You are currently viewing a new version of our website. To view the old version click .

11,782 Results Found

  • Article
  • Open Access
2 Citations
2,883 Views
20 Pages

12 August 2022

Many CAN-based session key sharing approaches are based on the group key scheme, which can easily lead advanced adversaries to infiltrate all ECUs (electronic control units) in the network if the sharing key is leaked. To address the above problem, w...

  • Article
  • Open Access
9 Citations
4,114 Views
19 Pages

7 August 2023

In this article, a hybrid powertrain for the Volkswagen (VW) Crafter is designed using the Model-In-The-Loop (MIL) method. An enhanced Proportional-Integral (PI) control technique based on integral cost functions is developed by carrying out a time-b...

  • Article
  • Open Access
2 Citations
2,898 Views
21 Pages

13 November 2022

With the rapid development of the Internet of Vehicles, the increase in vehicle functional requirements has led to the continuous increase in complex electronic systems, and the in-vehicle network is extremely vulnerable to network attacks. The contr...

  • Article
  • Open Access
4 Citations
2,695 Views
13 Pages

11 November 2021

In-vehicle electronic control unit (ECU) communications generally count on private protocols (defined by the manufacturers) under controller area network (CAN) specifications. Parsing the private protocols for a particular vehicle model would be of g...

  • Article
  • Open Access
15 Citations
8,408 Views
11 Pages

Time-Synchronization Method for CAN–Ethernet Networks with Gateways

  • Hyeong Jun Kim,
  • Uri Lee,
  • Manho Kim and
  • Suk Lee

11 December 2020

Time-synchronization technology can provide a common notion of time among the participating nodes on a network. This is essential not only for protocol operation for time-critical services but also for the time stamp for information included in the m...

  • Article
  • Open Access
1,369 Views
32 Pages

Can Artificial Intelligence Write Like Borges? An Evaluation Protocol for Spanish Microfiction

  • Gerardo Aleman Manzanarez,
  • Nora de la Cruz Arana,
  • Jorge Garcia Flores,
  • Yobany Garcia Medina,
  • Raul Monroy and
  • Nathalie Pernelle

17 June 2025

Automated story writing has been a subject of study for over 60 years. Today, large language models can generate narratively consistent and linguistically coherent short fiction texts. Despite these advancements, rigorous assessment of such outputs i...

  • Article
  • Open Access
19 Citations
4,168 Views
17 Pages

12 November 2019

Security has become critical for in-vehicle networks as they carry safety-critical data from various components, e.g., sensors or actuators, and current research proposals were quick to react with cryptographic protocols designed for in-vehicle buses...

  • Article
  • Open Access
1 Citations
1,927 Views
27 Pages

Research on Lightweight Dynamic Security Protocol for Intelligent In-Vehicle CAN Bus

  • Yuanhao Wang,
  • Yinan Xu,
  • Zhiquan Liu,
  • Suya Liu and
  • Yujing Wu

27 May 2025

With the integration of an increasing number of outward-facing components in intelligent and connected vehicles, the open controller area network (CAN) bus environment faces increasingly severe security threats. However, existing security measures re...

  • Article
  • Open Access
1,661 Views
23 Pages

Can Foot Orthoses Prevent Falls? A Proposal for a New Evaluation Protocol

  • Matteo Montesissa,
  • Ilaria Raimondi,
  • Nicola Baldini,
  • Antonio Mazzotti and
  • Lorenzo Brognara

27 January 2025

Foot pain represents one of the most common symptoms in lower limb issues, especially in elderly individuals. This condition, often associated with other pathologies, increases the risk of falling. To better understand the risk of falls, it is essent...

  • Article
  • Open Access
15 Citations
6,045 Views
15 Pages

Design of CAN Bus Communication Interfaces for Forestry Machines

  • Geoffrey Spencer,
  • Frutuoso Mateus,
  • Pedro Torres,
  • Rogério Dionísio and
  • Ricardo Martins

8 November 2021

This paper presents the initial developments of new hardware devices targeted for CAN (Controller Area Network) bus communications in forest machines. CAN bus is a widely used protocol for communications in the automobile area. It is also applied in...

