期刊文献+
共找到39,166篇文章
< 1 2 250 >
每页显示 20 50 100
Improving nursing care protocols for diabetic patients through a systematic review and meta-analysis of recent years
1
作者 Mónica Grande-Alonso María Barbado García +2 位作者 Soledad Cristóbal-Aguado Soledad Aguado-Henche Rafael Moreno-Gómez-Toledano 《World Journal of Diabetes》 2025年第2期257-269,共13页
BACKGROUND Diabetes mellitus has become one of the major pandemics of the 21st century.In this scenario,nursing interventions are essential for improving self-care and quality of life in patients with type 2 diabetes ... BACKGROUND Diabetes mellitus has become one of the major pandemics of the 21st century.In this scenario,nursing interventions are essential for improving self-care and quality of life in patients with type 2 diabetes mellitus.Nursing interventions are crucial for managing the disease and preventing complications.AIM To analyse nursing interventions in recent years through a systematic review and meta-analysis and to propose improvements in care plans.METHODS This study conducted a systematic review and meta-analysis of the impact of nursing interventions on quantitative glycaemic variables,such as glycated haemoglobin and fasting plasma glucose.RESULTS After confirming that the combined effect of all studies from the past 5 years positively impacts quantitative variables,a descriptive analysis of the studies with the most significant changes was conducted.Based on this,an improvement in diabetic patient care protocols has been proposed through follow-up plans tailored to the patient’s technological skills.CONCLUSION The combined results obtained and the proposal for improvement developed in this manuscript could help to improve the quality of life of many people around the world. 展开更多
关键词 Diabetes mellitus Nursing interventions Systematic review META-ANALYSIS protocol enhancement proposal
下载PDF
基于Paddle Lite的太湖莼菜检测测试平台设计
2
作者 陶杰 陈啟源 朱恒通 《电子制作》 2024年第3期66-69,共4页
本文根据太湖莼菜种植槽中图像检测系统的试验需求,设计检测系统。由EasyDL平台采用PaddlePaddle框架训练出图像检测模型,采用Andriod平板上运行检测模型,并通过WiFi发送操制指令至运动控制终端。采用Arduino控制步进驱动器,调整摄像头... 本文根据太湖莼菜种植槽中图像检测系统的试验需求,设计检测系统。由EasyDL平台采用PaddlePaddle框架训练出图像检测模型,采用Andriod平板上运行检测模型,并通过WiFi发送操制指令至运动控制终端。采用Arduino控制步进驱动器,调整摄像头位置,实现检测目标的中心定位要求。根据手动、自动运动控制要求,设计上层通信协议。运动控制终端轮询串口接收指令,判断电机的运动状况,定时中断子程序实现步进驱动器引脚上的电平状况。 展开更多
关键词 Paddle lite 太湖莼菜 图像检测 ARDUINO Andriod
下载PDF
基于改进D*Lite⁃APF算法的巡检机器人路径规划 被引量:3
3
作者 胡粒琪 曾维 +3 位作者 陈才华 张鹏 王艺儒 李铜 《现代电子技术》 北大核心 2024年第5期155-159,共5页
针对巡检机器人在动态场景下路径规划存在非全局最优、路径不平滑及局部避障效果不佳的问题,提出一种将改进D*Lite算法和人工势场法融合的算法。首先优化D*Lite算法启发代价函数,提升规划效率,并引入Dubins曲线平滑生成的全局路径;其次... 针对巡检机器人在动态场景下路径规划存在非全局最优、路径不平滑及局部避障效果不佳的问题,提出一种将改进D*Lite算法和人工势场法融合的算法。首先优化D*Lite算法启发代价函数,提升规划效率,并引入Dubins曲线平滑生成的全局路径;其次改进人工势场法势场函数并添加随机半径扰动点,解决局部碰撞问题,提高避障性能;最后将两种优化算法有效融合,实现全局规划和局部避障。仿真实验结果表明,相较于单一D*Lite算法,融合算法在路径长度、时间花销、路径拐点及扩展节点数方面均表现更优,能在确保全局路径最优的情况下有效避障。 展开更多
关键词 巡检机器人 路径规划 D*lite Dubins曲线 人工势场法 避障
下载PDF
Performance Analysis of MAC Protocol for LEO Satellite Networks 被引量:1
4
作者 Mingxiang GUAN Ruichun WANG 《International Journal of Communications, Network and System Sciences》 2009年第8期786-791,共6页
Considering that weak channel collision detection ability, long propagation delay and heavy load in LEO satellite communications, a valid adaptive APRMA MAC protocol was proposed. Different access probability function... Considering that weak channel collision detection ability, long propagation delay and heavy load in LEO satellite communications, a valid adaptive APRMA MAC protocol was proposed. Different access probability functions for different services were obtained and appropriate access probabilities for voice and data users were updated slot by slot based on the estimation of the voice traffic and the channel status. In the proposed MAC protocol limited wireless resource is allocated reasonably by multiple users and high capacity was achieved. Three performance parameters: voice packet loss probability, average delay of data packets and throughput of data packets were considered in simulation. Finally simulation results demonstrated that the performance of system was improved by the APRMA compared with the conventional PRMA, with an acceptable trade-off between QoS of voice and delay of data. 展开更多
