Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Language
      Language
      Clear All
      Language
  • Subject
      Subject
      Clear All
      Subject
  • Item Type
      Item Type
      Clear All
      Item Type
  • Discipline
      Discipline
      Clear All
      Discipline
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
6,876 result(s) for "Transmission Control Protocol/Internet Protocol (Computer network protocol)"
Sort by:
Interconnecting smart objects with IP : the next Internet
Interconnecting Smart Objects with IP: The Next Internet explains why the Internet Protocol (IP) has become the protocol of choice for smart object networks. IP has successfully demonstrated the ability to interconnect billions of digital systems on the global Internet and in private IP networks. Once smart objects can be easily interconnected, a whole new class of smart object systems can begin to evolve. The book discusses how IP-based smart object networks are being designed and deployed. The book is organized into three parts. Part 1 demonstrates why the IP architecture is well suited to smart object networks, in contrast to non-IP based sensor network or other proprietary systems that interconnect to IP networks (e.g. the public Internet of private IP networks) via hard-to-manage and expensive multi-protocol translation gateways that scale poorly. Part 2 examines protocols and algorithms, including smart objects and the low power link layers technologies used in these networks. Part 3 describes the following smart object network applications: smart grid, industrial automation, smart cities and urban networks, home automation, building automation, structural health monitoring, and container tracking. Shows in detail how connecting smart objects impacts our lives with practical implementation examples and case studies Provides an in depth understanding of the technological and architectural aspects underlying smart objects technology Offers an in-depth examination of relevant IP protocols to build large scale smart object networks in support of a myriad of new services
CaO–SiOsub.2–Psub.2Osub.5–Bsub.2Osub.3-Based Bioactive Glass Macrobeads Incorporated in Hydrogels Aid Bone Regeneration: Evaluation in Rabbit Calvarial and Femoral Defect Models
Bone graft substitutes are extensively investigated for addressing critical-size bone defects; however, their efficacy is limited by inadequate bone regeneration and subpar handling properties. Herein, we compared the bone regenerative capacity of CaO–SiO[sub.2]–P[sub.2]O[sub.5]–B[sub.2]O[sub.3]-based bioactive glass (BGS-7) macrobeads with that of β-tricalcium phosphate (β-TCP) beads and evaluated their performance when incorporated into hydrogels to improve their handling properties. BGS-7 macrobeads were fabricated via alginate crosslinking and heat treatment, and their physicochemical properties and microstructures were characterized. In a rabbit calvarial defect model, BGS-7 macrobeads, heat-treated at 600 and 800 °C, exhibited superior bone bridging and degradation than size-matched β-TCP macrobeads. To further evaluate their regenerative potential, critical-size defects (6 mm diameter × 10 mm depth) were created in the rabbit femoral condyle. To enhance clinical applicability, BGS-7 beads were incorporated into cellulose-based hydrogels and implanted into the defects. Radiographic and histomorphometric analyses demonstrated that bone formation and stable fixation achieved with hydrogel formulations containing BGS-7 microbeads and Laponite were more pronounced than those with BGS-7 beads alone. The findings suggest that BGS-7 macrobeads, particularly when combined with microbead- and Laponite-containing hydrogels, represent a promising bone graft substitute with improved regenerative and handling properties compared with using BGS-7 beads alone.
Assessing a Methodology for Evaluating the Latency of IPv6 with SCHC Compression in LoRaWAN Deployments
The Internet of Things (IoT) approach relies on the use of the Internet Protocol (IP) as a pervasive network protocol. IP acts as a “glue” for interconnecting end devices (on the field side) and end users, leveraging on very diverse lower-level and upper-level protocols. The need for scalability would suggest the adoption of IPv6, but the large overhead and payloads do not match with the constraints dictated by common wireless solutions. For this reason, compression strategies have been proposed to avoid redundant information in the IPv6 header and to provide fragmentation and reassembly of long messages. For example, the Static Context Header Compression (SCHC) protocol has been recently referenced by the LoRa Alliance as a standard IPv6 compression scheme for LoRaWAN-based applications. In this way, IoT end points can seamlessly share an end-to-end IP link. However, implementation details are out of the specifications’ scope. For this reason, formal test procedures for comparing solutions from different providers are important. In this paper, a test method for assessing architectural delays of real-world deployments of SCHC-over-LoRaWAN implementations is presented. The original proposal includes a mapping phase, for identifying information flows, and a subsequent evaluation phase, in which flows are timestamped and time-related metrics are computed. The proposed strategy has been tested in different use cases involving LoRaWAN backends deployed all around the world. The feasibility of the proposed approach has been tested by measuring the end-to-end latency of IPv6 data in sample use cases, obtaining a delay of less than 1 s. However, the main result is the demonstration that the suggested methodology permits a comparison of the behavior of IPv6 with SCHC-over-LoRaWAN, allowing the optimization of choices and parameters during deployment and commissioning of both infrastructure components and software.
