The trustworthiness and security of routing in the existing Peer-to-Peer (P2P) networks can not be ensured because of the diversity of the strategies of P2P nodes. This paper firstly uses game theory to establish game...The trustworthiness and security of routing in the existing Peer-to-Peer (P2P) networks can not be ensured because of the diversity of the strategies of P2P nodes. This paper firstly uses game theory to establish game model of the strategies and profits of various types of routing nodes. Then,two incentive mechanisms for the corresponding stages of P2P trustworthy routing are proposed,namely trust associated mechanism and trust compensated mechanism. Simulation results show that the incentive mechanisms proposed in this paper will encourage cooperation actions of good nodes and restrain malicious actions of bad nodes,which ensure the trustworthiness of routing consequently.展开更多
The rapid development of Internet has led to the explosion of information sharing, and how to supervise the sharing is a main research topic on current Internet. Aiming at the disadvantage that the current Peer-to-Pee...The rapid development of Internet has led to the explosion of information sharing, and how to supervise the sharing is a main research topic on current Internet. Aiming at the disadvantage that the current Peer-to-Peer (P2P) is hard to manage and control, this paper presents a Session Initial Protocol (SIP)-based P2P network of three-level architecture. SIP middleware is introduced to the middle level of the three-layer architecture. By the connection function of the SIP signaling, the P2P transmission on media-level can be controlled. Using SIP’s register and authentication function, the manage layer can manage the whole P2P network. Based on the aforementioned architecture, this paper investigates the grouping strategy on a live broadcast application in P2P network. Combined with the function of SIP register, the paper works on several grouping strategies, sets up models to manage users by grouping them, presents a weight-based K-means IP address grouping algorithm, and realizes it. The experiment shows that the grouping strategy presented in this paper can solve the problem of group sharing of network resource, and can realize the efficient-sharing, reasonable-distributing of network resource.展开更多
In this paper, we conduct research on the reasonable strategy of the development of commercial banks under the perspective of P2P Internet financial risks. P2P financial model mainly for China' s small and medium ent...In this paper, we conduct research on the reasonable strategy of the development of commercial banks under the perspective of P2P Internet financial risks. P2P financial model mainly for China' s small and medium enterprises and individuals to provides financing services. Generally need to use e-commerce professional network platform lending to help both sides to establish lending relationship and complete the related formalities. Traditional commercial banks need reform to keep up with the novel financial tools related to the Internet financing which will be discussed below.展开更多
The entity and symbolic fraction comparison tasks separating identification and semantic access stages based on event-related potential technology were used to investigate neural differences between fraction and decim...The entity and symbolic fraction comparison tasks separating identification and semantic access stages based on event-related potential technology were used to investigate neural differences between fraction and decimal strategies in magnitude processing of nonsymbolic entities and symbolic numbers.The experimental results show that continuous entities elicit stronger left-lateralized anterior N2 in decimals,while discretized ones elicit more significant right-lateralized posterior N2 in fractions during the identification stage.On the other hand,decimals elicit stronger N2 over the left-lateralized fronto-central sites while fractions elicit the more profound P2 over the right-lateralized fronto-central sites and N2 at biparietal regions during the semantic access stage.Hence,for nonsymbolic entity processing,alignments of decimals and continuous entities activate the phonological network,while alignments of fractions and discretized entities trigger the visuospatial regions.For symbolic numbers processing,exact strategies with rote arithmetic retrieval in verbal format are used in decimal processing,while approximate strategies with complex magnitude processing in a visuospatial format are used in fraction processing.展开更多
With the development of smart home energy management technology,prosumers are endowed with increased initiative in peer-to-peer(P2P)transactions,bringing new potential for cost savings.In this study,a novel strategic ...With the development of smart home energy management technology,prosumers are endowed with increased initiative in peer-to-peer(P2P)transactions,bringing new potential for cost savings.In this study,a novel strategic P2P energy trading framework is proposed considering the impact of network constraints on personal transaction strategies.Prosumers can estimate the allowed power injection before engaging in the P2P energy trading,which is solved in a distributed manner based on the sharing form alternating direction method of multipliers(ADMM)algorithm.To quantify the network usage cost for each prosumer and promote local transactions among prosumers at the same bus,a modified continuous double auction(CDA)matching algorithm is proposed including a transaction fee.An adaptive aggressiveness-based bidding strategy is generated considering the risk of uncertainty in real-time energy delivery amount under the limitations of the distribution network.The proposed strategic P2P energy trading framework is tested with the IEEE 37-bus distribution network and it is effective in creating profits for prosumers and supporting distribution network operations.展开更多
