Aiming at the weaknesses of LON bus, combining the coexistence of fieldbus and DCS (Distribu ted Control Systems) in control networks, the authors introduce a hierarchical hybrid control network design based on LON an...Aiming at the weaknesses of LON bus, combining the coexistence of fieldbus and DCS (Distribu ted Control Systems) in control networks, the authors introduce a hierarchical hybrid control network design based on LON and master slave RS 422/485 protocol. This design adopts LON as the trunk, master slave RS 422/485 control networks are connected to LON as special subnets by dedicated gateways. It is an implementation method for isomerous control network integration. Data management is ranked according to real time requirements for different network data. The core components, such as control network nodes, router and gateway, are detailed in the paper. The design utilizes both communication advantage of LonWorks technology and the more powerful control ability of universal MCUs or PLCs, thus it greatly increases system response speed and performance cost ratio.展开更多
This paper investigates the problem of cluster synchronization of master-slave complex net-works with time-varying delay via linear and adaptive feedback pinning controls.We need not non-delayed and delayed coupling m...This paper investigates the problem of cluster synchronization of master-slave complex net-works with time-varying delay via linear and adaptive feedback pinning controls.We need not non-delayed and delayed coupling matrices to be symmetric or irreducible.We have the advantages of using adaptive control method to reduce control gain and pinning control technology to reduce cost.By con-structing Lyapunov function,some sufficient synchronization criteria are established.Finally,numerical examples are employed to illustrate the effectiveness of the proposed approach.展开更多
Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajecto...Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade.展开更多
Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to thei...Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center.展开更多
Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for ...Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for pervasive computing that suitable for general PC, mobile device such as smart phones or PADs to participants in the working of mining and verification, in which we separated traditional blockchain model in 2 layer defined as master node layer and a series of slavery agents layer, then we proposed 2 approaches for partially computing model(PCM) and non-computing of model(NCM) in the MSB blockchain, Finally large amounts of simulations manifest the proposed master-slave blockchain scheme is feasible, extendible and suitable for pervasive computing especially in the 5 G generation environment, and can apply in the DRM-related applications.展开更多
This paper addresses a master-slave synchro- nization strategy for complex dynamic systems based on feedback control. This strategy is applied to 3-DOF pla- nar manipulators in order to obtain synchronization in such ...This paper addresses a master-slave synchro- nization strategy for complex dynamic systems based on feedback control. This strategy is applied to 3-DOF pla- nar manipulators in order to obtain synchronization in such complicated as chaotic motions of end-effectors. A chaotic curve is selected from Duffing equation as the trajectory of master end-effector and a piecewise approximation method is proposed to accurately represent this chaotic trajectory of end-effectors. The dynamical equations of master-slave manipulators with synchronization controller are derived, and the Lyapunov stability theory is used to determine the stability of this controlled synchronization system. In numer- ical experiments, the synchronous motions of end-effectors as well as three joint angles and torques of master-slave manipulators are studied under the control of the proposed synchronization strategy. It is found that the positive gain matrix affects the implementation of synchronization con- trol strategy. This synchronization control strategy proves the synchronization's feasibility and controllability for com- plicated motions generated by master-slave manipulators.展开更多
The networked synchronization problem of a class of master-slave chaotic systems with time-varying communication topologies is investigated in this paper. Based on algebraic graph theory and matrix theory, a simple li...The networked synchronization problem of a class of master-slave chaotic systems with time-varying communication topologies is investigated in this paper. Based on algebraic graph theory and matrix theory, a simple linear state feedback controller is designed to synchronize the master chaotic system and the slave chaotic systems with a time- varying communication topology connection. The exponential stability of the closed-loop networked synchronization error system is guaranteed by applying Lyapunov stability theory. The derived novel criteria are in the form of linear matrix inequalities (LMIs), which are easy to examine and tremendously reduce the computation burden from the feedback matrices. This paper provides an alternative networked secure communication scheme which can be extended conveniently. An illustrative example is given to demonstrate the effectiveness of the proposed networked synchronization method.展开更多
