The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the sev...The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks.展开更多
It has been suggested that text-based computer-mediated communication can help learners to use target language both in classrooms and in social contexts.It’s necessary to investigate the effect of text-based CMC on l...It has been suggested that text-based computer-mediated communication can help learners to use target language both in classrooms and in social contexts.It’s necessary to investigate the effect of text-based CMC on learners’communicative competence by conducting the method of systematic review.The findings implied that text-based CMC settings allowed learners to interact.The interaction provided learners with more opportunities to develop their communicative competence of target language.展开更多
A peculiarity of control network systems is the automatic implementation mode of monitoring and control, without outside intervention in a control process. This mode imposes rigid restrictions upon transmitted data. A...A peculiarity of control network systems is the automatic implementation mode of monitoring and control, without outside intervention in a control process. This mode imposes rigid restrictions upon transmitted data. All circulating data should comply to the defined time interval in which their reliability is definite. In other word communication has to be predictable and time-constrained in order to produce control output in time. This characteristic corresponds to concept 《determinism》 that characterizes an ability of a protocol to guarantee equivalent and opportune network access with the delay not exceeding definite time interval. For development of a deterministic and noise-resistant protocol is necessary to carry out analysis of an error model obtained by the computer simulation of an electromagnetic process in conditions of variety and intensity of interference. The formalization of the error model gives computer simulation an ability to get the error sequence directly without simulation of the electromagnetic process. The results of the simulation of an error sequence can be used for the expediency analysis of a noise-resistant encoding and the analysis of an error-correcting ability.展开更多
This paper describes the design of a prototype for an emotionally enhanced computer mediated communication system which is aimed at compensating for the emotional distance between communicators. The prototype system e...This paper describes the design of a prototype for an emotionally enhanced computer mediated communication system which is aimed at compensating for the emotional distance between communicators. The prototype system encourages the sender to take the emotional perspective of the message receiver by giving the sender a sense of how his message may affect the intended receiver, and by allowing the sender to reconsider sending the message or revise it. The objective of an emotionally enhanced communication system is to raise awareness to the ease in which a written word might be misinterpreted since emotions are too often unseen due to the nature of lean communication media. In order to show the receiver’s assumed emotion, the written text would be parsed before sending the message. An algorithm, for demonstrating the prediction of the emotion a written message might evoke, will choose a facial expression from a pool of 7 expressions, according to the words and phrases inserted in the message. We conducted a user test to evaluate the acceptance and attitudes toward such an emotionally enhanced communication system and received a high level of acceptance and favorable attitudes towards using it.展开更多
August 4-August 7, 2014 Shanghai, China http:/www.icccn.org/icccn14/ICCCN is one of the leading international conferences for presenting noel ideas and fundamental advances in the fields of computer communications and...August 4-August 7, 2014 Shanghai, China http:/www.icccn.org/icccn14/ICCCN is one of the leading international conferences for presenting noel ideas and fundamental advances in the fields of computer communications and networks. ICCCN serves to foster communication among researchers and practitioners with展开更多
An adaptive statistic model for mobile communication channel is studied and simulated in this paper. According to the model parameters, an error sequence describing the long burst error characteristics of the mobile c...An adaptive statistic model for mobile communication channel is studied and simulated in this paper. According to the model parameters, an error sequence describing the long burst error characteristics of the mobile communication channel is generated on a computer. A test method using threshold technique is presented to verify the accuracy of the adaptive channel model.展开更多
Computer video games,which are based on personal computers,game consoles,and portable devices,can be played solo or multiplayer,and over networks. Interaction,which is the basic characteristic of games,provides rich c...Computer video games,which are based on personal computers,game consoles,and portable devices,can be played solo or multiplayer,and over networks. Interaction,which is the basic characteristic of games,provides rich communication opportunities for audiences. Meanwhile,narrative is a far more diverse concept to be considered as a distinctly important way of communication. This essay will compare and contrast the communication opportunities provided by narratives and computer games.展开更多
