Background: Insomnia is a common complaint that is closely related to gastrointestinal symptoms, which is consistent with the traditional Chinese medicine classical theory of ‘‘stomach disharmony leading to restless...Background: Insomnia is a common complaint that is closely related to gastrointestinal symptoms, which is consistent with the traditional Chinese medicine classical theory of ‘‘stomach disharmony leading to restless sleep." Acupuncture is an effective complementary and alternative medicine therapy to improve gastrointestinal function and restore the normal sleep-wake cycle. However, studies on the effectiveness of acupuncture for insomnia due to spleen-stomach disharmony syndrome are limited to case reports and few randomized controlled trials; deeper research on its mechanism is still lacking. This randomized controlled trial aims to assess the treatment efficacy of ‘‘harmonizing stomach to tranquilize mind"acupuncture for insomnia and its influence on the intestinal microbiome.Methods/design: This is a randomized, single-blind, parallel-group study. Sixty eligible patients with insomnia due to spleen-stomach disharmony syndrome will be randomly divided into two groups(1:1 allocation ratio). The intervention group will use ‘‘harmonizing stomach to tranquilize mind"acupuncture, and the control group will receive sham acupuncture. Participants will receive 5 acupuncture treatment sessions per week for 4 consecutive weeks. The Pittsburgh Sleep Quality Index will be used to evaluate the clinical efficacy of acupuncture treatment by making assessments at baseline, the end of treatment and the end of the follow-up. High-throughput 16 S ribosomal ribonucleic acid gene sequencing will be performed to detect changes in the intestinal microbial composition before and after treatment.Discussion: The results of this trial are expected to confirm that ‘‘harmonizing stomach to tranquilize mind" acupuncture can effectively relieve insomnia and alter the intestinal microbiome.展开更多
The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studies have s...The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum and inefficiency in its utilization has been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting their transmission characteristics. In this paper, some of the decentralized adaptive medium access control (MAC) protocols for CR networks have been critically analyzed, and a novel adaptive MAC protocol for CR networks, decentralized non-global MAC (DNG-MAC), has been proposed. The results show the DNG-MAC outperforms other CR-MAC protocols in terms of time and energy efficiency.展开更多
Brain computer interface(BCI)systems permit individuals with motor disorders to utilize their thoughts as a mean to control external devices.BCI is a promising interdisciplinary field that gained the attention of many...Brain computer interface(BCI)systems permit individuals with motor disorders to utilize their thoughts as a mean to control external devices.BCI is a promising interdisciplinary field that gained the attention of many researchers.Yet,the development of BCI systems is facing several challenges,such as network lifetime.The Medium Access Control(MAC)Protocol is the bottle-neck of network reliability.There are many MAC protocols that can be utilized for dependable transmission in BCI applications by altering their control parameters.However,modifying these parameters is another source of concern due to the scarcity in knowledge about the effect of modification.Also,there is still no instrument that can receive and actualize these parameters on transmitters embedded inside the cerebrum.In this paper,we propose two novel MAC protocols using passive UHF-RFID,the proposed protocols provide efficient and reliable communication between the transmitters and the receiver.The UHF-RFID transmitters were used because they are energy efficient which makes them compatible with BCI application.The first protocol is designed for the EEG signals.While the second protocol was designed for the ECoG signals.The evaluation results showed the validity of the proposed protocols in terms of network performance.The results also proved that the protocols are suitable and reliable for designing efficient BCI applications.展开更多
