摘要 :
We have witnessed the Fixed Internet emerging with virtually every computer being connected today; we are currently witnessing the emergence of the Mobile Internet with the exponential explosion of smart phones, tablets and net-bo...
展开
We have witnessed the Fixed Internet emerging with virtually every computer being connected today; we are currently witnessing the emergence of the Mobile Internet with the exponential explosion of smart phones, tablets and net-books. However, both will be dwarfed by the anticipated emergence of the Internet of Things (IoT), in which everyday objects are able to connect to the Internet, tweet or be queried. Whilst the impact onto economies and societies around the world is undisputed, the technologies facilitating such a ubiquitous connectivity have struggled so far and only recently commenced to take shape. To this end, this paper introduces in a timely manner and for the first time the wireless communications stack the industry believes to meet the important criteria of power-efficiency, reliability and Internet connectivity. Industrial applications have been the early adopters of this stack, which has become the de-facto standard, thereby bootstrapping early IoT developments with already thousands of wireless nodes deployed. Corroborated throughout this paper and by emerging industry alliances, we believe that a standardized approach, using latest developments in the IEEE 802.15.4 and IETF working groups, is the only way forward. We introduce and relate key embodiments of the power-efficient IEEE 802.15.4-2006 PHY layer, the power-saving and reliable IEEE 802.15.4e MAC layer, the IETF 6LoWPAN adaptation layer enabling universal Internet connectivity, the IETF ROLL routing protocol enabling availability, and finally the IETF CoAP enabling seamless transport and support of Internet applications. The protocol stack proposed in the present work converges towards the standardized notations of the ISO/OSI and TCP/IP stacks. What thus seemed impossible some years back, i.e., building a clearly defined, standards-compliant and Internet-compliant stack given the extreme restrictions of IoT networks, is commencing to become reality.
收起
摘要 :
The recent advent of ubiquitous technologies has raised an important concern for citizens: the need to protect their privacy. So far, this wish was not heard of industrials, but national and international regulation authorities, a...
展开
The recent advent of ubiquitous technologies has raised an important concern for citizens: the need to protect their privacy. So far, this wish was not heard of industrials, but national and international regulation authorities, as the European Commission recently published some guidelines to enforce customers' privacy in RFID systems: "Privacy by designâ is the way to be followed as stated in EC Recommendation of 12.5.2009. Research on privacy is an active domain but there is still a wide gap between theory and everyday life's applications. Filling this gap will require academia to design protocols and algorithms that fit the real-life constraints. In this paper, we provide a comprehensive analysis of privacy-friendly authentication protocols devoted to RFID that: 1) are based on well-established symmetric-key cryptographic building blocks; 2) require a reader complexity lower than $(O(N))$ where $(N)$ is the number of provers in the system. These two properties are sine qua non conditions for deploying privacy-friendly authentication protocols in large-scale applications, for example, access control in mass transportation. We describe existing protocols fulfilling these requirements and point out their drawbacks and weaknesses. We especially introduce attacks on CHT, CTI,YA-TRAP*, and the variant of OSK/AO with mutual authentication. We also raise that some protocols, such as O-RAP, O-FRAP, and OSK/BF, are not resistant to timing attacks. Finally, we select some candidates that are, according to our criteria, the most appropriate ones for practical uses.
收起
摘要 :
STUDY DESIGN: Retrospective review. OBJECTIVE: The purpose of this study was to assess the preoperative neurologic risk in a consecutive series of spinal deformity patients undergoing correction surgery at one institution. SUMMARY...
