期刊文献+
共找到5,444篇文章
< 1 2 250 >
每页显示 20 50 100
Effects of acupuncture in treating insomnia due to spleen-stomach disharmony syndrome and its influence on intestinal microbiome: Study protocol for a randomized controlled trial 被引量:19
1
作者 Ya-ru Huangfu Wei Peng +5 位作者 Bao-jun Guo Zhi-fu Shen Li Li Shi-wei Liu Hui Zheng You-ping Hu 《Journal of Integrative Medicine》 SCIE CAS CSCD 2019年第3期161-166,共6页
Background: Insomnia is a common complaint that is closely related to gastrointestinal symptoms, which is consistent with the traditional Chinese medicine classical theory of ‘‘stomach disharmony leading to restless... Background: Insomnia is a common complaint that is closely related to gastrointestinal symptoms, which is consistent with the traditional Chinese medicine classical theory of ‘‘stomach disharmony leading to restless sleep." Acupuncture is an effective complementary and alternative medicine therapy to improve gastrointestinal function and restore the normal sleep-wake cycle. However, studies on the effectiveness of acupuncture for insomnia due to spleen-stomach disharmony syndrome are limited to case reports and few randomized controlled trials; deeper research on its mechanism is still lacking. This randomized controlled trial aims to assess the treatment efficacy of ‘‘harmonizing stomach to tranquilize mind"acupuncture for insomnia and its influence on the intestinal microbiome.Methods/design: This is a randomized, single-blind, parallel-group study. Sixty eligible patients with insomnia due to spleen-stomach disharmony syndrome will be randomly divided into two groups(1:1 allocation ratio). The intervention group will use ‘‘harmonizing stomach to tranquilize mind"acupuncture, and the control group will receive sham acupuncture. Participants will receive 5 acupuncture treatment sessions per week for 4 consecutive weeks. The Pittsburgh Sleep Quality Index will be used to evaluate the clinical efficacy of acupuncture treatment by making assessments at baseline, the end of treatment and the end of the follow-up. High-throughput 16 S ribosomal ribonucleic acid gene sequencing will be performed to detect changes in the intestinal microbial composition before and after treatment.Discussion: The results of this trial are expected to confirm that ‘‘harmonizing stomach to tranquilize mind" acupuncture can effectively relieve insomnia and alter the intestinal microbiome. 展开更多
关键词 INSOMNIA Gastrointestinal SYMPTOMS ACUPUNCTURE INTESTINAL MICROBIOME Randomized controlled trial Study protocol
原文传递
一种多优先级的自适应太赫兹无线局域网定向MAC协议
2
作者 任智 张伟业 +1 位作者 祁君易 吕玉超 《电讯技术》 北大核心 2025年第10期1650-1656,共7页
针对太赫兹无线局域网定向网络中重要信息传输优先级不足以及时隙请求帧碰撞的问题,提出了一种多优先级的自适应太赫兹无线局域网定向MAC(Medium Access Control)协议——PA-MAC(Priority-based Adaptive Time Slot Request MAC)。PA-MA... 针对太赫兹无线局域网定向网络中重要信息传输优先级不足以及时隙请求帧碰撞的问题,提出了一种多优先级的自适应太赫兹无线局域网定向MAC(Medium Access Control)协议——PA-MAC(Priority-based Adaptive Time Slot Request MAC)。PA-MAC协议采用基于数据业务类型的优先级划分机制,为不同优先级节点赋予不同的退避窗口大小,确保重要信息优先传输;采用基于优先级的新型CAP(Contention Access Period)时段划分机制,降低了碰撞概率;采用基于节点状态的自适应申请时隙机制,提高了时隙利用率。与现有相关协议相比,PA-MAC协议使节点申请到更多的剩余时隙资源,使时隙利用率最大提升了5.89%,网络吞吐量提高了5.86%,数据传输成功率最大提升了6.23%。 展开更多
关键词 太赫兹无线局域网 优先级划分 定向通信 mac协议
在线阅读 下载PDF
An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks 被引量:1
3
作者 Munam Ali Shah Sijing Zhang Carsten Maple 《International Journal of Automation and computing》 EI CSCD 2013年第1期46-52,共7页
