Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade...Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols.展开更多
Optical non-reciprocity is a fundamental phenomenon in photonics.It is crucial for developing devices that rely on directional signal control,such as optical isolators and circulators.However,most research in this fie...Optical non-reciprocity is a fundamental phenomenon in photonics.It is crucial for developing devices that rely on directional signal control,such as optical isolators and circulators.However,most research in this field has focused on systems in equilibrium or steady states.In this work,we demonstrate a room-temperature Rydberg atomic platform where the unidirectional propagation of light acts as a switch to mediate time-crystalline-like collective oscillations through atomic synchronization.展开更多
Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,inclu...Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios.展开更多
Neuromorphic circuits based on superconducting tunnel junctions have attracted much attention due to their highspeed computing capabilities and low energy consumption.Josephson junction circuits can effectively mimic ...Neuromorphic circuits based on superconducting tunnel junctions have attracted much attention due to their highspeed computing capabilities and low energy consumption.Josephson junction circuits can effectively mimic biological neural dynamics.Leveraging these advantages,we construct a Josephson junction neuron-like model with a phasedependent dissipative current,referred to as a memristive current.The proposed memristive Josephson junction model exhibits complex dynamical behaviors.Furthermore,considering the effect of a fast-modulated synapse,we explore synchronization phenomena in coupled networks under varying coupling conductances and excitatory/inhibitory interactions.Finally,we extend the neuromorphic Josephson junction model—exhibiting complex dynamics—to the field of image encryption.These results not only enrich the understanding of the dynamical characteristics of memristive Josephson junctions but also provide a theoretical basis and technical support for the development of new neural networks and their applications in information security technology.展开更多
This paper is dedicated to fixed-time passivity and synchronization for multi-weighted spatiotemporal directed networks.First,to achieve fixed-time passivity,a type of decentralized power-law controller is developed,i...This paper is dedicated to fixed-time passivity and synchronization for multi-weighted spatiotemporal directed networks.First,to achieve fixed-time passivity,a type of decentralized power-law controller is developed,in which only one parameter needs to be adjusted in the power-law terms;this greatly decreases the inconvenience of parameter adjustment.Second,several fixed-time passivity criteria with LMI forms are derived by using a Gauss divergence theorem to deal with the spatial diffusion of nodes and by applying the Hölder’s inequality to dispose rigorously the power-law term greater than one in the designed control scheme;this improves the previous theoretical analysis.Additionally,the fixed-time synchronization of spatiotemporal directed networks with multi-weights is addressed as a direct result of fixed-time strict passivity.Finally,a numerical example is presented in order to show the validity of the theoretical analysis.展开更多
Clock synchronization has important applications in multi-agent collaboration(such as drone light shows,intelligent transportation systems,and game AI),group decision-making,and emergency rescue operations.Synchroniza...Clock synchronization has important applications in multi-agent collaboration(such as drone light shows,intelligent transportation systems,and game AI),group decision-making,and emergency rescue operations.Synchronization method based on pulse-coupled oscillators(PCOs)provides an effective solution for clock synchronization in wireless networks.However,the existing clock synchronization algorithms in multi-agent ad hoc networks are difficult to meet the requirements of high precision and high stability of synchronization clock in group cooperation.Hence,this paper constructs a network model,named DAUNet(unsupervised neural network based on dual attention),to enhance clock synchronization accuracy in multi-agent wireless ad hoc networks.Specifically,we design an unsupervised distributed neural network framework as the backbone,building upon classical PCO-based synchronization methods.This framework resolves issues such as prolonged time synchronization message exchange between nodes,difficulties in centralized node coordination,and challenges in distributed training.Furthermore,we introduce a dual-attention mechanism as the core module of DAUNet.By integrating a Multi-Head Attention module and a Gated Attention module,the model significantly improves information extraction capabilities while reducing computational complexity,effectively mitigating synchronization inaccuracies and instability in multi-agent ad hoc networks.To evaluate the effectiveness of the proposed model,comparative experiments and ablation studies were conducted against classical methods and existing deep learning models.The research results show that,compared with the deep learning networks based on DASA and LSTM,DAUNet can reduce the mean normalized phase difference(NPD)by 1 to 2 orders of magnitude.Compared with the attention models based on additive attention and self-attention mechanisms,the performance of DAUNet has improved by more than ten times.This study demonstrates DAUNet’s potential in advancing multi-agent ad hoc networking technologies.展开更多
Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajecto...Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade.展开更多
Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to thei...Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center.展开更多
Federated Learning(FL)has become a leading decentralized solution that enables multiple clients to train a model in a collaborative environment without directly sharing raw data,making it suitable for privacy-sensitiv...Federated Learning(FL)has become a leading decentralized solution that enables multiple clients to train a model in a collaborative environment without directly sharing raw data,making it suitable for privacy-sensitive applications such as healthcare,finance,and smart systems.As the field continues to evolve,the research field has become more complex and scattered,covering different system designs,training methods,and privacy techniques.This survey is organized around the three core challenges:how the data is distributed,how models are synchronized,and how to defend against attacks.It provides a structured and up-to-date review of FL research from 2023 to 2025,offering a unified taxonomy that categorizes works by data distribution(Horizontal FL,Vertical FL,Federated Transfer Learning,and Personalized FL),training synchronization(synchronous and asynchronous FL),optimization strategies,and threat models(data leakage and poisoning attacks).In particular,we summarize the latest contributions in Vertical FL frameworks for secure multi-party learning,communication-efficient Horizontal FL,and domain-adaptive Federated Transfer Learning.Furthermore,we examine synchronization techniques addressing system heterogeneity,including straggler mitigation in synchronous FL and staleness management in asynchronous FL.The survey covers security threats in FL,such as gradient inversion,membership inference,and poisoning attacks,as well as their defense strategies that include privacy-preserving aggregation and anomaly detection.The paper concludes by outlining unresolved issues and highlighting challenges in handling personalized models,scalability,and real-world adoption.展开更多
The security-related problem during the data exchange is not considered in the SyncML protocol. To solve this problem, SyncML is enhanced with a secure data synchronization exchange service application program interfa...The security-related problem during the data exchange is not considered in the SyncML protocol. To solve this problem, SyncML is enhanced with a secure data synchronization exchange service application program interface (SDSXS-API) to ensure the reliability, the integrity, and the security in the data transmission and exchange. The design and the implementation of SDSXS-API are also given. The proposed APIs can be conveniently used as a uniform exchange interface for any related application programs. And their effectiveness is verified in the prototype mobile database system.展开更多
In this paper, the types of synchronization errors of HDLC protocol are defined and equations for evaluating the performance of frame synchronization are derived. The probabilities of synchronization errors are calcul...In this paper, the types of synchronization errors of HDLC protocol are defined and equations for evaluating the performance of frame synchronization are derived. The probabilities of synchronization errors are calculated with these equations. Since the synchronization errors are highly related to the average error rate of the channel, their calculations are the precondition of choosing optimal error control technique in order to maintain a high throughput of the communication channel.展开更多
Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services...Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services. This paper indicates that there are two drawbacks in Youn and Lim's protocol: 1) the synchronization problem will lead to a fail in on-line authentication; and 2) the exhaustive search puts a heavy burden on the off-line authentication process. Moreover, based on Youn and Lim's protocol, a remedy is proposed to address these problems. It is worthwhile to note that the proposed remedy not only keeps the original advantages but also enhances the security and performance.展开更多
