期刊文献+
共找到38,310篇文章
< 1 2 250 >
每页显示 20 50 100
CAW-YOLO:Cross-Layer Fusion and Weighted Receptive Field-Based YOLO for Small Object Detection in Remote Sensing
1
作者 Weiya Shi Shaowen Zhang Shiqiang Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3209-3231,共23页
In recent years,there has been extensive research on object detection methods applied to optical remote sensing images utilizing convolutional neural networks.Despite these efforts,the detection of small objects in re... In recent years,there has been extensive research on object detection methods applied to optical remote sensing images utilizing convolutional neural networks.Despite these efforts,the detection of small objects in remote sensing remains a formidable challenge.The deep network structure will bring about the loss of object features,resulting in the loss of object features and the near elimination of some subtle features associated with small objects in deep layers.Additionally,the features of small objects are susceptible to interference from background features contained within the image,leading to a decline in detection accuracy.Moreover,the sensitivity of small objects to the bounding box perturbation further increases the detection difficulty.In this paper,we introduce a novel approach,Cross-Layer Fusion and Weighted Receptive Field-based YOLO(CAW-YOLO),specifically designed for small object detection in remote sensing.To address feature loss in deep layers,we have devised a cross-layer attention fusion module.Background noise is effectively filtered through the incorporation of Bi-Level Routing Attention(BRA).To enhance the model’s capacity to perceive multi-scale objects,particularly small-scale objects,we introduce a weightedmulti-receptive field atrous spatial pyramid poolingmodule.Furthermore,wemitigate the sensitivity arising from bounding box perturbation by incorporating the joint Normalized Wasserstein Distance(NWD)and Efficient Intersection over Union(EIoU)losses.The efficacy of the proposedmodel in detecting small objects in remote sensing has been validated through experiments conducted on three publicly available datasets.The experimental results unequivocally demonstrate the model’s pronounced advantages in small object detection for remote sensing,surpassing the performance of current mainstream models. 展开更多
关键词 Small object detection attention mechanism cross-layer fusion discrete cosine transform
下载PDF
Cross-Layer Design of Energy-Saving AODV Routing Protocol 被引量:3
2
作者 李冰 金志刚 舒炎泰 《Transactions of Tianjin University》 EI CAS 2009年第5期343-349,共7页
Since most ad hoc mobile devices today operate on batteries,the power consumption becomes an important issue.This paper proposes a cross-layer design of energy-aware ad hoc on-demand distance vector(CEAODV) routing pr... Since most ad hoc mobile devices today operate on batteries,the power consumption becomes an important issue.This paper proposes a cross-layer design of energy-aware ad hoc on-demand distance vector(CEAODV) routing protocol which adopts cross-layer mechanism and energy-aware metric to improve AODV routing protocol to reduce the energy consumption and then prolong the life of the whole network.In CEAODV,the link layer and the routing layer work together to choose the optimized transmission power for nodes and the route for packets.The link layer provides the energy consumption information for the routing layer and the routing layer chooses route accordingly and conversely controls the link layer to adjust the transmission power.The simulation result shows that CEAODV can outperform AODV to save more energy.It can reduce the consumed energy by about 8%over traditional energy-aware algorithm.And the performance is better when the traffic load is higher in the network. 展开更多
关键词 ad hoc network energy conservation cross-layer ROUTING
下载PDF
Joint channel assignment and cross-layer routing protocol for multi-radio multi-channel Ad Hoc networks 被引量:2
3
作者 Yang Lu Junming Guan +1 位作者 Zhen Wei Qilin Wu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第6期1095-1102,共8页
To study multi-radio multi-channel (MR-MC) Ad Hoc networks based on 802.11, an efficient cross-layer routing protocol with the function of joint channel assignment, called joint channel assignment and cross-layer ro... To study multi-radio multi-channel (MR-MC) Ad Hoc networks based on 802.11, an efficient cross-layer routing protocol with the function of joint channel assignment, called joint channel assignment and cross-layer routing (JCACR), is presented. Firstly, this paper introduces a new concept called channel utilization percentage (CUP), which is for measuring the contention level of different channels in a node’s neighborhood, and deduces its optimal value for determining whether a channel is overloaded or not. Then, a metric parameter named channel selection metric (CSM) is designed, which actually reffects not only the channel status but also corresponding node’s capacity to seize it. JCACR evaluates channel assignment by CSM, performs a local optimization by assigning each node a channel with the smaller CSM value, and changes the working channel dynamically when the channel is overloaded. Therefore, the network load balancing can be achieved. In addition, simulation shows that, when compared with the protocol of weighted cumulative expected transfer time (WCETT), the new protocol can improve the network throughput and reduce the end-to-end average delay with fewer overheads. 展开更多
关键词 Ad Hoc network multi-radio multi-channel channel assignment routing protocol channel utilization percentage.
