期刊文献+
共找到1,738篇文章
< 1 2 87 >
每页显示 20 50 100
Designing Proportional-Integral Consensus Protocols for Second-Order Multi-Agent Systems Using Delayed and Memorized State Information
1
作者 Honghai Wang Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期878-892,共15页
This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consens... This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consensus protocol is designed by using delayed and memorized state information.Under the proportional-integral consensus protocol,the consensus problem of the multi-agent system is transformed into the problem of asymptotic stability of the corresponding linear time-invariant time-delay system.Note that the location of the eigenvalues of the corresponding characteristic function of the linear time-invariant time-delay system not only determines the stability of the system,but also plays a critical role in the dynamic performance of the system.In this paper,based on recent results on the distribution of roots of quasi-polynomials,several necessary conditions for Hurwitz stability for a class of quasi-polynomials are first derived.Then allowable regions of consensus protocol parameters are estimated.Some necessary and sufficient conditions for determining effective protocol parameters are provided.The designed protocol can achieve consensus and improve the dynamic performance of the second-order multi-agent system.Moreover,the effects of delays on consensus of systems of harmonic oscillators/double integrators under proportional-integral consensus protocols are investigated.Furthermore,some results on proportional-integral consensus are derived for a class of high-order linear time-invariant multi-agent systems. 展开更多
关键词 Consensus protocol Hurwitz stability multi-agent systems quasi-polynomials time delay
下载PDF
Trans-Thoracic Echocardiographic Aortic Blood Flow Peak Velocity Variation, Distance Minute, Aortic Velocity Time Integral and Postoperative Outcome in Pediatric Surgical Patients—An Observational Pilot Study Protocol 被引量:1
2
作者 Claudine Kumba 《Open Journal of Internal Medicine》 2020年第1期90-95,共6页
Background: A Randomized Controlled Trial (RCT) has been elaborated where goal directed fluid and hemodynamic therapy (GDFHT) will be realized with trans-thoracic echocardiographic aortic blood flow peak velocity vari... Background: A Randomized Controlled Trial (RCT) has been elaborated where goal directed fluid and hemodynamic therapy (GDFHT) will be realized with trans-thoracic echocardiographic aortic blood flow peak velocity variation (ΔVpeak) and distance minute (DM) to guide fluid therapy and hemodynamics in high risk pediatric surgical patients. This RCT will clarify the impact of GDFHT with ΔVpeak and DM on postoperative outcome in terms of morbidity, length of stay in the intensive care