L-SYNC is a synchronization protocol for Wireless Sensor Networks which is based on larger degree clustering providing efficiency in homogeneous topologies. In L-SYNC, the effectiveness of the routing algorithm for th...L-SYNC is a synchronization protocol for Wireless Sensor Networks which is based on larger degree clustering providing efficiency in homogeneous topologies. In L-SYNC, the effectiveness of the routing algorithm for the synchronization precision of two remote nodes was considered. Clustering in L-SYNC is according to larger degree techniques. These techniques reduce cluster overlapping, resulting in the routing algorithm requiring fewer hops to move from one cluster to another remote cluster. Even though L-SYNC offers higher precision compared to other algorithms, it does not support heterogeneous topologies and its synchronization algorithm can be influenced by unreliable data. In this paper, we present the L-SYNCng (L-SYNC next generation) protocol, working in heterogeneous topologies. Our proposed protocol is scalable in unreliable and noisy environments. Simulation results illustrate that L-SYNCng has better precision in synchronization and scalability.展开更多
This study accessed the reproductive performance of Bunaji cows in an Ovsynch protocol involving ovatide.Bunaji cows(n=16)aged 4-6 years and weighing between 250-350 kg with body condition scores(BCS)of 2.5-3.5 were u...This study accessed the reproductive performance of Bunaji cows in an Ovsynch protocol involving ovatide.Bunaji cows(n=16)aged 4-6 years and weighing between 250-350 kg with body condition scores(BCS)of 2.5-3.5 were used.There were two treatment groups for synchronization of ovulation.Treatment group 1 comprising Bunaji(n=8)received 50μg of gonadotropin releasing hormone(GnRH)(Cystorelin)and 25 mg of PGF2α.While,treatment group 2 comprising Bunaji(n=8)received 50μg of ovatide and 25 mg of PGF2α.All cows from both treatment groups were inseminated at 16 h after each second GnRH or ovatide injections.Cows that showed mucus discharge from the vagina on the day of artificial insemination(AI)were recorded as well as those that had patent cervix.Cervical dilation was measured by taking note of the cows that had mid cervix insemination due to non-passage of the AI gun through the cervix.Transrectal palpation was conducted twice at a month interval to select cycling cows within 5-12 d of the estrous cycle before initiating Ovsynch protocol.It was repeated on day 45 post AI to confirm pregnancies in animals.Results showed that the rate of mucus discharge from the vagina was 37.5%and 87.5%for ovatide and Cystorelin,respectively;while the rate of cervical dilation were 75%and 87.5%for ovatide and Cystorelin,respectively(p>0.05),and pregnancy rates were 0%and 12.5%for ovatide and Cystorelin,respectively.There were no significant differences between the two groups.It was concluded that treatment of Bunaji cows with 50μg ovatide in Ovsynh protocol has heat and ovulation synchronization potentials and zero pregnancy rate.It was recommended that further studies be carried out using graded doses of 50,100 and 150μg of ovatide in a fixed time AI synchronization protocol in Bunaji cows,to tap the potentials of the hormone in manipulation of bovine reproduction.展开更多
Time synchronization is one of the base techniques in wireless sensor networks(WSNs).This paper proposes a novel time synchronization protocol which is a robust consensusbased algorithm in the existence of transmissio...Time synchronization is one of the base techniques in wireless sensor networks(WSNs).This paper proposes a novel time synchronization protocol which is a robust consensusbased algorithm in the existence of transmission delay and packet loss.It compensates for transmission delay and packet loss firstly,and then,estimates clock skew and clock offset in two steps.Simulation and experiment results show that the proposed protocol can keep synchronization error below 2μs in the grid network of 10 nodes or the random network of 90 nodes.Moreover,the synchronization accuracy in the proposed protocol can keep constant when the WSN works up to a month.展开更多
This article briefly reviews the topic of complex network synchronization,with its graph-theoretic criterion,showing that the homogeneous and symmetrical network structures are essential for optimal synchronization.Fu...This article briefly reviews the topic of complex network synchronization,with its graph-theoretic criterion,showing that the homogeneous and symmetrical network structures are essential for optimal synchronization.Furthermore,it briefly reviews the notion of higher-order network topologies and shows their promising potential in application to evaluating the optimality of network synchronizability.展开更多