Anonymity, an important feature of computer-mediated communication (CMC), is embedded in this new technology. With the penetration of the Internet in society, many daily activities involve online interactions. Anonymi...Anonymity, an important feature of computer-mediated communication (CMC), is embedded in this new technology. With the penetration of the Internet in society, many daily activities involve online interactions. Anonymity affects both the task and social aspects of online communication including information exchange, decision making, and relationship development. This review examines the effects of anonymity on human behavior. It outlines how the prior literature has attempted to address this issue and how the Social Identity Deindividuation (SIDE) model has developed as an attempt to tackle this question. More importantly, it discusses a framework describing the multidimensions of anonymity in CMC [1], and subsequently raised five propositions inspired by this framework. Furthermore, using McLeod’s framework, this review evaluates SIDE studies with regard to their anonymity manipulations. This critique reveals possible future research directions for refining the SIDE model and better studying the effect of anonymity in virtual environment.展开更多
Nowadays,computer-mediated communication(CMC) becomes one of the most convenient ways for people to connect with each other in which Chinese/English code-switching has been frequently used and widely spread.The articl...Nowadays,computer-mediated communication(CMC) becomes one of the most convenient ways for people to connect with each other in which Chinese/English code-switching has been frequently used and widely spread.The article will memeticly interpret this language phenomenon based on the authentic examples collected from various kinds of CMC,and point out that the Chinese/English code-switching in CMC is a kind of strong memeplex which includes many different strong memes,resulting in the popularity of Chinese/English code-switching in CMC.展开更多
AIM: To summarise and compare currently available evidence regarding accuracy of pre-operative imaging, which is one of the key choices for surgeons contemplating patient-specific instrumentation(PSI) surgery.METHODS:...AIM: To summarise and compare currently available evidence regarding accuracy of pre-operative imaging, which is one of the key choices for surgeons contemplating patient-specific instrumentation(PSI) surgery.METHODS: The MEDLINE and EMBASE medical literature databases were searched, from January 1990 to December 2013, to identify relevant studies. The data from several clinical studies was assimilated to allow appreciation and comparison of the accuracy of each modality. The overall accuracy of each modality was calculated as proportion of outliers > 3% in the coronal plane of both computerised tomography(CT) or magnetic resonance imaging(MRI). RESULTS: Seven clinical studies matched our inclusion criteria for comparison and were included in our study for statistical analysis. Three of these reported series using MRI and four with CT. Overall percentage of outliers > 3% in patients with CT-based PSI systems was 12.5% vs 16.9% for MRI-based systems. These results were not statistically significant. CONCLUSION: Although many studies have been undertaken to determine the ideal pre-operative imaging modality, conclusions remain speculative in the absence of long term data. Ultimately, information regarding accuracy of CT and MRI will be the main determining factor. Increased accuracy of pre-operative imaging could result in longer-term savings, and reduced accumulated dose of radiation by eliminating the need for post-operative imaging and revision surgery.展开更多
Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detail...Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detailed killer-applications and key technologies of 6G have not been clearly defined yet,it is commonly expected that 6G will provide hypercoverage and hyper-connectivity.Enabled by these capabilities,the 6G communication systems are especially aiming at improving the user’s experi-ence greatly,or more ambitiously,to change the way of human’s everyday life.So far,many new services with more stringent requirements,such as truly immersive extended reali¬ty(XR),high-fidelity mobile hologram,and digital replica,are expected to be satisfied by the 6G communication systems.展开更多
Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detail...Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detailed killer-applications and key technologies of 6G have not been clearly defined yet,it is commonly expected that 6G will provide hyper-coverage and hyper-connectivity.Enabled by these capabilities,the 6G communication systems are especially aiming at improving the user’s experience greatly,or more ambitiously,to change the way of human’s everyday life.So far,many new services with more stringent requirements,such as truly immersive extended reality(XR),high-fidelity mobile hologram,and digital replica,are expected to be satisfied by the 6G communication systems.展开更多
One major difference among surgical instruments is the level of bodily disruption and tissue trauma that surgical devices might cause the patients. This newly designed and developed surgical instrument aims at minimal...One major difference among surgical instruments is the level of bodily disruption and tissue trauma that surgical devices might cause the patients. This newly designed and developed surgical instrument aims at minimally invasive therapy procedure, more reliable and durable function, less operational force, and reduced manufacturing cost. The computer aided modeling and simulation have been applied to help this new instrument design and analysis. This improved new surgical instrument is designed to use in general surgery to prevent patient's vessels and tissues from being damaging due to reliable motion control of surgical clips with no unexpected clip drop. It can also be applied to surgical education purpose to educate medical students for their future surgical careers. The prototype testing indicated that the handle operational force to close surgical clips is lower than current surgical clip instruments, product manufacturing is cost-effective due to less dimensional tolerance control of this new instrument design, more reliable instrument function, and good mechanical advantage.展开更多