As a key component of injection molding,multi-cavity hot runner(MCHR)system faces the crucial problem of polymer melt filling imbalance among the cavities.The thermal imbalance in the system has been considered as the...As a key component of injection molding,multi-cavity hot runner(MCHR)system faces the crucial problem of polymer melt filling imbalance among the cavities.The thermal imbalance in the system has been considered as the leading cause.Hence,the solution may rest with the synchronization of those heating processes in MCHR system.This paper proposes a’Master-Slave’generalized predictive synchronization control(MS-GPSC)method with’Mr.Slowest’strategy for preheating stage of MCHR system.The core of the proposed method is choosing the heating process with slowest dynamics as the’Master’to track the setpoint,while the other heating processes are treated as‘Slaves’tracking the output of’Master’.This proposed method is shown to have the good ability of temperature synchronization.The corresponding analysis is conducted on parameters tuning and stability,simulations and experiments show the strategy is effective.展开更多
A 3 DOF master-slave telerobot system is established for study on force telepresence technology. A force feedback and position control scheme is adopted in the bilateral force response control system,and force fidelit...A 3 DOF master-slave telerobot system is established for study on force telepresence technology. A force feedback and position control scheme is adopted in the bilateral force response control system,and force fidelity and controllability experiments demonstrate feasibility of the con-trol system.展开更多
The fluidic oscillator is an instrument that can continuously generate a spatially sweeping jet entirely based on its internal geometry without any moving parts.However,the traditional fluidic oscillator has an inhere...The fluidic oscillator is an instrument that can continuously generate a spatially sweeping jet entirely based on its internal geometry without any moving parts.However,the traditional fluidic oscillator has an inherent limitation,that is,the spreading angle cannot be controlled independently,rather by the jet volume flow rate and internal geometry.Accordingly,two types of fluidic oscillators based on the master-slave design are developed in current study to decouple this correlation.In both designs,the master layer inherits the similar oscillation mechanisms of a sweeping jet,and the slave layer resembles a steady jet channel.The difference between the two designs is that Design A has a short diverging exit in the slave layer,but Design B adds a long interaction chamber in the exit channel to intensify flow instability.The external flow fields and governing oscillation properties of these two designs are experimentally explored with time-resolved Particle Image Velocimetry(PIV),while the internal flow dynamics and driving oscillation mechanisms are numerically investigated.By fixing the total volume flow rate,the jet spreading angle of Design A can be increased smoothly from 0°to above 100°by increasing the proportion of master layer’s flow rate from 0 to 100%.For Design B,the control authority of the master layer is significantly enhanced by adding the interaction chamber in the slave layer.In addition,the added chamber causes notable jet oscillation even when the master layer has none input.展开更多
This paper proposes an adaptive synchronization problem for the master and slave structure of linear systems with nonlinear perturbations and mixed time-varying delays comprising different discrete and distributed tim...This paper proposes an adaptive synchronization problem for the master and slave structure of linear systems with nonlinear perturbations and mixed time-varying delays comprising different discrete and distributed time delays. Using an appropriate Lyapunov-Krasovskii functional, some delay-dependent sufficient conditions and an adaptation law including the master-slave parame- ters are established for designing a delayed synchronization law in terms of linear matrix inequalities(LMIs). The time-varying controller guarantees the H ∞ synchronization of the two coupled master and slave systems regardless of their initial states. Particularly, it is shown that the synchronization speed can be controlled by adjusting the updated gain of the synchronization signal. Two numerical examples are given to demonstrate the effectiveness of the method.展开更多
Welding seam tracking precision was decreased due to human hand tremor during the master-slave welding teleoperation. To solve this problem, a master-slave robot remote welding system was built, the system consisted o...Welding seam tracking precision was decreased due to human hand tremor during the master-slave welding teleoperation. To solve this problem, a master-slave robot remote welding system was built, the system consisted of a master manipulator with six degree of freedom ( DOF ) , an industrial computer control system and a slave Motoman HP3 J robot, and human hand tremor and digital filtering were discussed. An optimal digital filter was designed to clean human tremor signal for improving the welding seam tracking precision. The experimental results show that the digital filter suppresses the operator' s tremor signal.展开更多
This study aims to address the feasibility of planned islanding operation and to investigate the effect of unplanned islanding using the master-slave islanding method for controlling the distributed generation units d...This study aims to address the feasibility of planned islanding operation and to investigate the effect of unplanned islanding using the master-slave islanding method for controlling the distributed generation units during grid-connected and islanding operation. Neplan desktop power simulation tool was used for the modelling and simulation of a realistic MV network with four different distributed generation technologies (diesel, gas, hydro and wind) along with their excitation and governor control systems, while an exponential model was used to represent the loads in the network. The dynamic and steady state behavior of the four distributed generation technologies were investigated during grid-connected operation and two transition modes to the islanding situation, planned and unplanned. The obtained results that validated through various case studies have shown that a suitable planned islanding transition could provide support to critical loads at the event of electricity utility outages.展开更多