In recent years, the strategy of inhibiting the interactions of p53 with murine double minute 2(MDM2)and murine double minute X(MDMX) has been proved to be a promising approach for tumor therapy.However, the poor prot...In recent years, the strategy of inhibiting the interactions of p53 with murine double minute 2(MDM2)and murine double minute X(MDMX) has been proved to be a promising approach for tumor therapy.However, the poor proteolytical stability and low intracellular delivery efficiency of peptide inhibitors limit their clinical application. Here, we designed and synthesized the bicyclic stapled peptides based on p53 by combining all-hydrocarbon stapling and lactam stapling strategies. We demonstrated that bicyclic stapled peptide p53-16 significantly improved α-helicity and proteolytic stability. Especially, p53-16showed nanomolar binding affinity for MDM2 and MDMX. In addition, p53-16 could penetrate the cell membrane, and selectively inhibited the activity of tumor cells via activating p53 pathway in vitro. Our data suggest that p53-16 is a potential dual inhibitor of MDM2 and MDMX interactions. The bicyclic stapling strategy is a promising drug design strategy for protein–protein interactions inhibitors.展开更多
It is universally acknowledged by network security experts that proactive peer-to-peer (P2P) worms may soon en-gender serious threats to the Internet infrastructures. These latent threats stimulate activities of model...It is universally acknowledged by network security experts that proactive peer-to-peer (P2P) worms may soon en-gender serious threats to the Internet infrastructures. These latent threats stimulate activities of modeling and analysis of the proactive P2P worm propagation. Based on the classical two-factor model,in this paper,we propose a novel proactive worm propagation model in unstructured P2P networks (called the four-factor model) by considering four factors:(1) network topology,(2) countermeasures taken by Internet service providers (ISPs) and users,(3) configuration diversity of nodes in the P2P network,and (4) attack and defense strategies. Simulations and experiments show that proactive P2P worms can be slowed down by two ways:improvement of the configuration diversity of the P2P network and using powerful rules to reinforce the most connected nodes from being compromised. The four-factor model provides a better description and prediction of the proactive P2P worm propagation.展开更多
Different from the single paths between controllers and plants of networked control systems(NCSs), the complex network provides widespread links and brings plenty of paths from the controller side to the plant side. B...Different from the single paths between controllers and plants of networked control systems(NCSs), the complex network provides widespread links and brings plenty of paths from the controller side to the plant side. Benefit from this advantage, a novel data transmission dispatching strategy is proposed. When the direct path can not satisfy the condition of system demand, neither stability nor performance, some specified paths compose a concurrent-path to transmit the control signal concurrently. Firstly, the networked control systems(NCSs) are expressed by the switched systems model with the constant network-induced delay, and the network communication is described as a packet-loss process. Secondly, taking system's exponential decay rate as its performance indicator, the relationship between control signal transmission paths and system performance is quantitatively given by considering packet losses as the compound poisson process and the alternating renewal process. Then, due to that different combination of paths induces the different statistical properties of packet losses, the approach to find an appropriate concurrent-path is proposed concerning two mutually constrained factors, the system performance demand and the utilization of network resources. After the theoretical analysis, a distributed communication platform based on peer-to-peer(P2P) network technology is designed and implemented to realize the concurrent-path transmission on internet. Finally, the practical experiment on the platform demonstrates the validity and effectiveness of proposed approach.展开更多
基金Supported by the Hi-Tech R&D Program (863) of China (2006AA01Z232)the Research Innovation Program for Graduate Student in Jiangsu Province (CX07B-11OZ)
文摘The trustworthiness and security of routing in the existing Peer-to-Peer (P2P) networks can not be ensured because of the diversity of the strategies of P2P nodes. This paper firstly uses game theory to establish game model of the strategies and profits of various types of routing nodes. Then,two incentive mechanisms for the corresponding stages of P2P trustworthy routing are proposed,namely trust associated mechanism and trust compensated mechanism. Simulation results show that the incentive mechanisms proposed in this paper will encourage cooperation actions of good nodes and restrain malicious actions of bad nodes,which ensure the trustworthiness of routing consequently.