unit (LOSICU), length of mechanical ventilation (LMV) and length of hospital stay (LOS) in children. To determine values of ΔVpeak, DM and VTI predictive of these postoperative outcomes, an observational pilot study will be realized. This pilot study is described here. The primary objective of this study is to determine values of ΔVpeak, DM and ITV predictive of postoperative outcome in children in terms of morbidity. The secondary objectives are to determine values of ΔVpeak, DM and ITV predictive of LOSICU, LMV, LOS, intraoperative, postoperative fluid administration and vasoactive-inotropic therapy. Methods: 500 - 1000 children aged less than 18 years will be included prospectively. Statistic analysis will be realized with XLSTAT 2019.4.2 software or plus. Results and Conclusions: This trial protocol will determine values of ΔVpeak, DM and ITV with echocardiography predictive of postoperative outcome in children. 展开更多
关键词 Children AORTIC Blood Flow Peak VELOCITY Variation AORTIC VELOCITY time INTEGRAL Distance MINUTE Postoperative Outcome Pilot Study protocol Trans-Thoracic Echocardiography
下载PDF
A new real-time ethernet MAC protocol for time-critical applications 被引量:1
3
作者 沈钢 许晓鸣 +2 位作者 蔡云泽 何星 张卫东 《Journal of Central South University of Technology》 EI 2002年第1期54-58,共5页
The authors propose a new persistent transmission based real time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real time frames. Moreover, it is compatible with the protocol ... The authors propose a new persistent transmission based real time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real time frames. Moreover, it is compatible with the protocol used by the existing Ethernet controllers for conventional datagram traffic and thus standard Ethernet stations can be used in the system without any modification. The paper describes the protocol in detail and analyses the maximum delivery delay for real time traffic and the efficiency of the channel. 展开更多
关键词 以太网 通信协议 实时控制 工业控制网络 多通道协议 MAC
下载PDF
Distributed In-Time Multiple Coverage Holes Healing Protocol
4
作者 Lin-Na Wei Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2012年第2期185-191,共7页
Coverage holes often appear in wireless sensor networks due to sensor failure or the inheritance of sensor's random distribution. In the hybrid model, mobile sensors in the network are acquired to heal coverage holes... Coverage holes often appear in wireless sensor networks due to sensor failure or the inheritance of sensor's random distribution. In the hybrid model, mobile sensors in the network are acquired to heal coverage holes by their mobifity. When multiple coverage holes appear in the sensor network and each of them has a time requirement (in which the coverage hole has to be healed), conflicts for the requests of the same mobile sensor may arise. A distributed multiple mobile sensor schedufing protocol (DMS) is proposed in this paper to solve this problem by finding mobile sensors in the time response zone defined by the time requirement of each coverage hole. Simulation results show that DMS can well schedule the mobile sensors to move to multiple coverage holes within the time requirement. 展开更多