The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studies have s... The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum and inefficiency in its utilization has been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting their transmission characteristics. In this paper, some of the decentralized adaptive medium access control (MAC) protocols for CR networks have been critically analyzed, and a novel adaptive MAC protocol for CR networks, decentralized non-global MAC (DNG-MAC), has been proposed. The results show the DNG-MAC outperforms other CR-MAC protocols in terms of time and energy efficiency. 展开更多
关键词 Cognitive radio medium access control mac protocols common control channel cooperative communication
原文传递
Efficient MAC Protocols for Brain Computer Interface Applications 被引量:2
4
作者 Shams Al Ajrawi Ramesh Rao Mahasweta Sarkar 《Computers, Materials & Continua》 SCIE EI 2021年第10期589-605,共17页
Brain computer interface(BCI)systems permit individuals with motor disorders to utilize their thoughts as a mean to control external devices.BCI is a promising interdisciplinary field that gained the attention of many... Brain computer interface(BCI)systems permit individuals with motor disorders to utilize their thoughts as a mean to control external devices.BCI is a promising interdisciplinary field that gained the attention of many researchers.Yet,the development of BCI systems is facing several challenges,such as network lifetime.The Medium Access Control(MAC)Protocol is the bottle-neck of network reliability.There are many MAC protocols that can be utilized for dependable transmission in BCI applications by altering their control parameters.However,modifying these parameters is another source of concern due to the scarcity in knowledge about the effect of modification.Also,there is still no instrument that can receive and actualize these parameters on transmitters embedded inside the cerebrum.In this paper,we propose two novel MAC protocols using passive UHF-RFID,the proposed protocols provide efficient and reliable communication between the transmitters and the receiver.The UHF-RFID transmitters were used because they are energy efficient which makes them compatible with BCI application.The first protocol is designed for the EEG signals.While the second protocol was designed for the ECoG signals.The evaluation results showed the validity of the proposed protocols in terms of network performance.The results also proved that the protocols are suitable and reliable for designing efficient BCI applications. 展开更多
关键词 Brain-computer interface mac protocol UHF-RFID TDMA FDMA CSMA
在线阅读 下载PDF
Modeling and Simulation of P-Aloha,CSMA /CA and MACAW Protocols for Underwater Acoustic Channel 被引量:1
5
作者 DAO Van-phuong 左加阔 +3 位作者 赵力 NGUYEN Dang-nam 邹采荣 孙剑 《Journal of Donghua University(English Edition)》 EI CAS 2015年第1期35-40,共6页
Medium access control( MAC) protocol of underwater acoustic communication network is a key technology for underwater acoustic networks( UANs). Most of the MAC protocols for wireless terrestrial communication networks ... Medium access control( MAC) protocol of underwater acoustic communication network is a key technology for underwater acoustic networks( UANs). Most of the MAC protocols for wireless terrestrial communication networks have been designed with negligible propagation delay. If it is deployed directly in an underwater environment,the UANs will perform inefficiently. In this paper,the characteristics of underwater acoustic channel are modeled and simulated by using the OPNET simulation tool,which are the speed of sound, propagation loss, and four sources for ambient noise: the turbulence,shipping,wind driven waves and thermal noise. The performance of pure Aloha( P-Aloha),carrier sense multiple access with collision avoidance( CSMA / CA) and multiple access collision avoidance for wireless local area network( MACAW) protocols in underwater acoustic channel environment are evaluated. The different performance of protocols in underwater environment is compared in the simulation. 展开更多