Content Addressable Memory (CAM) is a type of memory used for high-speed search applications. Due to parallel comparison feature, the CAM memory leads to large power consumption which is caused by frequent pre-charge ...Content Addressable Memory (CAM) is a type of memory used for high-speed search applications. Due to parallel comparison feature, the CAM memory leads to large power consumption which is caused by frequent pre-charge or discharge of match line. In this paper, CAM for automatic charge balancing with self-control mechanism is proposed to control the voltage swing of ML for reducing the power consumption of CAM. Another technique to reduce the power dissipation is to use MSML, it combines the master-slave architecture with charge minimization technique. Unlike the conventional design, only one match line (ML) is used, whereas in Master-Slave Match Line (MSML) one master ML and several slave MLs are used to reduce the power dissipation in CAM caused by match lines (MLs). Theoretically, the match line (ML) reduces the power consumption up to 50% which is independent of search and match case. The simulation results using Cadence tool of MSML show the reduced power consumption in CAM and modified CAM cell.展开更多
This article discusses the evolving real-world practice using nitazoxanide,nonsteroidal anti-inflammatory drugs(NSAIDs)and/or azithromycin(Kelleni’s protocol)to manage the evolving manifestations of severe acute resp...This article discusses the evolving real-world practice using nitazoxanide,nonsteroidal anti-inflammatory drugs(NSAIDs)and/or azithromycin(Kelleni’s protocol)to manage the evolving manifestations of severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)Omicron EG.5.1,its descendant HV.1 as well as BA.2.86 and its descendant JN.1 subvariants in Egypt in 2024.These subvariants are well-known for their highly evolved immune-evasive properties and the manifestations include some peculiar manifestations as persistent cough besides high fever in young children as well as high fever,persistent severe cough,change of voice,loss of taste and smell,epigastric pain,nausea,vomiting,diarrhea,generalized malaise and marked bone aches in adults including the high-risk groups.It’s suggested that the ongoing SARS-CoV-2 evolution is continuing to mostly affect the high-risk groups of patients,to some of whom we’ve also successfully prescribed nitazoxanide and/or NSAIDs for post-exposure prophylaxis of all household contacts.We also continue to recommend starting the immune-modulatory antiviral Kelleni’s protocol as soon as possible in the course of infection and adjusting it in a personalized manner to be more aggressive from the beginning for the high risk patients,at least until the currently encountered surge of infections subsides.展开更多
The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation...The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation of a patient in the emergency department(ED),Code Crimson activation facilitates rapid decisionmaking by multi-disciplinary specialists for definitive haemorrhage control in operating theatre(OT)and/or interventional radiology(IR)suite.Once this decision has been made,there may still be various factors that lead to delay in transporting the patient from ED to OT/IR.Red Blanket protocol identifies and addresses these factors and processes which cause delay,and aims to facilitate rapid and safe transport of the haemodynamically unstable patient from ED to OT,while minimizing delay in resuscitation during the transfer.The two processes,Code Crimson and Red Blanket,complement each other.It would be ideal to merge the two processes into a single protocol rather than having two separate workflows.Introducing these quality improvement strategies and coor-dinated processes within the trauma framework of the hospitals/healthcare systems will help in further improving the multi-disciplinary care for the complex trauma patients requiring rapid and definitive haemorrhage control.展开更多
Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-len...Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results.展开更多
“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of F...“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research.展开更多
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade...Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols.展开更多
文摘Aiming at the weaknesses of LON bus, combining the coexistence of fieldbus and DCS (Distribu ted Control Systems) in control networks, the authors introduce a hierarchical hybrid control network design based on LON and master slave RS 422/485 protocol. This design adopts LON as the trunk, master slave RS 422/485 control networks are connected to LON as special subnets by dedicated gateways. It is an implementation method for isomerous control network integration. Data management is ranked according to real time requirements for different network data. The core components, such as control network nodes, router and gateway, are detailed in the paper. The design utilizes both communication advantage of LonWorks technology and the more powerful control ability of universal MCUs or PLCs, thus it greatly increases system response speed and performance cost ratio.