基金Supported in part by the Hi-Tech R&D Program (863) of China (2006AA01Z444)the CNGI 2006 Application Demonstration Program (The IPv6 Distributed Multi-media Communication System Based On SIP and WISI/WIMAX )Tsinghua-Microsoft Key Laboratory Fund Project
文摘The rapid development of Internet has led to the explosion of information sharing, and how to supervise the sharing is a main research topic on current Internet. Aiming at the disadvantage that the current Peer-to-Peer (P2P) is hard to manage and control, this paper presents a Session Initial Protocol (SIP)-based P2P network of three-level architecture. SIP middleware is introduced to the middle level of the three-layer architecture. By the connection function of the SIP signaling, the P2P transmission on media-level can be controlled. Using SIP’s register and authentication function, the manage layer can manage the whole P2P network. Based on the aforementioned architecture, this paper investigates the grouping strategy on a live broadcast application in P2P network. Combined with the function of SIP register, the paper works on several grouping strategies, sets up models to manage users by grouping them, presents a weight-based K-means IP address grouping algorithm, and realizes it. The experiment shows that the grouping strategy presented in this paper can solve the problem of group sharing of network resource, and can realize the efficient-sharing, reasonable-distributing of network resource.
文摘In this paper, we conduct research on the reasonable strategy of the development of commercial banks under the perspective of P2P Internet financial risks. P2P financial model mainly for China' s small and medium enterprises and individuals to provides financing services. Generally need to use e-commerce professional network platform lending to help both sides to establish lending relationship and complete the related formalities. Traditional commercial banks need reform to keep up with the novel financial tools related to the Internet financing which will be discussed below.
基金The National Natural Science Foundation of China(No.62077013,61773114)the Jiangsu Provincial Innovation Project for Scientific Research of Graduate Students in Universities(No.KYCX17_0160).
文摘The entity and symbolic fraction comparison tasks separating identification and semantic access stages based on event-related potential technology were used to investigate neural differences between fraction and decimal strategies in magnitude processing of nonsymbolic entities and symbolic numbers.The experimental results show that continuous entities elicit stronger left-lateralized anterior N2 in decimals,while discretized ones elicit more significant right-lateralized posterior N2 in fractions during the identification stage.On the other hand,decimals elicit stronger N2 over the left-lateralized fronto-central sites while fractions elicit the more profound P2 over the right-lateralized fronto-central sites and N2 at biparietal regions during the semantic access stage.Hence,for nonsymbolic entity processing,alignments of decimals and continuous entities activate the phonological network,while alignments of fractions and discretized entities trigger the visuospatial regions.For symbolic numbers processing,exact strategies with rote arithmetic retrieval in verbal format are used in decimal processing,while approximate strategies with complex magnitude processing in a visuospatial format are used in fraction processing.
