期刊文献+
共找到275,105篇文章
< 1 2 250 >
每页显示 20 50 100
SegInfer:Binary Network Protocol Segmentation Based on Probabilistic Inference
1
作者 Guo Maohua Zhu Yuefei Fei Jinlong 《China Communications》 2025年第6期334-354,共21页
Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-len... Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results. 展开更多
关键词 binary protocol probabilistic inference protocol field segmentation protocol reverse engineering related construction
在线阅读 下载PDF
Machine Learning-Based Routing Protocol in Flying Ad Hoc Networks: A Review
2
作者 Priyanka Manjit Kaur +2 位作者 Deepak Prashar Leo Mrsic Arfat Ahmad Khan 《Computers, Materials & Continua》 2025年第2期1615-1643,共29页
“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of F... “Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research. 展开更多
关键词 FANET protocol machine learning
在线阅读 下载PDF
Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol(iSTSP)for Security-Critical Time-Sensitive WSNs
3
作者 Ramadan Abdul-Rashid Mohd Amiruddin Abd Rahman Abdulaziz Yagoub Barnawi 《Computer Modeling in Engineering & Sciences》 2025年第9期3213-3250,共38页
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade... Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols. 展开更多
关键词 Time-sensitive wireless sensor networks(TS-WSNs) secure time synchronization protocol trust-based authentication autoencoder model deep learning malicious node detection Internet of Things energyefficient communication protocols
在线阅读 下载PDF
Multi-radio fast routing recovery protocol based on spectrum situation awareness
4
作者 Chuanxin ZHOU Chao DONG +3 位作者 Xiaojun ZHU Fuhui ZHOU Qihui WU Zhengrui QIN 《Chinese Journal of Aeronautics》 2025年第3期435-446,共12页
UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect ... UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect jamming, leading to long sensing time and thus slow routing recovery. To address the issues raised by jamming attacks, we propose a new routing protocol, Electromagnetic Spectrum situation awareness Optimized Link State Routing (ESOLSR) protocol, to improve the existing OLSRv2 protocol. ESOLSR utilizes the spectrum situation awareness capability from the physical layer, and adopts joint-updating of link status, updating of interface functions, and adaptive adjustment of parameters. Our simulation results show that the improved protocol, ESOLSR, can recover routing and resume normal communication 26.6% faster compared to the existing protocols. 展开更多
关键词 UAV ad hoc network OLSR protocol Routing recovery Electromagnetic spectrum situation awareness MULTI-RADIO
原文传递
Fresh Arrival--Rwanda-China avocado export protocol is a milestone in growing agricultural partnership
5
作者 ALAFATI MUGABO 《ChinAfrica》 2026年第1期46-47,共2页
Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajecto... Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade. 展开更多
关键词 China trade protocol Rwanda agricultural partnership fresh avocado exports
原文传递
Towards mechanism-based tau-targeted therapies
6
作者 Lidia Bakota Roland Brandt 《Neural Regeneration Research》 2026年第2期687-688,共2页
Tau plays a crucial role in several neurodegenerative diseases,collectively referred to as tauopathies.Therefore,targeting potential pathological changes in tau could enable useful therapeutic interventions.However,ta... Tau plays a crucial role in several neurodegenerative diseases,collectively referred to as tauopathies.Therefore,targeting potential pathological changes in tau could enable useful therapeutic interventions.However,tau is not an easy target because it dynamically interacts with microtubules and other cellular components,which presents a challenge for tau-targeted drugs.New cellular models could aid the development of mechanism-based tau-targeted therapies. 展开更多
关键词 tau targeted therapies cellular components mechanism based therapies cellular componentswhich cellular models MICROTUBULES TAUOPATHIES neurodegenerative diseasescollectively
暂未订购
The Design and Implementation of SMS Gateway Interface for Early Warning Plan for Meteorological Hazards Based on CMPP Protocol 被引量:2
7
作者 苗传海 潘静 张超 《Meteorological and Environmental Research》 CAS 2010年第1期71-74,共4页
Relying on CMPP (China Mobile Peer to Peer) protocol,we propose and design SMS (Short Message Service) gateway interface for early warning plan based on real-time meteorological database application,in order to form t... Relying on CMPP (China Mobile Peer to Peer) protocol,we propose and design SMS (Short Message Service) gateway interface for early warning plan based on real-time meteorological database application,in order to form the meteorological mobile internet service system which is 'One point connect,service the whole province' for short.Accessing interface system to each city's SMG (Short Message Gateway) through standard protocol,we establish the information transmitting channel of short message platform and mobile SMG to realize the store-forward and flow control of short message.In addition,the stable and dependable communication connect of interface system and mobile SMG should be ensure,and the connect could be reconstructed while encountering any error,as well as committing short message would be stopped due to interruption of connect. 展开更多