关键词 Coverage bole distributed protocol mobile sensor dispatch sensor network time limited.
下载PDF
An Extension of Contract Net Protocol With Real Time Constraints
5
《Wuhan University Journal of Natural Sciences》 CAS 1996年第2期156-162,共7页
The contract net protocol has developed to specify problem solving communication for nodes in a distributed problem solving. Task distribution is affected by a negotiation process,a discussion carried on between node... The contract net protocol has developed to specify problem solving communication for nodes in a distributed problem solving. Task distribution is affected by a negotiation process,a discussion carried on between nodes with tasks to he executed and nodes that may be able to execute those tasks. In contract net protocol,once negotiation successes,tbe task execution is assumed to success. However,in real world,even though a task is awarded to successfully bidding nodes,it may be delayed. Such delay may badly propagate in whole system. Here,we introduce real-time constraints into contract net protocol to manage task execution for avoiding the, task's delay,or even though being delayed,the railure cannot propagate to whole system. In this paper,we first present a real-time contract net protocol which is an extension of contract net protocol with real-time constraints for distributed computing. Our proposition extends the basic negotiation protocol to negotiation and controlling execution or task. The controlling process is based on task deadline time,we also present an extension of the internode language of contract net protocol specification with real-time constraints. 展开更多
关键词 real-time time-out coordination model contract net protocol time delay
下载PDF
ACTIVE-A Real Time Commit Protocol
6
作者 Udai Shanker Nikhil Agarwal +2 位作者 Shalabh Kumar Tiwari Praphull Goel Praveen Srivastava 《Wireless Sensor Network》 2010年第3期254-263,共10页
Many existing real time commit protocols try to improve system performance by allowing a committing cohort to lend its data to an executing cohort, thus reducing data inaccessibility. They block the borrower from send... Many existing real time commit protocols try to improve system performance by allowing a committing cohort to lend its data to an executing cohort, thus reducing data inaccessibility. They block the borrower from sending WORKDONE/PREPARED message and restrict them from lending data so that transaction abort chain is limited to one. Thus, transaction