Resource Type

Journal Article 27

Year

2023 3

2022 4

2020 2

2019 3

2018 3

2017 3

2013 1

2010 1

2006 1

2005 2

2002 4

open ︾

Keywords

Reinforcement learning 2

2.048 Mb/s high speed signalling link 1

API protocol mining 1

Active queue management 1

Buffer occupancy 1

CALLG2008 1

Chaotic systems 1

Chaum-Pedersen proof 1

Cheating detection 1

Cloud data 1

Cloud storage 1

Consensus 1

Coronavirus disease 2019 1

Cross layering 1

Cyber-physical system 1

Data integrity 1

Data privacy 1

Data sharing 1

Dynamic taint analysis 1

Efficacy 1

open ︾

Search scope:

排序: Display mode:

Development of pretreatment protocol for DNA extraction from biofilm attached to biologic activated carbon

Shuting ZHANG, Bo WEI, Xin YU, Bing LIU, Zhuoying WU, Li GU

Frontiers of Environmental Science & Engineering 2010, Volume 4, Issue 4,   Pages 459-465 doi: 10.1007/s11783-010-0249-3

Abstract: This protocol was further tested using the vertical BAC samples from the full-scale biofilter of PinghuAll results suggested that the final protocol could produce qualified genomic DNA as a template from

Keywords: bacterial DNA extraction     biological activated carbon (BAC)     biofilm     water treatment     pretreatment protocol    

Research and Realization of IP Multicast Routing Protocol

Li Wei

Strategic Study of CAE 2002, Volume 4, Issue 1,   Pages 82-88

Abstract:

This paper first explains why IP multicasting must be used. Then it summaries the fundamentals of IP multicasting and multicast routing protocols. After that it specially discusses protoool independent multicast-sparse mode (PIM-SM), points out its defect and proposes a scheme to solve it. In this scheme each source registers and sends data packets toward multiple rendezvous points (RPs) but receivers only join to a single RP. If one of the RPs fails, receivers will join to one of the alternative RPs quickly. On implementation, the paper centers on the details of implementing PIM-SM. Finally it discusses the problems and prospect of IP multicasting.

Keywords: protocol independent multicast-sparse mode (PIM-SM)     multiple rendezvous     point (RPs)     multicast    

Hardware Module of Multi-Protocol Tester Based on the Specification of 2.0 Mb/s High Speed Signalling

Liu Zhihui

Strategic Study of CAE 2002, Volume 4, Issue 2,   Pages 79-85

Abstract: Protocol and signalling are becoming more and more important.Since there is no related protocol testing equipment used for telecommunication branch, The 2.048 Mb/s high speed signalling protocol-analyzing set is developed for this purpose.

Keywords: 2.048 Mb/s high speed signalling link     embedded processor     real time operating system     protocol-analyzing    

Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis Research Articles

Rongkuan MA, Hao ZHENG, Jingyi WANG, Mufeng WANG, Qiang WEI, Qiang WEI,rongkuan233@gmail.com,zjuzhenghao@gmail.com,wangjyee@gmail.com,csewmf@zju.edu.cn,weiqiang66@126.com,wangqingxian2015@163.com

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 3,   Pages 351-360 doi: 10.1631/FITEE.2000709

Abstract: Conventional protocol reverse engineering methods have been proposed which are considered time-consumingRecently, automatical protocol reverse engineering methods have been proposed which are, however, neitherfields from protocol implementations.framework (ICSPRF) that aims to extract ICS protocol fields with high accuracy.We evaluate our approach with six open-source ICS protocol implementations.

Keywords: Industrial control system (ICS)     ICS protocol reverse engineering     Dynamic taint analysis     Protocol format    

Efficacy and prognostic factors of imatinib plus CALLG2008 protocol in adult patients with newly diagnosed

Yinjun Lou, Yafang Ma, Chenyin Li, Sansan Suo, Hongyan Tong, Wenbin Qian, Wenyuan Mai, Haitao Meng, Wenjuan Yu, Liping Mao, Juyin Wei, Weilei Xu, Jie Jin

Frontiers of Medicine 2017, Volume 11, Issue 2,   Pages 229-238 doi: 10.1007/s11684-017-0506-y

Abstract:

A CALLG2008 protocol was developed by the Chinese Acute Lymphoblastic Leukemia Cooperative Group forAll these results suggested that imatinib plus CALLG2008 was an effective protocol for Ph-positive ALL

Keywords: Philadelphia chromosome     acute lymphoblastic leukemia     imatinib     CALLG2008    

Performance analysis of the stop-and-wait automatic repeat request protocol under Markovian interruptions Regular Papers-Research Articles