下载PDF
Safety and effectiveness of butorphanol in epidural labor analgesia:A protocol for a systematic review and meta-analysis 被引量:1
4
作者 Guan-Cheng Tang Man He +1 位作者 Zhen-Zhao Huang Yan Cheng 《World Journal of Clinical Cases》 SCIE 2024年第8期1416-1421,共6页
BACKGROUND Epidural analgesia is the most effective analgesic method during labor.Butorphanol administered epidurally has been shown to be a successful analgesic method during labor.However,no comprehensive study has ... BACKGROUND Epidural analgesia is the most effective analgesic method during labor.Butorphanol administered epidurally has been shown to be a successful analgesic method during labor.However,no comprehensive study has examined the safety and efficacy of using butorphanol as an epidural analgesic during labor.AIM To assess butorphanol's safety and efficacy for epidural labor analgesia.METHODS The PubMed,Cochrane Library,EMBASE,Web of Science,China National Knowledge Infrastructure,and Google Scholar databases will be searched from inception.Other types of literature,such as conference abstracts and references to pertinent reviews,will also be reviewed.We will include randomized controlled trials comparing butorphanol with other opioids combined with local anesthetics for epidural analgesia during labor.There will be no language restrictions.The primary outcomes will include the visual analog scale score for the first stage of labor,fetal effects,and Apgar score.Two independent reviewers will evaluate the full texts,extract data,and assess the risk of bias.Publication bias will be evaluated using Egger's or Begg's tests as well as visual analysis of a funnel plot,and heterogeneity will be evaluated using the Cochran Q test,P values,and I2 values.Meta-analysis,subgroup analysis,and sensitivity analysis will be performed using RevMan software version 5.4.This protocol was developed in accordance with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)Protocols statement,and the PRISMA statement will be used for the systematic review.RESULTS This study provides reliable information regarding the safety and efficacy of using butorphanol as an epidural analgesic during labor.CONCLUSION To support clinical practice and development,this study provides evidence-based findings regarding the safety and efficacy of using butorphanol as an epidural analgesic during labor. 展开更多
关键词 Epidural analgesia during labor BUTORPHANOL SAFETY protocol META-ANALYSIS
下载PDF
Novel E2E-QoE Metric for PHY Optimization:A Cross-Layered Framework
5
作者 Lei Ji Hao Wang Hongxiang Xie 《China Communications》 SCIE CSCD 2023年第4期167-179,共13页
Existing systems use key performance indicators(KPIs)as metrics for physical layer(PHY)optimization,which suffers from the problem of overoptimization,because some unnecessary PHY enhancements are imperceptible to ter... Existing systems use key performance indicators(KPIs)as metrics for physical layer(PHY)optimization,which suffers from the problem of overoptimization,because some unnecessary PHY enhancements are imperceptible to terminal users and thus induce additional cost and energy waste.Therefore,it is necessary to utilize directly the quality of experience(QoE)of user as a metric of optimization,which can achieve the global optimum of QoE under cost and energy constraints.However,QoE is still a metric of application layer that cannot be easily used to design and optimize the PHY.To address this problem,we in this paper propose a novel end-to-end QoE(E2E-QoE)based optimization architecture at the user-side for the first time.Specifically,a cross-layer parameterized model is proposed to establish the relationship between PHY and E2E-QoE.Based on this,an E2E-QoE oriented PHY anomaly diagnosis method is further designed to locate the time and root cause of anomalies.Finally,we investigate to optimize the PHY algorithm directly based on the E2E-QoE.The proposed frameworks and algorithms are all validated using the data from real fifth-generation(5G)mobile system,which show that using E2E-QoE as the metric of PHY optimization is feasible and can outperform existing schemes. 展开更多
关键词 quality of experience(QoE) performance metric physical layer optimization cross-layer framework
下载PDF
Multi-Agent Deep Reinforcement Learning for Cross-Layer Scheduling in Mobile Ad-Hoc Networks
6
作者 Xinxing Zheng Yu Zhao +1 位作者 Joohyun Lee Wei Chen 《China Communications》 SCIE CSCD 2023年第8期78-88,共11页