Replay-Attack Detection and Prevention Mechanism in Industry 4.0 Landscape for Secure SECS/GEM Communications
Starting from the First Industrial Revolution to the current and Fourth Industrial Revolution (or Industry 4.0), various industrial machines are present in the market and manufacturing companies. As standardized protocols have become increasingly popular, more utilities are switching to Internet Protocol (IP)-based systems for wide-area communication. SECS/GEM is one of the standards that permit industries to collect information directly from the machines, either using RS323 or TCP/IP communication. TCP/IP communication is becoming more critical than ever, especially given our accelerated digital transformation and increasing reliance on communication technologies. The growth of IT is accelerating with cyberthreats as well. In contrast, security features in the SECS/GEM protocol may be neglected by some companies as it is only used in factories and not mostly used in the outside world. However, communication of SECS/GEM is highly susceptible to various cyberattacks. This paper analyzes the potential replay-attack cyberattacks that can occur on a SECS/GEM system. In replay attacks, this paper supposes an adversary that wants to damage an operation-based control system in an ongoing condition. The adversary has the ability to capture messages to watch and record their contents for a predetermined amount of time, record them, and then replay them while attacking in order to inject an exogenous control input undetected. The paper’s objectives are to prove that SECS/GEM communication is vulnerable to cyberattack and design a detection mechanism to protect SECS/GEM communications from replay attacks. The methodology implements a simulation of the replay-attack mechanism on SECS/GEM communication. The results indicate that the design mechanism detected replay attacks against SECS/GEM communications and successfully prevented them.
Bio-Activation of HA/β-TCP Porous Scaffolds by High-Pressure COsub.2 Surface Remodeling: A Novel “Coating-from” Approach
Biphasic macroporous Hydroxyapatite/β-Tricalcium Phosphate (HA/β-TCP) scaffolds (BCPs) are widely used for bone repair. However, the high-temperature HA and β-TCP phases exhibit limited bioactivity (low solubility of HA, restricted surface area, low ion release). Strategies were developed to coat such BCPs with biomimetic apatite to enhance bioactivity. However, this can be associated with poor adhesion, and metastable solutions may prove difficult to handle at the industrial scale. Alternative strategies are thus desirable to generate a highly bioactive surface on commercial BCPs. In this work, we developed an innovative “coating from” approach for BCP surface remodeling via hydrothermal treatment under supercritical CO[sub.2], used as a reversible pH modifier and with industrial scalability. Based on a set of complementary tools including FEG-SEM, solid state NMR and ion exchange tests, we demonstrate the remodeling of macroporous BCP surface with the occurrence of dissolution–reprecipitation phenomena involving biomimetic CaP phases. The newly precipitated compounds are identified as bone-like nanocrystalline apatite and octacalcium phosphate (OCP), both known for their high bioactivity character, favoring bone healing. We also explored the effects of key process parameters, and showed the possibility to dope the remodeled BCPs with antibacterial Cu[sup.2+] ions to convey additional functionality to the scaffolds, which was confirmed by in vitro tests. This new process could enhance the bioactivity of commercial BCP scaffolds via a simple and biocompatible approach.
A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach
The Domain Name System (DNS) protocol essentially translates domain names to IP addresses, enabling browsers to load and utilize Internet resources. Despite its major role, DNS is vulnerable to various security loopholes that attackers have continually abused. Therefore, delivering secure DNS traffic has become challenging since attackers use advanced and fast malicious information-stealing approaches. To overcome DNS vulnerabilities, the DNS over HTTPS (DoH) protocol was introduced to improve the security of the DNS protocol by encrypting the DNS traffic and communicating it over a covert network channel. This paper proposes a lightweight, double-stage scheme to identify malicious DoH traffic using a hybrid learning approach. The system comprises two layers. At the first layer, the traffic is examined using random fine trees (RF) and identified as DoH traffic or non-DoH traffic. At the second layer, the DoH traffic is further investigated using Adaboost trees (ADT) and identified as benign DoH or malicious DoH. Specifically, the proposed system is lightweight since it works with the least number of features (using only six out of thirty-three features) selected using principal component analysis (PCA) and minimizes the number of samples produced using a random under-sampling (RUS) approach. The experiential evaluation reported a high-performance system with a predictive accuracy of 99.4% and 100% and a predictive overhead of 0.83 µs and 2.27 µs for layer one and layer two, respectively. Hence, the reported results are superior and surpass existing models, given that our proposed model uses only 18% of the feature set and 17% of the sample set, distributed in balanced classes.