We previously demonstrated that inhibiting neural stem cells necroptosis enhances functional recovery after spinal cord injury.While exosomes are recognized as playing a pivotal role in neural stem cells exocrine func...We previously demonstrated that inhibiting neural stem cells necroptosis enhances functional recovery after spinal cord injury.While exosomes are recognized as playing a pivotal role in neural stem cells exocrine function,their precise function in spinal cord injury remains unclear.To investigate the role of exosomes generated following neural stem cells necroptosis after spinal cord injury,we conducted singlecell RNA sequencing and validated that neural stem cells originate from ependymal cells and undergo necroptosis in response to spinal cord injury.Subsequently,we established an in vitro necroptosis model using neural stem cells isolated from embryonic mice aged 16-17 days and extracted exosomes.The results showed that necroptosis did not significantly impact the fundamental characteristics or number of exosomes.Transcriptome sequencing of exosomes in necroptosis group identified 108 differentially expressed messenger RNAs,104 long non-coding RNAs,720 circular RNAs,and 14 microRNAs compared with the control group.Construction of a competing endogenous RNA network identified the following hub genes:tuberous sclerosis 2(Tsc2),solute carrier family 16 member 3(Slc16a3),and forkhead box protein P1(Foxp1).Notably,a significant elevation in TSC2 expression was observed in spinal cord tissues following spinal cord injury.TSC2-positive cells were localized around SRY-box transcription factor 2-positive cells within the injury zone.Furthermore,in vitro analysis revealed increased TSC2 expression in exosomal receptor cells compared with other cells.Further assessment of cellular communication following spinal cord injury showed that Tsc2 was involved in ependymal cellular communication at 1 and 3 days post-injury through the epidermal growth factor and midkine signaling pathways.In addition,Slc16a3 participated in cellular communication in ependymal cells at 7 days post-injury via the vascular endothelial growth factor and macrophage migration inhibitory factor signaling pathways.Collectively,these findings confirm that exosomes derived from neural stem cells undergoing necroptosis play an important role in cellular communication after spinal cord injury and induce TSC2 upregulation in recipient cells.展开更多
Semantic Communication(SC)has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput in wireless networ...Semantic Communication(SC)has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput in wireless networks,beyond the theoretical capacity limit.Despite the extensive research on SC,there is a lack of comprehensive survey on technologies,solutions,applications,and challenges for SC.In this article,the development of SC is first reviewed and its characteristics,architecture,and advantages are summarized.Next,key technologies such as semantic extraction,semantic encoding,and semantic segmentation are discussed and their corresponding solutions in terms of efficiency,robustness,adaptability,and reliability are summarized.Applications of SC to UAV communication,remote image sensing and fusion,intelligent transportation,and healthcare are also presented and their strategies are summarized.Finally,some challenges and future research directions are presented to provide guidance for further research of SC.展开更多
In order to solve the problem of inter-vehicle communication (IVC) in vast and desolate areas such as the desert and the Gobi, two vehicle network models are proposed. One is based on satellite communication and the...In order to solve the problem of inter-vehicle communication (IVC) in vast and desolate areas such as the desert and the Gobi, two vehicle network models are proposed. One is based on satellite communication and the other is based on high altitude platform ( HAP ) communication. The system outline and networking modes of the two models are described. In the satellite communication based model, all the vehicles are equipped with vehicle-bone satellite communication on the move terminals and the communication signals between vehicles are forwarded by satellite. In the high altitude platform-based model, the HAPs are equipped with base station facilities to form aerial base stations, and vehicles can communicate with each other via common terrestrial mobile communication devices. Some key parameters such as path loss, link loss and system capacity are also computed. The analysis shows that both the two models can satisfy the requirement of IVC in the descriptive environment.展开更多
The concept of semantic communication provides a novel approach for applications in scenarios with limited communication resources.In this paper,we propose an end-to-end(E2E)semantic molecular communication system,aim...The concept of semantic communication provides a novel approach for applications in scenarios with limited communication resources.In this paper,we propose an end-to-end(E2E)semantic molecular communication system,aiming to enhance the efficiency of molecular communication systems by reducing the transmitted information.Specifically,following the joint source channel coding paradigm,the network is designed to encode the task-relevant information into the concentration of the information molecules,which is robust to the degradation of the molecular communication channel.Furthermore,we propose a channel network to enable the E2E learning over the non-differentiable molecular channel.Experimental results demonstrate the superior performance of the semantic molecular communication system over the conventional methods in classification tasks.展开更多