Due to the fading characteristics of wireless channels and the burstiness of data traffic,how to deal with congestion in Ad-hoc networks with effective algorithms is still open and challenging.In this paper,we focus o... Due to the fading characteristics of wireless channels and the burstiness of data traffic,how to deal with congestion in Ad-hoc networks with effective algorithms is still open and challenging.In this paper,we focus on enabling congestion control to minimize network transmission delays through flexible power control.To effectively solve the congestion problem,we propose a distributed cross-layer scheduling algorithm,which is empowered by graph-based multi-agent deep reinforcement learning.The transmit power is adaptively adjusted in real-time by our algorithm based only on local information(i.e.,channel state information and queue length)and local communication(i.e.,information exchanged with neighbors).Moreover,the training complexity of the algorithm is low due to the regional cooperation based on the graph attention network.In the evaluation,we show that our algorithm can reduce the transmission delay of data flow under severe signal interference and drastically changing channel states,and demonstrate the adaptability and stability in different topologies.The method is general and can be extended to various types of topologies. 展开更多
关键词 Ad-hoc network cross-layer scheduling multi agent deep reinforcement learning interference elimination power control queue scheduling actorcritic methods markov decision process
下载PDF
Cell replacement with stem cell-derived retinal ganglion cells from different protocols 被引量:1
7
作者 Ziming Luo Kun-Che Chang 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第4期807-810,共4页
Glaucoma,characterized by a degenerative loss of retinal ganglion cells,is the second leading cause of blindness worldwide.There is currently no cure for vision loss in glaucoma because retinal ganglion cells do not r... Glaucoma,characterized by a degenerative loss of retinal ganglion cells,is the second leading cause of blindness worldwide.There is currently no cure for vision loss in glaucoma because retinal ganglion cells do not regenerate and are not replaced after injury.Human stem cell-derived retinal ganglion cell transplant is a potential therapeutic strategy for retinal ganglion cell degenerative diseases.In this review,we first discuss a 2D protocol for retinal ganglion cell differentiation from human stem cell culture,including a rapid protocol that can generate retinal ganglion cells in less than two weeks and focus on their transplantation outcomes.Next,we discuss using 3D retinal organoids for retinal ganglion cell transplantation,comparing cell suspensions and clusters.This review provides insight into current knowledge on human stem cell-derived retinal ganglion cell differentiation and transplantation,with an impact on the field of regenerative medicine and especially retinal ganglion cell degenerative diseases such as glaucoma and other optic neuropathies. 展开更多
关键词 cell clumps cell suspension cell transplantation DIFFERENTIATION direct-induced protocol GLAUCOMA optic neuropathy regenerative medicine retinal ganglion cell retinal organoids stem cells
下载PDF
Cross-Layer Design Based Optimized Link State Routing Protocol for Wireless Mesh Networks
8
作者 Huai-Yu Wen Guang-Chun Luo 《Journal of Electronic Science and Technology》 CAS 2011年第4期368-372,共5页
A proactive routing protocol CL-OLSR (cross-layer based optimized link state routing) by using a brand-new routing metric CLM (cross-layer metric) is proposed. CL-OLSR takes into account four link quality impact f... A proactive routing protocol CL-OLSR (cross-layer based optimized link state routing) by using a brand-new routing metric CLM (cross-layer metric) is proposed. CL-OLSR takes into account four link quality impact factors in route calculation through the cross-layer operation mechanism: the node available bandwidth, the node load, the link delivery rate, and the link interference, and thus the effect of route selection is optimized greatly. The simulation results show that the proposed CL-OLSR protocol can not only improve the network throughput to a large extent, but also reduce the end-to-end delay, while achieving load balance route results. 展开更多
关键词 cross-layer design proactive routing routing protocol wireless mesh network.