To compare the fertility results and to assess the cost-effectiveness of several synchronization protocols applied under the conditions of beef cattle enterprises in Colombia, 1658 multiparous zebu crossbred cows most...To compare the fertility results and to assess the cost-effectiveness of several synchronization protocols applied under the conditions of beef cattle enterprises in Colombia, 1658 multiparous zebu crossbred cows mostly Brahman and Nelore ranging between 2 - 6 parities were used. Five protocols of pharmacological treatments varying in hormones used, dosage and the time of application were tested. All cows were inseminated at 52 h by appointment. Pregnancy diagnosis was undertaken over 45 d after insemination by rectal palpation. The total cost per cow and the total cost per gestation, for each protocol, were calculated. Taking a herd of one-hundred cows as baseline for calculations, it was estimated the cost of the total amount of pregnancies possibly obtained in each protocol;then, the excess between the costs of a pregnant cow and the cost of a treated cow was estimated. Additionally, the costs due to cows empty after four services were calculated. A total of 874 pregnancies were registered (52.7%), with pregnancies per protocol varying between 46.9% and 66.2% (p < 005). The cost per treated cow, varied between $64.08 and $97.47 and the cost per gestation from $126.01 to $177.26, without association between the cost of the treatment and the pregnancy rate. Protocol A was the best cost-effective with the lowest additional costs, the lowest amount of open days (2107.7 to 2231.7 d) and IA straws (average = 134), with an additional costs of $6940.00. Synchronization of estrus using pharmacological products seems to have a place in the management of cattle;however, caution should be called upon a careful assessment both from the part of the farm and the professional in charge of the enterprise to avoid using the technique indiscriminatively thus propitiating the use of a method that might not be cost efficient.展开更多
This paper explores the issue of secure synchronization control in piecewise-homogeneous Markovian jump delay neural networks affected by denial-of-service(DoS)attacks.Initially,a novel memory-based adaptive event-tri...This paper explores the issue of secure synchronization control in piecewise-homogeneous Markovian jump delay neural networks affected by denial-of-service(DoS)attacks.Initially,a novel memory-based adaptive event-triggered mechanism(MBAETM)is designed based on sequential growth rates,focusing on event-triggered conditions and thresholds.Subsequently,from the perspective of defenders,non-periodic DoS attacks are re-characterized,and a model of irregular DoS attacks with cyclic fluctuations within time series is further introduced to enhance the system's defense capabilities more effectively.Additionally,considering the unified demands of network security and communication efficiency,a resilient memory-based adaptive event-triggered mechanism(RMBAETM)is proposed.A unified Lyapunov-Krasovskii functional is then constructed,incorporating a loop functional to thoroughly consider information at trigger moments.The master-slave system achieves synchronization through the application of linear matrix inequality techniques.Finally,the proposed methods'effectiveness and superiority are confirmed through four numerical simulation examples.展开更多
The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in...The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in heterogeneous deployments.When multiple TSN networks interconnect over non-TSN networks,all devices in the network need to be syn-chronized by sharing a uniform time reference.How-ever,most non-TSN networks are best-effort.Path delay asymmetry and random noise accumulation can introduce unpredictable time errors during end-to-end time synchronization.These factors can degrade syn-chronization performance.Therefore,cross-domain time synchronization becomes a challenging issue for multiple TSN networks interconnected by non-TSN networks.This paper presents a cross-domain time synchronization scheme that follows the software-defined TSN(SD-TSN)paradigm.It utilizes a com-bined control plane constructed by a coordinate con-troller and a domain controller for centralized control and management of cross-domain time synchroniza-tion.The general operation flow of the cross-domain time synchronization process is designed.The mecha-nism of cross-domain time synchronization is revealed by introducing a synchronization model and an error compensation method.A TSN cross-domain proto-type testbed is constructed for verification.Results show that the scheme can achieve end-to-end high-precision time synchronization with accuracy and sta-bility.展开更多
Projective synchronization problems of a drive system and a particular response network were investigated,where the drive system is an arbitrary system with n+1 dimensions;it may be a linear or nonlinear system,and ev...Projective synchronization problems of a drive system and a particular response network were investigated,where the drive system is an arbitrary system with n+1 dimensions;it may be a linear or nonlinear system,and even a chaotic or hyperchaotic system,the response network is complex system coupled by N nodes,and every node is showed by the approximately linear part of the drive system.Only controlling any one node of the response network by designed controller can achieve the projective synchronization.Some numerical examples were employed to verify the effectiveness and correctness of the designed controller.展开更多
基金this project under Geran Putra Inisiatif(GPI)with reference of GP-GPI/2023/976210。
文摘Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols.
