-
21
-
22
-
23
The Efficacy and Brain Network Mechanism of Acupuncture for Knee Osteoarthritis: A Study Protocol for Randomized Controlled Neuroimaging Trial
Published 2025-01-01“…Yi-Yang Sun,1 Ming-Lin Wang,2 Ruo-Han Zhao,1 Ming-Yao Hao,3 Shuai Song,3 Yue Zhou,3 Na Zhang1 1Department of Acupuncture-Moxibustion and Tuina, Shandong University of Traditional Chinese Medicine, Jinan, Shandong, People’s Republic of China; 2Traditional Chinese Medicine Comprehensive Treatment Center, Shengli Oilfield Central Hospital, Jinan, Shandong, People’s Republic of China; 3External Treatment Center of Traditional Chinese Medicine, Affiliated Hospital of Shandong University of Traditional Chinese Medicine, Jinan, Shandong, People’s Republic of ChinaCorrespondence: Na Zhang, Email zhangna2008zhentui@163.comPurpose: Knee osteoarthritis (KOA) is a prevalent degenerative bone and joint disease observed in clinical practice. …”
Get full text
Article -
24
-
25
-
26
-
27
-
28
-
29
Evaluating the effectiveness of handheld ultrasound in primary blast lung injury: a comprehensive study
Published 2025-01-01Get full text
Article -
30
-
31
-
32
Analysis and improvement of the BACnet/IP based on identity authentication
Published 2024-03-01“…To solve security issues arising from multiple attackable vulnerabilities and key leakage in BACnet/IP authentication, a security-enhanced BACnet/IP-SA protocol authentication scheme was proposed.By analyzing the authentication message flow model of the protocol and modeling it using colored Petri net theory and CPN Tools, vulnerabilities in the security of BACnet/IP were identified.An improvement scheme was proposed based on the Dolev-Yao attacker model and formal analysis method.The BACnet/IP-SA protocol utilized the device’s pseudo-identity to safeguard the actual identity information.It emploied the PUF response for authentication and verified the authenticity of the counterparty’s identity.The session key was generated through the authentication value of the multi-information set.The protocol’s security was demonstrated by combining BAN logic and non-formal methods.The experimental results indicate that the proposed scheme can effectively resist security threats from multi-class attacks and key leakage, enhancing the security of the protocol authentication while reducing computational overhead.…”
Get full text
Article -
33
-
34
-
35
Factors influencing image quality in Tibetan children by optical coherence tomography
Published 2025-01-01Get full text
Article -
36
Fault Diagnosis and Fault-Tolerant Control for Leader-Follower Multi-Agent Systems with Time Delay
Published 2022-01-01Get full text
Article -
37
Filtration assisted pretreatment for rapid enrichment and accurate detection of Salmonella in vegetables
Published 2023-07-01Get full text
Article -
38
-
39
-
40
A Splay Tree-Based Approach for Efficient Resource Location in P2P Networks
Published 2014-01-01Get full text
Article