Medium access control( MAC) protocol of underwater acoustic communication network is a key technology for underwater acoustic networks( UANs). Most of the MAC protocols for wireless terrestrial communication networks ...Medium access control( MAC) protocol of underwater acoustic communication network is a key technology for underwater acoustic networks( UANs). Most of the MAC protocols for wireless terrestrial communication networks have been designed with negligible propagation delay. If it is deployed directly in an underwater environment,the UANs will perform inefficiently. In this paper,the characteristics of underwater acoustic channel are modeled and simulated by using the OPNET simulation tool,which are the speed of sound, propagation loss, and four sources for ambient noise: the turbulence,shipping,wind driven waves and thermal noise. The performance of pure Aloha( P-Aloha),carrier sense multiple access with collision avoidance( CSMA / CA) and multiple access collision avoidance for wireless local area network( MACAW) protocols in underwater acoustic channel environment are evaluated. The different performance of protocols in underwater environment is compared in the simulation.展开更多
This paper investigates the fnite-time consensus problem of multi-agent systems with single and double integrator dynamics,respectively.Some novel nonlinear protocols are constructed for frst-order and second-order le...This paper investigates the fnite-time consensus problem of multi-agent systems with single and double integrator dynamics,respectively.Some novel nonlinear protocols are constructed for frst-order and second-order leader-follower multi-agent systems,respectively.Based on the fnite-time control technique,the graph theory and Lyapunov direct method,some theoretical results are proposed to ensure that the states of all the follower agents can converge to its leader agent s state in fnite time.Finally,some simulation results are presented to illustrate the efectiveness of our theoretical results.展开更多
Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the...Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol.展开更多
In this paper, we provide a comprehensive survey of key energy-efficient Medium Access Control (MAC) protocols for Wireless Body Area Networks (WBANs). At the outset, we outline the crucial attributes of a good MAC pr...In this paper, we provide a comprehensive survey of key energy-efficient Medium Access Control (MAC) protocols for Wireless Body Area Networks (WBANs). At the outset, we outline the crucial attributes of a good MAC protocol for WBAN. Several sources that contribute to the energy inefficiency of WBAN are identified, and features of the various MAC protocols qualitatively compared. Then, we further investigate some representative TDMA-based energy-efficient MAC protocols for WBAN by emphasizing their strengths and weaknesses. Finally, we conclude with a number of open research issues with regard to WBAN MAC layer.展开更多
Wireless sensor networks are currently experiencing widespread enthusiasm in the field of research, mainly because of the great benefits they promise in terms of flexibility, cost, range and robustness. In addition, s...Wireless sensor networks are currently experiencing widespread enthusiasm in the field of research, mainly because of the great benefits they promise in terms of flexibility, cost, range and robustness. In addition, such networks find use in a wide variety of applications, for example in collecting remote data, type of climate monitoring, seismic activity, or in other areas such?as home automation and medical. Unfortunately, their disadvantages are up to their promises. Indeed, the sensor nodes are subjected to high energy consumption constraints due to their compact size as well as the deployment environment. Frequent replacement of batteries is excluded in a field that can be difficult to access. Therefore, the main challenge remains as a result of miniaturization and reduces power consumption to maximize network lifetime. The objective of this work is to make a thorough study of the energy consumption in wireless sensor networks. The study points are addressed at the media access protocol or MAC protocol.展开更多
The number of electronic devices connected to agricultural machinery is increasing to support new agricultural practices tasks related to the Precision Agriculture such as spatial variability mapping and Variable Rate...The number of electronic devices connected to agricultural machinery is increasing to support new agricultural practices tasks related to the Precision Agriculture such as spatial variability mapping and Variable Rate Technology (VRT). The Distributed Control System (DCS) is a suitable solution for decentralization of the data acquisition system and the Controller Area Network (CAN) is the major trend among the embedded communications protocols for agricultural machinery and vehicles. The application of soil correctives is a typical problem in Brazil. The efficiency of this correction process is highly dependent of the inputs way at soil and the occurrence of errors affects directly the agricultural yield. To handle this problem, this paper presents the development of a CAN-based distributed control system for a VRT system of soil corrective in agricultural machinery. The VRT system is composed by a tractor-implement that applies a desired rate of inputs according to the georeferenced prescription map of the farm field to support PA (Precision Agriculture). The performance evaluation of the CAN-based VRT system was done by experimental tests and analyzing the CAN messages transmitted in the operation of the entire system. The results of the control error according to the necessity of agricultural application allow conclude that the developed VRT system is suitable for the agricultural productions reaching an acceptable response time and application error. The CAN-Based DCS solution applied in the VRT system reduced the complexity of the control system, easing the installation and maintenance. The use of VRT system allowed applying only the required inputs, increasing the efficiency operation and minimizing the environmental impact.展开更多
In wireless ad hoc networks, nodes cooperatively form a network without any infrastructure such as a BS/AP (base station or access point). The widely-used contention-based MAC protocol, IEEE 802.11b, is inefficient in...In wireless ad hoc networks, nodes cooperatively form a network without any infrastructure such as a BS/AP (base station or access point). The widely-used contention-based MAC protocol, IEEE 802.11b, is inefficient in multi-hop networks due to the hidden and exposed terminal problems. The most popular schedule-based MAC protocol, TDMA (time division multiple access), is difficult to implement in an ad hoc network due to the lack of infrastructure. The contribution of this paper is to provide the community novel and efficient MAC (medium access control) protocols (i.e., a collision resolution protocol) for a wireless ad hoc network without a centralized infrastructure. We propose two new MAC protocols (one distributed algorithm and one cluster-based algorithm) that use a collision resolution scheme for a network with a single BS/AP. We first compare the performance of our distributed algorithm with our cluster-based algorithm. Then, we compare our algorithm that performs better (i.e., our cluster-based algorithm) to TDMA in a two-hop network. The simulation results illustrate that our cluster-based algorithm provides higher throughput and lower delay than TDMA in a two-hop network.展开更多
This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided in...This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel,broadcast channel and several data chan-nels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol,the results show that the pro-posed mechanism improves the average throughput and limits the transmission delay efficiently.展开更多
As wireless sensor network becomes pervasive, new requirements have been continuously emerged. How-ever, the most of research efforts in wireless sensor network are focused on energy problem since the nodes are usuall...As wireless sensor network becomes pervasive, new requirements have been continuously emerged. How-ever, the most of research efforts in wireless sensor network are focused on energy problem since the nodes are usually battery-powered. Among these requirements, real-time communication is one of the big research challenges in wireless sensor networks because most of query messages carry time information. To meet this requirement, recently several real-time medium access control protocols have been proposed for wireless sensor networks in the literature because waiting time to share medium on each node is one of main source for end-to-end delay. In this paper, we first introduce the specific requirement of wireless sensor real-time MAC protocol. Then, a collection of recent wireless sensor real-time MAC protocols are surveyed, classified, and described emphasizing their advantages and disadvantages whenever possible. Finally we present a dis-cussion about the challenges of current wireless sensor real-time MAC protocols in the literature, and show the conclusion in the end.展开更多
By modifying the IEEE 802.11 wireless local area network(WLAN) medium access protocol(MAC),a contention based and a polling based protocol are proposed to deal with the case every station possesses two classes of fram...By modifying the IEEE 802.11 wireless local area network(WLAN) medium access protocol(MAC),a contention based and a polling based protocol are proposed to deal with the case every station possesses two classes of frame in real time applications.Both protocols can ensure the real time frame only need to wait a determinable bounded time.These two protocols are introduced briefly and a performance comparison between them is made.Simulation results show that each protocol has advantage over the others in certain network condition.展开更多
针对PTP(precise time protocol)协议在应用层获取软件时间戳导致时钟同步精度下降的问题,提出一种基于MAC(media access control)层获取硬件时间戳的PTP同步优化方案。设计了以STM32F407微处理器为核心的PTP时钟应用平台,在MAC层实现...针对PTP(precise time protocol)协议在应用层获取软件时间戳导致时钟同步精度下降的问题,提出一种基于MAC(media access control)层获取硬件时间戳的PTP同步优化方案。设计了以STM32F407微处理器为核心的PTP时钟应用平台,在MAC层实现了硬件时间戳获取,避免了由于协议栈软件处理延时产生的不确定性;针对PTP时钟晶振老化导致的时间同步偏差及网络延迟抖动问题,采用迭代方法优化了本地时钟频率调节算法,提高了频率校正精度。经实际测试,主从时钟偏差的RMS(root mean square)优于20 ns,提升了时钟同步精度。展开更多
低功耗广域网(Low Power Wide Area Network,LPWAN)技术的出现,能够在保证更远距离的通信传输的同时,最大限度地降低功耗,节约传输成本。LoRa(Long Range)技术作为其中的佼佼者,凭借其远距离、低功耗、大容量、强抗干扰、高接收灵敏度...低功耗广域网(Low Power Wide Area Network,LPWAN)技术的出现,能够在保证更远距离的通信传输的同时,最大限度地降低功耗,节约传输成本。LoRa(Long Range)技术作为其中的佼佼者,凭借其远距离、低功耗、大容量、强抗干扰、高接收灵敏度的特点,备受工业界和学术界的青睐。针对目前工业中主流使用的基于ALOHA的LoRaWAN协议无法很好地解决海量终端设备接入LoRa网络后所带来的严重数据包冲突以及LoRa CAD(Channel Activity Detection)功能带来的隐藏终端问题,提出了一种基于BTMA(Busy Tone Multiple Access)的LoRa网络MAC协议——BT-MAC协议。该协议利用了LoRa高接收灵敏度的特性,网关利用“忙音”信标来通知各个节点网关的工作情况,减少了无效包的发送。同时,节点端通过记录有“忙音”信息和本地信息的逻辑信道矩阵,结合最优信道选择算法,选出最优逻辑信道进行发送,降低了端节点上行数据包之间的冲突,有效缓解了LoRa网络中的隐藏终端问题以及阻塞问题。此外,搭建了LoRa网络MAC协议测试平台,并测试了BT-MAC的有效性,完成了室内和室外环境大规模的并发实验和能耗检测实验。实验结果表明,BT-MAC协议的吞吐量是LMAC-2协议的1.6倍,是ALOHA协议的5.1倍;同时其包接收率达到LMAC-2协议的1.53倍,ALOHA协议的17.2倍;其包接收平均能耗约为LMAC-2协议的64.1%,为ALOHA协议的14.2%。展开更多
Objective:To evaluate the efficacy and safety of acupoint application for post-stroke depression(PSD)by regulating gastrointestinal function.A secondary objective is to explore the potential mechanism underlying this ...Objective:To evaluate the efficacy and safety of acupoint application for post-stroke depression(PSD)by regulating gastrointestinal function.A secondary objective is to explore the potential mechanism underlying this approach from the perspective of gut microbiota.Methods:This multicenter,randomized,double-blind(patients and assessors),placebo-controlled trial will enroll 80 patients with PSD,and include a 1-week run-in period,a 4-week treatment phase,and a 12-week follow-up.Eligible participants will randomly be assigned in a 1:1 ratio to either the acupoint application or placebo(non-acupoint)groups.Treatments will be administered thrice weekly for 4 weeks.The primary outcome is change in the Hamilton Rating Scale for Depression(HAMD)score.Secondary outcomes include the Beck Depression Inventory(BDI),36-Item Short-Form Health Survey(SF-36),Barthel Index of Activities of Daily Living,Social Adaptation Self-Evaluation Scale(SASS),and gut microbiota profiling.All outcomes will be assessed at baseline(prior to treatment),during treatment(weeks 2 and 4),and during follow-up(weeks 8,12,and 16).The Treatment Emergent Symptom Scale(TESS)will be used for evaluation throughout the 4-week treatment phase.Discussion:The results of this study will provide important evidence supporting a novel treatment strategy for PSD that targets gastrointestinal regulation,potentially informing future clinical practice.展开更多
In this paper,we develop a quantum communication protocol for the simultaneous preparation of a two-qubit and a three-qubit state at the positions of two different parties situated spatially apart.For one party,Alice,...In this paper,we develop a quantum communication protocol for the simultaneous preparation of a two-qubit and a three-qubit state at the positions of two different parties situated spatially apart.For one party,Alice,it is a remote state preparation of a known two-qubit state while for the other party,Bob,it is a joint remote state preparation with the help of a third party,Eve.The protocol is executed in a hybrid form bi-directionally in the presence of two controllers,Charlie and David.There is a hierarchy in the process through different levels of control under which the actions by Alice and Bob are performed.There is a need for a ten-qubit entangled channel connecting the five parties.The generation of this channel through a circuit is discussed.The protocol is executed on the IBM Quantum platform.We also study the effect of noise on our protocol.Here,amplitude-damping,bit-flip and phase-flip noisy environments are considered and the corresponding variations of fidelity are theoretically and numerically analyzed.展开更多
基金supported by a grant from the Science and Technology Planned Project of Sichuan Province,China (No.18YYJC0949)
文摘Background: Insomnia is a common complaint that is closely related to gastrointestinal symptoms, which is consistent with the traditional Chinese medicine classical theory of ‘‘stomach disharmony leading to restless sleep." Acupuncture is an effective complementary and alternative medicine therapy to improve gastrointestinal function and restore the normal sleep-wake cycle. However, studies on the effectiveness of acupuncture for insomnia due to spleen-stomach disharmony syndrome are limited to case reports and few randomized controlled trials; deeper research on its mechanism is still lacking. This randomized controlled trial aims to assess the treatment efficacy of ‘‘harmonizing stomach to tranquilize mind"acupuncture for insomnia and its influence on the intestinal microbiome.Methods/design: This is a randomized, single-blind, parallel-group study. Sixty eligible patients with insomnia due to spleen-stomach disharmony syndrome will be randomly divided into two groups(1:1 allocation ratio). The intervention group will use ‘‘harmonizing stomach to tranquilize mind"acupuncture, and the control group will receive sham acupuncture. Participants will receive 5 acupuncture treatment sessions per week for 4 consecutive weeks. The Pittsburgh Sleep Quality Index will be used to evaluate the clinical efficacy of acupuncture treatment by making assessments at baseline, the end of treatment and the end of the follow-up. High-throughput 16 S ribosomal ribonucleic acid gene sequencing will be performed to detect changes in the intestinal microbial composition before and after treatment.Discussion: The results of this trial are expected to confirm that ‘‘harmonizing stomach to tranquilize mind" acupuncture can effectively relieve insomnia and alter the intestinal microbiome.
文摘The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum and inefficiency in its utilization has been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting their transmission characteristics. In this paper, some of the decentralized adaptive medium access control (MAC) protocols for CR networks have been critically analyzed, and a novel adaptive MAC protocol for CR networks, decentralized non-global MAC (DNG-MAC), has been proposed. The results show the DNG-MAC outperforms other CR-MAC protocols in terms of time and energy efficiency.
文摘Brain computer interface(BCI)systems permit individuals with motor disorders to utilize their thoughts as a mean to control external devices.BCI is a promising interdisciplinary field that gained the attention of many researchers.Yet,the development of BCI systems is facing several challenges,such as network lifetime.The Medium Access Control(MAC)Protocol is the bottle-neck of network reliability.There are many MAC protocols that can be utilized for dependable transmission in BCI applications by altering their control parameters.However,modifying these parameters is another source of concern due to the scarcity in knowledge about the effect of modification.Also,there is still no instrument that can receive and actualize these parameters on transmitters embedded inside the cerebrum.In this paper,we propose two novel MAC protocols using passive UHF-RFID,the proposed protocols provide efficient and reliable communication between the transmitters and the receiver.The UHF-RFID transmitters were used because they are energy efficient which makes them compatible with BCI application.The first protocol is designed for the EEG signals.While the second protocol was designed for the ECoG signals.The evaluation results showed the validity of the proposed protocols in terms of network performance.The results also proved that the protocols are suitable and reliable for designing efficient BCI applications.
基金National Natural Science Foundations of China(Nos.60872073,6097501,and 51075068)the Doctoral Fund of Ministry of Education of China(No.20110092130004)the Research Foundation and Education Bureau of Anhui Province of China(No.KJ2009B137)
文摘Medium access control( MAC) protocol of underwater acoustic communication network is a key technology for underwater acoustic networks( UANs). Most of the MAC protocols for wireless terrestrial communication networks have been designed with negligible propagation delay. If it is deployed directly in an underwater environment,the UANs will perform inefficiently. In this paper,the characteristics of underwater acoustic channel are modeled and simulated by using the OPNET simulation tool,which are the speed of sound, propagation loss, and four sources for ambient noise: the turbulence,shipping,wind driven waves and thermal noise. The performance of pure Aloha( P-Aloha),carrier sense multiple access with collision avoidance( CSMA / CA) and multiple access collision avoidance for wireless local area network( MACAW) protocols in underwater acoustic channel environment are evaluated. The different performance of protocols in underwater environment is compared in the simulation.
基金supported by National Basic Research Program of China (973 Program) (No.2010CB731800)National Natural Science Foundation of China (Nos.60934003 and 61074065)Natural Science Foundation of Hebei Province (No.F2012203119)
文摘This paper investigates the fnite-time consensus problem of multi-agent systems with single and double integrator dynamics,respectively.Some novel nonlinear protocols are constructed for frst-order and second-order leader-follower multi-agent systems,respectively.Based on the fnite-time control technique,the graph theory and Lyapunov direct method,some theoretical results are proposed to ensure that the states of all the follower agents can converge to its leader agent s state in fnite time.Finally,some simulation results are presented to illustrate the efectiveness of our theoretical results.
文摘Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol.
基金supported by the MKE (The Ministry of Knowledge Economy), Korea, under the ITRC (Information Technology Research Center)support program supervised by the NIPA(National IT Industry Promotion Agency)under Grant No.NIPA-2011-(C1090-1121-0002)
文摘In this paper, we provide a comprehensive survey of key energy-efficient Medium Access Control (MAC) protocols for Wireless Body Area Networks (WBANs). At the outset, we outline the crucial attributes of a good MAC protocol for WBAN. Several sources that contribute to the energy inefficiency of WBAN are identified, and features of the various MAC protocols qualitatively compared. Then, we further investigate some representative TDMA-based energy-efficient MAC protocols for WBAN by emphasizing their strengths and weaknesses. Finally, we conclude with a number of open research issues with regard to WBAN MAC layer.
文摘Wireless sensor networks are currently experiencing widespread enthusiasm in the field of research, mainly because of the great benefits they promise in terms of flexibility, cost, range and robustness. In addition, such networks find use in a wide variety of applications, for example in collecting remote data, type of climate monitoring, seismic activity, or in other areas such?as home automation and medical. Unfortunately, their disadvantages are up to their promises. Indeed, the sensor nodes are subjected to high energy consumption constraints due to their compact size as well as the deployment environment. Frequent replacement of batteries is excluded in a field that can be difficult to access. Therefore, the main challenge remains as a result of miniaturization and reduces power consumption to maximize network lifetime. The objective of this work is to make a thorough study of the energy consumption in wireless sensor networks. The study points are addressed at the media access protocol or MAC protocol.
文摘The number of electronic devices connected to agricultural machinery is increasing to support new agricultural practices tasks related to the Precision Agriculture such as spatial variability mapping and Variable Rate Technology (VRT). The Distributed Control System (DCS) is a suitable solution for decentralization of the data acquisition system and the Controller Area Network (CAN) is the major trend among the embedded communications protocols for agricultural machinery and vehicles. The application of soil correctives is a typical problem in Brazil. The efficiency of this correction process is highly dependent of the inputs way at soil and the occurrence of errors affects directly the agricultural yield. To handle this problem, this paper presents the development of a CAN-based distributed control system for a VRT system of soil corrective in agricultural machinery. The VRT system is composed by a tractor-implement that applies a desired rate of inputs according to the georeferenced prescription map of the farm field to support PA (Precision Agriculture). The performance evaluation of the CAN-based VRT system was done by experimental tests and analyzing the CAN messages transmitted in the operation of the entire system. The results of the control error according to the necessity of agricultural application allow conclude that the developed VRT system is suitable for the agricultural productions reaching an acceptable response time and application error. The CAN-Based DCS solution applied in the VRT system reduced the complexity of the control system, easing the installation and maintenance. The use of VRT system allowed applying only the required inputs, increasing the efficiency operation and minimizing the environmental impact.
文摘In wireless ad hoc networks, nodes cooperatively form a network without any infrastructure such as a BS/AP (base station or access point). The widely-used contention-based MAC protocol, IEEE 802.11b, is inefficient in multi-hop networks due to the hidden and exposed terminal problems. The most popular schedule-based MAC protocol, TDMA (time division multiple access), is difficult to implement in an ad hoc network due to the lack of infrastructure. The contribution of this paper is to provide the community novel and efficient MAC (medium access control) protocols (i.e., a collision resolution protocol) for a wireless ad hoc network without a centralized infrastructure. We propose two new MAC protocols (one distributed algorithm and one cluster-based algorithm) that use a collision resolution scheme for a network with a single BS/AP. We first compare the performance of our distributed algorithm with our cluster-based algorithm. Then, we compare our algorithm that performs better (i.e., our cluster-based algorithm) to TDMA in a two-hop network. The simulation results illustrate that our cluster-based algorithm provides higher throughput and lower delay than TDMA in a two-hop network.
基金Supported by the Science Foundation of Shanghai Mu-nicipal Commission of Science and Technology under contract 045115012.
文摘This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel,broadcast channel and several data chan-nels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol,the results show that the pro-posed mechanism improves the average throughput and limits the transmission delay efficiently.
文摘As wireless sensor network becomes pervasive, new requirements have been continuously emerged. How-ever, the most of research efforts in wireless sensor network are focused on energy problem since the nodes are usually battery-powered. Among these requirements, real-time communication is one of the big research challenges in wireless sensor networks because most of query messages carry time information. To meet this requirement, recently several real-time medium access control protocols have been proposed for wireless sensor networks in the literature because waiting time to share medium on each node is one of main source for end-to-end delay. In this paper, we first introduce the specific requirement of wireless sensor real-time MAC protocol. Then, a collection of recent wireless sensor real-time MAC protocols are surveyed, classified, and described emphasizing their advantages and disadvantages whenever possible. Finally we present a dis-cussion about the challenges of current wireless sensor real-time MAC protocols in the literature, and show the conclusion in the end.
基金National Science Foundation of China (No60474031)NCET(No04-0383)
文摘By modifying the IEEE 802.11 wireless local area network(WLAN) medium access protocol(MAC),a contention based and a polling based protocol are proposed to deal with the case every station possesses two classes of frame in real time applications.Both protocols can ensure the real time frame only need to wait a determinable bounded time.These two protocols are introduced briefly and a performance comparison between them is made.Simulation results show that each protocol has advantage over the others in certain network condition.
文摘针对PTP(precise time protocol)协议在应用层获取软件时间戳导致时钟同步精度下降的问题,提出一种基于MAC(media access control)层获取硬件时间戳的PTP同步优化方案。设计了以STM32F407微处理器为核心的PTP时钟应用平台,在MAC层实现了硬件时间戳获取,避免了由于协议栈软件处理延时产生的不确定性;针对PTP时钟晶振老化导致的时间同步偏差及网络延迟抖动问题,采用迭代方法优化了本地时钟频率调节算法,提高了频率校正精度。经实际测试,主从时钟偏差的RMS(root mean square)优于20 ns,提升了时钟同步精度。
文摘低功耗广域网(Low Power Wide Area Network,LPWAN)技术的出现,能够在保证更远距离的通信传输的同时,最大限度地降低功耗,节约传输成本。LoRa(Long Range)技术作为其中的佼佼者,凭借其远距离、低功耗、大容量、强抗干扰、高接收灵敏度的特点,备受工业界和学术界的青睐。针对目前工业中主流使用的基于ALOHA的LoRaWAN协议无法很好地解决海量终端设备接入LoRa网络后所带来的严重数据包冲突以及LoRa CAD(Channel Activity Detection)功能带来的隐藏终端问题,提出了一种基于BTMA(Busy Tone Multiple Access)的LoRa网络MAC协议——BT-MAC协议。该协议利用了LoRa高接收灵敏度的特性,网关利用“忙音”信标来通知各个节点网关的工作情况,减少了无效包的发送。同时,节点端通过记录有“忙音”信息和本地信息的逻辑信道矩阵,结合最优信道选择算法,选出最优逻辑信道进行发送,降低了端节点上行数据包之间的冲突,有效缓解了LoRa网络中的隐藏终端问题以及阻塞问题。此外,搭建了LoRa网络MAC协议测试平台,并测试了BT-MAC的有效性,完成了室内和室外环境大规模的并发实验和能耗检测实验。实验结果表明,BT-MAC协议的吞吐量是LMAC-2协议的1.6倍,是ALOHA协议的5.1倍;同时其包接收率达到LMAC-2协议的1.53倍,ALOHA协议的17.2倍;其包接收平均能耗约为LMAC-2协议的64.1%,为ALOHA协议的14.2%。
基金supported by the Chinese Medicine Development Fund,Hong Kong SAR,China(23B2/027A_R1)the National Natural Science Foundation of China(81704198).
文摘Objective:To evaluate the efficacy and safety of acupoint application for post-stroke depression(PSD)by regulating gastrointestinal function.A secondary objective is to explore the potential mechanism underlying this approach from the perspective of gut microbiota.Methods:This multicenter,randomized,double-blind(patients and assessors),placebo-controlled trial will enroll 80 patients with PSD,and include a 1-week run-in period,a 4-week treatment phase,and a 12-week follow-up.Eligible participants will randomly be assigned in a 1:1 ratio to either the acupoint application or placebo(non-acupoint)groups.Treatments will be administered thrice weekly for 4 weeks.The primary outcome is change in the Hamilton Rating Scale for Depression(HAMD)score.Secondary outcomes include the Beck Depression Inventory(BDI),36-Item Short-Form Health Survey(SF-36),Barthel Index of Activities of Daily Living,Social Adaptation Self-Evaluation Scale(SASS),and gut microbiota profiling.All outcomes will be assessed at baseline(prior to treatment),during treatment(weeks 2 and 4),and during follow-up(weeks 8,12,and 16).The Treatment Emergent Symptom Scale(TESS)will be used for evaluation throughout the 4-week treatment phase.Discussion:The results of this study will provide important evidence supporting a novel treatment strategy for PSD that targets gastrointestinal regulation,potentially informing future clinical practice.
基金supported by the the University Grants Commission(UGC),Government of India(NTA Ref.No.:211610140697,dated:19th April 2022)supported by the Indian Institute of Engineering Science and Technology,Shibpur。
文摘In this paper,we develop a quantum communication protocol for the simultaneous preparation of a two-qubit and a three-qubit state at the positions of two different parties situated spatially apart.For one party,Alice,it is a remote state preparation of a known two-qubit state while for the other party,Bob,it is a joint remote state preparation with the help of a third party,Eve.The protocol is executed in a hybrid form bi-directionally in the presence of two controllers,Charlie and David.There is a hierarchy in the process through different levels of control under which the actions by Alice and Bob are performed.There is a need for a ten-qubit entangled channel connecting the five parties.The generation of this channel through a circuit is discussed.The protocol is executed on the IBM Quantum platform.We also study the effect of noise on our protocol.Here,amplitude-damping,bit-flip and phase-flip noisy environments are considered and the corresponding variations of fidelity are theoretically and numerically analyzed.