  • Review
  • Open Access
2,226 Views
23 Pages

19 March 2025

This study investigates the integration of smart card readers into vehicle ignition systems as a multifaceted solution to enhance security, regulatory compliance, and road safety. By implementing real-time driver verification, encryption protocols (A...

  • Article
  • Open Access
32 Citations
6,225 Views
19 Pages

V-SOC4AS: A Vehicle-SOC for Improving Automotive Security

  • Vita Santa Barletta,
  • Danilo Caivano,
  • Mirko De Vincentiis,
  • Azzurra Ragone,
  • Michele Scalera and
  • Manuel Ángel Serrano Martín

14 February 2023

Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other u...

  • Article
  • Open Access
6 Citations
5,500 Views
23 Pages

22 May 2020

In some states, the Stream Quantification Tool (SQT) has been adopted to quantify functional change of stream mitigation efforts. However, the ability of the SQT protocol to predict biological function and uphold the premise of the Stream Functions P...

  • Abstract
  • Open Access
1,297 Views
2 Pages

Optimization of an Analytical Protocol for the Extraction of Microplastics from Seafood Samples with Different Levels of Fat

  • Diogo M. Silva,
  • Marisa Almeida,
  • Francisco Guardiola,
  • Sabrina M. Rodrigues and
  • Sandra Ramos

The global production of plastics increased from 1.5 million tons in 1950 to 370 million tons in 2020. Microplastics (MPs) are plastic particles smaller than 5 mm, with a concerning ubiquitous occurrence in marine environments, posing risks to wildli...

  • Article
  • Open Access
16 Citations
5,175 Views
20 Pages

19 October 2020

Despite being a leading producer and exporter of dairy products, New Zealand has no industry-recognised welfare assessment protocol. A New Zealand-specific protocol is essential, as almost all dairy farms in New Zealand are pasture-based and housing...

  • Article
  • Open Access
11 Citations
3,423 Views
20 Pages

Metabolomic Phenotyping of Gliomas: What Can We Get with Simplified Protocol for Intact Tissue Analysis?

  • Paulina Zofia Goryńska,
  • Kamila Chmara,
  • Bogumiła Kupcewicz,
  • Krzysztof Goryński,
  • Karol Jaroch,
  • Dariusz Paczkowski,
  • Jacek Furtak,
  • Marek Harat and
  • Barbara Bojko

9 January 2022

Glioblastoma multiforme is one of the most malignant neoplasms among humans in their third and fourth decades of life, which is evidenced by short patient survival times and rapid tumor-cell proliferation after radiation and chemotherapy. At present,...

  • Proceeding Paper
  • Open Access
1 Citations
706 Views
10 Pages

12 September 2025

We developed and evaluated a monitoring and control system based on the controller area network (CAN) bus with a microprocessor of Arduino UNOs and a logic analyzer as auxiliary tools. We implemented a CAN bus communication system using Arduino UNO t...

  • Protocol
  • Open Access
5 Citations
5,872 Views
14 Pages

Can an Open-Label Placebo Be as Effective as a Deceptive Placebo? Methodological Considerations of a Study Protocol

  • Leo Druart,
  • SaraEve Graham Longsworth,
  • Carole Rolland,
  • Maïa Dolgopoloff,
  • Hugo Terrisse,
  • Jean-Luc Bosson and
  • Nicolas Pinsault

Background: Placebo has been studied for many years and is ever-present in healthcare. In clinical practice, its use is limited by ethical issues raised by the deception entailed by its administration. Objective: To investigate whether, when given de...

  • Article
  • Open Access
3 Citations
3,982 Views
12 Pages

Can Early Neuromuscular Rehabilitation Protocol Improve Disability after a Hemiparetic Stroke? A Pilot Study

  • Mahdi Yazdani,
  • Ahmad Chitsaz,
  • Vahid Zolaktaf,
  • Mohammad Saadatnia,
  • Majid Ghasemi,
  • Fatemeh Nazari,
  • Abbas Chitsaz,
  • Katsuhiko Suzuki and
  • Hadi Nobari

Background: The impairment of limb function and disability are among the most im portant consequences of stroke. To date, however, little research has been done on the early reha bilitation trial (ERT) after stroke in these patients. The purpose of t...