execution time increases. This paper proposes a modified real time commit protocol for distributed real time database systems (DRTDBS), Allow Commit Dependent and in Time borrowers for Incredible Value added data lending without extended abort chain (ACTIVE), where borrower cohorts are categorized as commit and abort dependent. Further, the commit dependent borrowers can lend data to executing cohorts with still limiting the transaction abort chain to one only and reducing the data inaccessibility. Also, an incoming executing cohort having borrowing factor greater than one can only borrow the dirty data items from lender. This minimizes the fruitless borrowing by the cohort. The performance of ACTIVE is compared with PROMPT, 2SC and SWIFT protocols for both main memory resident and disk resident databases with and without communication delay. Simulation results show that the proposed protocol improves the system performance up to 4% as transaction miss percentage. 展开更多
关键词 Distributed Real time Database System Commit protocol CONFLICT Resolution DEPENDENCY LENDER BORROWER
下载PDF
Verification of Session Initiation Protocol Using Timed Colored Petri Net
7
作者 Safiye Kizmaz Mürvet Kirci 《International Journal of Communications, Network and System Sciences》 2011年第3期170-179,共10页
In this work, Session Initiation Protocol model is established by using Timed Colored Petri Nets (TCPN). SIP (Session Initiation Protocol) is a protocol developed to assist in providing advanced telephony services acr... In this work, Session Initiation Protocol model is established by using Timed Colored Petri Nets (TCPN). SIP (Session Initiation Protocol) is a protocol developed to assist in providing advanced telephony services across the Internet. The Session Initiation Protocol (SIP) has become the quasi-standard for Voiceover-Internet Protocol (VoIP) communications. SIP is based on a client–server infrastructure in which user agents represent the end-terminals as clients, proxy servers handle SIP message routing between the user agents, and registrar servers store the client’s contact information into a location service. By use of timed color set and useful time attributes in tokens defined in CPN tools, timer and time-related problems of SIP are modeled and analyzed. Timer is an important part for SIP, especially the INVITE transaction. 展开更多
关键词 Session Initiation protocol timed Colored Petri Nets protocol Verification CPN Tool
下载PDF
Real-Time Communication Method for mHealth Base on Extended XMPP Protocol
8
作者 Chenjie Shi Yu Fang 《Communications and Network》 2013年第3期590-595,共6页