基金supported in part by the National Key R&D Program of China(No.2018YFB0905000)in part by the National Natural Science Foundation of China(No.51877189)+1 种基金the Joint Program of National Natural Science Foundation of China(No.U2166203)in part by the Zhejiang Provincial Natural Science Foundation of China(No.LR22E070003)。
文摘With the development of smart home energy management technology,prosumers are endowed with increased initiative in peer-to-peer(P2P)transactions,bringing new potential for cost savings.In this study,a novel strategic P2P energy trading framework is proposed considering the impact of network constraints on personal transaction strategies.Prosumers can estimate the allowed power injection before engaging in the P2P energy trading,which is solved in a distributed manner based on the sharing form alternating direction method of multipliers(ADMM)algorithm.To quantify the network usage cost for each prosumer and promote local transactions among prosumers at the same bus,a modified continuous double auction(CDA)matching algorithm is proposed including a transaction fee.An adaptive aggressiveness-based bidding strategy is generated considering the risk of uncertainty in real-time energy delivery amount under the limitations of the distribution network.The proposed strategic P2P energy trading framework is tested with the IEEE 37-bus distribution network and it is effective in creating profits for prosumers and supporting distribution network operations.
基金supported by National Natural Science Foundation of China-Shandong Joint Fund (No. U1606403)Innovation Project of Qingdao National Laboratory for Marine Science and Technology (No. 2015ASKJ02)。
文摘In recent years, the strategy of inhibiting the interactions of p53 with murine double minute 2(MDM2)and murine double minute X(MDMX) has been proved to be a promising approach for tumor therapy.However, the poor proteolytical stability and low intracellular delivery efficiency of peptide inhibitors limit their clinical application. Here, we designed and synthesized the bicyclic stapled peptides based on p53 by combining all-hydrocarbon stapling and lactam stapling strategies. We demonstrated that bicyclic stapled peptide p53-16 significantly improved α-helicity and proteolytic stability. Especially, p53-16showed nanomolar binding affinity for MDM2 and MDMX. In addition, p53-16 could penetrate the cell membrane, and selectively inhibited the activity of tumor cells via activating p53 pathway in vitro. Our data suggest that p53-16 is a potential dual inhibitor of MDM2 and MDMX interactions. The bicyclic stapling strategy is a promising drug design strategy for protein–protein interactions inhibitors.
基金Project (No. 09511501600) partially supported by the Science and Technology Commission of Shanghai Municipality, China
文摘It is universally acknowledged by network security experts that proactive peer-to-peer (P2P) worms may soon en-gender serious threats to the Internet infrastructures. These latent threats stimulate activities of modeling and analysis of the proactive P2P worm propagation. Based on the classical two-factor model,in this paper,we propose a novel proactive worm propagation model in unstructured P2P networks (called the four-factor model) by considering four factors:(1) network topology,(2) countermeasures taken by Internet service providers (ISPs) and users,(3) configuration diversity of nodes in the P2P network,and (4) attack and defense strategies. Simulations and experiments show that proactive P2P worms can be slowed down by two ways:improvement of the configuration diversity of the P2P network and using powerful rules to reinforce the most connected nodes from being compromised. The four-factor model provides a better description and prediction of the proactive P2P worm propagation.
基金supported in part by the National Natural Science Foundation of China under Grant Nos.61333003 and 61690212
文摘Different from the single paths between controllers and plants of networked control systems(NCSs), the complex network provides widespread links and brings plenty of paths from the controller side to the plant side. Benefit from this advantage, a novel data transmission dispatching strategy is proposed. When the direct path can not satisfy the condition of system demand, neither stability nor performance, some specified paths compose a concurrent-path to transmit the control signal concurrently. Firstly, the networked control systems(NCSs) are expressed by the switched systems model with the constant network-induced delay, and the network communication is described as a packet-loss process. Secondly, taking system's exponential decay rate as its performance indicator, the relationship between control signal transmission paths and system performance is quantitatively given by considering packet losses as the compound poisson process and the alternating renewal process. Then, due to that different combination of paths induces the different statistical properties of packet losses, the approach to find an appropriate concurrent-path is proposed concerning two mutually constrained factors, the system performance demand and the utilization of network resources. After the theoretical analysis, a distributed communication platform based on peer-to-peer(P2P) network technology is designed and implemented to realize the concurrent-path transmission on internet. Finally, the practical experiment on the platform demonstrates the validity and effectiveness of proposed approach.