a higher mean adherence difference, M = 3.913, 95% CI 2.632-5.193, t (402) = 6.006, p ≤ 0.001), with Cohen’s d = 0.60. Although not significant, (χ<sup>2</sup>dd = 0.151, df = 1, p = 2.064), more women were perfect adheres than males. Perfect adherers were satisfied with SMS support (χ<sup>2</sup>dd = 7.620, df = 1, p = 0.06), were in the intervention arm (χ<sup>2</sup>dd = 22.942, df = 1, p ≤ 0.001), and had trust in the care provider (χ<sup>2</sup>dd = 10.591 p ≤ 0.001). SMS support was not significant in the multivariate analysis but had an estimated effect size of 0.958 (z = 1.424, p = 0.154, CI = 0.242-3.781), indicating that mean adherence was slightly better in the presence of the intervention. Conclusions: SMS-support intervention has demonstrated superiority in influencing adherence. Further, health system-related factors have a significant influence on the adherence to chemotherapy treatment. Interventions to re-design health systems that are responsive to unmet care needs of cancer patients must be explored. .
文摘Introduction: The cicatricial acceleration method (MAC®) promotes photobiological effects of an anti-inflammatory and healing nature. Its therapeutic radiation is emitted, producing photobiostimulant effects that result in rapid tissue repair and better tissue quality. The treatment of burns has always been a challenge, which involves both performing surgery and controlling and guiding scar regeneration, avoiding possible morbidities. Objective: To evaluate the effects of applying the MAC methodology with an AlGa (aluminum, gallium arsenide) laser on the time and quality of tissue repair in the skin of rats after induced chemical burns. Method: 22 adult male rats were subjected to a second-degree chemical burn on the back using 50% trichloroacetic acid. After the burns, the animals were randomly separated into 2 groups: control and experimental. The control group (G1) received placebo laser therapy and the laser group (G2) underwent laser irradiation with an energy density of 100 J/cm2. Histological analysis and macroscopic evaluation were carried out by means of the paper template method. Results: Group G1 showed (53%) of the necrosis area and group G2 showed (11%) necrosis area. Conclusion: The cicatricial acceleration method (MAC®) favored the repair of wounds caused by a 2nd-degree chemical burn, optimizing time and improving quality.
文摘This study presents results from sentiment analysis of Dynamic message sign (DMS) message content, focusing on messages that include numbers of road fatalities. As a traffic management tool, DMS plays a role in influencing driver behavior and assisting transportation agencies in achieving safe and efficient traffic movement. However, the psychological and behavioral effects of displaying fatality numbers on DMS remain poorly understood;hence, it is important to know the potential impacts of displaying such messages. The Iowa Department of Transportation displays the number of fatalities on a first screen, followed by a supplemental message hoping to promote safe driving;an example is “19 TRAFFIC DEATHS THIS YEAR IF YOU HAVE A SUPER BOWL DON’T DRIVE HIGH.” We employ natural language processing to decode the sentiment and undertone of the supplementary message and investigate how they influence driving speeds. According to the results of a mixed effect model, drivers reduced speeds marginally upon encountering DMS fatality text with a positive sentiment with a neutral undertone. This category had the largest associated amount of speed reduction, while messages with negative sentiment with a negative undertone had the second largest amount of speed reduction, greater than other combinations, including positive sentiment with a positive undertone.
基金funded by Guangxi Natural Science Foundation General Project—Research on Visual Positioning and Navigation Robot Based on Deep Learning,Project Number:2023GXNSFAA026025.
文摘As an important application of intelligent transportation system,Internet of Vehicles(IoV)provides great convenience for users.Users can obtain real-time traffic conditions through the IoV’s services,plan users’travel routes,and improve travel efficiency.However,in the IoV system,there are always malicious vehicle nodes publishing false information.Therefore,it is essential to ensure the legitimacy of the source.In addition,during the peak period of vehicle travel,the vehicle releases a large number of messages,and IoV authentication efficiency is prone to performance bottlenecks.Most existing authentication schemes have the problem of low authentication efficiency in the scenario.To address the above problems,this paper designs a novel reliable anonymous authentication scheme in IoV for Rush-hour Traffic.Here,our scheme uses blockchain and elliptic curve cryptography(ECC)to design authentication algorithms for message authentication between vehicles and roadside units(RSU).Additionally,we introduce the idea of edge computing into the scheme,RSU will select themost suitable vehicle as the edge computing node for message authentication.In addition,we used the ProVerif tool for Internet security protocols and applications to test its security,ensuring that it is secure under different network attacks.In the simulation experiment,we compare our scheme with other existing works.Our scheme has a significant improvement in computational overhead,authentication efficiency and packet loss rate,and is suitable for traffic scenarios with large message volume.
基金supported by the National Key Laboratory of Wireless Communications Foundation,China (IFN20230204)。
文摘This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst interference may occur only on data symbols but not on pilot symbols, which means that interference information cannot be premeasured. To cancel the burst interference, we first revisit the uplink multi-user system and develop a matrixform system model, where the covariance pattern and the low-rank property of the interference matrix is discussed. Then, we propose a turbo message passing based burst interference cancellation(TMP-BIC) algorithm to solve the data detection problem, where the constellation information of target data is fully exploited to refine its estimate. Furthermore, in the TMP-BIC algorithm, we design one module to cope with the interference matrix by exploiting its lowrank property. Numerical results demonstrate that the proposed algorithm can effectively mitigate the adverse effects of burst interference and approach the interference-free bound.