基金supported by the National Natural Science Foundation of China (Grant No.12274131)the Innovation Program for Quantum Science and Technology (Grant No.2024ZD0300101)。
文摘Optical non-reciprocity is a fundamental phenomenon in photonics.It is crucial for developing devices that rely on directional signal control,such as optical isolators and circulators.However,most research in this field has focused on systems in equilibrium or steady states.In this work,we demonstrate a room-temperature Rydberg atomic platform where the unidirectional propagation of light acts as a switch to mediate time-crystalline-like collective oscillations through atomic synchronization.
文摘Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios.
基金supported by the National Natural Science Foundation of China(Grant No.12302070)the Natural Science Foundation of Ningxia(Grant No.2024AAC05002)+1 种基金the Youth Science and Technology Talent Cultivation Project of Ningxiathe Ningxia Science and Technology Leading Talent Training Program(Grant No.2022GKLRLX04)。
文摘Neuromorphic circuits based on superconducting tunnel junctions have attracted much attention due to their highspeed computing capabilities and low energy consumption.Josephson junction circuits can effectively mimic biological neural dynamics.Leveraging these advantages,we construct a Josephson junction neuron-like model with a phasedependent dissipative current,referred to as a memristive current.The proposed memristive Josephson junction model exhibits complex dynamical behaviors.Furthermore,considering the effect of a fast-modulated synapse,we explore synchronization phenomena in coupled networks under varying coupling conductances and excitatory/inhibitory interactions.Finally,we extend the neuromorphic Josephson junction model—exhibiting complex dynamics—to the field of image encryption.These results not only enrich the understanding of the dynamical characteristics of memristive Josephson junctions but also provide a theoretical basis and technical support for the development of new neural networks and their applications in information security technology.
基金supported by the National Natural Science Foundation of China(62373317)the Tianshan Talent Training Program(2022TSYCCX0013)+3 种基金the Key Project of Natural Science Foundation of Xinjiang(2021D01D10)the Basic Research Foundation for Universities of Xinjiang(XJEDU2023P023)the Xinjiang Key Laboratory of Applied Mathematics(XJDX1401)the Intelligent Control and Optimization Research Platform in Xinjiang University.
文摘This paper is dedicated to fixed-time passivity and synchronization for multi-weighted spatiotemporal directed networks.First,to achieve fixed-time passivity,a type of decentralized power-law controller is developed,in which only one parameter needs to be adjusted in the power-law terms;this greatly decreases the inconvenience of parameter adjustment.Second,several fixed-time passivity criteria with LMI forms are derived by using a Gauss divergence theorem to deal with the spatial diffusion of nodes and by applying the Hölder’s inequality to dispose rigorously the power-law term greater than one in the designed control scheme;this improves the previous theoretical analysis.Additionally,the fixed-time synchronization of spatiotemporal directed networks with multi-weights is addressed as a direct result of fixed-time strict passivity.Finally,a numerical example is presented in order to show the validity of the theoretical analysis.
