期刊文献+
共找到42,326篇文章
< 1 2 250 >
每页显示 20 50 100
基于802.11be的LSTF和LLTF联合估计IQ不平衡方法
1
作者 徐俊 许虎 +1 位作者 张煜 李明福 《移动信息》 2026年第1期330-332,共3页
802.11be系统中IQ不平衡对信号解调性能影响较大,针对IQ不平衡中的两个主要部分,即幅度不平衡和相位不平衡,文中提出了一种基于802.11be的LSTF和LLTF联合估计IQ不平衡的方法。首先,将原始IQ数据变采样到协议规定的采样率后,并按照IEEE 8... 802.11be系统中IQ不平衡对信号解调性能影响较大,针对IQ不平衡中的两个主要部分,即幅度不平衡和相位不平衡,文中提出了一种基于802.11be的LSTF和LLTF联合估计IQ不平衡的方法。首先,将原始IQ数据变采样到协议规定的采样率后,并按照IEEE 802.11be协议标准,生成理想LSTF序列和LLTF序列。然后,利用理想LSTF序列和变采样后的数据进行相关运算,找出相关峰值,获取到接收序列的LSTF同步起始位置。再将理想发送的LSTF序列和同步后的接收LSTF序列进行前后项联合,建立方程组,通过求解方程组的形式,计算幅度不平衡和相位不平衡。最后,再将补偿幅度不平衡后的接收LLTF序列和理想LLTF序列进行联合,二次计算相位不平衡估计值。 展开更多
关键词 802.11b IQ不平衡 LSTF LLTF
在线阅读 下载PDF
ProRE:A Protocol Message Structure Reconstruction Method Based on Execution Slice Embedding
2
作者 Yuyao Huang Hui Shu Fei Kang 《Computers, Materials & Continua》 2026年第3期936-960,共25页
Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,inclu... Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios. 展开更多
关键词 protocol reverse engineering program slicing code embedding hierarchical clustering
在线阅读 下载PDF
Fresh Arrival--Rwanda-China avocado export protocol is a milestone in growing agricultural partnership
3
作者 ALAFATI MUGABO 《ChinAfrica》 2026年第1期46-47,共2页
Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajecto... Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade. 展开更多
关键词 China trade protocol Rwanda agricultural partnership fresh avocado exports
原文传递
Robust Hyper-Polarization Protocol of Nuclear Spins via Magic Sequence
4
作者 Haiyang Li Yongju Li +1 位作者 Hao Liao Ping Wang 《Chinese Physics Letters》 2026年第1期105-128,共24页
Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to thei... Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center. 展开更多
关键词 transferring polarization electrons hyperpolarization protocols quantum information technologiesas nuclear spins pulse polarization nuclear spin polarization magic sequences nuclear magnetic resonance
原文传递
基于软件无线电模块的IEEE 802.11a接收机同步单元实验设计
5
作者 王莹 宋沛豪 《实验科学与技术》 2025年第5期1-7,共7页
针对“新工科”建设对大学生实践能力培养的要求,在通信原理实验教学中提出基于软件无线电模块的IEEE802.11a接收机OFDM同步算法教学实验,并给出帧同步、符号同步和频率同步的实验原理。在MATLAB开发环境下,进行OFDM同步单元程序设计和... 针对“新工科”建设对大学生实践能力培养的要求,在通信原理实验教学中提出基于软件无线电模块的IEEE802.11a接收机OFDM同步算法教学实验,并给出帧同步、符号同步和频率同步的实验原理。在MATLAB开发环境下,进行OFDM同步单元程序设计和软件无线电模块PLUTO配置。从而,利用PLUTO完成通带信号收发,并进行同步单元功能验证。学生通过该实验,能更好地掌握通信原理有关同步的理论知识,提升工程实践能力。 展开更多
关键词 软件无线电 IEEE 802.11a OFDM 同步算法
在线阅读 下载PDF
Evaluation of Energy Consumption of Proactive, Reactive, and Hybrid Routing Protocols in Wireless Mesh Networks Using 802.11 Standards 被引量:2
6
作者 Sidoine D. Samo Jean Louis E. K. Fendji 《Journal of Computer and Communications》 2018年第4期1-30,共30页
This paper provides a deep evaluation of the energy consumption of routing protocols. The evaluation is done along with other metrics such as throughput and packet delivery ratio (PDR). We introduce two more metrics t... This paper provides a deep evaluation of the energy consumption of routing protocols. The evaluation is done along with other metrics such as throughput and packet delivery ratio (PDR). We introduce two more metrics to capture the efficiency of the energy consumption: e-throughput and e-PDR. Both are ratios in relation to the energy. We consider the three low layers of the stack. Three types of routing protocols are used: proactive, reactive, and hybrid. At the MAC and PHY layer, three radio types are considered: 802.11a/b/g. Finally, the number of nodes is varying in random topologies, with nodes being static or mobile. Simulations are conducted using NS3. The parameters of a real network interface card are used. From the results in mobile position scenarios, no protocol is outperforming the others;even if OLSR has the lowest energy consumption, most of the time. However, in constant position scenarios, AODV consumed a lower energy, apart from the scenarios using the 802.11a standard where HWMP energy consumption is the lowest. Regarding the energy efficiency, AODV protocols provided the best e-throughput and OLSR the best e-PDR in overall configurations. A framework for selecting energy-efficient routing protocol depending on network characteristics is proposed at the end. 展开更多