The development of science and technology has made it not only possible but very convenient for people living in different parts of the world to communicate with each other, thus bringing forth a new form of communica...The development of science and technology has made it not only possible but very convenient for people living in different parts of the world to communicate with each other, thus bringing forth a new form of communication: computer-mediated communication (CMC). Text-based CMC is one of the most popular forms of CMC in which people send instant messages to others in different settings. Since this mode of interaction combines features of both the written and spoken language (Greenfield & Subrahmanyam, 2003), it's of great interest whether it follows the same sequential rule as the telephone conversation. However, compared to telephone conversations, computer-mediated communication has received much less attention, let alone text-based CMC. The existing body of literature mostly focuses on content analysis and linguistic features but neglects the sequential organization of such interaction (Paolillo, 1999; Greenfield and Subrahmanyam, 2003; Herring, 1999). In light of this, this paper examines the opening moves of instant message exchanges among Chinese adults in an attempt to find out the unique features characterizing the way they open an online chat. The framework that was chosen for data analysis was the sequential model proposed by Schegloff for American telephone openings.展开更多
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ...Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency.展开更多
This study explores the application of single photon detection(SPD)technology in underwater wireless optical communication(UWOC)and analyzes the influence of different modulation modes and error correction coding type...This study explores the application of single photon detection(SPD)technology in underwater wireless optical communication(UWOC)and analyzes the influence of different modulation modes and error correction coding types on communication performance.The study investigates the impact of on-off keying(OOK)and 2-pulse-position modulation(2-PPM)on the bit error rate(BER)in single-channel intensity and polarization multiplexing.Furthermore,it compares the error correction performance of low-density parity check(LDPC)and Reed-Solomon(RS)codes across different error correction coding types.The effects of unscattered photon ratio and depolarization ratio on BER are also verified.Finally,a UWOC system based on SPD is constructed,achieving 14.58 Mbps with polarization OOK multiplexing modulation and 4.37 Mbps with polarization 2-PPM multiplexing modulation using LDPC code error correction.展开更多
文摘The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks.
文摘It has been suggested that text-based computer-mediated communication can help learners to use target language both in classrooms and in social contexts.It’s necessary to investigate the effect of text-based CMC on learners’communicative competence by conducting the method of systematic review.The findings implied that text-based CMC settings allowed learners to interact.The interaction provided learners with more opportunities to develop their communicative competence of target language.
文摘A peculiarity of control network systems is the automatic implementation mode of monitoring and control, without outside intervention in a control process. This mode imposes rigid restrictions upon transmitted data. All circulating data should comply to the defined time interval in which their reliability is definite. In other word communication has to be predictable and time-constrained in order to produce control output in time. This characteristic corresponds to concept 《determinism》 that characterizes an ability of a protocol to guarantee equivalent and opportune network access with the delay not exceeding definite time interval. For development of a deterministic and noise-resistant protocol is necessary to carry out analysis of an error model obtained by the computer simulation of an electromagnetic process in conditions of variety and intensity of interference. The formalization of the error model gives computer simulation an ability to get the error sequence directly without simulation of the electromagnetic process. The results of the simulation of an error sequence can be used for the expediency analysis of a noise-resistant encoding and the analysis of an error-correcting ability.
文摘This paper describes the design of a prototype for an emotionally enhanced computer mediated communication system which is aimed at compensating for the emotional distance between communicators. The prototype system encourages the sender to take the emotional perspective of the message receiver by giving the sender a sense of how his message may affect the intended receiver, and by allowing the sender to reconsider sending the message or revise it. The objective of an emotionally enhanced communication system is to raise awareness to the ease in which a written word might be misinterpreted since emotions are too often unseen due to the nature of lean communication media. In order to show the receiver’s assumed emotion, the written text would be parsed before sending the message. An algorithm, for demonstrating the prediction of the emotion a written message might evoke, will choose a facial expression from a pool of 7 expressions, according to the words and phrases inserted in the message. We conducted a user test to evaluate the acceptance and attitudes toward such an emotionally enhanced communication system and received a high level of acceptance and favorable attitudes towards using it.