关键词 underwater acoustic channel OPNET simulation medium access control(mac) protocol pure Aloha(P-Aloha) protocol carrier sense multiple access with collision avoidance(CSMA /CA) protocol multiple access collision avoidance for wireless local area network(macAW) protocol
在线阅读 下载PDF
Finite-time Consensus for Multi-agent Systems via Nonlinear Control Protocols 被引量:1
6
作者 Ya-Kun Zhu Xin-Ping Guan Xiao-Yuan Luo 《International Journal of Automation and computing》 EI CSCD 2013年第5期455-462,共8页
This paper investigates the fnite-time consensus problem of multi-agent systems with single and double integrator dynamics,respectively.Some novel nonlinear protocols are constructed for frst-order and second-order le... This paper investigates the fnite-time consensus problem of multi-agent systems with single and double integrator dynamics,respectively.Some novel nonlinear protocols are constructed for frst-order and second-order leader-follower multi-agent systems,respectively.Based on the fnite-time control technique,the graph theory and Lyapunov direct method,some theoretical results are proposed to ensure that the states of all the follower agents can converge to its leader agent s state in fnite time.Finally,some simulation results are presented to illustrate the efectiveness of our theoretical results. 展开更多
关键词 Finite-time consensus multi-agent systems nonlinear control protocol leader-follower single and double integratordynamics
原文传递
A Quantitative Security Metric Model for Security Controls:Secure Virtual Machine Migration Protocol as Target of Assessment 被引量:1
7
作者 Tayyaba Zeb Muhammad Yousaf +1 位作者 Humaira Afzal Muhammad Rafiq Mufti 《China Communications》 SCIE CSCD 2018年第8期126-140,共15页
Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the... Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol. 展开更多
关键词 attack resiliency measure cost-benefit measure performance improvement factor security assessment formal verification security controls security metrics virtual machine migration protocol
在线阅读 下载PDF
Energy-Efficieng MAC Protocols for Wireless Body Area Networks: A Survey
8
作者 Sai Anand Gopalan Jong-Tae Park 《China Communications》 SCIE CSCD 2011年第5期1-10,共10页
In this paper, we provide a comprehensive survey of key energy-efficient Medium Access Control (MAC) protocols for Wireless Body Area Networks (WBANs). At the outset, we outline the crucial attributes of a good MAC pr... In this paper, we provide a comprehensive survey of key energy-efficient Medium Access Control (MAC) protocols for Wireless Body Area Networks (WBANs). At the outset, we outline the crucial attributes of a good MAC protocol for WBAN. Several sources that contribute to the energy inefficiency of WBAN are identified, and features of the various MAC protocols qualitatively compared. Then, we further investigate some representative TDMA-based energy-efficient MAC protocols for WBAN by emphasizing their strengths and weaknesses. Finally, we conclude with a number of open research issues with regard to WBAN MAC layer. 展开更多
关键词 Medium Access control (mac) Wireless Body Area Networks (WBANs) ENERGY-EFFICIENCY
在线阅读 下载PDF
Energy Consumption and Fault Tolerance in the MAC Protocols for WSN
9
作者 Ridha Azizi 《Journal of Computer and Communications》 2015年第6期118-130,共13页