关键词 Energy CONSUMPTION Routing protocols Wireless MESH Networks e-Throughput e-PDR
在线阅读 下载PDF
Adaptive Backoff Algorithm for IEEE 802.11 MAC Protocol 被引量:1
7
作者 Maali ALBALT Qassim NASIR 《International Journal of Communications, Network and System Sciences》 2009年第4期300-317,共18页
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that can communicate directly over wireless media, without the need for a preconfigured infrastructure. Several approaches have been suggested to improve... A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that can communicate directly over wireless media, without the need for a preconfigured infrastructure. Several approaches have been suggested to improve Quality of Service (QoS) in IEEE 802.11-based MANETs through modifying some of the IEEE 802.11 Medium Access Control (MAC) algorithms, such as the backoff algorithm that is used to control the packets collision aftermath. In this work, an adaptive IEEE 802.11 backoff algorithm to improve QoS is de-veloped and tested in simulations as well as in testbed implementation. While the Binary Exponential Backoff (BEB) algorithm deployed by IEEE 802.11 reacts based on individual packet transmit trials, the new algo-rithm takes the history of successive packet transmit trials into account to provide a better QoS performance. The new algorithm has been tested against the legacy IEEE 802.11 through simulations using QualNet and a Linux-based testbed comprising a number of stations. The performed tests have shown significant im-provements in performance, with up to 33.51% improvement in delay and 7.36% improvement in packet delivery fraction compared to the original IEEE 802.11. 展开更多
关键词 MANETS AD-HOC Networks Quality of Service BACKOFF Algorithm IEEE 802.11
在线阅读 下载PDF
RATE ADAPTIVE PROTOCOL FOR MULTIRATE IEEE 802.11 NETWORKS 被引量:1
8
作者 Xi Yong Huang Qingyan +1 位作者 Wei Jibo Zhao Haitao 《Journal of Electronics(China)》 2007年第3期289-295,共7页
In this paper, a rate adaptive protocol AMARF (Adaptive Multirate Auto Rate Fallback) for multirate IEEE 802.11 networks is proposed. In AMARF, each data rate is assigned a unique success threshold, which is a criteri... In this paper, a rate adaptive protocol AMARF (Adaptive Multirate Auto Rate Fallback) for multirate IEEE 802.11 networks is proposed. In AMARF, each data rate is assigned a unique success threshold, which is a criterion to judge when to switch a rate to the next higher one, and the success thresholds can be adjusted dynamically in an adaptive manner according to the running conditions, such as packet length and channel parameters. Moreover, the proposed protocol can be implemented by software without any change to the current IEEE 802.11 standards. Simulation result shows that AMARF yields significantly higher throughput than other existing schemes including ARF and its variants, in various running conditions. 展开更多
关键词 IEEE 802.11 Rate adaptive MULTIRATE
在线阅读 下载PDF
MAC Frame Resolution and PHY Protocol Type Detection of IEEE 802.11
9
作者 Ling Li Shi Peng +5 位作者 June Li Kai Yuan Zhihao Wang Yinbin Liu Ping Chen Xianbing Wang 《International Journal of Communications, Network and System Sciences》 2017年第5期43-53,共11页