文摘This paper investigates the problem of cluster synchronization of master-slave complex net-works with time-varying delay via linear and adaptive feedback pinning controls.We need not non-delayed and delayed coupling matrices to be symmetric or irreducible.We have the advantages of using adaptive control method to reduce control gain and pinning control technology to reduce cost.By con-structing Lyapunov function,some sufficient synchronization criteria are established.Finally,numerical examples are employed to illustrate the effectiveness of the proposed approach.
文摘Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade.
基金supported by the National Natural Science Foundation of China (Grant Nos.12475012,62461160263 for P.W.,and 62276171 for H.L.)Quantum Science and Technology-National Science and Technology Major Project of China (Project No.2023ZD0300600 for P.W.)+3 种基金Guangdong Provincial Quantum Science Strategic Initiative (Grant Nos.GDZX240-3009 and GDZX2303005 for P.W.)Guangdong Basic and Applied Basic Research Foundation (Grant No.2024-A1515011938 for H.L.)Shenzhen Fundamental ResearchGeneral Project (Grant No.JCYJ20240813141503005 for H.L.)the Talents Introduction Foundation of Beijing Normal University (Grant No.310432106 for P.W.)。
文摘Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center.
基金supported by the National Natural Science Foundation of China under Grant 61272519the Research Funds of Blockchain Joint Lab between BUPT and BCTthe joint Blockchain and Security Lab between BUPT and CAPSTONE
文摘Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for pervasive computing that suitable for general PC, mobile device such as smart phones or PADs to participants in the working of mining and verification, in which we separated traditional blockchain model in 2 layer defined as master node layer and a series of slavery agents layer, then we proposed 2 approaches for partially computing model(PCM) and non-computing of model(NCM) in the MSB blockchain, Finally large amounts of simulations manifest the proposed master-slave blockchain scheme is feasible, extendible and suitable for pervasive computing especially in the 5 G generation environment, and can apply in the DRM-related applications.
基金supported by the Key Project of Chinese Ministry of Education(108037)the National Natural Science Foundation of China(10402008 and 50535010)
文摘This paper addresses a master-slave synchro- nization strategy for complex dynamic systems based on feedback control. This strategy is applied to 3-DOF pla- nar manipulators in order to obtain synchronization in such complicated as chaotic motions of end-effectors. A chaotic curve is selected from Duffing equation as the trajectory of master end-effector and a piecewise approximation method is proposed to accurately represent this chaotic trajectory of end-effectors. The dynamical equations of master-slave manipulators with synchronization controller are derived, and the Lyapunov stability theory is used to determine the stability of this controlled synchronization system. In numer- ical experiments, the synchronous motions of end-effectors as well as three joint angles and torques of master-slave manipulators are studied under the control of the proposed synchronization strategy. It is found that the positive gain matrix affects the implementation of synchronization con- trol strategy. This synchronization control strategy proves the synchronization's feasibility and controllability for com- plicated motions generated by master-slave manipulators.
基金supported by the National Natural Science Foundation of China (Grant Nos. 60904046, 60972164, 60974071, and 60804006)the Special Fund for Basic Scientific Research of Central Colleges, Northeastern University, China (Grant No. 090604005)+2 种基金the Science and Technology Program of Shenyang (Grant No. F11-264-1-70)the Program for Liaoning Excellent Talents in University (Grant No. LJQ2011137)the Program for Liaoning Innovative Research Team in University (Grant No. LT2011019)
文摘The networked synchronization problem of a class of master-slave chaotic systems with time-varying communication topologies is investigated in this paper. Based on algebraic graph theory and matrix theory, a simple linear state feedback controller is designed to synchronize the master chaotic system and the slave chaotic systems with a time- varying communication topology connection. The exponential stability of the closed-loop networked synchronization error system is guaranteed by applying Lyapunov stability theory. The derived novel criteria are in the form of linear matrix inequalities (LMIs), which are easy to examine and tremendously reduce the computation burden from the feedback matrices. This paper provides an alternative networked secure communication scheme which can be extended conveniently. An illustrative example is given to demonstrate the effectiveness of the proposed networked synchronization method.