文摘August 4-August 7, 2014 Shanghai, China http:/www.icccn.org/icccn14/ICCCN is one of the leading international conferences for presenting noel ideas and fundamental advances in the fields of computer communications and networks. ICCCN serves to foster communication among researchers and practitioners with
基金National Natural Science Foundation of China(No.69372004)
文摘An adaptive statistic model for mobile communication channel is studied and simulated in this paper. According to the model parameters, an error sequence describing the long burst error characteristics of the mobile communication channel is generated on a computer. A test method using threshold technique is presented to verify the accuracy of the adaptive channel model.
文摘Computer video games,which are based on personal computers,game consoles,and portable devices,can be played solo or multiplayer,and over networks. Interaction,which is the basic characteristic of games,provides rich communication opportunities for audiences. Meanwhile,narrative is a far more diverse concept to be considered as a distinctly important way of communication. This essay will compare and contrast the communication opportunities provided by narratives and computer games.
文摘Anonymity, an important feature of computer-mediated communication (CMC), is embedded in this new technology. With the penetration of the Internet in society, many daily activities involve online interactions. Anonymity affects both the task and social aspects of online communication including information exchange, decision making, and relationship development. This review examines the effects of anonymity on human behavior. It outlines how the prior literature has attempted to address this issue and how the Social Identity Deindividuation (SIDE) model has developed as an attempt to tackle this question. More importantly, it discusses a framework describing the multidimensions of anonymity in CMC [1], and subsequently raised five propositions inspired by this framework. Furthermore, using McLeod’s framework, this review evaluates SIDE studies with regard to their anonymity manipulations. This critique reveals possible future research directions for refining the SIDE model and better studying the effect of anonymity in virtual environment.
文摘Nowadays,computer-mediated communication(CMC) becomes one of the most convenient ways for people to connect with each other in which Chinese/English code-switching has been frequently used and widely spread.The article will memeticly interpret this language phenomenon based on the authentic examples collected from various kinds of CMC,and point out that the Chinese/English code-switching in CMC is a kind of strong memeplex which includes many different strong memes,resulting in the popularity of Chinese/English code-switching in CMC.
文摘AIM: To summarise and compare currently available evidence regarding accuracy of pre-operative imaging, which is one of the key choices for surgeons contemplating patient-specific instrumentation(PSI) surgery.METHODS: The MEDLINE and EMBASE medical literature databases were searched, from January 1990 to December 2013, to identify relevant studies. The data from several clinical studies was assimilated to allow appreciation and comparison of the accuracy of each modality. The overall accuracy of each modality was calculated as proportion of outliers > 3% in the coronal plane of both computerised tomography(CT) or magnetic resonance imaging(MRI). RESULTS: Seven clinical studies matched our inclusion criteria for comparison and were included in our study for statistical analysis. Three of these reported series using MRI and four with CT. Overall percentage of outliers > 3% in patients with CT-based PSI systems was 12.5% vs 16.9% for MRI-based systems. These results were not statistically significant. CONCLUSION: Although many studies have been undertaken to determine the ideal pre-operative imaging modality, conclusions remain speculative in the absence of long term data. Ultimately, information regarding accuracy of CT and MRI will be the main determining factor. Increased accuracy of pre-operative imaging could result in longer-term savings, and reduced accumulated dose of radiation by eliminating the need for post-operative imaging and revision surgery.
文摘Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detailed killer-applications and key technologies of 6G have not been clearly defined yet,it is commonly expected that 6G will provide hypercoverage and hyper-connectivity.Enabled by these capabilities,the 6G communication systems are especially aiming at improving the user’s experi-ence greatly,or more ambitiously,to change the way of human’s everyday life.So far,many new services with more stringent requirements,such as truly immersive extended reali¬ty(XR),high-fidelity mobile hologram,and digital replica,are expected to be satisfied by the 6G communication systems.
