In event-driven wireless sensor networks, many redundant packets flow from monitored sites through the network and to the sink, resulting in a typical funnel effect which affects event reliability, negatively. Taking ...
详细信息
In event-driven wireless sensor networks, many redundant packets flow from monitored sites through the network and to the sink, resulting in a typical funnel effect which affects event reliability, negatively. Taking this transport property into account, a differentiated priority queue management scheme is presented, in which the packets with same event identification are prioritized according to their arrival sequence, and scheduled differentially. The queue model, packet prioritization strategy and event table maintaining methods are examined in detail. Simulation results show that the queue management scheme can improve event reliability of event-driven sensor networks in terms of event detection ratio, accuracy ratio, and event delay efficiently.
Background:MicroRNAs(miRNAs) are a class of small non-coding RNAs,which negatively regulate protein coding genes at the posttranscriptional *** tiny regulators have been associated to almost all known physiological an...
详细信息
Background:MicroRNAs(miRNAs) are a class of small non-coding RNAs,which negatively regulate protein coding genes at the posttranscriptional *** tiny regulators have been associated to almost all known physiological and pathological *** defects in miRNAs have been implicated in the etiology of many forms of human diseases. Apoptosis,autophagy and programmed necrosis are three distinct yet intimately connected functional modules of programmed cell death(PCD).In the past few years,increasing evidences suggested that aberrant expression of miRNAs regulate different subroutines of *** the roles of miRNAs in PCD network has attracted interests of researchers from a wide range of ***,a knowledge depository,which integrates information for both miRNAs and their targets in PCD network,will be of great help. Methods:Based on PubMed search,we firstly collected literatures which reported the roles of miRNAs in PCD before April ***,these literatures were inspected manually and the miRNAs and their targets genes were *** criterion for selecting PCD associated miRNAs in miRDeathDB is *** morphological or biochemical data should be provided when the miRNAs(or their targets) are manipulated in cell death *** miRDeathDB(http://***/mirdeathdb/) was developed,which allows users to browse,search and analyze the PCD associated miRNAs. Results:In total,210 records covering 86 miRNAs and 95 protein coding genes were collected in five model species:humans(Homo sapiens),mice(Mus musculus),fruit flies (Drosophila melanogaster),rat(Rattus norvegicus) and African frog(Xenopus tropicalis). Users can search the database for both miRNAs and protein coding entries based on principal *** addition,users can browse and obtain full lists of miRNAs involved in PCD for any given *** data can be freely downloaded or accessed via our website for academic uses. Conclusions:miRDeathDB provides a valuab
Considering that intravenous in blood infusion, usually applied without a proper control of the progress and velocity under unreliable manual monitoring practice, is the most popular and frequent clinical activity thr...
详细信息
The flow and congestion control methods based on one-shot game model with non-cooperative game theory can explain the non-cooperative behavior of Internet ***,the low effciency of equilibrium solutions affects their *...
详细信息
The flow and congestion control methods based on one-shot game model with non-cooperative game theory can explain the non-cooperative behavior of Internet ***,the low effciency of equilibrium solutions affects their *** the behavior of flow and congestion control based on infinitely repeated game models is addressed;the repeated and infinitely repeated flow and congestion control game model is presented; the existence and optimization of the Nash equilibrium point are proved;the discount factor in repeated game is discussed;the punishment and threat strategy to users'misbehavior is studied in N-users infinitely flow control game;the punishment restrictive method of users'behavior is designed in infinitely and finitely games;finally,a flow control algorithm based on repeated game,FCAR,is provided based on the conclusions of repeated game *** results of experiment and simulation show that FCAR algorithm could regularize and restrict users' misbehavior *** algorithm can also make non-cooperative Internet users achieve cooperation in order to optimize the utility of the whole flow and congestion control system.
Smart grid is envisioned as a critical application of cyber-physical systems and of the internet of things. In the smart grid, smart meters equipped with wireless sensors can upload meter readings (data) to smart gr...
详细信息
Smart grid is envisioned as a critical application of cyber-physical systems and of the internet of things. In the smart grid, smart meters equipped with wireless sensors can upload meter readings (data) to smart grid control and schedule centers via the advanced metering infrastructure to improve power delivery efficiency. However, data gathered in short intervals, such as 15 minutes, will expose customers' detailed daily activities (for example, when they get up and when they use oven) using nonintrusive appliance load monitoring. Thus, data must be hidden to protect customers' privacy. However, data accountability is still required for emergency responses or to trace back suspected intrusions, even though the data is anonymous. In addition to desired security requirements, this imposes two extra tasks: Sensors in smart meters usually have resource constraints; thus, the desired security protocols have to remain lightweight in terms of computation and storage cost. Furthermore, scalability and flexibility are required since there exist vast meters. This paper presents a lightweight Privacy-aware yet Accountable Secure Scheme called PASS which guarantees privacy-aware accountability yet tackles the above challenges in the smart grid. A formal secu- rity analysis justifies that PASS can attain the security goals, while a performance analysis verifies that PASS requires few computations, and is scalable and flexible.
Vehicular Ad hoc networks (VANET) consists of several vehicular nodes and uses 802.11p protocol for communication. Because of its unique characteristics, such as fast speed, serious Doppler effect, large node number e...
详细信息
we present a robust and universal quantum secret sharing protocol with four-qubit decoherence-free (DF) states against collective noise. The transmission's safety is ensured by the nonorthogonality of the noiseless...
详细信息
we present a robust and universal quantum secret sharing protocol with four-qubit decoherence-free (DF) states against collective noise. The transmission's safety is ensured by the nonorthogonality of the noiseless states traveling on the quantum channel. Although this scheme uses entangled states for encoding, only single-particle product measurements are required.
Recently Vadim Lyubashevsky etc. built LWE problem on ring and proposed a public cryptosystem based on R-LWE, which, to a certain extent, solved the defect of large public key of this kind, but it didn't offer par...
详细信息
Broadcast is a hot topic in wireless sensor network research. The main challenges are from network instability and complexity of communication collision. Currently, the broadcast protocols for sensor network focus on ...
详细信息
A new security test for the substitution boxes (S-boxes) high-order bit independence criterion (HOBIC) test, is presented. Different from the previous security tests for S-boxes, the HOBIC test can be used to meas...
详细信息
A new security test for the substitution boxes (S-boxes) high-order bit independence criterion (HOBIC) test, is presented. Different from the previous security tests for S-boxes, the HOBIC test can be used to measure the strength of an S-box against attacks that keep some of its input bits constant. Test results over the S-boxes of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) are given and some possible applications of the HOBIC test are analyzed. Meanwhile, the source code for a basic version of the HOBIC test is also provided, the implement process of which shows that it is very fast and efficient for practical applications .
暂无评论