基金supported in part by National Natural Science Foundation of China(62203127)Basic and Applied Basic Research Project of Guangzhou City(2023A04J1712)+1 种基金The Foshan-HKUST Projects Program(FSUST19-FYTRI01)GDAS’Project of Science and Technology Development(2020GDASYL-20200202001).
文摘As a key component of injection molding,multi-cavity hot runner(MCHR)system faces the crucial problem of polymer melt filling imbalance among the cavities.The thermal imbalance in the system has been considered as the leading cause.Hence,the solution may rest with the synchronization of those heating processes in MCHR system.This paper proposes a’Master-Slave’generalized predictive synchronization control(MS-GPSC)method with’Mr.Slowest’strategy for preheating stage of MCHR system.The core of the proposed method is choosing the heating process with slowest dynamics as the’Master’to track the setpoint,while the other heating processes are treated as‘Slaves’tracking the output of’Master’.This proposed method is shown to have the good ability of temperature synchronization.The corresponding analysis is conducted on parameters tuning and stability,simulations and experiments show the strategy is effective.
文摘A 3 DOF master-slave telerobot system is established for study on force telepresence technology. A force feedback and position control scheme is adopted in the bilateral force response control system,and force fidelity and controllability experiments demonstrate feasibility of the con-trol system.
基金financial support from the National Natural Science Foundation of China(Nos.12072196 and 11702172)Science and Technology Commission of Shanghai Municipality(No.19JC1412900)+1 种基金Aeronautics Power Foundation(No.6141B09050393)Key Laboratory of Aerodynamic Noise Control(No.ANCL20190106)extended to this study。
文摘The fluidic oscillator is an instrument that can continuously generate a spatially sweeping jet entirely based on its internal geometry without any moving parts.However,the traditional fluidic oscillator has an inherent limitation,that is,the spreading angle cannot be controlled independently,rather by the jet volume flow rate and internal geometry.Accordingly,two types of fluidic oscillators based on the master-slave design are developed in current study to decouple this correlation.In both designs,the master layer inherits the similar oscillation mechanisms of a sweeping jet,and the slave layer resembles a steady jet channel.The difference between the two designs is that Design A has a short diverging exit in the slave layer,but Design B adds a long interaction chamber in the exit channel to intensify flow instability.The external flow fields and governing oscillation properties of these two designs are experimentally explored with time-resolved Particle Image Velocimetry(PIV),while the internal flow dynamics and driving oscillation mechanisms are numerically investigated.By fixing the total volume flow rate,the jet spreading angle of Design A can be increased smoothly from 0°to above 100°by increasing the proportion of master layer’s flow rate from 0 to 100%.For Design B,the control authority of the master layer is significantly enhanced by adding the interaction chamber in the slave layer.In addition,the added chamber causes notable jet oscillation even when the master layer has none input.
文摘This paper proposes an adaptive synchronization problem for the master and slave structure of linear systems with nonlinear perturbations and mixed time-varying delays comprising different discrete and distributed time delays. Using an appropriate Lyapunov-Krasovskii functional, some delay-dependent sufficient conditions and an adaptation law including the master-slave parame- ters are established for designing a delayed synchronization law in terms of linear matrix inequalities(LMIs). The time-varying controller guarantees the H ∞ synchronization of the two coupled master and slave systems regardless of their initial states. Particularly, it is shown that the synchronization speed can be controlled by adjusting the updated gain of the synchronization signal. Two numerical examples are given to demonstrate the effectiveness of the method.
基金This research is supported by National Natural Science Foundation of China (No. 50905043).