  • Article
  • Open Access
41 Citations
16,769 Views
15 Pages

19 February 2017

The Convention on Biological Diversity (CBD), adopted in 1992 and entered into force at the end of 1993, established a global regime on access to genetic resources (GR) and sharing of benefits arising from their utilization (Access and Benefit Sharin...

  • Article
  • Open Access
3 Citations
2,922 Views
13 Pages

Myotendinous Junction: Exercise Protocols Can Positively Influence Their Development in Rats

  • Jurandyr Pimentel Neto,
  • Lara Caetano Rocha-Braga,
  • Carolina dos Santos Jacob,
  • André Neri Tomiate and
  • Adriano Polican Ciena

The myotendinous junction (MTJ) is an interface that different stimuli alter their morphology. One of the main stimuli to promote alterations in the MTJ morphology is physical exercise. The present study aimed to investigate the morphology and molecu...

  • Study Protocol
  • Open Access
23 Citations
4,434 Views
14 Pages

Incorporating the Patient Voice in Sarcoma Research: How Can We Assess Health-Related Quality of Life in This Heterogeneous Group of Patients? A Study Protocol

  • Dide den Hollander,
  • Marco Fiore,
  • Javier Martin-Broto,
  • Bernd Kasper,
  • Antonio Casado Herraez,
  • Dagmara Kulis,
  • Ioanna Nixon,
  • Samantha C. Sodergren,
  • Martin Eichler and
  • Winan J. van Houdt
  • + 10 authors

22 December 2020

Sarcomas comprise 1% of adult tumors and are very heterogeneous. Long-lasting and cumulative treatment side-effects detract from the (progression-free) survival benefit of treatment. Therefore, it is important to assess treatment effectiveness in ter...

  • Protocol
  • Open Access
1 Citations
3,737 Views
19 Pages

Despite most episodes of low back pain (LBP) being short-lasting, some transition into persistent long-lasting problems. Hence, the need for a deeper understanding of the physiological mechanisms of this is pertinent. Therefore, the aims of the prese...

  • Study Protocol
  • Open Access
1 Citations
4,984 Views
14 Pages

Background: A cochlear implant (CI) enables deaf people to understand speech but due to technical restrictions, users face great limitations in noisy conditions. Music training has been shown to augment shared auditory and cognitive neural networks f...

  • Study Protocol
  • Open Access
1,585 Views
20 Pages

As veganism becomes more popular, the number of vegan pregnant women and children is steadily increasing. During vegan pregnancy and early childhood, there is a high risk for nutrient deficiencies that may impair child development. External factors,...

  • Article
  • Open Access
6 Citations
4,444 Views
11 Pages

22 September 2021

Spine surgery is painful despite the balanced techniques including intraoperative and postoperative opioids use. We investigated the effect of intraoperative magnesium sulfate (MgSO4) on acute pain intensity, analgesic consumption and intraoperative...

  • Article
  • Open Access
1 Citations
3,305 Views
35 Pages

15 December 2021

The need for continuous monitoring of physiological information of critical organs of the human body, combined with the ever-growing field of electronics and sensor technologies and the vast opportunities brought by 5G connectivity, have made implant...

  • Article
  • Open Access
6 Citations
3,230 Views
16 Pages

Toward Designing a Secure Authentication Protocol for IoT Environments

  • Mehdi Hosseinzadeh,
  • Mazhar Hussain Malik,
  • Masoumeh Safkhani,
  • Nasour Bagheri,
  • Quynh Hoang Le,
  • Lilia Tightiz and
  • Amir H. Mosavi

29 March 2023

Authentication protocol is a critical part of any application to manage the access control in many applications. A former research recently proposed a lightweight authentication scheme to transmit data in an IoT subsystem securely. Although the desig...