Doping of Hollow Urchin-like MnOsub.2 Nanoparticles in Beta-Tricalcium Phosphate Scaffold Promotes Stem Cell Osteogenic Differentiation
Effective osteogenesis for bone regeneration is still considerably challenging for a porous β-tricalcium phosphate (β-TCP) scaffold to achieve. To overcome this challenge, hollow manganese dioxide (H-MnO[sub.2]) nanoparticles with an urchin-like shell structure were prepared and added in the porous β-TCP scaffold. A template-casting method was used to prepare the porous H-MnO[sub.2]/β-TCP scaffolds. As a control, solid manganese dioxide (S-MnO[sub.2]) nanoparticles were also added into β-TCP scaffolds. Human bone mesenchymal stem cells (hBMSC) were seeded in the porous scaffolds and characterized through cell viability assay and alkaline phosphatase (ALP) assay. Results from in vitro protein loading and releasing experiments showed that H-MnO[sub.2] can load significantly higher proteins and release more proteins compared to S-MnO[sub.2] nanoparticles. When they were doped into β-TCP, MnO[sub.2] nanoparticles did not significantly change the surface wettability and mechanical properties of porous β-TCP scaffolds. In vitro cell viability results showed that MnO[sub.2] nanoparticles promoted cell proliferation in a low dose, but inhibited cell growth when the added concentration went beyond 0.5%. At a range of lower than 0.5%, H-MnO[sub.2] doped β-TCP scaffolds promoted the early osteogenesis of hBMSCs. These results suggested that H-MnO[sub.2] in the porous β-TCP scaffold has promising potential to stimulate osteogenesis. More studies would be performed to demonstrate the other functions of urchin-like H-MnO[sub.2] nanoparticles in the porous β-TCP.
A Multimaterial Scaffold With Tunable Properties: Toward Bone Tissue Repair
Polyetheretherketone (PEEK)/β‐tricalcium phosphate (β‐TCP) scaffolds are expected to be able to combine the excellent mechanical strength of PEEK and the good bioactivity and biodegradability of β‐TCP. While PEEK acts as a closed membrane in which β‐TCP is completely wrapped after the melting/solidifying processing, the PEEK membrane degrades very little, hence the scaffolds cannot display bioactivity and biodegradability. The strategy reported here is to blend a biodegradable polymer with PEEK and β‐TCP to fabricate multi‐material scaffolds via selective laser sintering (SLS). The biodegradable polymer first degrades and leaves caverns on the closed membrane, and then the wrapped β‐TCP is exposed to body fluid. In this study, poly(l‐lactide) (PLLA) is adopted as the biodegradable polymer. The results show that large numbers of caverns form on the membrane with the degradation of PLLA, enabling direct contact between β‐TCP and body fluid, and allowing for their ion‐exchange. As a consequence, the scaffolds display the bioactivity, biodegradability and cytocompatibility. Moreover, bone defect repair studies reveal that new bone tissues grow from the margin towards the center of the scaffolds from the histological analysis. The bone defect region is completely connected to the host bone end after 8 weeks of implantation. The biodegradation test of scaffolds reveals that many caverns form on the closed membrane due to poly(l‐lactide) (PLLA) degradation, and the caverns become larger and deeper with increasing PLLA content. As a result, the wrapped β‐tricalcium phosphate (β‐TCP) particles are exposed from the membrane into body fluid environment.
Analysis of factors affecting IoT-based smart hospital design
Currently, rapidly developing digital technological innovations affect and change the integrated information management processes of all sectors. The high efficiency of these innovations has inevitably pushed the health sector into a digital transformation process to optimize the technologies and methodologies used to optimize healthcare management systems. In this transformation, the Internet of Things (IoT) technology plays an important role, which enables many devices to connect and work together. IoT allows systems to work together using sensors, connection methods, internet protocols, databases, cloud computing, and analytic as infrastructure. In this respect, it is necessary to establish the necessary technical infrastructure and a suitable environment for the development of smart hospitals. This study points out the optimization factors, challenges, available technologies, and opportunities, as well as the system architecture that come about by employing IoT technology in smart hospital environments. In order to do that, the required technical infrastructure is divided into five layers and the system infrastructure, constraints, and methods needed in each layer are specified, which also includes the smart hospital’s dimensions and extent of intelligent computing and real-time big data analytic. As a result of the study, the deficiencies that may arise in each layer for the smart hospital design model and the factors that should be taken into account to eliminate them are explained. It is expected to provide a road map to managers, system developers, and researchers interested in optimization of the design of the smart hospital system.