关键词 CMPP protocol Meteorological warning Disaster prevention and reduction Short message interface Short message routing China
在线阅读 下载PDF
High efficiency AODV routing protocol based on link availability prediction in MANETs 被引量:2
8
作者 刘超 胡爱群 《Journal of Southeast University(English Edition)》 EI CAS 2007年第4期489-493,共5页
To cope with the problem of low protocol efficiency of the standard ad hoc on-demand distance vector (AODV) routing protocol with the periodic Hello message broadcast mechanism, a new link availability prediction ba... To cope with the problem of low protocol efficiency of the standard ad hoc on-demand distance vector (AODV) routing protocol with the periodic Hello message broadcast mechanism, a new link availability prediction based strategy is introduced to reduce the amount of Hello messages. In this strategy, a novel wireless link availability prediction model under line-of-sight (LOS) propagation environments is proposed based on which the parameter of Hello Interval in AODV can be dynamically adjusted to achieve the goal of changing the frequency of Hello message broadcasts under different link stability degrees. Simulation results demonstrate that, compared with the standard AODV with the periodic Hello message broadcast mechanism, the proposed protocol effectively reduces unnecessary control message overhead and greatly improves the performance in terms of end-to-end delay and efficiency. 展开更多
关键词 Hello message link availability ad hoc on-demand distance vector routing protocol ad hoc
在线阅读 下载PDF
Traditional Chinese medicine in the treatment of idiopathic pulmonary fibrosis based on syndrome differentiation:Study protocol of an exploratory trial 被引量:8
9
作者 Xue-qing Yu Shu-guang Yang +1 位作者 Yang Xie Jian-sheng Li 《Journal of Integrative Medicine》 SCIE CAS CSCD 2020年第2期163-168,共6页
Background: Idiopathic pulmonary fibrosis(IPF) has a poor prognosis and is often a kind of heavy financial burden to patients. Currently, few treatments are available for IPF. Clinical practice of traditional Chinese ... Background: Idiopathic pulmonary fibrosis(IPF) has a poor prognosis and is often a kind of heavy financial burden to patients. Currently, few treatments are available for IPF. Clinical practice of traditional Chinese medicine(TCM), using a syndrome differentiation approach, offers some treatment success in IPF. However, there is no sufficient evidence-based study of the role of TCM in IPF management to make strong conclusions. This study evaluates the efficacy and safety of TCM in the treatment of IPF.Methods and design: A multicenter, exploratory, randomized, double-blind and placebo-controlled trial is planned. A total of 80 patients will be enrolled in the study, which will include 26 weeks of treatment.Participants will be randomly assigned into TCM group or control group in a 1:1 ratio. The TCM group will be given TCM granules based on syndrome differentiation. Formulae include Bao-fei Hua-xian granule for lung qi deficiency, Jin-shui Huan-xian granule for lung-kidney qi deficiency and Yang-qing Kang-xian granule for yin deficiency and inner heat. The control group will be given a corresponding TCM granule placebo. The efficacy and safety of interventions will be evaluated by the outcome variables,including frequencies of acute exacerbations, pulmonary function, clinical symptoms, dyspnea, healthrelated quality of life(HRQo L), 6-minute walk distance and safety indicators.Discussion: It is hypothesized that TCM will decrease the frequency of adverse events, improve pulmonary function and HRQo L, based on our clinical experience. This trial is the first study of TCM treatment in IPF that is based on syndrome differentiation and will evaluate the efficacy and safety of TCM in IPF. 展开更多
关键词 IDIOPATHIC PULMONARY FIBROSIS Traditional Chinese medicine Syndrome differentiation protocol
原文传递
Formal analysis of robust email protocol based on authentication tests 被引量:1
10
作者 蒋睿 胡爱群 《Journal of Southeast University(English Edition)》 EI CAS 2009年第2期147-151,共5页
Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the m... Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy. 展开更多
关键词 email protocol authentication tests formal method perfect forward secrecy strand space model
在线阅读 下载PDF
Development and Verification of Simulation Model Based on Real MANET Experiments for Transport Layer Protocols (UDP and TCP) 被引量:3
11
作者 Joarder Mohammad Mustafa Kamal Mohammad Shahidul Hasan +1 位作者 Alison L. Griffiths Hongnian Yu 《International Journal of Automation and computing》 EI CSCD 2013年第1期53-63,共11页