关键词 LEO SATELliteS Adaptive PACKET RESERVATION Multiple Access MAC protocol
下载PDF
Safety and effectiveness of butorphanol in epidural labor analgesia:A protocol for a systematic review and meta-analysis 被引量:3
5
作者 Guan-Cheng Tang Man He +1 位作者 Zhen-Zhao Huang Yan Cheng 《World Journal of Clinical Cases》 SCIE 2024年第8期1416-1421,共6页
BACKGROUND Epidural analgesia is the most effective analgesic method during labor.Butorphanol administered epidurally has been shown to be a successful analgesic method during labor.However,no comprehensive study has ... BACKGROUND Epidural analgesia is the most effective analgesic method during labor.Butorphanol administered epidurally has been shown to be a successful analgesic method during labor.However,no comprehensive study has examined the safety and efficacy of using butorphanol as an epidural analgesic during labor.AIM To assess butorphanol's safety and efficacy for epidural labor analgesia.METHODS The PubMed,Cochrane Library,EMBASE,Web of Science,China National Knowledge Infrastructure,and Google Scholar databases will be searched from inception.Other types of literature,such as conference abstracts and references to pertinent reviews,will also be reviewed.We will include randomized controlled trials comparing butorphanol with other opioids combined with local anesthetics for epidural analgesia during labor.There will be no language restrictions.The primary outcomes will include the visual analog scale score for the first stage of labor,fetal effects,and Apgar score.Two independent reviewers will evaluate the full texts,extract data,and assess the risk of bias.Publication bias will be evaluated using Egger's or Begg's tests as well as visual analysis of a funnel plot,and heterogeneity will be evaluated using the Cochran Q test,P values,and I2 values.Meta-analysis,subgroup analysis,and sensitivity analysis will be performed using RevMan software version 5.4.This protocol was developed in accordance with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)Protocols statement,and the PRISMA statement will be used for the systematic review.RESULTS This study provides reliable information regarding the safety and efficacy of using butorphanol as an epidural analgesic during labor.CONCLUSION To support clinical practice and development,this study provides evidence-based findings regarding the safety and efficacy of using butorphanol as an epidural analgesic during labor. 展开更多
关键词 Epidural analgesia during labor BUTORPHANOL SAFETY protocol META-ANALYSIS
下载PDF
Corneal collagen cross-linking in patients with keratoconus from the Dresden protocol to customized solutions:theoretical basis 被引量:1
6
作者 Ciro Caruso Luca D’Andrea +4 位作者 Mario Troisi Michele Rinaldi Raffaele Piscopo Salvatore Troisi Ciro Costagliola 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2024年第5期951-962,共12页
Keratoconus is an ectatic condition characterized by gradual corneal thinning,corneal protrusion,progressive irregular astigmatism,corneal fibrosis,and visual impairment.The therapeutic options regarding improvement o... Keratoconus is an ectatic condition characterized by gradual corneal thinning,corneal protrusion,progressive irregular astigmatism,corneal fibrosis,and visual impairment.The therapeutic options regarding improvement of visual function include glasses or soft contact lenses correction for initial stages,gas-permeable rigid contact lenses,scleral lenses,implantation of intrastromal corneal ring or corneal transplants for most advanced stages.In keratoconus cases showing disease progression corneal collagen crosslinking(CXL)has been proven to be an effective,minimally invasive and safe procedure.CXL consists of a photochemical reaction of corneal collagen by riboflavin stimulation with ultraviolet A radiation,resulting in stromal crosslinks formation.The aim of this review is to carry out an examination of CXL methods based on theoretical basis and mathematical models,from the original Dresden protocol to the most recent developments in the technique,reporting the changes proposed in the last 15y and examining the advantages and disadvantages of the various treatment protocols.Finally,the limits of non-standardized methods and the perspectives offered by a customization of the treatment are highlighted. 展开更多