Frame resolution and physical layer (PHY) protocol type detection are the basis of research and development of intrusion prevention systems for IEEE 802.11 wireless network. Aiming at the problems which cannot be solv... Frame resolution and physical layer (PHY) protocol type detection are the basis of research and development of intrusion prevention systems for IEEE 802.11 wireless network. Aiming at the problems which cannot be solved by the specifications export, this paper proposed a MAC frame analytical method and a PHY protocol type detection algorithm based on parsing the IEEE 802.11packets captured by the library Libpcap. The packet structure and the length of the frame preamble (18 or 26 bytes) are presented. Then the methods of transforming byte-order and resolving sub-fields are given. A detection algorithm of PHY protocol type is proposed based on the experiments and examples are given to verify these methods. This work can be a reference for the R & D related to link layer frame analysis. 展开更多
关键词 IEEE 802.11 MAC FRAME RESOLUTION PHY protocols DETECTION
暂未订购
Simulation Based Evaluation of Highway Road Scenario between DSRC/802.11p MAC Protocol and STDMA for Vehicle-to-Vehicle Communication
10
作者 Vaishali D. Khairnar Srikhant N. Pradhan 《Journal of Transportation Technologies》 2013年第1期88-104,共17页
In this paper the DSRC/IEEE 802.11p Medium Access Control (MAC) method of the vehicular communication has been simulated on highway road scenario with periodic broadcast of packets in a vehicle-to-vehicle situation. I... In this paper the DSRC/IEEE 802.11p Medium Access Control (MAC) method of the vehicular communication has been simulated on highway road scenario with periodic broadcast of packets in a vehicle-to-vehicle situation. IEEE 802.11p MAC method is basically based on carrier sense multiple accesses (CSMA) where nodes listen to the wireless channel before sending the packets. If the channel is busy, the vehicle node must defer its access and during high utilization periods this could lead to unbounded delays. This well-known property of CSMA is undesirable for critical communications scenarios. The simulation results reveal that a specific vehicle is forced to drop over 80% of its packets/messages because no channel access was possible before the next message/packet was generated. To overcome this problem, we propose to use self-organizing time division multiple access (STDMA) for real-time data traffic between vehicles. Our initial results indicate that STDMA outperforms CSMA for time-critical traffic safety applications in ad- hoc vehicular networks. 展开更多
关键词 STDMA CSMA MAC DSRC IEEE 802.11p Vehicle-To-Vehicle Etc
在线阅读 下载PDF
Performance Study of a Cross-Layer Based Multipath Routing Protocol for IEEE 802.11e Mobile Ad Hoc Networks
11
作者 Hang SHEN Guangwei BAI +2 位作者 Junyuan WANG Yong JIN Jinjing TAO 《International Journal of Communications, Network and System Sciences》 2008年第4期329-338,共10页
Communication over wireless links identifies significant challenges for routing protocols operating. This paper proposes a Cross-layer design based Multipath Routing Protocol (CMRP) for mobile ad hoc networks, by mean... Communication over wireless links identifies significant challenges for routing protocols operating. This paper proposes a Cross-layer design based Multipath Routing Protocol (CMRP) for mobile ad hoc networks, by means of the node energy signal from the physical layer. The purpose is to optimize routing decision and path quality. The nodes’ mobility behavior is predicted using a notion of “Signal Fading Degree, SFD”. Especially, in combination of the IEEE 802.11e standard at the MAC layer, we determine that the IEEE 802.11e makes a significant contribution to performance improvement of CMRP. Performance evaluation of AODV in legacy 802.11 and CMRP in IEEE 802.11e shows that, as a function of speed of node mobility, a tremendous reduction achieved, in metrics such as the average end-to-end delay, route overhead, route discovery frequency, normalized routing load - almost more than 80%, 40%, 40%, and 40%. In the case of varying number of sessions, the reduction for route discovery frequency and normalized routing load are up to 70% and 80%. 展开更多
关键词 Wireless Mobile Ad HOC Networks MULTIPATH ROUTING CROSS-LAYER Design IEEE 802.11e
在线阅读 下载PDF
一款应用于802.11ax的5.3~7.4 GHz CMOS低噪声放大器设计
12
作者 蒋欣怡 石春琦 +2 位作者 黄磊磊 徐珑 张润曦 《固体电子学研究与进展》 2025年第1期52-58,共7页
为满足IEEE 802.11ax应用的低噪声和大带宽需求,设计了一款5.3~7.4 GHz宽带低噪声放大器(Low noise amplifier, LNA)。采用无源变压器作为辅路,实现噪声抵消,在优化噪声系数的同时不增加功耗,与未采用噪声抵消的方案相比,噪声系数改善0.... 为满足IEEE 802.11ax应用的低噪声和大带宽需求,设计了一款5.3~7.4 GHz宽带低噪声放大器(Low noise amplifier, LNA)。采用无源变压器作为辅路,实现噪声抵消,在优化噪声系数的同时不增加功耗,与未采用噪声抵消的方案相比,噪声系数改善0.27 dB。采用开关电容阵列,实现可调谐级间网络,子带带宽和整体调谐带宽分别为700 MHz和2.1 GHz。基于等Q圆策略设计宽带输出匹配网络。该款LNA采用22 nm CMOS工艺实现,芯片测试结果表明:3 dB带宽达到2.1 GHz,峰值增益为26.5 dB,在5.3~7.4 GHz频段内,噪声系数均小于2.53 dB,增益大于23.5 dB,功耗为43.05 mW。 展开更多
关键词 低噪声放大器 无源辅路噪声抵消 调谐宽带 802.11ax
原文传递
Real-life practice of Kelleni’s protocol in treatment and post exposure prophylaxis of SARS-CoV-2 HV.1 and JN.1 subvariants 被引量:1
13
作者 Mina Thabet Kelleni 《World Journal of Virology》 2025年第3期1-5,共5页
This article discusses the evolving real-world practice using nitazoxanide,nonsteroidal anti-inflammatory drugs(NSAIDs)and/or azithromycin(Kelleni’s protocol)to manage the evolving manifestations of severe acute resp... This article discusses the evolving real-world practice using nitazoxanide,nonsteroidal anti-inflammatory drugs(NSAIDs)and/or azithromycin(Kelleni’s protocol)to manage the evolving manifestations of severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)Omicron EG.5.1,its descendant HV.1 as well as BA.2.86 and its descendant JN.1 subvariants in Egypt in 2024.These subvariants are well-known for their highly evolved immune-evasive properties and the manifestations include some peculiar manifestations as persistent cough besides high fever in young children as well as high fever,persistent severe cough,change of voice,loss of taste and smell,epigastric pain,nausea,vomiting,diarrhea,generalized malaise and marked bone aches in adults including the high-risk groups.It’s suggested that the ongoing SARS-CoV-2 evolution is continuing to mostly affect the high-risk groups of patients,to some of whom we’ve also successfully prescribed nitazoxanide and/or NSAIDs for post-exposure prophylaxis of all household contacts.We also continue to recommend starting the immune-modulatory antiviral Kelleni’s protocol as soon as possible in the course of infection and adjusting it in a personalized manner to be more aggressive from the beginning for the high risk patients,at least until the currently encountered surge of infections subsides. 展开更多
关键词 SARS-CoV-2 HV.1 JN.1 Post exposure prophylaxis Kelleni’s protocol NITAZOXANIDE Non-steroidal anti-inflammatory drugs
暂未订购
Incorporating red blanket protocol within code crimson:Streamlining definitive trauma care amid the chaos
14
作者 Sohil Pothiawala Savitha Bhagvan Andrew MacCormick 《World Journal of Critical Care Medicine》 2025年第1期14-19,共6页
The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation... The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation of a patient in the emergency department(ED),Code Crimson activation facilitates rapid decisionmaking by multi-disciplinary specialists for definitive haemorrhage control in operating theatre(OT)and/or interventional radiology(IR)suite.Once this decision has been made,there may still be various factors that lead to delay in transporting the patient from ED to OT/IR.Red Blanket protocol identifies and addresses these factors and processes which cause delay,and aims to facilitate rapid and safe transport of the haemodynamically unstable patient from ED to OT,while minimizing delay in resuscitation during the transfer.The two processes,Code Crimson and Red Blanket,complement each other.It would be ideal to merge the two processes into a single protocol rather than having two separate workflows.Introducing these quality improvement strategies and coor-dinated processes within the trauma framework of the hospitals/healthcare systems will help in further improving the multi-disciplinary care for the complex trauma patients requiring rapid and definitive haemorrhage control. 展开更多