Considering characteristic of mHealth communication and problems of existing methods, this paper presents a real-time communication method for mHealth based on extended XMPP protocol. The method can maintain the role ... Considering characteristic of mHealth communication and problems of existing methods, this paper presents a real-time communication method for mHealth based on extended XMPP protocol. The method can maintain the role status efficiently and reduce data latency during the communication process. Meanwhile, it can be extended flexibly to meet increasing communication demands of mHealth services. Furthermore, a system framework is presented to support telemonitoring scene. Finally, system implementation and feasibility tests verify the effectiveness of the method and framework. 展开更多
关键词 MHEALTH XMPP protocol REAL-time Communication
下载PDF
Partitioned k-Exclusion Real-Time Locking Protocol Motivated by Multicore Multi-GPU Systems
9
作者 Mao-Lin Yang Hang Lei +1 位作者 Yong Liao Ze-Wei Chen 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第3期193-198,共6页
Graphic processing units (GPUs) have been widely recognized as cost-efficient co-processors with acceptable size, weight, and power consumption. However, adopting GPUs in real-time systems is still challenging, due ... Graphic processing units (GPUs) have been widely recognized as cost-efficient co-processors with acceptable size, weight, and power consumption. However, adopting GPUs in real-time systems is still challenging, due to the lack in framework for real-time analysis. In order to guarantee real-time requirements while maintaining system utilization ~in modern heterogeneous systems, such as multicore multi-GPU systems, a novel suspension-based k-exclusion real-time locking protocol and the associated suspension-aware schedulability analysis are proposed. The proposed protocol provides a synchronization framework that enables multiple GPUs to be efficiently integrated in multicore real-time systems. Comparative evaluations show that the proposed methods improve upon the existing work in terms of schedulability. 展开更多
关键词 Embedded systems graphic processing units(GPUs) heterogeneous systems locking protocols MULTICORE real-time systems
下载PDF
Contention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks
10
作者 Chao Huang Guoli Wang 《Wireless Sensor Network》 2010年第7期528-537,共10页
This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at ... This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks. 展开更多
关键词 Wireless Sensor Network REAL-time Routing protocol Contention-Based Scheme Beaconless
下载PDF
基于面向TTE的新型数据综合系统的设计与实现
11
作者 张会新 洪应平 +1 位作者 姚玉林 杨应杰 《仪表技术与传感器》 CSCD 北大核心 2024年第1期81-86,共6页
针对传统总线无法实时网络传输,新型总线时间触发以太网(TTE)兼容IP协议和IEEE802.3协议,但TT业务和BE业务需设备满足TTE协议,实际工程缺少适用性的问题,设计了一种基于FPGA的时间触发以太网数据综合系统。该数据综合系统以FPGA作为核... 针对传统总线无法实时网络传输,新型总线时间触发以太网(TTE)兼容IP协议和IEEE802.3协议,但TT业务和BE业务需设备满足TTE协议,实际工程缺少适用性的问题,设计了一种基于FPGA的时间触发以太网数据综合系统。该数据综合系统以FPGA作为核心控制器,千兆网作为主要通信接口,在满足高速率、高宽带、高灵活的前提下,设计出数据综合模块,将多种传统总线与TTE总线良好兼容。试验结果表明:系统在同步精度高达40 ns、通信抖动仅为392 ns的前提下,数据转换收发无误码现象。同时将多种数据混合编帧,具备极高的稳定性与灵活性,为TTE网络数据服务于实际工程提供了可靠的解决方案。 展开更多