文摘Welding seam tracking precision was decreased due to human hand tremor during the master-slave welding teleoperation. To solve this problem, a master-slave robot remote welding system was built, the system consisted of a master manipulator with six degree of freedom ( DOF ) , an industrial computer control system and a slave Motoman HP3 J robot, and human hand tremor and digital filtering were discussed. An optimal digital filter was designed to clean human tremor signal for improving the welding seam tracking precision. The experimental results show that the digital filter suppresses the operator' s tremor signal.
文摘This study aims to address the feasibility of planned islanding operation and to investigate the effect of unplanned islanding using the master-slave islanding method for controlling the distributed generation units during grid-connected and islanding operation. Neplan desktop power simulation tool was used for the modelling and simulation of a realistic MV network with four different distributed generation technologies (diesel, gas, hydro and wind) along with their excitation and governor control systems, while an exponential model was used to represent the loads in the network. The dynamic and steady state behavior of the four distributed generation technologies were investigated during grid-connected operation and two transition modes to the islanding situation, planned and unplanned. The obtained results that validated through various case studies have shown that a suitable planned islanding transition could provide support to critical loads at the event of electricity utility outages.
文摘Content Addressable Memory (CAM) is a type of memory used for high-speed search applications. Due to parallel comparison feature, the CAM memory leads to large power consumption which is caused by frequent pre-charge or discharge of match line. In this paper, CAM for automatic charge balancing with self-control mechanism is proposed to control the voltage swing of ML for reducing the power consumption of CAM. Another technique to reduce the power dissipation is to use MSML, it combines the master-slave architecture with charge minimization technique. Unlike the conventional design, only one match line (ML) is used, whereas in Master-Slave Match Line (MSML) one master ML and several slave MLs are used to reduce the power dissipation in CAM caused by match lines (MLs). Theoretically, the match line (ML) reduces the power consumption up to 50% which is independent of search and match case. The simulation results using Cadence tool of MSML show the reduced power consumption in CAM and modified CAM cell.
文摘This article discusses the evolving real-world practice using nitazoxanide,nonsteroidal anti-inflammatory drugs(NSAIDs)and/or azithromycin(Kelleni’s protocol)to manage the evolving manifestations of severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)Omicron EG.5.1,its descendant HV.1 as well as BA.2.86 and its descendant JN.1 subvariants in Egypt in 2024.These subvariants are well-known for their highly evolved immune-evasive properties and the manifestations include some peculiar manifestations as persistent cough besides high fever in young children as well as high fever,persistent severe cough,change of voice,loss of taste and smell,epigastric pain,nausea,vomiting,diarrhea,generalized malaise and marked bone aches in adults including the high-risk groups.It’s suggested that the ongoing SARS-CoV-2 evolution is continuing to mostly affect the high-risk groups of patients,to some of whom we’ve also successfully prescribed nitazoxanide and/or NSAIDs for post-exposure prophylaxis of all household contacts.We also continue to recommend starting the immune-modulatory antiviral Kelleni’s protocol as soon as possible in the course of infection and adjusting it in a personalized manner to be more aggressive from the beginning for the high risk patients,at least until the currently encountered surge of infections subsides.
文摘The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation of a patient in the emergency department(ED),Code Crimson activation facilitates rapid decisionmaking by multi-disciplinary specialists for definitive haemorrhage control in operating theatre(OT)and/or interventional radiology(IR)suite.Once this decision has been made,there may still be various factors that lead to delay in transporting the patient from ED to OT/IR.Red Blanket protocol identifies and addresses these factors and processes which cause delay,and aims to facilitate rapid and safe transport of the haemodynamically unstable patient from ED to OT,while minimizing delay in resuscitation during the transfer.The two processes,Code Crimson and Red Blanket,complement each other.It would be ideal to merge the two processes into a single protocol rather than having two separate workflows.Introducing these quality improvement strategies and coor-dinated processes within the trauma framework of the hospitals/healthcare systems will help in further improving the multi-disciplinary care for the complex trauma patients requiring rapid and definitive haemorrhage control.
文摘Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results.
基金support the findings of this study are openly available in(Scopus database)at www.scopus.com(accessed on 07 January 2025).
文摘“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research.
基金this project under Geran Putra Inisiatif(GPI)with reference of GP-GPI/2023/976210。
文摘Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols.