The Majorana fermion, which is its own antiparticle and obeys non-Abelian statistics, plays a critical role in topological quantum computing. It can be realized as a bound state at zero energy, ...called a Majorana zero mode (MZM), in the vortex core of a topological superconductor, or at the ends of a nanowire when both superconductivity and strong spin orbital coupling are present. A MZM can be detected as a zero-bias conductance peak (ZBCP) in tunneling spectroscopy. However, in practice, clean and robust MZMs have not been realized in the vortices of a superconductor because of contamination from impurity states or other closely packed Caroli–de Gennes-Matricon (CdGM) states, which hampers further manipulations of MZMs. Here, using scanning tunneling spectroscopy, we show that a ZBCP well separated from the other discrete CdGM states exists ubiquitously in the cores of free vortices in the defect-free regions of(Li0.84Fe0.16)OHFeSe, which has a superconducting transition temperature of 42 K. Moreover, a Dirac-cone-type surface state is observed by angle-resolved photoemission spectroscopy, and its topological nature is confirmed by band calculations. The observed ZBCP can naturally be attributed to a MZM arising from the chiral topological surface state of a bulk superconductor. Thus,(Li0.84Fe0.16)OHFeSeprovides an ideal platform for studying MZMs and topological quantum computing.
Full text
Available for:
CMK, CTK, FMFMET, NUK, UL
Wireless sensor networks (WSNs) distribute hundreds to thousands of inexpensive microsensor nodes in their regions, and these nodes are important parts of Internet of Things (IoT). In WSN-assisted ...IoT, the nodes are resource constrained in many ways, such as storage resources, computing resources, energy resources, and so on. Robust routing protocols are required to maintain a long network lifetime and achieve higher energy utilization. In this paper, we propose a new energy-efficient centroid-based routing protocol (EECRP) for WSN-assisted IoT to improve the performance of the network. The proposed EECRP includes three key parts: a new distributed cluster formation technique that enables the self-organization of local nodes, a new series of algorithms for adapting clusters and rotating the cluster head based on the centroid position to evenly distribute the energy load among all sensor nodes, and a new mechanism to reduce the energy consumption for long-distance communications. In particular, the residual energy of nodes is considered in EECRP for calculating the centroid's position. Our simulation results indicate that EECRP performs better than LEACH, LEACH-C, and GEEC. In addition, EECRP is suitable for networks that require a long lifetime and whose base station (BS) is located in the network.
The rapid development of 5G networks has made smart driving possible. The vehicular ad-hoc networks (VANETs) are the main environment for smart driving, providing road information, instant ...communication between vehicle and vehicle (V2V) or vehicle and infrastructure (V2I). The information interaction security of VANETs is critical to the proper functioning of the traffic. Much research in recent years has focused on secure communication in VANETs, especially the secure V2V or V2I communications. However, current security schemes often require complex identity re-authentication when vehicles enter a new infrastructure coverage, which greatly reduces the efficiency of the entire network. In addition, the emergence of blockchain has created opportunities to overcome the challenges in VANETs mentioned above. In this article, blockchain is utilized to enhance the scalability of the trustworthiness scalable computation. The proposed blockchain assisted trustworthiness scalable computation based V2I authentication (B-TSCA) scheme achieves rapid re-authentication of vehicles through secure ownership transfer between infrastructures. Note that, trustworthiness scalable computation assisted by blockchian technology ensures the decentralization and non tamperability of the scalable computation result. The security analysis indicates that B-TSCA scheme is a CDH-secure scheme. The time cost of the novel handover authentication phase is half of that of the initial one as is presented in the simulation.
Abnormal wound healing is likely to induce the formation of hypertrophic scars and keloids, which leads to dysfunction, deformity, and mental problem in the patients. Despite the advances in ...prevention and management of hypertrophic scar and keloids, the mechanism underlying scar and keloid formation has not been fully elucidated. Recent insights into the role of the epithelial–mesenchymal transition (EMT) in development, wound healing, stem cell regulation, fibrosis, and tumorigenesis have increased our understanding of the pathophysiology of hypertrophic scarring and keloids and suggested new therapeutic targets. This review summarizes recent progress in the elucidation of the role of EMT in physiologic wound healing and pathologic scar formation. This knowledge will facilitate an understanding of EMT roles in scar formation and shed new light on the modulation and potential treatment of hypertrophic scars and keloids.
Data Mining for Internet of Things: A Survey Tsai, Chun-Wei; Lai, Chin-Feng; Chiang, Ming-Chao ...
IEEE Communications surveys and tutorials,
01/2014, Volume:
16, Issue:
1
Journal Article
Peer reviewed
It sounds like mission impossible to connect everything on the earth together via internet, but Internet of Things (IoT) will dramatically change our life in the foreseeable future, by making many ..."impossibles" possible. To many, the massive data generated or captured by IoT are considered having highly useful and valuable information. Data mining will no doubt play a critical role in making this kind of system smart enough to provide more convenient services and environments. This paper begins with a discussion of the IoT. Then, a brief review of the features of "data from IoT" and "data mining for IoT' is given. Finally, changes, potentials, open issues, and future trends of this field are addressed.