下载PDF
Corneal collagen cross-linking in patients with keratoconus from the Dresden protocol to customized solutions:theoretical basis
9
作者 Ciro Caruso Luca D’Andrea +4 位作者 Mario Troisi Michele Rinaldi Raffaele Piscopo Salvatore Troisi Ciro Costagliola 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2024年第5期951-962,共12页
Keratoconus is an ectatic condition characterized by gradual corneal thinning,corneal protrusion,progressive irregular astigmatism,corneal fibrosis,and visual impairment.The therapeutic options regarding improvement o... Keratoconus is an ectatic condition characterized by gradual corneal thinning,corneal protrusion,progressive irregular astigmatism,corneal fibrosis,and visual impairment.The therapeutic options regarding improvement of visual function include glasses or soft contact lenses correction for initial stages,gas-permeable rigid contact lenses,scleral lenses,implantation of intrastromal corneal ring or corneal transplants for most advanced stages.In keratoconus cases showing disease progression corneal collagen crosslinking(CXL)has been proven to be an effective,minimally invasive and safe procedure.CXL consists of a photochemical reaction of corneal collagen by riboflavin stimulation with ultraviolet A radiation,resulting in stromal crosslinks formation.The aim of this review is to carry out an examination of CXL methods based on theoretical basis and mathematical models,from the original Dresden protocol to the most recent developments in the technique,reporting the changes proposed in the last 15y and examining the advantages and disadvantages of the various treatment protocols.Finally,the limits of non-standardized methods and the perspectives offered by a customization of the treatment are highlighted. 展开更多
关键词 corneal collagen cross linking KERATOCONUS custom fast protocol Dresden protocol lambert-beer law Bunsen-roscoe law
下载PDF
Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies
10
作者 Waseem Akram Khalid Mahmood +3 位作者 Hafiz Burhan ul Haq Muhammad Asif Shehzad Ashraf Chaudhry Taeshik Shon 《Computers, Materials & Continua》 SCIE EI 2024年第7期263-280,共18页
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the Internet.HTTP cookie... Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the Internet.HTTP cookies are exploited to carry client patterns observed by a website.These client patterns facilitate the particular client’s future visit to the corresponding website.However,security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the browser.Several protocols have been introduced that maintain HTTP cookies,but many of those fail to achieve the required security,or require a lot of resource overheads.In this article,we have introduced a lightweight Elliptic Curve Cryptographic(ECC)based protocol for authenticating client and server transactions to maintain the privacy and security of HTTP cookies.Our proposed protocol uses a secret key embedded within a cookie.The proposed protocol ismore efficient and lightweight than related protocols because of its reduced computation,storage,and communication costs.Moreover,the analysis presented in this paper confirms that proposed protocol resists various known attacks. 展开更多
关键词 COOKIES authentication protocol impersonation attack ECC
下载PDF
Enhancing Network Design through Statistical Evaluation of MANET Routing Protocols
11
作者 Ibrahim Alameri Tawfik Al-Hadhrami +2 位作者 Anjum Nazir Abdulsamad Ebrahim Yahya Atef Gharbi 《Computers, Materials & Continua》 SCIE EI 2024年第7期319-339,共21页
This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network(MANET)routing protocols:Destination Sequenced Distance Vector(DSDV),Ad hoc... This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network(MANET)routing protocols:Destination Sequenced Distance Vector(DSDV),Ad hoc On-Demand Distance Vector(AODV),Dynamic Source Routing(DSR),and Zone Routing Protocol(ZRP).In this paper,the evaluation will be carried out using complete sets of statistical tests such as Kruskal-Wallis,Mann-Whitney,and Friedman.It articulates a systematic evaluation of how the performance of the previous protocols varies with the number of nodes and the mobility patterns.The study is premised upon the Quality of Service(QoS)metrics of throughput,packet delivery ratio,and end-to-end delay to gain an adequate understanding of the operational efficiency of each protocol under different network scenarios.The findings explained significant differences in the performance of different routing protocols;as a result,decisions for the selection and optimization of routing protocols can be taken effectively according to different network requirements.This paper is a step forward in the general understanding of the routing dynamics of MANETs and contributes significantly to the strategic deployment of robust and efficient network infrastructures. 展开更多