Wireless sensor networks are currently experiencing widespread enthusiasm in the field of research, mainly because of the great benefits they promise in terms of flexibility, cost, range and robustness. In addition, s... Wireless sensor networks are currently experiencing widespread enthusiasm in the field of research, mainly because of the great benefits they promise in terms of flexibility, cost, range and robustness. In addition, such networks find use in a wide variety of applications, for example in collecting remote data, type of climate monitoring, seismic activity, or in other areas such?as home automation and medical. Unfortunately, their disadvantages are up to their promises. Indeed, the sensor nodes are subjected to high energy consumption constraints due to their compact size as well as the deployment environment. Frequent replacement of batteries is excluded in a field that can be difficult to access. Therefore, the main challenge remains as a result of miniaturization and reduces power consumption to maximize network lifetime. The objective of this work is to make a thorough study of the energy consumption in wireless sensor networks. The study points are addressed at the media access protocol or MAC protocol. 展开更多
关键词 WIRELESS Sensor Networks FAULT TOLERANCE mac PROTOCOL Suitable for WSN
暂未订购
Development of CAN-Based Distributed Control System for Variable Rate Technology in Agricultural Machinery 被引量:1
10
作者 E. P. Godoy R. R. D, Pereira +1 位作者 A. J. V. Porto R. Y. Inamasu 《Journal of Agricultural Science and Technology》 2010年第3期65-77,共13页
The number of electronic devices connected to agricultural machinery is increasing to support new agricultural practices tasks related to the Precision Agriculture such as spatial variability mapping and Variable Rate... The number of electronic devices connected to agricultural machinery is increasing to support new agricultural practices tasks related to the Precision Agriculture such as spatial variability mapping and Variable Rate Technology (VRT). The Distributed Control System (DCS) is a suitable solution for decentralization of the data acquisition system and the Controller Area Network (CAN) is the major trend among the embedded communications protocols for agricultural machinery and vehicles. The application of soil correctives is a typical problem in Brazil. The efficiency of this correction process is highly dependent of the inputs way at soil and the occurrence of errors affects directly the agricultural yield. To handle this problem, this paper presents the development of a CAN-based distributed control system for a VRT system of soil corrective in agricultural machinery. The VRT system is composed by a tractor-implement that applies a desired rate of inputs according to the georeferenced prescription map of the farm field to support PA (Precision Agriculture). The performance evaluation of the CAN-based VRT system was done by experimental tests and analyzing the CAN messages transmitted in the operation of the entire system. The results of the control error according to the necessity of agricultural application allow conclude that the developed VRT system is suitable for the agricultural productions reaching an acceptable response time and application error. The CAN-Based DCS solution applied in the VRT system reduced the complexity of the control system, easing the installation and maintenance. The use of VRT system allowed applying only the required inputs, increasing the efficiency operation and minimizing the environmental impact. 展开更多
关键词 CAN protocol Electronic control Unit (ECU) ISOBUS precision agriculture
在线阅读 下载PDF
Collision Resolution MAC Protocols for Wireless Ad Hoc Networks
11
作者 Xinhua Yang Tracy Camp 《Communications and Network》 2013年第1期16-33,共18页