文摘Clock synchronization has important applications in multi-agent collaboration(such as drone light shows,intelligent transportation systems,and game AI),group decision-making,and emergency rescue operations.Synchronization method based on pulse-coupled oscillators(PCOs)provides an effective solution for clock synchronization in wireless networks.However,the existing clock synchronization algorithms in multi-agent ad hoc networks are difficult to meet the requirements of high precision and high stability of synchronization clock in group cooperation.Hence,this paper constructs a network model,named DAUNet(unsupervised neural network based on dual attention),to enhance clock synchronization accuracy in multi-agent wireless ad hoc networks.Specifically,we design an unsupervised distributed neural network framework as the backbone,building upon classical PCO-based synchronization methods.This framework resolves issues such as prolonged time synchronization message exchange between nodes,difficulties in centralized node coordination,and challenges in distributed training.Furthermore,we introduce a dual-attention mechanism as the core module of DAUNet.By integrating a Multi-Head Attention module and a Gated Attention module,the model significantly improves information extraction capabilities while reducing computational complexity,effectively mitigating synchronization inaccuracies and instability in multi-agent ad hoc networks.To evaluate the effectiveness of the proposed model,comparative experiments and ablation studies were conducted against classical methods and existing deep learning models.The research results show that,compared with the deep learning networks based on DASA and LSTM,DAUNet can reduce the mean normalized phase difference(NPD)by 1 to 2 orders of magnitude.Compared with the attention models based on additive attention and self-attention mechanisms,the performance of DAUNet has improved by more than ten times.This study demonstrates DAUNet’s potential in advancing multi-agent ad hoc networking technologies.
文摘Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade.
基金supported by the National Natural Science Foundation of China (Grant Nos.12475012,62461160263 for P.W.,and 62276171 for H.L.)Quantum Science and Technology-National Science and Technology Major Project of China (Project No.2023ZD0300600 for P.W.)+3 种基金Guangdong Provincial Quantum Science Strategic Initiative (Grant Nos.GDZX240-3009 and GDZX2303005 for P.W.)Guangdong Basic and Applied Basic Research Foundation (Grant No.2024-A1515011938 for H.L.)Shenzhen Fundamental ResearchGeneral Project (Grant No.JCYJ20240813141503005 for H.L.)the Talents Introduction Foundation of Beijing Normal University (Grant No.310432106 for P.W.)。
文摘Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center.
文摘Federated Learning(FL)has become a leading decentralized solution that enables multiple clients to train a model in a collaborative environment without directly sharing raw data,making it suitable for privacy-sensitive applications such as healthcare,finance,and smart systems.As the field continues to evolve,the research field has become more complex and scattered,covering different system designs,training methods,and privacy techniques.This survey is organized around the three core challenges:how the data is distributed,how models are synchronized,and how to defend against attacks.It provides a structured and up-to-date review of FL research from 2023 to 2025,offering a unified taxonomy that categorizes works by data distribution(Horizontal FL,Vertical FL,Federated Transfer Learning,and Personalized FL),training synchronization(synchronous and asynchronous FL),optimization strategies,and threat models(data leakage and poisoning attacks).In particular,we summarize the latest contributions in Vertical FL frameworks for secure multi-party learning,communication-efficient Horizontal FL,and domain-adaptive Federated Transfer Learning.Furthermore,we examine synchronization techniques addressing system heterogeneity,including straggler mitigation in synchronous FL and staleness management in asynchronous FL.The survey covers security threats in FL,such as gradient inversion,membership inference,and poisoning attacks,as well as their defense strategies that include privacy-preserving aggregation and anomaly detection.The paper concludes by outlining unresolved issues and highlighting challenges in handling personalized models,scalability,and real-world adoption.
文摘The security-related problem during the data exchange is not considered in the SyncML protocol. To solve this problem, SyncML is enhanced with a secure data synchronization exchange service application program interface (SDSXS-API) to ensure the reliability, the integrity, and the security in the data transmission and exchange. The design and the implementation of SDSXS-API are also given. The proposed APIs can be conveniently used as a uniform exchange interface for any related application programs. And their effectiveness is verified in the prototype mobile database system.
文摘In this paper, the types of synchronization errors of HDLC protocol are defined and equations for evaluating the performance of frame synchronization are derived. The probabilities of synchronization errors are calculated with these equations. Since the synchronization errors are highly related to the average error rate of the channel, their calculations are the precondition of choosing optimal error control technique in order to maintain a high throughput of the communication channel.