There is a lack of appropriate guidelines for realistic user traces, mobility models, routing protocols, considerations of real-life challenges, etc. for general-purpose mobile ad hoc networks (MANET). In this paper... There is a lack of appropriate guidelines for realistic user traces, mobility models, routing protocols, considerations of real-life challenges, etc. for general-purpose mobile ad hoc networks (MANET). In this paper, four laptops are used in an open field environment in four scenarios to evaluate the performances of Internet control message protocol (ICMP) based ping and transmission control protocol (TCP) based streaming video applications using optimised link state routing (OLSR) implementation in an IEEE 802.11g wireless network. Corresponding simulations are developed in Network Simulator ns-2 by setting simulation parameters according to the real experiments. Difficulties faced to regenerate real-life scenarios have been discussed and the gaps between reality and simulation are identified. A setup guideline to produce realistic simulation results has been established. 展开更多
关键词 Mobile ad-hoc networks (MANET) real-life experiment Internet control message protocol (ICMP) user datagram protocol (UDP) transmission control protocol (TCP) optimised link state routing (OLSR) NS-2
原文传递
MULTIPLE ELECTRONIC CONTROL UNITS CALIBRATION SYSTEM BASED ON EXPLICIT CALIBRATION PROTOCOL AND J1939 PROTOCOL 被引量:3
12
作者 ZHU Keqing XU Quankui YANG Lin ZHUO Bin 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2008年第1期42-46,共5页
The rising number of electronic control units (ECUs) in vehicles and the decreasing time to market have led to the need for advanced methods of calibration. A multi-ECU calibration system was developed based on the ... The rising number of electronic control units (ECUs) in vehicles and the decreasing time to market have led to the need for advanced methods of calibration. A multi-ECU calibration system was developed based on the explicit calibration protocol (XCP) and J1939 communication protocol to satisfy the need of calibrating multiple ECUs simultaneously. The messages in the controller area network (CAN) are defined in the J1939 protocol. Each CAN node can get its own calibration messages and information from other ECUs, and block other messages by qualifying the CAN messages with priority, source or destination address. The data field of the calibration message is designed with the XCP, with CAN acting as the transport layer. The calibration sessions are setup with the event-triggered XCP driver in the master node and the responding XCP driver in the slave nodes. Mirroring calibration variables from ROM to RAM enables the user to calibrate ECUs online. The application example shows that the multi-ECU calibration system can calibrate multiple ECUs simultaneously, and the main program can also accomplish its calculation and send commands to the actuators in time. By the multi-ECU calibration system, the calibration effort and time can be reduced and the variables in ECU can get a better match with the variables of other ECUs. 展开更多
关键词 Electronic control unit (ECU) Calibration Explicit calibration protocol (XCP) J1939 communication protocol Controlled area network (CAN)
在线阅读 下载PDF
Individualized music for dementia:Evolution and application of evidence-based protocol 被引量:3
13
作者 Linda A Gerdner 《World Journal of Psychiatry》 SCIE 2012年第2期26-32,共7页
The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded versio... The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded version of the protocol was written for professional health care providers with a consumer version tailored for family caregivers. The underlying mid-range theory is presented along with a seminal study that was followed by further research in the United States, Canada, Great Britain, France, Sweden, Norway, Japan and Taiwan. Key studies are summarized. Given its efficacy when implemented by research staff, studies have advanced to testing the intervention under real-life conditions when implemented and evaluated by trained nursing assistants in long-term care facilities and visiting family members. In addition, one study evaluated the implementation of music by family members in the home setting. Initial research focused on agitation as the dependent variable with subsequent research indicating a more holistic response such as positive affect, expressed satisfaction, and meaningful interaction with others. The article advances by describing on-line programs designed to train health care professionals in the assessment, implementation and evaluation of individualized music. In addition, Gerdner has written a story for apicture book intended for children and their families(in press). The story models principles of individualized music to elicit positive memories, reduce anxiety and agitation, and promote communication. The article concludes with implications for future research. 展开更多
