Privacy is a key requirement for connected vehicles. Cooperation between vehicles is mandatory for achieving location privacy preservation. However, non-cooperative vehicles can be a big issue to ...achieve this objective. To this end, we propose a novel monetary incentive scheme for cooperative location privacy preservation in 5G-enabled Vehicular Fog Computing. This scheme leverages a consortium blockchain-enabled fog layer and smart contracts to ensure a trusted and secure cooperative Pseudonym Changing Processes (PCPs). We also propose optimized smart contracts to reduce the monetary costs of vehicles while providing more location privacy preservation. Moreover, a resilient and lightweight Utility-based Delegated Byzantine Fault Tolerance (U-DBFT) consensus protocol is proposed to ensure fast and reliable block mining and validation. The performance analysis shows that our scheme has effective incentive techniques to stimulate non-cooperative vehicles and provides optimal monetary cost management and secure, private, fast validation of blocks.
This study evaluated the influence of the surgical approach for locking plate osteosynthesis in proximal humeral fractures during a 1-year period. We performed a comparative study in 83 patients to ...evaluate possible benefits for an early functional result for function, pain, activity levels, radiographic evaluation, and complications. In 39 cases, the extended anterolateral deltoid-splitting approach was used (group DS); in 44 cases, the deltopectoral approach was used (group DP). The clinical and radiologic follow-up took place 3, 6, and 12 months after the operation. The functional results in the adjusted Constant score after 3 months showed higher values for group DS of 57.9% vs group DP with 49.6%. After 6 months, no significant differences were seen, with 69.4% for group DS and 71.4% for group DP. Finally, after 12 months, group DP showed higher results at 81% compared with 73.1% for DS. In the subgroups of the Constant score, abduction and active anterior elevation showed particularly higher values in group DP. The duration of the operation was 67 minutes in group DS and 86 minutes in group DP. One case of avascular necrosis was observed in group DS and 3 in group DP. We conclude that the choice of approach for exposure of the proximal humerus region may influence the functional outcome. Stable osteosynthesis is important, but the outcome of operatively treated proximal humerus fractures is dependent on soft tissue management as well.
Since Critical Infrastructures (CIs) use systems and equipment that are separated by long distances, Supervisory Control And Data Acquisition (SCADA) systems are used to monitor their behaviour and ...to send commands remotely. For a long time, operator of CIs applied the air gap principle, a security strategy that physically isolates the control network from other communication channels. True isolation, however, is difficult nowadays due to the massive spread of connectivity: using open protocols and more connectivity opens new network attacks against CIs. To cope with this dilemma, sophisticated security measures are needed to address malicious intrusions, which are steadily increasing in number and variety. However, traditional Intrusion Detection Systems (IDSs) cannot detect attacks that are not already present in their databases. To this end, we assess in this paper Machine Learning (ML) techniques for anomaly detection in SCADA systems using a real data set collected from a gas pipeline system and provided by the Mississippi State University (MSU). The contribution of this paper is two-fold: 1) The evaluation of four techniques for missing data estimation and two techniques for data normalization, 2) The performances of Support Vector Machine (SVM), Random Forest (RF), Bidirectional Long Short Term Memory (BLSTM) are assessed in terms of accuracy, precision, recall and F1 score for intrusion detection. Two cases are differentiated: binary and categorical classifications. Our experiments reveal that RF and BLSTM detect intrusions effectively, with an F1 score of respectively > 99% and > 96%.
Zusammenfassung
Eine Revisionsplastik des vorderen Kreuzbands (VKB) kann in der Regel erst nach einer Auffüllung der erweiterten Bohrkanäle mit Spongiosa oder Allograft erfolgen. Dieser zusätzliche ...Eingriff führt zu operativen Risiken und einer Verlängerung der Behandlungsdauer. Das vorübergehende Fehlen des Transplantats kann zudem durch die damit einhergehende Instabilität zur weiteren Schädigung des Kniegelenks führen. In diesem Beitrag soll eine modifizierte Knochen-Sehnen-Knochen-Technik („bone-tendon-bone“, BTB) vorgestellt werden, bei der durch eine geänderte Anlage des tibialen Bohrkanals und der Möglichkeit einer zusätzlichen Spongiosaentnahme aus dem Tibiakopf eine einzeitige Revision ohne zusätzliche Fixation möglich ist. Im 1‑Jahres-Follow-up erwies sich die Technik bereits als effizientes Verfahren mit gleichwertigen Ergebnissen zu den bisher üblichen Verfahren bei deutlich verkürzter Gesamtbehandlungsdauer.
The maximum theoretical efficiency of constant inductance gradient electromagnetic launchers (EMLs) is analyzed and discussed. The maximum theoretical efficiency is a parameter needed to calculate ...the EML's efficiency. Constant inductance gradient EMLs include the conventional railgun, the augmented railgun, and the conventional helical launcher. The maximum theoretical efficiency of an EML is dependent on its geometry and the manner, or mode, in which it is powered. In the lossless case, the conventional railgun, the augmented railgun, and the conventional helical launcher are capable of 50% maximum efficiency when operating in constant current (CC) mode. Conventional and augmented railguns can achieve 100% maximum efficiency when operating in zero exit-current mode. While zero exit-current mode promotes high efficiency, this mode can reduce EML lifetime since it requires current levels much higher than those found in CC mode. The high-efficiency helical launcher, presented and analyzed here for the first time, combines 100% maximum theoretical efficiency with the low-current benefits of constant-current mode.
A scientific classification method for electromagnetic launchers (EMLs) is presented and discussed. The classification method is based on the well-known binomial nomenclature method developed by Carl ...Linnaeus (circa 1700s) that is used in other botany and zoology to classify flora and fauna. This investigation starts by establishing a formal definition for the launcher and the EML that, respectively, characterize the device and group. The EML can then be categorized into its respective class and type according to how its accelerating force is generated. The method developed here does not interfere with the inventor's right to provide a common name for the EML. The scientific classification of EMLs highlights their similarities and differences to develop a better understanding of their operation and to produce more comprehensive general theories. The classification method is an intuitive approach that is both flexible to allow for changes in classification protocols and expandable to accommodate new EMLs that may be invented in the future.
Being part of the 6G ecosystem vision, Connected and Automated Vehicles (CAVs) will enjoy sophisticated tailored services offering road safety and entertainment for users. As one of the 6G ...cornerstones, Network Slicing (NS) allows the creation of various customized 6G-V2X (Vehicle-to-Everything) use cases on the same physical infrastructure. However, 6G-NS advances can open up breaches to cyber-attacks aiming to break 6G-V2X Network slices to inflict maximum damage on CAVs and their users. Crossing borders, where CAVs leave their V2X-NS (V2X Network Slice) in the Home Mobile Network Operator (H-MNO) toward a similar V2X-NS in the Visited MNO (V-MNO), is an attractive opportunity to exploit by attackers. Detecting and mitigating attacks, in this case, becomes a priority, confronted by NS requirements and MNOs not ready to share their private data. To this end, this paper proposes a 3GPP-compliant privacy preservation collaborative learning scheme for 6G-NS security, focusing on V2X-NS cross-border areas. Our scheme leverages multi-process Federated Learning (FL) architecture to build efficient V2X-NS security-related models while preserving 6G V2X-NS isolation. In addition, it uses differential privacy-enabled stacking to build up attack detection knowledge at the V2X-NSs and MNOs levels while ensuring privacy preservation. We conducted an experimental study on the 5G-NIDD dataset, which is one of the most realistic publicly available 5G datasets. Our results demonstrate that multi-process FL with stacking can deliver high accuracy while ensuring isolation between 6G-V2X-NSs and privacy preservation between H-MNO and V-MNO.
West African summer monsoon precipitation is characterized by distinct decadal variability. Due to its well-documented link to oceanic boundary conditions in various ocean basins it represents a ...paradigm for decadal predictability. In this study, we reappraise this hypothesis for several sub-regions of sub-Saharan West Africa using the new German contribution to the coupled model intercomparison project phase 5 (CMIP5) near-term prediction system.In addition, we assume that dynamical downscaling of the global decadal predictions leads to an enhanced predictive skill because enhanced resolution improves the atmospheric response to oceanic forcing and land-surface feedbacks. Based on three regional climate models, a heterogeneous picture is drawn: none of the regional climate models outperforms the global decadal predictions or all other regional climate models in every region nor decade. However, for every test case at least one regional climate model was identified which outperforms the global predictions. The highest predictive skill is found in the western and central Sahel Zone with correlation coefficients and mean-square skill scores exceeding 0.9 and 0.8, respectively.