文摘Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services. This paper indicates that there are two drawbacks in Youn and Lim's protocol: 1) the synchronization problem will lead to a fail in on-line authentication; and 2) the exhaustive search puts a heavy burden on the off-line authentication process. Moreover, based on Youn and Lim's protocol, a remedy is proposed to address these problems. It is worthwhile to note that the proposed remedy not only keeps the original advantages but also enhances the security and performance.
文摘L-SYNC is a synchronization protocol for Wireless Sensor Networks which is based on larger degree clustering providing efficiency in homogeneous topologies. In L-SYNC, the effectiveness of the routing algorithm for the synchronization precision of two remote nodes was considered. Clustering in L-SYNC is according to larger degree techniques. These techniques reduce cluster overlapping, resulting in the routing algorithm requiring fewer hops to move from one cluster to another remote cluster. Even though L-SYNC offers higher precision compared to other algorithms, it does not support heterogeneous topologies and its synchronization algorithm can be influenced by unreliable data. In this paper, we present the L-SYNCng (L-SYNC next generation) protocol, working in heterogeneous topologies. Our proposed protocol is scalable in unreliable and noisy environments. Simulation results illustrate that L-SYNCng has better precision in synchronization and scalability.
文摘This study accessed the reproductive performance of Bunaji cows in an Ovsynch protocol involving ovatide.Bunaji cows(n=16)aged 4-6 years and weighing between 250-350 kg with body condition scores(BCS)of 2.5-3.5 were used.There were two treatment groups for synchronization of ovulation.Treatment group 1 comprising Bunaji(n=8)received 50μg of gonadotropin releasing hormone(GnRH)(Cystorelin)and 25 mg of PGF2α.While,treatment group 2 comprising Bunaji(n=8)received 50μg of ovatide and 25 mg of PGF2α.All cows from both treatment groups were inseminated at 16 h after each second GnRH or ovatide injections.Cows that showed mucus discharge from the vagina on the day of artificial insemination(AI)were recorded as well as those that had patent cervix.Cervical dilation was measured by taking note of the cows that had mid cervix insemination due to non-passage of the AI gun through the cervix.Transrectal palpation was conducted twice at a month interval to select cycling cows within 5-12 d of the estrous cycle before initiating Ovsynch protocol.It was repeated on day 45 post AI to confirm pregnancies in animals.Results showed that the rate of mucus discharge from the vagina was 37.5%and 87.5%for ovatide and Cystorelin,respectively;while the rate of cervical dilation were 75%and 87.5%for ovatide and Cystorelin,respectively(p>0.05),and pregnancy rates were 0%and 12.5%for ovatide and Cystorelin,respectively.There were no significant differences between the two groups.It was concluded that treatment of Bunaji cows with 50μg ovatide in Ovsynh protocol has heat and ovulation synchronization potentials and zero pregnancy rate.It was recommended that further studies be carried out using graded doses of 50,100 and 150μg of ovatide in a fixed time AI synchronization protocol in Bunaji cows,to tap the potentials of the hormone in manipulation of bovine reproduction.
文摘Time synchronization is one of the base techniques in wireless sensor networks(WSNs).This paper proposes a novel time synchronization protocol which is a robust consensusbased algorithm in the existence of transmission delay and packet loss.It compensates for transmission delay and packet loss firstly,and then,estimates clock skew and clock offset in two steps.Simulation and experiment results show that the proposed protocol can keep synchronization error below 2μs in the grid network of 10 nodes or the random network of 90 nodes.Moreover,the synchronization accuracy in the proposed protocol can keep constant when the WSN works up to a month.
基金Hong Kong Research Grants Council under the GRF(9043664).
文摘This article briefly reviews the topic of complex network synchronization,with its graph-theoretic criterion,showing that the homogeneous and symmetrical network structures are essential for optimal synchronization.Furthermore,it briefly reviews the notion of higher-order network topologies and shows their promising potential in application to evaluating the optimality of network synchronizability.