关键词 Routing protocols statistical approach friedman MANET
下载PDF
An efficient cross-layer buffer management optimization scheme for 5G protocol stack
12
作者 YANG Xining ZHOU Yiqing CHEN Yang 《High Technology Letters》 EI CAS 2022年第4期384-391,共8页
It is extremely challenging for the 5G User Equipment(UE)to meet the requirement of low-latency data transmission with higher achievable data rates.And user plane processing of 5G protocol stack(PS)is one of the domin... It is extremely challenging for the 5G User Equipment(UE)to meet the requirement of low-latency data transmission with higher achievable data rates.And user plane processing of 5G protocol stack(PS)is one of the dominating components for end-to-end data transmission in the network system.In this paper,a cross-layer buffer management scheme(CLBM)is proposed.CLBM adopts a zero-copy technique for protocol data unit(PDU)processing between protocol layers and allows to improve the memory operation efficiency significantly with reduced processing latency and CPU usage.Moreover,the PS performance profiling(PSperf)tool,a general evaluation framework for the performance measurement and analysis of PS,is implemented based on the OpenAirInterface(OAI)5G platform.The evaluation result shows that compared with the PS of OAI the CLBM strategy reduces the CPU usage of RLC,PDCP,and MAC layer processing significantly up to 20.6%,63.4%,and 38.8%,respectively.In result,the processing delay of the whole user plane of PS also has been reduced distinctly at various offered traffic load. 展开更多
关键词 cross-layer optimization 5G protocol stack evaluation framework OpenAirInterface(OAI)
下载PDF
Designing Proportional-Integral Consensus Protocols for Second-Order Multi-Agent Systems Using Delayed and Memorized State Information
13
作者 Honghai Wang Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期878-892,共15页
This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consens... This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consensus protocol is designed by using delayed and memorized state information.Under the proportional-integral consensus protocol,the consensus problem of the multi-agent system is transformed into the problem of asymptotic stability of the corresponding linear time-invariant time-delay system.Note that the location of the eigenvalues of the corresponding characteristic function of the linear time-invariant time-delay system not only determines the stability of the system,but also plays a critical role in the dynamic performance of the system.In this paper,based on recent results on the distribution of roots of quasi-polynomials,several necessary conditions for Hurwitz stability for a class of quasi-polynomials are first derived.Then allowable regions of consensus protocol parameters are estimated.Some necessary and sufficient conditions for determining effective protocol parameters are provided.The designed protocol can achieve consensus and improve the dynamic performance of the second-order multi-agent system.Moreover,the effects of delays on consensus of systems of harmonic oscillators/double integrators under proportional-integral consensus protocols are investigated.Furthermore,some results on proportional-integral consensus are derived for a class of high-order linear time-invariant multi-agent systems. 展开更多
关键词 Consensus protocol Hurwitz stability multi-agent systems quasi-polynomials time delay
下载PDF
A Formal Model for Analyzing Fair Exchange Protocols Based on Event Logic
14
作者 Ke Yang Meihua Xiao Zehuan Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2641-2663,共23页
Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and elec... Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and electronic contract signing,ensuring the reliability and security of network transactions.In order to address the limitations of current research methods and enhance the analytical capabilities for fair exchange protocols,this paper proposes a formal model for analyzing such protocols.The proposed model begins with a thorough analysis of fair exchange protocols,followed by the formal definition of fairness.This definition accurately captures the inherent requirements of fair exchange protocols.Building upon event logic,the model incorporates the time factor into predicates and introduces knowledge set axioms.This enhancement empowers the improved logic to effectively describe the state and knowledge of protocol participants at different time points,facilitating reasoning about their acquired knowledge.To maximize the intruder’s capabilities,channel errors are translated into the behaviors of the intruder.The participants are further categorized into honest participants and malicious participants,enabling a comprehensive evaluation of the intruder’s potential impact.By employing a typical fair exchange protocol as an illustrative example,this paper demonstrates the detailed steps of utilizing the proposed model for protocol analysis.The entire process of protocol execution under attack scenarios is presented,shedding light on the underlying reasons for the attacks and proposing corresponding countermeasures.The developedmodel enhances the ability to reason about and evaluate the security properties of fair exchange protocols,thereby contributing to the advancement of secure network transactions. 展开更多
关键词 Fair exchange protocols FAIRNESS formal analysis logic reasoning
下载PDF
Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks
15
作者 Youseef Alotaibi B.Rajasekar +1 位作者 R.Jayalakshmi Surendran Rajendran 《Computers, Materials & Continua》 SCIE EI 2024年第3期4243-4262,共20页
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effect... Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods. 展开更多
关键词 Vehicular networks communication protocol CLUSTERING falcon optimization algorithm ROUTING
下载PDF
Hyperbolic Tangent Function-Based Protocols for Global/Semi-Global Finite-Time Consensus of Multi-Agent Systems
16
作者 Zongyu Zuo Jingchuan Tang +1 位作者 Ruiqi Ke Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第6期1381-1397,共17页
This paper investigates the problem of global/semi-global finite-time consensus for integrator-type multi-agent sys-tems.New hyperbolic tangent function-based protocols are pro-posed to achieve global and semi-global ... This paper investigates the problem of global/semi-global finite-time consensus for integrator-type multi-agent sys-tems.New hyperbolic tangent function-based protocols are pro-posed to achieve global and semi-global finite-time consensus for both single-integrator and double-integrator multi-agent systems with leaderless undirected and leader-following directed commu-nication topologies.These new protocols not only provide an explicit upper-bound estimate for the settling time,but also have a user-prescribed bounded control level.In addition,compared to some existing results based on the saturation function,the pro-posed approach considerably simplifies the protocol design and the stability analysis.Illustrative examples and an application demonstrate the effectiveness of the proposed protocols. 展开更多
关键词 Consensus protocol finite-time consensus hyper-bolic tangent function multi-agent systems.
下载PDF
Protocol for lower back pain management: Insights from the French healthcare system
17
作者 Lea Evangeline Boyer Mathieu Boudier-Revéret Min Cheol Chang 《World Journal of Clinical Cases》 SCIE 2024年第11期1875-1880,共6页
In this editorial we comment on the article published in a recent issue of the World Journal of Clinical Cases.This article described a novel ultrasound-guided lateral recess block approach in treating a patient with ... In this editorial we comment on the article published in a recent issue of the World Journal of Clinical Cases.This article described a novel ultrasound-guided lateral recess block approach in treating a patient with lateral recess stenosis.The impact of spinal pain-related disability extends significantly,causing substantial human suffering and medical costs.Each county has its preferred treatment strategies for spinal pain.Here,we explore the lower back pain(LBP)treatment algorithm recommended in France.The treatment algorithm for LBP recommended by the French National Authority for Health emphasizes early patient activity and minimal medication use.It encourages the continuation of daily activities,limits excessive medication and spinal injections,and incorporates psychological assessments and non-pharmacological therapies for chronic cases.However,the algorithm may not aggressively address acute pain in the early stages,potentially delaying relief and increasing the risk of chronicity.Additionally,the recommended infiltrations primarily involve caudal epidural steroid injections,with limited consideration for other injection procedures,such as transforaminal or interlaminar epidural steroid injections.The fixed follow-up timeline may not accommodate patients who do not respond to initial treatment or experience intense pain,potentially delaying the exploration of alternative therapies.Despite these limitations,understanding the strengths and weaknesses of the French approach could inform adaptations in LBP treatment strategies globally,potentially enhancing patient outcomes and satisfaction across diverse healthcare systems. 展开更多
关键词 Lower back pain protocol FRANCE TREATMENT Chronic pain
下载PDF
A Multi-Token Sector Antenna Neighbor Discovery Protocol for Directional Ad Hoc Networks
18
作者 Zhang Hang Li Bo +2 位作者 Yan Zhongjiang Yang Mao Li Xinru 《China Communications》 SCIE CSCD 2024年第7期149-168,共20页
In this paper,we propose a Multi-token Sector Antenna Neighbor Discovery(M-SAND)protocol to enhance the efficiency of neighbor discovery in asynchronous directional ad hoc networks.The central concept of our work invo... In this paper,we propose a Multi-token Sector Antenna Neighbor Discovery(M-SAND)protocol to enhance the efficiency of neighbor discovery in asynchronous directional ad hoc networks.The central concept of our work involves maintaining multiple tokens across the network.To prevent mutual interference among multi-token holders,we introduce the time and space non-interference theorems.Furthermore,we propose a master-slave strategy between tokens.When the master token holder(MTH)performs the neighbor discovery,it decides which 1-hop neighbor is the next MTH and which 2-hop neighbors can be the new slave token holders(STHs).Using this approach,the MTH and multiple STHs can simultaneously discover their neighbors without causing interference with each other.Building on this foundation,we provide a comprehensive procedure for the M-SAND protocol.We also conduct theoretical analyses on the maximum number of STHs and the lower bound of multi-token generation probability.Finally,simulation results demonstrate the time efficiency of the M-SAND protocol.When compared to the QSAND protocol,which uses only one token,the total neighbor discovery time is reduced by 28% when 6beams and 112 nodes are employed. 展开更多
关键词 multi-token neighbor discovery SAND protocol sector antenna ad hoc network
下载PDF
Distributed Fault Estimation for Nonlinear Systems With Sensor Saturation and Deception Attacks Using Stochastic Communication Protocols
19
作者 Weiwei Sun Xinci Gao +1 位作者 Lusong Ding Xiangyu Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第8期1865-1876,共12页
This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimati... This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimation structure under consideration,an estimation center is not necessary,and the estimator derives its information from itself and neighboring nodes,which fuses the state vector and the measurement vector.In an effort to cut down data conflicts in communication networks,the stochastic communication protocol(SCP)is employed so that the output signals from sensors can be selected.Additionally,a recursive security estimator scheme is created since attackers randomly inject malicious signals into the selected data.On this basis,sufficient conditions for a fault estimator with less conservatism are presented which ensure an upper bound of the estimation error covariance and the mean-square exponential boundedness of the estimating error.Finally,a numerical example is used to show the reliability and effectiveness of the considered distributed estimation algorithm. 展开更多
关键词 Actuator fault deception attacks distributed estimation sensor saturation stochastic communication protocol(SCP).
下载PDF
Exploration of standard dosage for GnRH antagonist protocol and dosage adjustments after premature luteinizing hormone surge
20
作者 HAN Zhong-yi WU Ting-ting MA Yan-lin 《Journal of Hainan Medical University》 CAS 2024年第3期74-78,共5页
The gonadotropin-releasing hormone (GnRH) antagonist protocol has emerged as an efficacious alternative to the GnRH agonist protocol for controlled ovarian hyperstimulation (COH) during in vitro fertilization (IVF) cy... The gonadotropin-releasing hormone (GnRH) antagonist protocol has emerged as an efficacious alternative to the GnRH agonist protocol for controlled ovarian hyperstimulation (COH) during in vitro fertilization (IVF) cycles, and has been demonstrated applicability in infertile female patients with diverse ovarian responses. While the clinical implementation of the antagonist COH protocol has achieved widespread consensus, opportunities for refinement persist. Therefore, this review article focuses on the advantages and disadvantages of GnRH antagonist protocol, the selection of optimal standard doses, and the strategies for adjusting antagonist doses after the premature luteinizing hormone (LH) surge, aiming to provide more reasonable and scientific recommendations for the application of this scheme. 展开更多
关键词 GnRH antagonist protocol Optimal dosage Premature LH surge
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部