With the rapid development of Industrial Internet of Things, the category and quantity of industrial equipment will increase gradually. For centralized monitoring and management of numerous and ...multivariate equipment in the intelligent manufacturing process, the equipment categories shall be identified first. However, manual labeling of electrical equipment needs high costs. For the purpose of recognizing industrial equipment accurately in manufacturing systems, this study adopts the long short-term memory to analyze big data features and build a nonintrusive load monitoring system. Edge computing is used to implement parallel computing to improve the efficiency of equipment identification. Considering the practical popularity, the fairly priced low-frequency Smart Meter is used to collect the appliance data. According to the proposed optimal adjustment strategy of parameter model, the average random recognition rate can achieve 88% and the average recognition rate of the continuous data of a single electrical equipment can achieve 83.6%.
The emergence of edge computing (EC) and intelligent vision-based driver assistance system is of great significance for the prospective development of Internet of Vehicle (IoV). The additional ...computation capability and extensive network coverage provides energy-limited smart devices with more opportunities to enable IoV system for time-sensitive applications. However, when implemented in a vision-based driver assistance system, the transmission of a large amount of redundant data not only causes delay but also severely compromises the accuracy of object detection. In this paper, an improved object detection algorithm based on video key-frame for latency reduction on edge IoV system is proposed. It can significantly improve latency reduction performance at the expense of small detection accuracy. In our proposal, we adopt an important coefficient and frame similarity comparison algorithm to filter redundant frames and achieve key frames for object detection. Then an improved Haar-like feature based classification algorithm is used for object detection under the edge computation model. Finally, a scalable cluster object detection system is implemented as a practical EC case to verify our proposal, and extensive simulations confirm the superiority of the proposed scheme over regular schemes. It can speed up about 84 times with 40% of the similar frames filtered in comparison.
Internet of Things (IoT) and its relevant technologies have been attracting the attention of researchers from academia, industry, and government in recent years. However, since the requirements of ...the IoT are quite different from what the Internet today can offer, several innovative techniques have been gradually developed and incorporated into IoT, which is referred to as the Future Internet of Things (FIoT). Among them, how to extract “data” and transfer them into “knowledge” from sensing layer to application layer has become a vital issue. This paper begins with an overview of IoT and FIoT, followed by discussions on how to apply data mining and computational intelligence to FIoT. An intelligent data management framework inspired by swarm optimization will then given. Finally, open issues and future trends of this field will be addressed.
For nickel-based catalysts, in-situ formed nickel oxyhydroxide has been generally believed as the origin for anodic biomass electro-oxidations. However, rationally understanding the catalytic ...mechanism still remains challenging. In this work, we demonstrate that NiMn hydroxide as the anodic catalyst can enable methanol-to-formate electro-oxidation reaction (MOR) with a low cell-potential of 1.33/1.41 V at 10/100 mA cm
, a Faradaic efficiency of nearly 100% and good durability in alkaline media, remarkably outperforming NiFe hydroxide. Based on a combined experimental and computational study, we propose a cyclic pathway that consists of reversible redox transitions of Ni
-(OH)
/Ni
-OOH and a concomitant MOR. More importantly, it is proved that the Ni
-OOH provides combined active sites including Ni
and nearby electrophilic oxygen species, which work in a cooperative manner to promote either spontaneous or non-spontaneous MOR process. Such a bifunctional mechanism can well account for not only the highly selective formate formation but also the transient presence of Ni
-OOH. The different catalytic activities of NiMn and NiFe hydroxides can be attributed to their different oxidation behaviors. Thus, our work provides a clear and rational understanding of the overall MOR mechanism on nickel-based hydroxides, which is beneficial for advanced catalyst design.
The number of IoT devices has been growing significantly, and mobile network traffic is also increasing explosively. In order to meet the human desire to explore unknown areas, edgeless ...communications have always been one of the directions for the development of wireless networks. H-STIN is a promising solution to face the problem of large bandwidth requirement, massive machine type communication, and edgeless communication requirements. However, it is difficult to integrate communication protocols, routing problems, and resource allocation in the large-scale and heterogeneous network architecture. Therefore, this article proposes a potential H-STIN architecture based on the development trends of the Internet of Things, mobile networks, and satellite networks. Since TN has adequate computation resource and routing architecture, the backbone network is given to support an entire network, and AS is adopted to achieve regional self-optimization. The SSTIS is composed of the perception layer, the cognition layer, and the intelligence layer. It integrates IoT, SDN, and network functions virtualization technologies to achieve self-monitoring, crisis forecasting, and optimal control. Finally, the promising technical challenge, including integrated route planning and large-scale resource allocation, is given.