期刊文献+
共找到39,180篇文章
< 1 2 250 >
每页显示 20 50 100
Hierarchical hybrid control network design based on LON and master-slave RS-422/485 protocol
1
作者 彭可 陈际达 陈岚 《Journal of Central South University of Technology》 2002年第3期202-207,共6页
Aiming at the weaknesses of LON bus, combining the coexistence of fieldbus and DCS (Distribu ted Control Systems) in control networks, the authors introduce a hierarchical hybrid control network design based on LON an... Aiming at the weaknesses of LON bus, combining the coexistence of fieldbus and DCS (Distribu ted Control Systems) in control networks, the authors introduce a hierarchical hybrid control network design based on LON and master slave RS 422/485 protocol. This design adopts LON as the trunk, master slave RS 422/485 control networks are connected to LON as special subnets by dedicated gateways. It is an implementation method for isomerous control network integration. Data management is ranked according to real time requirements for different network data. The core components, such as control network nodes, router and gateway, are detailed in the paper. The design utilizes both communication advantage of LonWorks technology and the more powerful control ability of universal MCUs or PLCs, thus it greatly increases system response speed and performance cost ratio. 展开更多
关键词 LON fieldbus master-slave RS-422/485 protocol HIERARCHICAL hybrid control NETWORKS router gateway NETWORKS integration
在线阅读 下载PDF
Cluster synchronization of master-slave complex networks via adaptive feedback pinning control
2
作者 LIU Ziping GONG Siyi 《上海师范大学学报(自然科学版中英文)》 2025年第4期389-400,共12页
This paper investigates the problem of cluster synchronization of master-slave complex net-works with time-varying delay via linear and adaptive feedback pinning controls.We need not non-delayed and delayed coupling m... This paper investigates the problem of cluster synchronization of master-slave complex net-works with time-varying delay via linear and adaptive feedback pinning controls.We need not non-delayed and delayed coupling matrices to be symmetric or irreducible.We have the advantages of using adaptive control method to reduce control gain and pinning control technology to reduce cost.By con-structing Lyapunov function,some sufficient synchronization criteria are established.Finally,numerical examples are employed to illustrate the effectiveness of the proposed approach. 展开更多
关键词 cluster synchronization TIME-VARYING master-slave complex networks DELAYED adaptive feedback control pinning control
在线阅读 下载PDF
Fresh Arrival--Rwanda-China avocado export protocol is a milestone in growing agricultural partnership
3
作者 ALAFATI MUGABO 《ChinAfrica》 2026年第1期46-47,共2页
Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajecto... Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade. 展开更多
关键词 China trade protocol Rwanda agricultural partnership fresh avocado exports
原文传递
Robust Hyper-Polarization Protocol of Nuclear Spins via Magic Sequence
4
作者 Haiyang Li Yongju Li +1 位作者 Hao Liao Ping Wang 《Chinese Physics Letters》 2026年第1期105-128,共24页
Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to thei... Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center. 展开更多
关键词 transferring polarization electrons hyperpolarization protocols quantum information technologiesas nuclear spins pulse polarization nuclear spin polarization magic sequences nuclear magnetic resonance
原文传递
Master-Slave机器手协调控制选择行列式算法
5
作者 杨慧 《中国民航学院学报》 2003年第A02期210-213,共4页
提出了一种基于选择行列式的Master-Slave机器手的协调控制算法。通过选择行列式的导入,实现了对Master机器手和Slave机器手各个变量的协调控制。本方法应用于装有视觉传感器的机器手的追踪控制,经过实验证明了基于选择行列式的算法能... 提出了一种基于选择行列式的Master-Slave机器手的协调控制算法。通过选择行列式的导入,实现了对Master机器手和Slave机器手各个变量的协调控制。本方法应用于装有视觉传感器的机器手的追踪控制,经过实验证明了基于选择行列式的算法能够实现人类的某些技能赋予机器手,在支援机器手的同时还能够通过有效地协调遥控,完成机器手的自主控制。 展开更多
关键词 选择行列式 master-slave机器手 协调控制 视觉传感器
在线阅读 下载PDF
A Master-Slave Blockchain Paradigm and Application in Digital Rights Management 被引量:5
6
作者 Zhaofeng Ma Weihua Huang +2 位作者 Wei Bi Hongmin Gao Zhen Wang 《China Communications》 SCIE CSCD 2018年第8期174-188,共15页
Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for ... Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for pervasive computing that suitable for general PC, mobile device such as smart phones or PADs to participants in the working of mining and verification, in which we separated traditional blockchain model in 2 layer defined as master node layer and a series of slavery agents layer, then we proposed 2 approaches for partially computing model(PCM) and non-computing of model(NCM) in the MSB blockchain, Finally large amounts of simulations manifest the proposed master-slave blockchain scheme is feasible, extendible and suitable for pervasive computing especially in the 5 G generation environment, and can apply in the DRM-related applications. 展开更多