Dashdondov KHONGORZUL, Yong-Ki KIM, Mi-Hye KIM

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 9,   Pages 1296-1306 doi: 10.1631/FITEE.1700185

Abstract: integrated packet voice/data multiplexer using a stop-and-wait (SW) automatic repeat request (ARQ) protocolof buffer occupancy to simplify the analysis, and discover that data multiplexers using the SW ARQ protocol

Keywords: Stop-and-wait ARQ protocol     Markovian interruptions     Poisson distribution     Buffer occupancy     Waiting time    

Automatic discovery of stateful variables in network protocol software based on replay analysis Research Article

Jianxin HUANG, Bo YU, Runhao LIU, Jinshu SU

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 3,   Pages 403-416 doi: 10.1631/FITEE.2200275

Abstract: and store some information about the sessions are prone to potential flaws caused by violations of protocolDiscovering such variables is significant in discovering and exploiting vulnerabilities in protocol softwareBased on recording and replaying a protocol program's execution, varieties of variables in the life cycle

Keywords: Stateful variables     Network protocol software     Program analysis technology     Network security    

A Cyber-Physical Routing Protocol Exploiting Trajectory Dynamics for Mission-Oriented Flying Ad Hoc Article

Die Hu, Shaoshi Yang, Min Gong, Zhiyong Feng, Xuejun Zhu

Engineering 2022, Volume 19, Issue 12,   Pages 217-227 doi: 10.1016/j.eng.2021.10.022

Abstract: The routing protocol plays a pivotal role in FANET.However, when designing the routing protocol for FANET, it is conventionally assumed that the aerialIn this paper, a novel cyber-physical routing protocol exploiting the particular mobility pattern ofCompared with the existing representative routing protocols used in FANETs, our protocol achieves a higher

Keywords: Cyber-physical system     Flying ad hoc network (FANET)     Routing protocol     Trajectory dynamics     Unmanned    

Research and Implementation of IP - VPN

Li Xiuzhong

Strategic Study of CAE 2002, Volume 4, Issue 3,   Pages 84-91

Abstract:

Recently, IP - VPN is proposed as a way satisfying large company´s inter-connect requirement because of the prevalence of Internet. But there are some problems to be solved, especially security and QoS. In this paper, one way of network-based VPN QoS is proposed based on analysis of some available QoS algorithms. For IP - VPN, now there are several mechanisms: VLL, VPRN, VPLS and VPDN. This paper places emphasis on VPRN and VPLS. Two kinds of VPRN: BGP/MPLS and VR are discussed and compared with each other. And besides, VLAN, one way of VPLS, is introduced.

Keywords: virtual private routed network (VPRN)     virtual private LAN segment (VPLS)     border gateway protocol / multi-protocol    

Chaotic digital cryptosystem using serial peripheral interface protocol and its dsPIC implementation None

Rodrigo MÉNDEZ-RAMÍREZ, Adrian ARELLANO-DELGADO, César CRUZ-HERNÁNDEZ, Fausto ABUNDIZ-PÉREZ, Rigoberto MARTÍNEZ-CLARK

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 2,   Pages 165-179 doi: 10.1631/FITEE.1601346

Abstract: digital communications demands a secure link by using an embedded system (ES) with data encryption at the protocolThe serial peripheral interface (SPI) protocol is commonly used by manufacturers of ESs and integratedexperimental implementation of a chaotic encryption and decryption algorithm applied to the SPI communication protocolThe SPI protocol is configured in 16 bits to synchronize a transmitter and a receiver considering a symmetric

Keywords: systems     Statistical tests     Embedded systems     dsPIC microcontroller     Serial peripheral interface (SPI) protocol    

Application of Mobile Agent in Intelligent Transportation System (ITS)

Zhang Yunyong,Liu Jinde

Strategic Study of CAE 2002, Volume 4, Issue 7,   Pages 46-50

Abstract:

The history and architecture of intelligent transportation system is reviewed. After the excellence of mobile agent is introduced,the application of mobile agent in intelligent transportation system is focused from the following fields: network management, wireless communication, traffic control system, simulation system and graphics information system.

Keywords: control system     graphics information system (GIS)     agent communication language (ACL)     agent transfer protocol    

Technology Development and Application of Blockchain: Current Status and Challenges

Sun Yi,Fan Lingjun and Hong Xuehai

Strategic Study of CAE 2018, Volume 20, Issue 2,   Pages 27-32 doi: 10.15302/J-SSCAE-2018.02.005

Abstract:

Blockchain, as the backbone of the future "Internet of Value" model, is considered to have the potential to significantly alter the current state of the economy and society. This paper explains the state-of-the-art development in blockchain technologies (e.g. blockchain architecture, consensus algorithm, privacy preserving, smart contract, and chain interoperability) and its applications, especially considering the technological challenges encountered when blockchain is widely applied in different domains. Furthermore, respectively from the perspective of technology, talent and supervision, we propose suggestions that could facilitate the further development of blockchain in China.