关键词 Individualized MUSIC DEMENTIA Alzheimer’s disease AGITATION EVIDENCE-based protocol
暂未订购
AeroMTP:A fountain code-based multipath transport protocol for airborne networks 被引量:4
14
作者 Li Jie Gong Erling +2 位作者 Sun Zhiqiang Liu Wei Xie Hongwei 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第4期1147-1162,共16页
Airborne networks(ANs) are special types of ad hoc networks that can be used to enhance situational awareness, flight coordination and flight efficiency in civil and military aviation.Compared to ground networks, AN... Airborne networks(ANs) are special types of ad hoc networks that can be used to enhance situational awareness, flight coordination and flight efficiency in civil and military aviation.Compared to ground networks, ANs have some unique attributes including high node mobility, frequent topology changes, mechanical and aerodynamic constrains, strict safety requirements and harsh communication environment.Thus, the performance of conventional transmission control protocol(TCP) will be dramatically degraded in ANs.Aircraft commonly have two or more heterogeneous network interfaces which offer an opportunity to form multiple communication paths between any two nodes in ANs.To satisfy the communication requirements in ANs, we propose aeronautical multipath transport protocol(Aero MTP) for ANs, which effectively utilizes the available bandwidth and diversity provided by heterogeneous wireless paths.Aero MTP uses fountain codes as forward error correction(FEC) codes to recover from data loss and deploys a TCP-friendly rate-based congestion control mechanism for each path.Moreover, we design a packet allocation algorithm based on optimization to minimize the delivery time of blocks.The performance of Aero MTP is evaluated through OMNe T++ simulations under a variety of test scenarios.Simulations demonstrate that Aero MTP is of great potential to be applied to ANs. 展开更多
关键词 Ad hoc networks Airborne networks Fountain code Multi-paths Network protocols
原文传递
Location-Based Routing Protocols for Wireless Sensor Networks: A Survey 被引量:6
15
作者 Arun Kumar Hnin Yu Shwe +1 位作者 Kai Juan Wong Peter H. J. Chong 《Wireless Sensor Network》 2017年第1期25-72,共48页
Recently, location-based routings in wireless sensor networks (WSNs) are attracting a lot of interest in the research community, especially because of its scalability. In location-based routing, the network size is sc... Recently, location-based routings in wireless sensor networks (WSNs) are attracting a lot of interest in the research community, especially because of its scalability. In location-based routing, the network size is scalable without increasing the signalling overhead as routing decisions are inherently localized. Here, each node is aware of its position in the network through some positioning device like GPS and uses this information in the routing mechanism. In this paper, we first discuss the basics of WSNs including the architecture of the network, energy consumption for the components of a typical sensor node, and draw a detailed picture of classification of location-based routing protocols. Then, we present a systematic and comprehensive taxonomy of location-based routing protocols, mostly for sensor networks. All the schemes are subsequently discussed in depth. Finally, we conclude the paper with some insights on potential research directions for location-based routing in WSNs. 展开更多
关键词 Location-based protocol GEOGRAPHIC ROUTING WIRELESS Sensor Networks Energy CONSERVATION ROUTING
在线阅读 下载PDF
Prediction-based protocol for mobile target tracking in wireless sensor networks 被引量:3
16
作者 Liang Xue Zhixin Liu Xinping Guan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第2期347-352,共6页
Remote tracking for mobile targets is one of the most important applications in wireless sensor networks (WSNs). A target tracking protoco–exponential distributed predictive tracking (EDPT) is proposed. To reduce... Remote tracking for mobile targets is one of the most important applications in wireless sensor networks (WSNs). A target tracking protoco–exponential distributed predictive tracking (EDPT) is proposed. To reduce energy waste and response time, an improved predictive algorithm–exponential smoothing predictive algorithm (ESPA) is presented. With the aid of an additive proportion and differential (PD) controller, ESPA decreases the system predictive delay effectively. As a recovery mechanism, an optimal searching radius (OSR) algorithm is applied to calculate the optimal radius of the recovery zone. The simulation results validate that the proposed EDPT protocol performes better in terms of track failed ratio, energy waste ratio and enlarged sensing nodes ratio, respectively. 展开更多
关键词 wireless sensor network target tracking protocol predictive algorithm recovery mechanism.
在线阅读 下载PDF
A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access 被引量:8
17
作者 Xin Jiang Mingzhe Liu +2 位作者 Chen Yang Yanhua Liu Ruili Wang 《Computers, Materials & Continua》 SCIE EI 2019年第1期45-59,共15页
In order to deploy a secure WLAN mesh network,authentication of both users and APs is needed,and a secure authentication mechanism should be employed.However,some additional configurations of trusted third party agenc... In order to deploy a secure WLAN mesh network,authentication of both users and APs is needed,and a secure authentication mechanism should be employed.However,some additional configurations of trusted third party agencies are still needed on-site to deploy a secure authentication system.This paper proposes a new block chain-based authentication protocol for WLAN mesh security access,to reduce the deployment costs and resolve the issues of requiring key delivery and central server during IEEE 802.11X authentication.This method takes the user’s authentication request as a transaction,considers all the authentication records in the mesh network as the public ledger and realizes the effective monitoring of the malicious attack.Finally,this paper analyzes the security of the protocol in detail,and proves that the new method can solve the dependence of the authentication node on PKI and CA. 展开更多
关键词 WLAN MESH BLOCK CHAIN AUTHENTICATION protocol PUBLIC ledger
在线阅读 下载PDF
Research on ZigBee Wireless Sensors Network Based on ModBus Protocol 被引量:8
18
作者 Chengbo YU Yanfei LIU Cheng WANG 《Wireless Sensor Network》 2009年第1期43-47,共5页
The information transmission is transparent for the user in the ZigBee wireless sensors network, which are lack of interactivity and self-constrain. The information in the ZigBee wireless sensors network can not be vi... The information transmission is transparent for the user in the ZigBee wireless sensors network, which are lack of interactivity and self-constrain. The information in the ZigBee wireless sensors network can not be viewed in a real time by a friendly interface. Modbus protocol is embedded into ZigBee stack, in this way, we can implement interaction well and the information can be viewed in a friendly interface. The paper presents the measures to embed the Modbus protocol into the ZigBee stack provided by Chipcon company, which contains address bound mechanism, information centralized storage, and flexible monitoring, by which we can monitor the real time information from the ZigBee wireless network and use some instructions to control the remote device in a friendly interface, which can be used well in the middle and small ZigBee monitoring wireless sensors network. We implement it in the plant physiological ecology monitoring system. 展开更多
关键词 MODBUS protocol ZIGBEE STACK MONITORING
暂未订购
Nonlinear consensus protocols for multi-agent systems based on centre manifold reduction 被引量:2
19
作者 李玉梅 关新平 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第8期3355-3366,共12页
Nonlinear consensus protocols for dynamic directed networks of multi-agent systems with fixed and switching topologies are investigated separately in this paper. Based on the centre manifold reduction technique, nonli... Nonlinear consensus protocols for dynamic directed networks of multi-agent systems with fixed and switching topologies are investigated separately in this paper. Based on the centre manifold reduction technique, nonlinear consensus protocols are presented. We prove that a group of agents can reach a β-consensus, the value of which is the group decision value varying from the minimum and the maximum values of the initial states of the agents. Moreover, we derive the conditions to guarantee that all the agents reach a β-consensus on a desired group decision value. Finally, a simulation study concerning the vertical alignment manoeuvere of a team of unmanned air vehicles is performed. Simulation results show that the nonlinear consensus protocols proposed are more effective than the linear protocols for the formation control of the agents and they are an improvement over existing protocols. 展开更多
关键词 nonlinear consensus protocol centre manifold reduction multi-agent systems switching topology
原文传递
A study protocol of population-based cancer screening cohort study on esophageal,stomach and liver cancer in rural China 被引量:14
20
作者 Jiang Li He Li +6 位作者 Hongmei Zeng Rongshou Zheng Maomao Cao Dianqin Sun Jiansong Ren Wanqing Chen Jie He 《Chinese Journal of Cancer Research》 SCIE CAS CSCD 2020年第4期540-546,共7页
Objective:National Health Commission of the People's Republic of China collaborated with many ministries and commissions government and initiated a population-based cancer screening program in high-risk area of ru... Objective:National Health Commission of the People's Republic of China collaborated with many ministries and commissions government and initiated a population-based cancer screening program in high-risk area of rural China,targeting three types of cancer that are most prevalent in these areas,including esophageal,stomach and liver cancer.This study protocol was reported to show the design and evaluate the effectiveness of cancer screening and appropriate screening strategies of three cancers in rural China.Methods and analysis:A two-step design with cancer risk assessment based on questionnaire interview,Hepatitis B surface antigen(HBsAg)test strip and subsequent clinical intervention for high-risk populations was adopted&ee of charge at the local hospitals designated in the program.Ethic and dissemination:This study was approved by the Institutional Review Board of Cancer Hospital,Chinese Academy of Medical Sciences and Peking Union Medical College.The results will evaluate the effectiveness of cancer screening and appropriate screening strategies in rural China. 展开更多
关键词 Esophageal cancer screening stomach cancer screening liver cancer screening study protocol
暂未订购
上一页 1 2 250 下一页 到第
使用帮助 返回顶部