关键词 master-slave blockchain proof ofequivalent work proof of contribution pervasive computing DRM application
在线阅读 下载PDF
Achievement of chaotic synchronization trajectories of master-slave manipulators with feedback control strategy 被引量:3
7
作者 Qingkai Han Lina Hao Hao Zhang Bangchun Wen 《Acta Mechanica Sinica》 SCIE EI CAS CSCD 2010年第3期433-439,共7页
This paper addresses a master-slave synchro- nization strategy for complex dynamic systems based on feedback control. This strategy is applied to 3-DOF pla- nar manipulators in order to obtain synchronization in such ... This paper addresses a master-slave synchro- nization strategy for complex dynamic systems based on feedback control. This strategy is applied to 3-DOF pla- nar manipulators in order to obtain synchronization in such complicated as chaotic motions of end-effectors. A chaotic curve is selected from Duffing equation as the trajectory of master end-effector and a piecewise approximation method is proposed to accurately represent this chaotic trajectory of end-effectors. The dynamical equations of master-slave manipulators with synchronization controller are derived, and the Lyapunov stability theory is used to determine the stability of this controlled synchronization system. In numer- ical experiments, the synchronous motions of end-effectors as well as three joint angles and torques of master-slave manipulators are studied under the control of the proposed synchronization strategy. It is found that the positive gain matrix affects the implementation of synchronization con- trol strategy. This synchronization control strategy proves the synchronization's feasibility and controllability for com- plicated motions generated by master-slave manipulators. 展开更多
关键词 master-slave manipulators - Chaoticsynchronization trajectory - Feedback control
在线阅读 下载PDF
Exponential networked synchronization of master-slave chaotic systems with timevarying communication topologies 被引量:1
8
作者 杨东升 刘振伟 +1 位作者 赵琰 刘兆冰 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第4期151-158,共8页
The networked synchronization problem of a class of master-slave chaotic systems with time-varying communication topologies is investigated in this paper. Based on algebraic graph theory and matrix theory, a simple li... The networked synchronization problem of a class of master-slave chaotic systems with time-varying communication topologies is investigated in this paper. Based on algebraic graph theory and matrix theory, a simple linear state feedback controller is designed to synchronize the master chaotic system and the slave chaotic systems with a time- varying communication topology connection. The exponential stability of the closed-loop networked synchronization error system is guaranteed by applying Lyapunov stability theory. The derived novel criteria are in the form of linear matrix inequalities (LMIs), which are easy to examine and tremendously reduce the computation burden from the feedback matrices. This paper provides an alternative networked secure communication scheme which can be extended conveniently. An illustrative example is given to demonstrate the effectiveness of the proposed networked synchronization method. 展开更多
关键词 exponential networked synchronization master-slave chaotic systems algebraic graph theory communication topology
原文传递
A master-slave generalized predictive synchronization control for preheating process of multi-cavity hot runner system 被引量:1
9
作者 Hongyi Qu Shengyong Mo +3 位作者 Ke Yao Zhao-Xia Huang Zhihao Xu Furong Gao 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2023年第10期270-280,共11页
As a key component of injection molding,multi-cavity hot runner(MCHR)system faces the crucial problem of polymer melt filling imbalance among the cavities.The thermal imbalance in the system has been considered as the... As a key component of injection molding,multi-cavity hot runner(MCHR)system faces the crucial problem of polymer melt filling imbalance among the cavities.The thermal imbalance in the system has been considered as the leading cause.Hence,the solution may rest with the synchronization of those heating processes in MCHR system.This paper proposes a’Master-Slave’generalized predictive synchronization control(MS-GPSC)method with’Mr.Slowest’strategy for preheating stage of MCHR system.The core of the proposed method is choosing the heating process with slowest dynamics as the’Master’to track the setpoint,while the other heating processes are treated as‘Slaves’tracking the output of’Master’.This proposed method is shown to have the good ability of temperature synchronization.The corresponding analysis is conducted on parameters tuning and stability,simulations and experiments show the strategy is effective. 展开更多
关键词 Process control Thermodynamics process Model-predictive control Multi-cavity hot runner system master-slave synchronization Mr.Slowest
在线阅读 下载PDF
Research on Master-slave Telerobot Force Telepresence Technology
10
作者 蔡鹤皋 陈卫东 +1 位作者 贾国武 赵杰 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 1997年第4期69-72,共4页
A 3 DOF master-slave telerobot system is established for study on force telepresence technology. A force feedback and position control scheme is adopted in the bilateral force response control system,and force fidelit... A 3 DOF master-slave telerobot system is established for study on force telepresence technology. A force feedback and position control scheme is adopted in the bilateral force response control system,and force fidelity and controllability experiments demonstrate feasibility of the con-trol system. 展开更多
关键词 master-slave TELEROBOT FORCE TELEPRESENCE BILATERAL FORCE response control MANOEUVRABILITY
在线阅读 下载PDF
Jet sweeping angle control by fluidic oscillators with master-slave designs
11
作者 Ziyan LI Kaiwen ZHOU +1 位作者 Yingzheng LIU Xin WEN 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2021年第5期145-162,共18页
The fluidic oscillator is an instrument that can continuously generate a spatially sweeping jet entirely based on its internal geometry without any moving parts.However,the traditional fluidic oscillator has an inhere... The fluidic oscillator is an instrument that can continuously generate a spatially sweeping jet entirely based on its internal geometry without any moving parts.However,the traditional fluidic oscillator has an inherent limitation,that is,the spreading angle cannot be controlled independently,rather by the jet volume flow rate and internal geometry.Accordingly,two types of fluidic oscillators based on the master-slave design are developed in current study to decouple this correlation.In both designs,the master layer inherits the similar oscillation mechanisms of a sweeping jet,and the slave layer resembles a steady jet channel.The difference between the two designs is that Design A has a short diverging exit in the slave layer,but Design B adds a long interaction chamber in the exit channel to intensify flow instability.The external flow fields and governing oscillation properties of these two designs are experimentally explored with time-resolved Particle Image Velocimetry(PIV),while the internal flow dynamics and driving oscillation mechanisms are numerically investigated.By fixing the total volume flow rate,the jet spreading angle of Design A can be increased smoothly from 0°to above 100°by increasing the proportion of master layer’s flow rate from 0 to 100%.For Design B,the control authority of the master layer is significantly enhanced by adding the interaction chamber in the slave layer.In addition,the added chamber causes notable jet oscillation even when the master layer has none input. 展开更多
关键词 Adjustable spreading angle CFD Fluidic devices master-slave fluidic oscillator TR-PIV
原文传递
Adaptive H_∞ Synchronization of Master-slave Systems with Mixed Time-varying Delays and Nonlinear Perturbations: An LMI Approach
12
作者 Hamid Reza Karimi 《International Journal of Automation and computing》 EI 2011年第4期381-390,共10页
This paper proposes an adaptive synchronization problem for the master and slave structure of linear systems with nonlinear perturbations and mixed time-varying delays comprising different discrete and distributed tim... This paper proposes an adaptive synchronization problem for the master and slave structure of linear systems with nonlinear perturbations and mixed time-varying delays comprising different discrete and distributed time delays. Using an appropriate Lyapunov-Krasovskii functional, some delay-dependent sufficient conditions and an adaptation law including the master-slave parame- ters are established for designing a delayed synchronization law in terms of linear matrix inequalities(LMIs). The time-varying controller guarantees the H ∞ synchronization of the two coupled master and slave systems regardless of their initial states. Particularly, it is shown that the synchronization speed can be controlled by adjusting the updated gain of the synchronization signal. Two numerical examples are given to demonstrate the effectiveness of the method. 展开更多
关键词 Adaptive synchronization master-slave systems DELAY H performance nonlinear perturbations.