文摘Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detailed killer-applications and key technologies of 6G have not been clearly defined yet,it is commonly expected that 6G will provide hyper-coverage and hyper-connectivity.Enabled by these capabilities,the 6G communication systems are especially aiming at improving the user’s experience greatly,or more ambitiously,to change the way of human’s everyday life.So far,many new services with more stringent requirements,such as truly immersive extended reality(XR),high-fidelity mobile hologram,and digital replica,are expected to be satisfied by the 6G communication systems.
文摘One major difference among surgical instruments is the level of bodily disruption and tissue trauma that surgical devices might cause the patients. This newly designed and developed surgical instrument aims at minimally invasive therapy procedure, more reliable and durable function, less operational force, and reduced manufacturing cost. The computer aided modeling and simulation have been applied to help this new instrument design and analysis. This improved new surgical instrument is designed to use in general surgery to prevent patient's vessels and tissues from being damaging due to reliable motion control of surgical clips with no unexpected clip drop. It can also be applied to surgical education purpose to educate medical students for their future surgical careers. The prototype testing indicated that the handle operational force to close surgical clips is lower than current surgical clip instruments, product manufacturing is cost-effective due to less dimensional tolerance control of this new instrument design, more reliable instrument function, and good mechanical advantage.
基金supported by the National Natural Science Foundation of China,No.81801907(to NC)Shenzhen Key Laboratory of Bone Tissue Repair and Translational Research,No.ZDSYS20230626091402006(to NC)+2 种基金Sanming Project of Medicine in Shenzhen,No.SZSM201911002(to SL)Foundation of Shenzhen Committee for Science and Technology Innovation,Nos.JCYJ20230807110310021(to NC),JCYJ20230807110259002(to JL)Science and Technology Program of Guangzhou,No.2024A04J4716(to TL)。
文摘We previously demonstrated that inhibiting neural stem cells necroptosis enhances functional recovery after spinal cord injury.While exosomes are recognized as playing a pivotal role in neural stem cells exocrine function,their precise function in spinal cord injury remains unclear.To investigate the role of exosomes generated following neural stem cells necroptosis after spinal cord injury,we conducted singlecell RNA sequencing and validated that neural stem cells originate from ependymal cells and undergo necroptosis in response to spinal cord injury.Subsequently,we established an in vitro necroptosis model using neural stem cells isolated from embryonic mice aged 16-17 days and extracted exosomes.The results showed that necroptosis did not significantly impact the fundamental characteristics or number of exosomes.Transcriptome sequencing of exosomes in necroptosis group identified 108 differentially expressed messenger RNAs,104 long non-coding RNAs,720 circular RNAs,and 14 microRNAs compared with the control group.Construction of a competing endogenous RNA network identified the following hub genes:tuberous sclerosis 2(Tsc2),solute carrier family 16 member 3(Slc16a3),and forkhead box protein P1(Foxp1).Notably,a significant elevation in TSC2 expression was observed in spinal cord tissues following spinal cord injury.TSC2-positive cells were localized around SRY-box transcription factor 2-positive cells within the injury zone.Furthermore,in vitro analysis revealed increased TSC2 expression in exosomal receptor cells compared with other cells.Further assessment of cellular communication following spinal cord injury showed that Tsc2 was involved in ependymal cellular communication at 1 and 3 days post-injury through the epidermal growth factor and midkine signaling pathways.In addition,Slc16a3 participated in cellular communication in ependymal cells at 7 days post-injury via the vascular endothelial growth factor and macrophage migration inhibitory factor signaling pathways.Collectively,these findings confirm that exosomes derived from neural stem cells undergoing necroptosis play an important role in cellular communication after spinal cord injury and induce TSC2 upregulation in recipient cells.
基金supported by the Natural Science Foundation of China under Grants 61971084,62025105,62001073,62272075the National Natural Science Foundation of Chongqing under Grants cstc2021ycjh-bgzxm0039,cstc2021jcyj-msxmX0031+1 种基金the Science and Technology Research Program for Chongqing Municipal Education Commission KJZD-M202200601the Support Program for Overseas Students to Return to China for Entrepreneurship and Innovation under Grants cx2021003,cx2021053.