Keywords: high-throughput blockchain     consensus protocol     smart contract     cross-chain communication    

Fairness analysis of extra-gain guilty of a non-repudiation protocol Research Articles

Xu GUO

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 6,   Pages 893-908 doi: 10.1631/FITEE.2100413

Abstract: E-fairness is measured by modeling the protocol in probabilistic timed automata and verifying the appropriateanalysis proposes insight for choosing suitable values for different parameters associated with the protocolTherefore, the reverse question—for a certain degree of fairness ε, how can the protocol

Keywords: Non-repudiation     Fairness analysis     Probabilistic model checking     PRISM    

Cryptanalysis of an identity-based public auditing protocol for cloud storage Comment

Li-bing WU, Jing WANG, De-biao HE, Muhammad-Khurram KHAN

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 12,   Pages 1972-1977 doi: 10.1631/FITEE.1601530

Abstract: Recently, Tan and Jia (2014) proposed an identity-based public verification (NaEPASC) protocol for cloud

Keywords: Cloud data     Public auditing     Data integrity     Data privacy    

Approximation Space of Generalization and Rough Classification Algebra

Liu Yonghong

Strategic Study of CAE 2006, Volume 8, Issue 3,   Pages 39-48

Abstract: quantum logic classification, bit quantum symmetric classification, incomparable set, bit space set, protocolrelation, rough set function of protocol relation, rough classification algebra, rough simple algebraBased on the protocol relation, the rough quotient algebra and the rough subalgebra are constructed.

Keywords: approximation space of generalization     rough set     rough classification algebra     protocol relation     rough    

Title Author Date Type Operation

Development of pretreatment protocol for DNA extraction from biofilm attached to biologic activated carbon

Shuting ZHANG, Bo WEI, Xin YU, Bing LIU, Zhuoying WU, Li GU

Journal Article

Research and Realization of IP Multicast Routing Protocol

Li Wei

Journal Article

Hardware Module of Multi-Protocol Tester Based on the Specification of 2.0 Mb/s High Speed Signalling

Liu Zhihui

Journal Article

Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis

Rongkuan MA, Hao ZHENG, Jingyi WANG, Mufeng WANG, Qiang WEI, Qiang WEI,rongkuan233@gmail.com,zjuzhenghao@gmail.com,wangjyee@gmail.com,csewmf@zju.edu.cn,weiqiang66@126.com,wangqingxian2015@163.com

Journal Article

Efficacy and prognostic factors of imatinib plus CALLG2008 protocol in adult patients with newly diagnosed

Yinjun Lou, Yafang Ma, Chenyin Li, Sansan Suo, Hongyan Tong, Wenbin Qian, Wenyuan Mai, Haitao Meng, Wenjuan Yu, Liping Mao, Juyin Wei, Weilei Xu, Jie Jin

Journal Article

Performance analysis of the stop-and-wait automatic repeat request protocol under Markovian interruptions

Dashdondov KHONGORZUL, Yong-Ki KIM, Mi-Hye KIM

Journal Article

Automatic discovery of stateful variables in network protocol software based on replay analysis

Jianxin HUANG, Bo YU, Runhao LIU, Jinshu SU

Journal Article

A Cyber-Physical Routing Protocol Exploiting Trajectory Dynamics for Mission-Oriented Flying Ad Hoc

Die Hu, Shaoshi Yang, Min Gong, Zhiyong Feng, Xuejun Zhu

Journal Article

Research and Implementation of IP - VPN

Li Xiuzhong

Journal Article

Chaotic digital cryptosystem using serial peripheral interface protocol and its dsPIC implementation

Rodrigo MÉNDEZ-RAMÍREZ, Adrian ARELLANO-DELGADO, César CRUZ-HERNÁNDEZ, Fausto ABUNDIZ-PÉREZ, Rigoberto MARTÍNEZ-CLARK

Journal Article

Application of Mobile Agent in Intelligent Transportation System (ITS)

Zhang Yunyong,Liu Jinde

Journal Article

Technology Development and Application of Blockchain: Current Status and Challenges

Sun Yi,Fan Lingjun and Hong Xuehai

Journal Article

Fairness analysis of extra-gain guilty of a non-repudiation protocol

Xu GUO

Journal Article

Cryptanalysis of an identity-based public auditing protocol for cloud storage

Li-bing WU, Jing WANG, De-biao HE, Muhammad-Khurram KHAN

Journal Article

Approximation Space of Generalization and Rough Classification Algebra

Liu Yonghong

Journal Article