在线阅读 下载PDF
Tremor suppression in master-slave robot remote welding system
13
作者 陈洪堂 李海超 +1 位作者 高洪明 吴林 《China Welding》 EI CAS 2011年第2期63-66,共4页
Welding seam tracking precision was decreased due to human hand tremor during the master-slave welding teleoperation. To solve this problem, a master-slave robot remote welding system was built, the system consisted o... Welding seam tracking precision was decreased due to human hand tremor during the master-slave welding teleoperation. To solve this problem, a master-slave robot remote welding system was built, the system consisted of a master manipulator with six degree of freedom ( DOF ) , an industrial computer control system and a slave Motoman HP3 J robot, and human hand tremor and digital filtering were discussed. An optimal digital filter was designed to clean human tremor signal for improving the welding seam tracking precision. The experimental results show that the digital filter suppresses the operator' s tremor signal. 展开更多
关键词 remote welding master-slave teleoperation hand tremor digital filtering
在线阅读 下载PDF
Distributed Generation Islanding Effect on Distribution Networks and End User Loads Using the Master-Slave Islanding Method
14
作者 Lambros Ekonomou George P. Fotis +1 位作者 Vasiliki Vita Valeri Mladenov 《Journal of Power and Energy Engineering》 2016年第10期1-24,共24页
This study aims to address the feasibility of planned islanding operation and to investigate the effect of unplanned islanding using the master-slave islanding method for controlling the distributed generation units d... This study aims to address the feasibility of planned islanding operation and to investigate the effect of unplanned islanding using the master-slave islanding method for controlling the distributed generation units during grid-connected and islanding operation. Neplan desktop power simulation tool was used for the modelling and simulation of a realistic MV network with four different distributed generation technologies (diesel, gas, hydro and wind) along with their excitation and governor control systems, while an exponential model was used to represent the loads in the network. The dynamic and steady state behavior of the four distributed generation technologies were investigated during grid-connected operation and two transition modes to the islanding situation, planned and unplanned. The obtained results that validated through various case studies have shown that a suitable planned islanding transition could provide support to critical loads at the event of electricity utility outages. 展开更多
关键词 Distributed Generation Distribution Networks ISLANDING master-slave Islanding Method Neplan Simulation Tool
在线阅读 下载PDF
Content Addressable Memory Using Automatic Charge Balancing with Self-Control Mechanism and Master-Slave Match Line Design
15
作者 Dr. Deepa Jose P. Suganya Dr. Palanichamy Nirmal Kumar 《Circuits and Systems》 2016年第6期597-611,共15页
Content Addressable Memory (CAM) is a type of memory used for high-speed search applications. Due to parallel comparison feature, the CAM memory leads to large power consumption which is caused by frequent pre-charge ... Content Addressable Memory (CAM) is a type of memory used for high-speed search applications. Due to parallel comparison feature, the CAM memory leads to large power consumption which is caused by frequent pre-charge or discharge of match line. In this paper, CAM for automatic charge balancing with self-control mechanism is proposed to control the voltage swing of ML for reducing the power consumption of CAM. Another technique to reduce the power dissipation is to use MSML, it combines the master-slave architecture with charge minimization technique. Unlike the conventional design, only one match line (ML) is used, whereas in Master-Slave Match Line (MSML) one master ML and several slave MLs are used to reduce the power dissipation in CAM caused by match lines (MLs). Theoretically, the match line (ML) reduces the power consumption up to 50% which is independent of search and match case. The simulation results using Cadence tool of MSML show the reduced power consumption in CAM and modified CAM cell. 展开更多
关键词 Content Addressable Memory (CAM) Match Line (ML) master-slave Match Line (MSML) Charge Balance Translation Look-Aside Buffer (TLAB)
在线阅读 下载PDF
Real-life practice of Kelleni’s protocol in treatment and post exposure prophylaxis of SARS-CoV-2 HV.1 and JN.1 subvariants 被引量:1
16
作者 Mina Thabet Kelleni 《World Journal of Virology》 2025年第3期1-5,共5页