关键词 时间触发以太网 时钟同步 协议兼容 数据融合
下载PDF
基于ARIMA-TCN混合模型的高速铁路时间同步方法
12
作者 陈永 詹芝贤 张薇 《铁道学报》 EI CAS CSCD 北大核心 2024年第6期90-100,共11页
列控系统作为高速铁路的核心系统,保持其系统的时间同步对于行车安全至关重要。针对现有时间同步方法易受时变上下行传输时延、随机时钟跳变等影响,导致主从时钟偏移估计不准确的问题,提出一种基于差分自回归移动平均-时域卷积神经网络(... 列控系统作为高速铁路的核心系统,保持其系统的时间同步对于行车安全至关重要。针对现有时间同步方法易受时变上下行传输时延、随机时钟跳变等影响,导致主从时钟偏移估计不准确的问题,提出一种基于差分自回归移动平均-时域卷积神经网络(ARIMA-TCN)混合模型的高速铁路时间同步方法。首先,根据上下行链路传输速率的不对称比,建立高速铁路时钟的数学理论和实际观测模型。然后,使用拉依达准则识别处理跳变异常值,完成实际时间序列的预处理。再次,使用ARIMA模型平滑时间序列中不确定时延带来的噪声抖动,获得平稳的时间序列。最后,通过提出的注意力增强TCN模型进行预测补偿,完成时钟偏移的补偿校正。通过实验仿真,得到基站区间内位置、基站间距以及车速对高速铁路时间同步的影响性分析。实验结果表明:与对比方法相比,所提方法补偿后的均方根误差较最小二乘法减少了75%、较最大似然估计方法误差减少了44.4%,较BP神经网络方法误差减少了16.7%,验证所提方法具有更低的同步误差和更高的同步精度。 展开更多
关键词 时间同步 精确时钟协议 差分自回归移动平均模型 注意力增强时域卷积网络 时间补偿
下载PDF
基于D2D通信和虚拟MIMO的飞行器集群网络传输方案设计
13
作者 刘志峰 张雪 +4 位作者 栗苹 张继豪 李思琪 王卫东 龚鹏 《兵工学报》 EI CAS CSCD 北大核心 2024年第4期1141-1147,共7页
在无中心飞行器集群网络中,非直通条件节点间不同的中继路径可能导致较大路径损耗落差,为有限资源前提下网络传输能力的提升带来困难。参考5G移动通信中的终端直通(Device to Device,D2D)技术与中继通信中的虚拟多输入多输出(Multiple-I... 在无中心飞行器集群网络中,非直通条件节点间不同的中继路径可能导致较大路径损耗落差,为有限资源前提下网络传输能力的提升带来困难。参考5G移动通信中的终端直通(Device to Device,D2D)技术与中继通信中的虚拟多输入多输出(Multiple-Input Multiple-Output,MIMO)技术,提出一套D2D通信与虚拟MIMO技术结合的无中心飞行器集群网络传输方案。重点研究在正交资源模式下,将不同的协作传输协议与空时编码进行组合,在信噪比、误比特率、接入概率等方面对通信性能的影响。仿真结果表明:D2D通信与虚拟MIMO技术结合的传输方案在不增加资源的前提下,对集群网络的通信性能有明显提升,且引入分布式空时编码可进一步优化误比特率性能,但3种传输协议在不同传输质量评价方向的改善有所不同。 展开更多
关键词 飞行器集群网络 终端直通通信 虚拟多输入多输出 协作传输协议 空时编码
下载PDF
Protocol Buffers在即时通讯系统中的应用研究 被引量:5
14
作者 田源 潘晨光 丁杰 《现代电子技术》 2014年第5期32-34,38,共4页
即时通讯系统已经广泛应用在人们的生活中,随着用户数量的增长,计算机设备在网络中传输的数据量越来越大。由于网络中的数据传输是非结构化的,因此需要数据的序列化与逆序列化方法来实现网络数据到可读数据的转换。基于即时通讯系统对... 即时通讯系统已经广泛应用在人们的生活中,随着用户数量的增长,计算机设备在网络中传输的数据量越来越大。由于网络中的数据传输是非结构化的,因此需要数据的序列化与逆序列化方法来实现网络数据到可读数据的转换。基于即时通讯系统对于数据的实时性需求,提出了使用Protocol Buffers作为系统的序列化与逆序列化的手段,并且将Protocol Buffers与目前几种比较主流的数据序列化方法进行了对比。 展开更多
关键词 即时通讯 数据序列化 消息
下载PDF
一种分析Timed-Release公钥协议的扩展逻辑 被引量:5
15
作者 范红 冯登国 《计算机学报》 EI CSCD 北大核心 2003年第7期831-836,共6页
在Coffey和Saidha提出的CS逻辑 (CS逻辑将时间与逻辑结构相结合 ,可用于形式化分析Timed release公钥协议的时间相关性秘密的安全性 )的基础上 ,提出了CS逻辑的扩展逻辑 ,它更好地反映了Timed release公钥协议的特性 ,并对一个协议实例... 在Coffey和Saidha提出的CS逻辑 (CS逻辑将时间与逻辑结构相结合 ,可用于形式化分析Timed release公钥协议的时间相关性秘密的安全性 )的基础上 ,提出了CS逻辑的扩展逻辑 ,它更好地反映了Timed release公钥协议的特性 ,并对一个协议实例进行了有效的形式化分析 . 展开更多
关键词 timed-Release公钥协议 扩展逻辑 密钥 密码协议 形式化分析
下载PDF
安全稳定控制系统远程非实时闭环测试技术研究
16
作者 赵巍 侯玉强 +2 位作者 陈汹 薛峰 许剑冰 《浙江电力》 2024年第4期63-73,共11页
目前,安全稳定控制系统的测试主要依赖于相互独立的厂内测试、实验室测试和现场联调测试,难以彻底消除安全稳定控制系统潜在的隐患。针对现有测试方法的不足,提出一种安全稳定控制系统远程非实时闭环测试技术。通过融合硬件在环仿真、5... 目前,安全稳定控制系统的测试主要依赖于相互独立的厂内测试、实验室测试和现场联调测试,难以彻底消除安全稳定控制系统潜在的隐患。针对现有测试方法的不足,提出一种安全稳定控制系统远程非实时闭环测试技术。通过融合硬件在环仿真、5G通信组网、广域同步触发、多通信协议转换等关键技术,研发了平台管理系统、测试主站和测试终端等关键模块,并制定了远程非实时闭环测试流程。以四川电网水电经特高压直流集中送出安全稳定控制系统为例,验证了所提技术的可行性。 展开更多
关键词 安全稳定控制系统 远程通信 同步触发 协议转换 时间切片 闭环测试
下载PDF
基于DRL的定向网络时隙复用和功率控制协议
17