关键词 corneal collagen cross linking KERATOCONUS custom fast protocol Dresden protocol lambert-beer law Bunsen-roscoe law
下载PDF
Topology and Position Aware Overlay Network Construction Protocol for Augmentation Information of Satellite Navigation System
7
作者 赵军 《China Communications》 SCIE CSCD 2011年第3期23-31,共9页
It is an effective method to broadcast the augmentation information of satellite navigation system using GEO technology.However,it becomes difficult to receive GEO signal in some special situation,for example in citie... It is an effective method to broadcast the augmentation information of satellite navigation system using GEO technology.However,it becomes difficult to receive GEO signal in some special situation,for example in cities or canyons,in which the signal will be sheltered by big buildings or mountains.In order to solve this problem,an Internet-based broadcast network has been proposed to utilize the infrastructure of the Internet to broadcast the augmentation information of satellite navigation system,which is based on application-layer multicast protocols.In this paper,a topology and position aware overlay network construction protocol is proposed to build the network for augmentation information of satellite navigation system.Simulation results show that the new algorithm is able to achieve better performance in terms of delay,depth and degree utilization. 展开更多
关键词 augmentation information of satellite navigation system BROADCAST Internet-based application-layer multicast protocol topology and position aware
下载PDF
Lite Touch铒激光辅助治疗慢性牙周炎伴2型糖尿病的效果观察
8
作者 吉俊盈 刘焱 +2 位作者 任强 陈青宇 仲琳 《中外医药研究》 2024年第1期45-47,共3页
目的:研究Lite Touch铒激光辅助治疗慢性牙周炎伴2型糖尿病的效果。方法:选取2021年1月—2022年12月内蒙古科技大学包头医学院第一附属医院口腔科收治的慢性牙周炎伴2型糖尿病患者60例患者作为研究对象,随机分为试验组与对照组,各30例... 目的:研究Lite Touch铒激光辅助治疗慢性牙周炎伴2型糖尿病的效果。方法:选取2021年1月—2022年12月内蒙古科技大学包头医学院第一附属医院口腔科收治的慢性牙周炎伴2型糖尿病患者60例患者作为研究对象,随机分为试验组与对照组,各30例。对照组进行牙周基础治疗,试验组在对照组基础上进行Lite Touch铒激光辅助治疗。比较两组牙周临床指标。结果:治疗前,两组菌斑指数(PLI)、探诊深度(PD)、附着丧失(CAL)及出血指数(BI)比较,差异无统计学意义(P>0.05);治疗后1、3个月,试验组PD、BI低于对照组,差异有统计学意义(P<0.05);治疗后1、3个月,两组PLI与CAL比较,差异无统计学意义(P>0.05);治疗后6个月,两组PLI比较,差异无统计学意义(P>0.05);治疗后6个月,试验组PD、CAL与BI低于对照组,差异有统计学意义(P<0.05)。结论:Lite Touch铒激光辅助治疗慢性牙周炎伴2型糖尿病的效果较好,能够优化牙周临床指标。 展开更多
关键词 lite Touch铒激光 2型糖尿病 慢性牙周炎
下载PDF
Novel satellite transport protocol with on-board spoofing proxy
9
作者 Liu Jiong Cao Zhigang Wang Jinglin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第3期513-520,共8页
As a result of the exponential growing rate of worldwide Internet usage, satellite systems are required to support broadband Internet applications. The transmission control protocol (TCP) which is widely used in the... As a result of the exponential growing rate of worldwide Internet usage, satellite systems are required to support broadband Internet applications. The transmission control protocol (TCP) which is widely used in the Internet, performs very well on wired networks. However, in the case of satellite channels, clue to the delay and transmission errors, TCP performance degrades significantly and bandwidth of satellite links can not be fully utilized. To improve the TCP performance, a new idea of placing a TCP spoofing proxy in the satellite is considered. A Novel Satellite Transport Protocol (NSTP) which takes advantage of the special properties of the satellite channel is also proposed. By using simulation, as compared with traditional TCPs, the on-board spoofing proxy integrated with the special transport protocol can significantly enhance throughput performance on the high BER satellite link, the time needed to transfer files and the bandwidth used in reverse path are sharply reduced. 展开更多
关键词 satellite communication on-board spoofing proxy novel satellite transport protocol (NSTP) modified SACK (M-SACK) TCP ground station (GS).