关键词 Red blanket protocol Code crimson HAEMORRHAGE Trauma
暂未订购
SegInfer:Binary Network Protocol Segmentation Based on Probabilistic Inference
15
作者 Guo Maohua Zhu Yuefei Fei Jinlong 《China Communications》 2025年第6期334-354,共21页
Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-len... Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results. 展开更多
关键词 binary protocol probabilistic inference protocol field segmentation protocol reverse engineering related construction
在线阅读 下载PDF
Machine Learning-Based Routing Protocol in Flying Ad Hoc Networks: A Review
16
作者 Priyanka Manjit Kaur +2 位作者 Deepak Prashar Leo Mrsic Arfat Ahmad Khan 《Computers, Materials & Continua》 2025年第2期1615-1643,共29页
“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of F... “Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research. 展开更多
关键词 FANET protocol machine learning
在线阅读 下载PDF
Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol(iSTSP)for Security-Critical Time-Sensitive WSNs
17
作者 Ramadan Abdul-Rashid Mohd Amiruddin Abd Rahman Abdulaziz Yagoub Barnawi 《Computer Modeling in Engineering & Sciences》 2025年第9期3213-3250,共38页
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade... Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols. 展开更多
关键词 Time-sensitive wireless sensor networks(TS-WSNs) secure time synchronization protocol trust-based authentication autoencoder model deep learning malicious node detection Internet of Things energyefficient communication protocols
在线阅读 下载PDF
Tuning the Coefficients of Thermal Expansion of the Crystallized Cordierite Glasses by Thermal Treatment Protocols
18
作者 DUAN Qiang KE Xuefei +1 位作者 QIAO Ang TAO Haizheng 《Journal of Wuhan University of Technology(Materials Science)》 2025年第5期1239-1243,共5页
Focusing on the ultralow expansion functionality of the crystalized glass containing the cordierite crystal phase with the molar composition 20.7MgO·20.7Al_(2)O_(3)·51.6SiO_(2)·7.0TiO_(2),we systematica... Focusing on the ultralow expansion functionality of the crystalized glass containing the cordierite crystal phase with the molar composition 20.7MgO·20.7Al_(2)O_(3)·51.6SiO_(2)·7.0TiO_(2),we systematically investigated impacts of thermal treatment protocols on T dependence of coefficients of thermal expansion(CTE).Except for the phase compositions,morphology is identified as another important factor to control the T dependence of CTE.By using X-ray diffraction and scanning electron microscope,various modes of T dependence of CTE for crystallized glasses are ascribed to their different phase compositions and microstructure with finely dispersed nanoparticles.These understanding contributes to the further modification of CTE of the crystalized glass by altering their thermal treatment scenarios. 展开更多
关键词 coefficients of thermal expansion crystalized glass CORDIERITE thermal treatment protocols
原文传递
Efficacy and safety of acupoint application for gastrointestinal function in treating post-stroke depression:Protocol for a randomized controlled trial
19
作者 Xuan Zhang Shuhui Li +2 位作者 Juntao Wang Chung Tai Lau Jacky C.P.Chan 《Journal of Traditional Chinese Medical Sciences》 2025年第4期552-558,共7页