  • Article
  • Open Access
2 Citations
2,307 Views
16 Pages

10 December 2020

For secure location proof in many applications, distance bounding protocols are considered as one of the useful tools that can be used in practice. In distance bounding protocols, a prover and a verifier can measure the distance between them by perfo...

  • Review
  • Open Access
7 Citations
4,289 Views
22 Pages

A Comprehensive Review on Network Protocol Design for Autonomic Internet of Things

  • Riri Fitri Sari,
  • Lukman Rosyidi,
  • Bambang Susilo and
  • Muhamad Asvial

22 July 2021

The autonomic Internet of Things is the creation of self-management capability in the Internet of Things system by embedding some autonomic properties, with the goal of freeing humans from all detail of the operation and management of the system. At...

  • Article
  • Open Access
2 Citations
2,877 Views
16 Pages

100 Gbps Dynamic Extensible Protocol Parser Based on an FPGA

  • Ke Wang,
  • Zhichuan Guo,
  • Mangu Song and
  • Meng Sha

In order to facilitate the transition between networks and the integration of heterogeneous networks, the underlying link design of the current mainstream Information-Centric Networking (ICN) still considers the characteristics of the general network...

  • Article
  • Open Access
24 Citations
2,968 Views
27 Pages

Wireless medical sensor networks (WMSNs), a type of wireless sensor network (WSN), have enabled medical professionals to identify patients’ health information in real time to identify and diagnose their conditions. However, since wireless commu...

  • Article
  • Open Access
12 Citations
6,815 Views
20 Pages

Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting

  • Junghyun Nam,
  • Kim-Kwang Raymond Choo,
  • Sangchul Han,
  • Juryon Paik and
  • Dongho Won

27 January 2015

We present the first provably-secure three-party password-only authenticated key exchange (PAKE) protocol that can run in only two communication rounds. Our protocol is generic in the sense that it can be constructed from any two-party PAKE protocol....

  • Article
  • Open Access
10 Citations
2,711 Views
24 Pages

In this paper, cooperative control and optimal control methods are used for the formation control of mixed-order heterogeneous multi-agent systems. The system consists of unmanned aerial vehicles (UAVs), unmanned surface vehicles (USVs), and unmanned...

  • Article
  • Open Access
4 Citations
2,522 Views
19 Pages

12 November 2020

We propose an underwater multi-DATA train protocol with multi-RTS reception and block ACK (BACK) for underwater acoustic sensor networks. Due to long underwater acoustic propagation delay, some RTS frames may not overlap at a sink node, even if the R...

  • Article
  • Open Access
2,570 Views
20 Pages

10 October 2020

A hierarchical method is often used to simplify the design of complex logic. However, when the hierarchical method is used to implement protocol control, there is no suitable decoupling method to divide the sophisticated protocol control into a serie...

  • Article
  • Open Access
4 Citations
2,400 Views
18 Pages

19 April 2023

The Internet of Things (IoT) consists of a range of devices that communicate with other devices that are surrounding them. Secure communications between IoT devices have been an essential requirement. However, most existing authentication protocols f...

  • Article
  • Open Access
11 Citations
5,931 Views
22 Pages

Secure multi-party computation (SMC) is a cryptographic protocol that allows participants to compute the desired output without revealing their inputs. A variety of results related to increasing the efficiency of SMC protocol have been reported, and...

  • Review
  • Open Access
4,099 Views
15 Pages

A Review of Asynchronous Byzantine Consensus Protocols

  • Zhenyan Ji,
  • Xiao Zhang,
  • Jianghao Hu,
  • Yuan Lu and
  • Jiqiang Liu

11 December 2024

Blockchain technology can be used in the IoT to ensure the data privacy collected by sensors. In blockchain systems, consensus mechanisms are a key technology for maintaining data consistency and correctness. Among the various consensus protocols, as...

  • Systematic Review
  • Open Access
2,482 Views
20 Pages

Lung Ultrasound in Hemodialysis Patients—Which Protocol Is More Accurate and Informative in Daily Clinical Practice: A Systematic Review

  • Christodoulos Keskinis,
  • Konstantina Bacharidou,
  • Stylianos Panagoutsos and
  • Efstathios Mitsopoulos

11 February 2025

Lung ultrasound can detect hidden lung congestion in hemodialysis (HD) patients, even though they present no symptoms of hypervolemia. The 28-zone protocol is the one mainly assessed in the majority of studies. However, it is quite time consuming, ma...