展开
STUDY DESIGN: Retrospective review. OBJECTIVE: The purpose of this study was to assess the preoperative neurologic risk in a consecutive series of spinal deformity patients undergoing correction surgery at one institution. SUMMARY OF BACKGROUND DATA: During spinal deformity correction surgery, neurologic monitoring techniques are commonly applied to reduce the risk of neurologic deficits. While previous studies have demonstrated risk factors for neurologic changes in the setting of spinal surgery, these involved long time spans and heterogeneous patient populations. METHODS: Of 301 cases performed over 1 year, 281 cases were monitorable. Patients were grouped according to diagnosis: neuromuscular (NM) scoliosis, Sagittal Plane deformity, and Scoliosis. Demographic and surgical data were collected for neurologically monitorable patients. Coronal and sagittal parameters were measured using digital images of radiographs. Neurologic status was measured with somatosensory-evoked potentials and/or motor-evoked potentials. RESULTS: Primary NM scoliosis cases had the highest incidence of neurologic monitoring changes (NMC) (10%) while revision sagittal plane deformity had the second highest (9.8%). Sensitivity and specificity were both 100%. Overall incidence of neurologic deficit was 1.1%. Of the 13 NMCs patients, 3 patients had persistent neurologic deficit. Majority of NMCs occurred before deformity correction. In patients with NM scoliosis, NMCs increased with hybrid constructs with wires (P < 0.01). In patients with scoliosis, NMCs increased with increased body mass index, estimated blood loss, operative time, and postoperative coronal thoracolumbar curve magnitude (P < 0.04). In patients with primarily sagittal plane deformity, NMCs increased with preoperative proximal curve, postoperative proximal and thoracolumbar curves, and postoperative kyphosis and lordosis (P < 0.04). CONCLUSION: Primary NM scoliosis and revision sagittal plane deformities appear to carry greatest incidence of NMCs during surgical intervention. Most observed NMCs did not result in a permanent neurologic deficit. Neuromonitoring should be assessed throughout the entire surgical procedure. This study may aid surgeons and patients to better assess neurologic risks related to spinal deformity surgery.
收起
摘要 :
We revisit the problem of the quarter-filled one-dimensional Kondo lattice model, for which the existence of a dimerized phase and a nonzero charge gap had been reported by Xavier et al. [Phys. Rev. Lett. 90, 247204 (2003)]. Recen...
展开
We revisit the problem of the quarter-filled one-dimensional Kondo lattice model, for which the existence of a dimerized phase and a nonzero charge gap had been reported by Xavier et al. [Phys. Rev. Lett. 90, 247204 (2003)]. Recently, some objections were raised claiming that the system is neither dimerized nor has a charge gap. In the interest of clarifying this important issue, we show that these objections are based on results obtained under conditions in which the dimer order is artificially suppressed. We use the incontrovertible dimerized phase of the Majumdar-Ghosh point of the J_1 -J_2 Heisenberg model as a paradigm with which to illustrate this artificial suppression. Finally, by means of extremely accurate density-matrix renormalization-group calculations, we show that the charge gap is indeed nonzero in the dimerized phase.
收起
摘要 :
PURPOSE: The use of ureteral stents for ureteral obstruction and after ureteroscopy can result in substantial deterioration in patient quality of life due to pain, frequency and urgency. We postulated that many stent related sympt...
展开
PURPOSE: The use of ureteral stents for ureteral obstruction and after ureteroscopy can result in substantial deterioration in patient quality of life due to pain, frequency and urgency. We postulated that many stent related symptoms may be related to detrusor muscle spasm in and around the intramural ureter, and evaluated the effect of botulinum toxin type A (Botox) in patients with indwelling stents after ureteroscopy. MATERIALS AND METHODS: A total of 51 patients between December 2007 and March 2009 were enrolled in an institutional review board approved, prospective, randomized, single-blind study comparing botulinum toxin type A injection at a concentration of 10 U/ml to 3 locations around the ureteral orifice (30) vs no injection after unilateral ureteral stent insertion (21). Pain and urinary symptoms after stent placement were evaluated through the Ureteral Stent Symptom Questionnaire, which was completed on postoperative day 7. In addition, patients were required to maintain a log of narcotic use after stent placement until removal. The Wilcoxon rank sum and Fisher exact tests were used for nonparametric and categorical data, respectively, with p 收起