Objective:To evaluate the efficacy and safety of acupoint application for post-stroke depression(PSD)by regulating gastrointestinal function.A secondary objective is to explore the potential mechanism underlying this ... Objective:To evaluate the efficacy and safety of acupoint application for post-stroke depression(PSD)by regulating gastrointestinal function.A secondary objective is to explore the potential mechanism underlying this approach from the perspective of gut microbiota.Methods:This multicenter,randomized,double-blind(patients and assessors),placebo-controlled trial will enroll 80 patients with PSD,and include a 1-week run-in period,a 4-week treatment phase,and a 12-week follow-up.Eligible participants will randomly be assigned in a 1:1 ratio to either the acupoint application or placebo(non-acupoint)groups.Treatments will be administered thrice weekly for 4 weeks.The primary outcome is change in the Hamilton Rating Scale for Depression(HAMD)score.Secondary outcomes include the Beck Depression Inventory(BDI),36-Item Short-Form Health Survey(SF-36),Barthel Index of Activities of Daily Living,Social Adaptation Self-Evaluation Scale(SASS),and gut microbiota profiling.All outcomes will be assessed at baseline(prior to treatment),during treatment(weeks 2 and 4),and during follow-up(weeks 8,12,and 16).The Treatment Emergent Symptom Scale(TESS)will be used for evaluation throughout the 4-week treatment phase.Discussion:The results of this study will provide important evidence supporting a novel treatment strategy for PSD that targets gastrointestinal regulation,potentially informing future clinical practice. 展开更多
关键词 Acupoint application Gut microbiota Post-stroke depression protocol Randomized controlled trial
暂未订购
Ultrasound guided femoral nerve blocks as a compulsory pain protocol in femoral neck fractures
20
作者 Yuri Klassov 《World Journal of Orthopedics》 2025年第12期82-90,共9页
BACKGROUND Femur fractures are one of the most serious injuries that occur in the older population and are associated with severe pain and increased mortality.The primary objective of this study was to find if there w... BACKGROUND Femur fractures are one of the most serious injuries that occur in the older population and are associated with severe pain and increased mortality.The primary objective of this study was to find if there was a significant difference in pain scores in patients treated with femoral nerve blocks(FNB)compared with patients treated with the standard analgesia protocol.The secondary objective was to find if there was a significant difference in morbidity between the two groups.AIM To evaluate the effectiveness of ultrasound(US)-guided FNB in managing preoperative pain and reducing morbidity in patients with neck femur fractures compared to the standard analgesia protocol.The study seeks to determine whether FNB offers superior outcomes in terms of pain control,rehospitalization rates,and mortality.METHODS This retrospective cohort study included 1577 patients suffering from neck femur fractures.387 patients were treated with a FNB for pain management upon arrival at the emergency department,the rest were treated with standard analgesia.Pain was assessed from electronic medical records using the visual analogue scale(VAS)pre surgery,12-and 24-hour post-surgery.To determine morbidity and mortality during hospitalizations and 6 months after,it was collected from electronic medical records.RESULTS In a cohort of 1577 patients,those receiving US-guided FNB had significantly lower preoperative VAS pain scores(1.46±2.49 vs 1.82±2.59,P=0.001),reduced rehospitalization rates(0.99±1.96 vs 1.46±2.34,P<0.001),and lower mortality(16%vs 32%,P<0.001)compared to standard analgesia.CONCLUSION US guided FNB is more effective for pain management compared with standard analgesia.This method was also found to significantly reduce the risk of morbidity in those patients. 展开更多
关键词 Hip fracture Femur fracture Femoral nerve block Ultrasound guided Analgesia protocol
暂未订购
上一页 1 2 250 下一页 到第
使用帮助 返回顶部