  • Article
  • Open Access
17 Citations
5,012 Views
19 Pages

Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol

  • Bin Liu,
  • Zhifeng Gao,
  • Di Xiao,
  • Wei Huang,
  • Zhiqing Zhang and
  • Bingjie Xu

23 May 2019

In this paper, a quantum identity authentication protocol is presented based on the counterfactual quantum key distribution system. Utilizing the proposed protocol, two participants can verify each other’s identity through the counterfactual qu...

  • Article
  • Open Access
2,067 Views
20 Pages

On the Interactive Capacity of Finite-State Protocols

  • Assaf Ben-Yishai,
  • Young-Han Kim,
  • Rotem Oshman and
  • Ofer Shayevitz

25 December 2020

The interactive capacity of a noisy channel is the highest possible rate at which arbitrary interactive protocols can be simulated reliably over the channel. Determining the interactive capacity is notoriously difficult, and the best known lower boun...

  • Article
  • Open Access
7 Citations
3,221 Views
22 Pages

16 April 2021

In a smart city, there are different types of entities, such as nature persons, IoT devices, and service providers, which have different computational limitations and storage limitations. Unfortunately, all of the existing authentication and key exch...

  • Article
  • Open Access
13 Citations
5,014 Views
16 Pages

Multi-Party Quantum Summation Based on Quantum Teleportation

  • Cai Zhang,
  • Mohsen Razavi,
  • Zhiwei Sun,
  • Qiong Huang and
  • Haozhen Situ

23 July 2019

We present a secure multi-party quantum summation protocol based on quantum teleportation, in which a malicious, but non-collusive, third party (TP) helps compute the summation. In our protocol, TP is in charge of entanglement distribution and Bell s...

  • Article
  • Open Access
11 Citations
5,407 Views
13 Pages

27 March 2019

We propose a simultaneous classical communication and quantum key distribution (SCCQ) protocol based on plug-and-play configuration with an optical amplifier. Such a protocol could be attractive in practice since the single plug-and-play system is ta...

  • Article
  • Open Access
1 Citations
1,853 Views
16 Pages

An MLWE-Based Cut-and-Choose Oblivious Transfer Protocol

  • Yongli Tang,
  • Menghao Guo,
  • Yachao Huo,
  • Zongqu Zhao,
  • Jinxia Yu and
  • Baodong Qin

16 September 2024

The existing lattice-based cut-and-choose oblivious transfer protocol is constructed based on the learning-with-errors (LWE) problem, which generally has the problem of inefficiency. An efficient cut-and-choose oblivious transfer protocol is proposed...

  • Article
  • Open Access
7 Citations
7,509 Views
19 Pages

Improving Classical Authentication over a Quantum Channel

  • Francisco M. Assis,
  • Aleksandar Stojanovic,
  • Paulo Mateus and
  • Yasser Omar

11 December 2012

We propose a quantum protocol to authenticate classical messages that can be used to replace Wegman–Carter’s classical authentication scheme in quantum key distribution (QKD) protocols. We show that the proposed scheme achieves greater conditional en...

  • Article
  • Open Access
4 Citations
3,985 Views
8 Pages

Quotation Accuracy of Systematic Review and Meta-Analysis Protocols on Acupuncture

  • José M. Morán,
  • María Romero-Moreno,
  • Azucena Santillán-García and
  • Ivan Herrera-Peco

29 December 2021

Currently, published systematic review protocols (SR protocols) have increasingly become a new trend in fields such as acupuncture and are therefore a new source of quotations in these fields. Systematic reviews are considered the pinnacle of the evi...

  • Communication
  • Open Access
1 Citations
2,895 Views
8 Pages

21 November 2022

We experimentally investigate how initial entanglement between the system and environment can be detected in an open system by using some prior knowledge of the joint evolutions. The protocol we employed requires classical optimization on the results...

of 236