文摘To compare the fertility results and to assess the cost-effectiveness of several synchronization protocols applied under the conditions of beef cattle enterprises in Colombia, 1658 multiparous zebu crossbred cows mostly Brahman and Nelore ranging between 2 - 6 parities were used. Five protocols of pharmacological treatments varying in hormones used, dosage and the time of application were tested. All cows were inseminated at 52 h by appointment. Pregnancy diagnosis was undertaken over 45 d after insemination by rectal palpation. The total cost per cow and the total cost per gestation, for each protocol, were calculated. Taking a herd of one-hundred cows as baseline for calculations, it was estimated the cost of the total amount of pregnancies possibly obtained in each protocol;then, the excess between the costs of a pregnant cow and the cost of a treated cow was estimated. Additionally, the costs due to cows empty after four services were calculated. A total of 874 pregnancies were registered (52.7%), with pregnancies per protocol varying between 46.9% and 66.2% (p < 005). The cost per treated cow, varied between $64.08 and $97.47 and the cost per gestation from $126.01 to $177.26, without association between the cost of the treatment and the pregnancy rate. Protocol A was the best cost-effective with the lowest additional costs, the lowest amount of open days (2107.7 to 2231.7 d) and IA straws (average = 134), with an additional costs of $6940.00. Synchronization of estrus using pharmacological products seems to have a place in the management of cattle;however, caution should be called upon a careful assessment both from the part of the farm and the professional in charge of the enterprise to avoid using the technique indiscriminatively thus propitiating the use of a method that might not be cost efficient.
文摘This paper explores the issue of secure synchronization control in piecewise-homogeneous Markovian jump delay neural networks affected by denial-of-service(DoS)attacks.Initially,a novel memory-based adaptive event-triggered mechanism(MBAETM)is designed based on sequential growth rates,focusing on event-triggered conditions and thresholds.Subsequently,from the perspective of defenders,non-periodic DoS attacks are re-characterized,and a model of irregular DoS attacks with cyclic fluctuations within time series is further introduced to enhance the system's defense capabilities more effectively.Additionally,considering the unified demands of network security and communication efficiency,a resilient memory-based adaptive event-triggered mechanism(RMBAETM)is proposed.A unified Lyapunov-Krasovskii functional is then constructed,incorporating a loop functional to thoroughly consider information at trigger moments.The master-slave system achieves synchronization through the application of linear matrix inequality techniques.Finally,the proposed methods'effectiveness and superiority are confirmed through four numerical simulation examples.
基金supported in part by National Key R&D Program of China(Grant No.2022YFC3803700)in part by the National Natural Science Foundation of China(Grant No.92067102)in part by the project of Beijing Laboratory of Advanced Information Networks.
文摘The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in heterogeneous deployments.When multiple TSN networks interconnect over non-TSN networks,all devices in the network need to be syn-chronized by sharing a uniform time reference.How-ever,most non-TSN networks are best-effort.Path delay asymmetry and random noise accumulation can introduce unpredictable time errors during end-to-end time synchronization.These factors can degrade syn-chronization performance.Therefore,cross-domain time synchronization becomes a challenging issue for multiple TSN networks interconnected by non-TSN networks.This paper presents a cross-domain time synchronization scheme that follows the software-defined TSN(SD-TSN)paradigm.It utilizes a com-bined control plane constructed by a coordinate con-troller and a domain controller for centralized control and management of cross-domain time synchroniza-tion.The general operation flow of the cross-domain time synchronization process is designed.The mecha-nism of cross-domain time synchronization is revealed by introducing a synchronization model and an error compensation method.A TSN cross-domain proto-type testbed is constructed for verification.Results show that the scheme can achieve end-to-end high-precision time synchronization with accuracy and sta-bility.
基金Supported by the National Natural Science Foundation of China (11161027)。
文摘Projective synchronization problems of a drive system and a particular response network were investigated,where the drive system is an arbitrary system with n+1 dimensions;it may be a linear or nonlinear system,and even a chaotic or hyperchaotic system,the response network is complex system coupled by N nodes,and every node is showed by the approximately linear part of the drive system.Only controlling any one node of the response network by designed controller can achieve the projective synchronization.Some numerical examples were employed to verify the effectiveness and correctness of the designed controller.