作者 梁仕杰 赵海涛 +3 位作者 张姣 王海军 魏急波 王俊芳 《信号处理》 CSCD 北大核心 2024年第7期1341-1353,共13页
近年来,无人机网络逐渐地广泛应用于各行各业,对无人机网络能提供的网络容量提出了更高的要求。定向天线结合无人机网络构成定向无人机网络以增加网络资源应对无人机网络中各个节点对网络有限通信资源的竞争造成网络容量低的问题。定向... 近年来,无人机网络逐渐地广泛应用于各行各业,对无人机网络能提供的网络容量提出了更高的要求。定向天线结合无人机网络构成定向无人机网络以增加网络资源应对无人机网络中各个节点对网络有限通信资源的竞争造成网络容量低的问题。定向无人机网络通过定向天线的空间复用能力可以提高网络的时隙利用效率。针对TDMA协议在定向组网中时隙利用率过低导致网络容量受限的问题,该文提出了一种基于深度Q网络(DQN)的定向无人机网络时隙复用和功率控制协议。为了提高时隙利用率,考虑在单位时隙进行多个链路通信以实现时隙资源的复用。然而多个链路在同一个时隙通信会产生链路间的干扰,如何在考虑链路间相互干扰的情况下控制功率提高网络的容量是时隙复用研究的重点问题。为了解决该问题,首先考虑以功率要求和每条链路最小信道容量为约束,考虑相较于其他研究更为复杂更符合实际的链路互干扰模型,建模问题为最大全网容量问题。然后为了构建链路间的更复杂的互干扰环境,将多个链路的瞬时信道信息、定向增益状态融入到DQN框架的状态中,DQN的奖励为高于最小信道容量的链路信道容量的和。最后,将每个时隙的优化问题扩展到每一帧的优化问题,并利用多个DQN进行求解。仿真结果表明,在保证每个被分配时隙的最小信道容量前提下,相较于对比方法网络容量有了很大的提升。 展开更多
关键词 时分多址协议 定向无人机网络 深度Q网络 时隙复用 功率控制
下载PDF
面向软件定义互连系统的多协议交换电路
18
作者 董春雷 沈剑良 +3 位作者 李沛杰 王盼 薄光明 路凯 《通信学报》 EI CSCD 北大核心 2024年第5期44-53,共10页
为满足软件定义互连系统中异构协议融合互连的需求,提出一种两级多协议交换电路,该电路通过融合共享缓存与Crossbar这2种交换架构,实现对多种异构协议的报文转发需求的兼顾。同时,提出一种基于时隙的多级仲裁调度方法,实现调度过程中时... 为满足软件定义互连系统中异构协议融合互连的需求,提出一种两级多协议交换电路,该电路通过融合共享缓存与Crossbar这2种交换架构,实现对多种异构协议的报文转发需求的兼顾。同时,提出一种基于时隙的多级仲裁调度方法,实现调度过程中时间与空间的解耦。仿真结果表明,所设计的交换电路能够弹性适应绑定模式变化引起的交换规模及端口缓存、端口带宽需求变化,缓存资源利用率相较传统组合输入输出排队(CIOQ)架构最高提高87.5%,转发时延低至数十纳秒,不仅适用于RapidIO、光纤通道(FC)、Ethernet、外设部件互连快速总线(PCIe)单一协议交换,而且适用于多种协议组合的混合协议交换。 展开更多
关键词 软件定义互连 异构协议 交换结构 时分复用 通道绑定 缓存利用率
下载PDF
后激活增强效应对山西省优秀男子跳马运动员助跑与踏跳影响的实验研究
19
作者 逄浩泽 赵蕊 +1 位作者 董建国 曹电康 《四川体育科学》 2024年第2期69-75,共7页
目的:本研究旨在探索在不同膝关节角度(60°、90°、120°)下进行的颈后蹲刺激,对4名山西省优秀男子跳马运动员在随后的15s、4min、8min、12min、16min完成跳马动作时助跑和踏跳过程中的运动学数据以及下肢肌肉肌电数据的... 目的:本研究旨在探索在不同膝关节角度(60°、90°、120°)下进行的颈后蹲刺激,对4名山西省优秀男子跳马运动员在随后的15s、4min、8min、12min、16min完成跳马动作时助跑和踏跳过程中的运动学数据以及下肢肌肉肌电数据的影响。希望找到一种最佳的颈后蹲刺激条件和方式,以提高后激活效应在体操跳马项目中的运用效果,并为训练和比赛提供指导和建议。方法:本研究同时使用两台JVC GC-P100对优秀男子跳马运动员的技术动作进行影像数据采集,随后利用APAS三维解析系统进行影像解析,以获取运动学数据。同时,使用Noraxon 16导遥测肌电仪对运动员完成技术动作时所需大量动员的相关下肢肌肉(包括股直肌、股外侧肌、股内侧肌、股二头肌、腓肠肌、胫骨前肌)的肌电数据进行测量并对获得的数据进行详细分析。结果:60°膝角下的5次90%1RM颈后蹲刺激后的4min会使运动员的运动表现显著性提高,运动学数据及iEMG值大幅上升。结论:(1)60°、90°和120°膝角下的5次90%1RM颈后蹲预刺激,均可使男性跳马运动员助跑和踏跳阶段的运动学表现和iEMG值显著提高。60°膝角的刺激效果最优。(2)选择在60°膝角的颈后蹲预刺激后的4min完成跳马动作,运动员下肢肌肉募集运动单位能力最强,肌肉活性明显增大,运动学和iEMG指标达到峰值。(3)跳马动作中的助跑和踏跳阶段均可受到颈后蹲预刺激的促进作用。 展开更多
关键词 后激活增强效应 跳马 颈后蹲 刺激方式 恢复时间
下载PDF
基于一次哈希签名和联盟链的密钥分发协议
20
作者 陈青青 刘蕾 王志伟 《计算机技术与发展》 2024年第6期73-80,共8页
在物联网环境中,为了确保通信数据的机密性和完整性,数据加密密钥的安全性尤为重要。密钥一般采用中心化的存储机制,当中心实体不可信时会造成密钥泄露的风险,因此在分发过程中需要保证密钥的完整性,但普通的签名方案往往较为复杂。针... 在物联网环境中,为了确保通信数据的机密性和完整性,数据加密密钥的安全性尤为重要。密钥一般采用中心化的存储机制,当中心实体不可信时会造成密钥泄露的风险,因此在分发过程中需要保证密钥的完整性,但普通的签名方案往往较为复杂。针对密钥分发中心化及密钥分发算法复杂等问题,提出了一种基于一次哈希签名和联盟链的密钥分发协议。首先,利用轻量级的一次哈希签名进行用户注册和认证,同时,为了有效检测和防御使用一次哈希签名过程中可能出现的中间人攻击,协议中使用了Hyperledger Fabric联盟链存储签名凭证,用户可以从联盟链上获取签名凭证以供认证;然后,基于Hyperledger Fabric链和ElGamal密码体制设计了一个对称密钥分发方案;最后,从理论分析和Scyther形式化协议分析工具两个方面分析了密钥分发协议的安全性,结果表明该协议在保证密钥分发安全性的情况下,提高了密钥分发的效率。 展开更多
关键词 一次哈希签名 联盟链 对称密钥分发协议 通信数据保护 安全性
下载PDF
上一页 1 2 87 下一页 到第
使用帮助 返回顶部