文摘Semantic Communication(SC)has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput in wireless networks,beyond the theoretical capacity limit.Despite the extensive research on SC,there is a lack of comprehensive survey on technologies,solutions,applications,and challenges for SC.In this article,the development of SC is first reviewed and its characteristics,architecture,and advantages are summarized.Next,key technologies such as semantic extraction,semantic encoding,and semantic segmentation are discussed and their corresponding solutions in terms of efficiency,robustness,adaptability,and reliability are summarized.Applications of SC to UAV communication,remote image sensing and fusion,intelligent transportation,and healthcare are also presented and their strategies are summarized.Finally,some challenges and future research directions are presented to provide guidance for further research of SC.
基金FThe National High Technology Research and Development Program of China (863 Program) (No. 2008AA01Z205)the Specialized Development Foundation for the Achievement Transformation of Jiangsu Province (No. BA2010023)+1 种基金the Natural Science Foundation of Hainan Province (No. 609008)Sanya University and Local Government Technological Cooperative Project (No. 2010YD29)
文摘In order to solve the problem of inter-vehicle communication (IVC) in vast and desolate areas such as the desert and the Gobi, two vehicle network models are proposed. One is based on satellite communication and the other is based on high altitude platform ( HAP ) communication. The system outline and networking modes of the two models are described. In the satellite communication based model, all the vehicles are equipped with vehicle-bone satellite communication on the move terminals and the communication signals between vehicles are forwarded by satellite. In the high altitude platform-based model, the HAPs are equipped with base station facilities to form aerial base stations, and vehicles can communicate with each other via common terrestrial mobile communication devices. Some key parameters such as path loss, link loss and system capacity are also computed. The analysis shows that both the two models can satisfy the requirement of IVC in the descriptive environment.
基金supported by the Beijing Natural Science Foundation(L211012)the Natural Science Foundation of China(62122012,62221001)the Fundamental Research Funds for the Central Universities(2022JBQY004)。
文摘The concept of semantic communication provides a novel approach for applications in scenarios with limited communication resources.In this paper,we propose an end-to-end(E2E)semantic molecular communication system,aiming to enhance the efficiency of molecular communication systems by reducing the transmitted information.Specifically,following the joint source channel coding paradigm,the network is designed to encode the task-relevant information into the concentration of the information molecules,which is robust to the degradation of the molecular communication channel.Furthermore,we propose a channel network to enable the E2E learning over the non-differentiable molecular channel.Experimental results demonstrate the superior performance of the semantic molecular communication system over the conventional methods in classification tasks.
文摘The development of science and technology has made it not only possible but very convenient for people living in different parts of the world to communicate with each other, thus bringing forth a new form of communication: computer-mediated communication (CMC). Text-based CMC is one of the most popular forms of CMC in which people send instant messages to others in different settings. Since this mode of interaction combines features of both the written and spoken language (Greenfield & Subrahmanyam, 2003), it's of great interest whether it follows the same sequential rule as the telephone conversation. However, compared to telephone conversations, computer-mediated communication has received much less attention, let alone text-based CMC. The existing body of literature mostly focuses on content analysis and linguistic features but neglects the sequential organization of such interaction (Paolillo, 1999; Greenfield and Subrahmanyam, 2003; Herring, 1999). In light of this, this paper examines the opening moves of instant message exchanges among Chinese adults in an attempt to find out the unique features characterizing the way they open an online chat. The framework that was chosen for data analysis was the sequential model proposed by Schegloff for American telephone openings.
基金the Deanship of Scientific Research,Vice Presidency for Graduate Studies and Scientific Research,King Faisal University,Saudi Arabia(Grant No.GRANT5,208).
文摘Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency.
基金supported in part by the National Natural Science Foundation of China(Nos.62071441 and 61701464)in part by the Fundamental Research Funds for the Central Universities(No.202151006).
文摘This study explores the application of single photon detection(SPD)technology in underwater wireless optical communication(UWOC)and analyzes the influence of different modulation modes and error correction coding types on communication performance.The study investigates the impact of on-off keying(OOK)and 2-pulse-position modulation(2-PPM)on the bit error rate(BER)in single-channel intensity and polarization multiplexing.Furthermore,it compares the error correction performance of low-density parity check(LDPC)and Reed-Solomon(RS)codes across different error correction coding types.The effects of unscattered photon ratio and depolarization ratio on BER are also verified.Finally,a UWOC system based on SPD is constructed,achieving 14.58 Mbps with polarization OOK multiplexing modulation and 4.37 Mbps with polarization 2-PPM multiplexing modulation using LDPC code error correction.