In wireless ad hoc networks, nodes cooperatively form a network without any infrastructure such as a BS/AP (base station or access point). The widely-used contention-based MAC protocol, IEEE 802.11b, is inefficient in... In wireless ad hoc networks, nodes cooperatively form a network without any infrastructure such as a BS/AP (base station or access point). The widely-used contention-based MAC protocol, IEEE 802.11b, is inefficient in multi-hop networks due to the hidden and exposed terminal problems. The most popular schedule-based MAC protocol, TDMA (time division multiple access), is difficult to implement in an ad hoc network due to the lack of infrastructure. The contribution of this paper is to provide the community novel and efficient MAC (medium access control) protocols (i.e., a collision resolution protocol) for a wireless ad hoc network without a centralized infrastructure. We propose two new MAC protocols (one distributed algorithm and one cluster-based algorithm) that use a collision resolution scheme for a network with a single BS/AP. We first compare the performance of our distributed algorithm with our cluster-based algorithm. Then, we compare our algorithm that performs better (i.e., our cluster-based algorithm) to TDMA in a two-hop network. The simulation results illustrate that our cluster-based algorithm provides higher throughput and lower delay than TDMA in a two-hop network. 展开更多
关键词 AD HOC Networks Cluster-Based ALGORITHMS COLLISION RESOLUTION Scheme mac protocols
在线阅读 下载PDF
A DUAL RESERVATION CDMA-BASED MAC PROTOCOL WITH POWER CONTROL FOR AD HOC NETWORKS
12
作者 Jia Min Chen Huimin Yuan Yuhua 《Journal of Electronics(China)》 2007年第1期64-68,共5页
This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided in... This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel,broadcast channel and several data chan-nels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol,the results show that the pro-posed mechanism improves the average throughput and limits the transmission delay efficiently. 展开更多
关键词 Ad hoc networks Medium Access control mac protocol MULTICHANNEL Code Division Multiple Access (CDMA) Power control
在线阅读 下载PDF
基于改进Transformer模型的Ad Hoc网络MAC协议识别技术
13
作者 何文雯 李盛祥 +3 位作者 王莉 李浩 李盈达 马鹏飞 《电讯技术》 北大核心 2025年第8期1240-1247,共8页
针对现有的媒体访问控制(Media Access Control,MAC)协议识别模型存在特征数据选取不完善和只关注局部特征的问题,首先,基于Transformer模型提出了Conv-Transformer模型。该模型将卷积操作引入到模型中,对卷积后特征图中的特征值进行分... 针对现有的媒体访问控制(Media Access Control,MAC)协议识别模型存在特征数据选取不完善和只关注局部特征的问题,首先,基于Transformer模型提出了Conv-Transformer模型。该模型将卷积操作引入到模型中,对卷积后特征图中的特征值进行分割拼接,并添加类别信息编码。其次,基于Exata平台搭建不同拓扑结构的Ad Hoc网络仿真场景,收集所有物理层的数据对Conv-Transformer模型进行训练和测试。测试结果表明,在Ad Hoc网络中对ALOHA、CSMA/CA、MACA和TDMA 4种MAC协议的识别任务上,提出的模型与经典深度学习模型递归神经网络(Recurrent Neural Network,RNN)、卷积神经网络(Convolutional Neural Network,CNN)和Transformer相比,比RNN模型的准确率提高了20.8%,比CNN模型的准确率提高了14.6%,比Transformer模型的准确率提高了68.8%。 展开更多
关键词 Ad Hoc网络 mac协议识别 深度学习 Transformer模型
在线阅读 下载PDF
A Survey on Real-Time MAC Protocols in Wireless Sensor Networks
14
作者 Zheng Teng Ki-Il Kim 《Communications and Network》 2010年第2期104-112,共9页
As wireless sensor network becomes pervasive, new requirements have been continuously emerged. How-ever, the most of research efforts in wireless sensor network are focused on energy problem since the nodes are usuall... As wireless sensor network becomes pervasive, new requirements have been continuously emerged. How-ever, the most of research efforts in wireless sensor network are focused on energy problem since the nodes are usually battery-powered. Among these requirements, real-time communication is one of the big research challenges in wireless sensor networks because most of query messages carry time information. To meet this requirement, recently several real-time medium access control protocols have been