This article discusses the evolving real-world practice using nitazoxanide,nonsteroidal anti-inflammatory drugs(NSAIDs)and/or azithromycin(Kelleni’s protocol)to manage the evolving manifestations of severe acute resp... This article discusses the evolving real-world practice using nitazoxanide,nonsteroidal anti-inflammatory drugs(NSAIDs)and/or azithromycin(Kelleni’s protocol)to manage the evolving manifestations of severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)Omicron EG.5.1,its descendant HV.1 as well as BA.2.86 and its descendant JN.1 subvariants in Egypt in 2024.These subvariants are well-known for their highly evolved immune-evasive properties and the manifestations include some peculiar manifestations as persistent cough besides high fever in young children as well as high fever,persistent severe cough,change of voice,loss of taste and smell,epigastric pain,nausea,vomiting,diarrhea,generalized malaise and marked bone aches in adults including the high-risk groups.It’s suggested that the ongoing SARS-CoV-2 evolution is continuing to mostly affect the high-risk groups of patients,to some of whom we’ve also successfully prescribed nitazoxanide and/or NSAIDs for post-exposure prophylaxis of all household contacts.We also continue to recommend starting the immune-modulatory antiviral Kelleni’s protocol as soon as possible in the course of infection and adjusting it in a personalized manner to be more aggressive from the beginning for the high risk patients,at least until the currently encountered surge of infections subsides. 展开更多
关键词 SARS-CoV-2 HV.1 JN.1 Post exposure prophylaxis Kelleni’s protocol NITAZOXANIDE Non-steroidal anti-inflammatory drugs
暂未订购
Incorporating red blanket protocol within code crimson:Streamlining definitive trauma care amid the chaos
17
作者 Sohil Pothiawala Savitha Bhagvan Andrew MacCormick 《World Journal of Critical Care Medicine》 2025年第1期14-19,共6页
The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation... The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation of a patient in the emergency department(ED),Code Crimson activation facilitates rapid decisionmaking by multi-disciplinary specialists for definitive haemorrhage control in operating theatre(OT)and/or interventional radiology(IR)suite.Once this decision has been made,there may still be various factors that lead to delay in transporting the patient from ED to OT/IR.Red Blanket protocol identifies and addresses these factors and processes which cause delay,and aims to facilitate rapid and safe transport of the haemodynamically unstable patient from ED to OT,while minimizing delay in resuscitation during the transfer.The two processes,Code Crimson and Red Blanket,complement each other.It would be ideal to merge the two processes into a single protocol rather than having two separate workflows.Introducing these quality improvement strategies and coor-dinated processes within the trauma framework of the hospitals/healthcare systems will help in further improving the multi-disciplinary care for the complex trauma patients requiring rapid and definitive haemorrhage control. 展开更多
关键词 Red blanket protocol Code crimson HAEMORRHAGE Trauma
暂未订购
SegInfer:Binary Network Protocol Segmentation Based on Probabilistic Inference
18
作者 Guo Maohua Zhu Yuefei Fei Jinlong 《China Communications》 2025年第6期334-354,共21页
Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-len... Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results. 展开更多
关键词 binary protocol probabilistic inference protocol field segmentation protocol reverse engineering related construction
在线阅读 下载PDF
Machine Learning-Based Routing Protocol in Flying Ad Hoc Networks: A Review
19
作者 Priyanka Manjit Kaur +2 位作者 Deepak Prashar Leo Mrsic Arfat Ahmad Khan 《Computers, Materials & Continua》 2025年第2期1615-1643,共29页
“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of F... “Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research. 展开更多
关键词 FANET protocol machine learning
在线阅读 下载PDF
Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol(iSTSP)for Security-Critical Time-Sensitive WSNs
20
作者 Ramadan Abdul-Rashid Mohd Amiruddin Abd Rahman Abdulaziz Yagoub Barnawi 《Computer Modeling in Engineering & Sciences》 2025年第9期3213-3250,共38页
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade... Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols. 展开更多
关键词 Time-sensitive wireless sensor networks(TS-WSNs) secure time synchronization protocol trust-based authentication autoencoder model deep learning malicious node detection Internet of Things energyefficient communication protocols
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部