proposed for wireless sensor networks in the literature because waiting time to share medium on each node is one of main source for end-to-end delay. In this paper, we first introduce the specific requirement of wireless sensor real-time MAC protocol. Then, a collection of recent wireless sensor real-time MAC protocols are surveyed, classified, and described emphasizing their advantages and disadvantages whenever possible. Finally we present a dis-cussion about the challenges of current wireless sensor real-time MAC protocols in the literature, and show the conclusion in the end. 展开更多
关键词 WIRELESS Sensor Networks MEDIUM ACCESS control (mac) REAL-TIME
在线阅读 下载PDF
A Performance Comparison of Two Real Time WLAN MAC Protocols
15
作者 曹春生 李锋 张卫东 《Journal of Donghua University(English Edition)》 EI CAS 2007年第5期637-640,共4页
By modifying the IEEE 802.11 wireless local area network(WLAN) medium access protocol(MAC),a contention based and a polling based protocol are proposed to deal with the case every station possesses two classes of fram... By modifying the IEEE 802.11 wireless local area network(WLAN) medium access protocol(MAC),a contention based and a polling based protocol are proposed to deal with the case every station possesses two classes of frame in real time applications.Both protocols can ensure the real time frame only need to wait a determinable bounded time.These two protocols are introduced briefly and a performance comparison between them is made.Simulation results show that each protocol has advantage over the others in certain network condition. 展开更多
关键词 frame class mac protocol wireless LAN upper bound
在线阅读 下载PDF
基于MAC的PTP同步优化设计与实现
16
作者 修相宇 王康 武建锋 《时间频率学报》 2025年第2期101-108,共8页
针对PTP(precise time protocol)协议在应用层获取软件时间戳导致时钟同步精度下降的问题,提出一种基于MAC(media access control)层获取硬件时间戳的PTP同步优化方案。设计了以STM32F407微处理器为核心的PTP时钟应用平台,在MAC层实现... 针对PTP(precise time protocol)协议在应用层获取软件时间戳导致时钟同步精度下降的问题,提出一种基于MAC(media access control)层获取硬件时间戳的PTP同步优化方案。设计了以STM32F407微处理器为核心的PTP时钟应用平台,在MAC层实现了硬件时间戳获取,避免了由于协议栈软件处理延时产生的不确定性;针对PTP时钟晶振老化导致的时间同步偏差及网络延迟抖动问题,采用迭代方法优化了本地时钟频率调节算法,提高了频率校正精度。经实际测试,主从时钟偏差的RMS(root mean square)优于20 ns,提升了时钟同步精度。 展开更多
关键词 PTP协议 mac 滤波 时钟同步 时间戳
在线阅读 下载PDF
基于Q-learning的广域物联网热点地区MAC层机制设计
17
作者 雷迪 刘向 +4 位作者 孙文彬 杨欣 许茜 陈丽丽 易波 《移动通信》 2025年第8期90-95,共6页
在广域物联网应用中,热点地区由于终端密集接入、业务负载波动大,存在接入冲突频发、信道资源利用率低下等问题。作为共享无线信道管理重要一环,MAC层协议在提升系统吞吐量与接入效率方面发挥着核心作用。分析了热点地区MAC层协议所需特... 在广域物联网应用中,热点地区由于终端密集接入、业务负载波动大,存在接入冲突频发、信道资源利用率低下等问题。作为共享无线信道管理重要一环,MAC层协议在提升系统吞吐量与接入效率方面发挥着核心作用。分析了热点地区MAC层协议所需特征,提出基于Q-learning算法的优化方案,在节点侧引入强化学习模型以实现参数自适应调整。在传统CSMA/CA协议基础上,设计了结合动态RTS/CTS机制与动态退避窗口的接入机制。仿真结果表明,所提出的优化方案在系统吞吐量、平衡信道冲突率与利用率方面有一定提升。 展开更多
关键词 物联网 mac层协议 CSMA/CA Q-LEARNING
在线阅读 下载PDF
基于BTMA的LoRa网络隐藏终端MAC协议研究
18
作者 汪浩 蔡宇航 +1 位作者 陈国杰 王璐 《计算机科学》 北大核心 2025年第3期318-325,共8页
低功耗广域网(Low Power Wide Area Network,LPWAN)技术的出现,能够在保证更远距离的通信传输的同时,最大限度地降低功耗,节约传输成本。LoRa(Long Range)技术作为其中的佼佼者,凭借其远距离、低功耗、大容量、强抗干扰、高接收灵敏度... 低功耗广域网(Low Power Wide Area Network,LPWAN)技术的出现,能够在保证更远距离的通信传输的同时,最大限度地降低功耗,节约传输成本。LoRa(Long Range)技术作为其中的佼佼者,凭借其远距离、低功耗、大容量、强抗干扰、高接收灵敏度的特点,备受工业界和学术界的青睐。针对目前工业中主流使用的基于ALOHA的LoRaWAN协议无法很好地解决海量终端设备接入LoRa网络后所带来的严重数据包冲突以及LoRa CAD(Channel Activity Detection)功能带来的隐藏终端问题,提出了一种基于BTMA(Busy Tone Multiple Access)的LoRa网络MAC协议——BT-MAC协议。该协议利用了LoRa高接收灵敏度的特性,网关利用“忙音”信标来通知各个节点网关的工作情况,减少了无效包的发送。同时,节点端通过记录有“忙音”信息和本地信息的逻辑信道矩阵,结合最优信道选择算法,选出最优逻辑信道进行发送,降低了端节点上行数据包之间的冲突,有效缓解了LoRa网络中的隐藏终端问题以及阻塞问题。此外,搭建了LoRa网络MAC协议测试平台,并测试了BT-MAC的有效性,完成了室内和室外环境大规模的并发实验和能耗检测实验。实验结果表明,BT-MAC协议的吞吐量是LMAC-2协议的1.6倍,是ALOHA协议的5.1倍;同时其包接收率达到LMAC-2协议的1.53倍,ALOHA协议的17.2倍;其包接收平均能耗约为LMAC-2协议的64.1%,为ALOHA协议的14.2%。 展开更多
关键词 LoRa mac协议 BTMA 隐藏终端 CAD
在线阅读 下载PDF
Efficacy and safety of acupoint application for gastrointestinal function in treating post-stroke depression:Protocol for a randomized controlled trial
19
作者 Xuan Zhang Shuhui Li +2 位作者 Juntao Wang Chung Tai Lau Jacky C.P.Chan 《Journal of Traditional Chinese Medical Sciences》 2025年第4期552-558,共7页
Objective:To evaluate the efficacy and safety of acupoint application for post-stroke depression(PSD)by regulating gastrointestinal function.A secondary objective is to explore the potential mechanism underlying this ... Objective:To evaluate the efficacy and safety of acupoint application for post-stroke depression(PSD)by regulating gastrointestinal function.A secondary objective is to explore the potential mechanism underlying this approach from the perspective of gut microbiota.Methods:This multicenter,randomized,double-blind(patients and assessors),placebo-controlled trial will enroll 80 patients with PSD,and include a 1-week run-in period,a 4-week treatment phase,and a 12-week follow-up.Eligible participants will randomly be assigned in a 1:1 ratio to either the acupoint application or placebo(non-acupoint)groups.Treatments will be administered thrice weekly for 4 weeks.The primary outcome is change in the Hamilton Rating Scale for Depression(HAMD)score.Secondary outcomes include the Beck Depression Inventory(BDI),36-Item Short-Form Health Survey(SF-36),Barthel Index of Activities of Daily Living,Social Adaptation Self-Evaluation Scale(SASS),and gut microbiota profiling.All outcomes will be assessed at baseline(prior to treatment),during treatment(weeks 2 and 4),and during follow-up(weeks 8,12,and 16).The Treatment Emergent Symptom Scale(TESS)will be used for evaluation throughout the 4-week treatment phase.Discussion:The results of this study will provide important evidence supporting a novel treatment strategy for PSD that targets gastrointestinal regulation,potentially informing future clinical practice. 展开更多
关键词 Acupoint application Gut microbiota Post-stroke depression PROTOCOL Randomized controlled trial
暂未订购
Hybrid bidirectional quantum communication with different levels of control with simulation
20
作者 Plaban Saha Manoj Kumar Mandal +1 位作者 Binayak S Choudhury Soumen Samanta 《Communications in Theoretical Physics》 2025年第1期65-91,共27页
In this paper,we develop a quantum communication protocol for the simultaneous preparation of a two-qubit and a three-qubit state at the positions of two different parties situated spatially apart.For one party,Alice,... In this paper,we develop a quantum communication protocol for the simultaneous preparation of a two-qubit and a three-qubit state at the positions of two different parties situated spatially apart.For one party,Alice,it is a remote state preparation of a known two-qubit state while for the other party,Bob,it is a joint remote state preparation with the help of a third party,Eve.The protocol is executed in a hybrid form bi-directionally in the presence of two controllers,Charlie and David.There is a hierarchy in the process through different levels of control under which the actions by Alice and Bob are performed.There is a need for a ten-qubit entangled channel connecting the five parties.The generation of this channel through a circuit is discussed.The protocol is executed on the IBM Quantum platform.We also study the effect of noise on our protocol.Here,amplitude-damping,bit-flip and phase-flip noisy environments are considered and the corresponding variations of fidelity are theoretically and numerically analyzed. 展开更多
关键词 remote state preparation joint remote state preparation HIERARCHY entangled state quantum circuit controlled protocol
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部