下载PDF
Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks 被引量:1
10
作者 Youseef Alotaibi B.Rajasekar +1 位作者 R.Jayalakshmi Surendran Rajendran 《Computers, Materials & Continua》 SCIE EI 2024年第3期4243-4262,共20页
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effect... Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods. 展开更多
关键词 Vehicular networks communication protocol CLUSTERING falcon optimization algorithm ROUTING
下载PDF
Unknown Application Layer Protocol Recognition Method Based on Deep Clustering 被引量:1
11
作者 Wu Jisheng Hong Zheng +1 位作者 Ma Tiantian Si Jianpeng 《China Communications》 SCIE CSCD 2024年第12期275-296,共22页
In recent years,many unknown protocols are constantly emerging,and they bring severe challenges to network security and network management.Existing unknown protocol recognition methods suffer from weak feature extract... In recent years,many unknown protocols are constantly emerging,and they bring severe challenges to network security and network management.Existing unknown protocol recognition methods suffer from weak feature extraction ability,and they cannot mine the discriminating features of the protocol data thoroughly.To address the issue,we propose an unknown application layer protocol recognition method based on deep clustering.Deep clustering which consists of the deep neural network and the clustering algorithm can automatically extract the features of the input and cluster the data based on the extracted features.Compared with the traditional clustering methods,deep clustering boasts of higher clustering accuracy.The proposed method utilizes network-in-network(NIN),channel attention,spatial attention and Bidirectional Long Short-term memory(BLSTM)to construct an autoencoder to extract the spatial-temporal features of the protocol data,and utilizes the unsupervised clustering algorithm to recognize the unknown protocols based on the features.The method firstly extracts the application layer protocol data from the network traffic and transforms the data into one-dimensional matrix.Secondly,the autoencoder is pretrained,and the protocol data is compressed into low dimensional latent space by the autoencoder and the initial clustering is performed with K-Means.Finally,the clustering loss is calculated and the classification model is optimized according to the clustering loss.The classification results can be obtained when the classification model is optimal.Compared with the existing unknown protocol recognition methods,the proposed method utilizes deep clustering to cluster the unknown protocols,and it can mine the key features of the protocol data and recognize the unknown protocols accurately.Experimental results show that the proposed method can effectively recognize the unknown protocols,and its performance is better than other methods. 展开更多
关键词 attention mechanism clustering loss deep clustering network traffic unknown protocol recognition
下载PDF
Robust Authentication and Session Key Agreement Protocol for Satellite Communications
12
作者 Somayeh Soltani Seyed Amin Hosseini Seno +1 位作者 Juli Rejito Rahmat Budiarto 《Computers, Materials & Continua》 SCIE EI 2022年第6期5891-5910,共20页
Satellite networks are recognized as the most essential communication infrastructures in the world today,which complement land networks and provide valuable services for their users.Extensive coverage and service stab... Satellite networks are recognized as the most essential communication infrastructures in the world today,which complement land networks and provide valuable services for their users.Extensive coverage and service stability of these networks have increased their popularity.Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks,securing satellite communications is vital.So far,several protocols have been proposed for authentication and key exchange of satellite communications,but none of them fullymeet the security requirements.In this paper,we examine one of these protocols and identify its security vulnerabilities.Moreover,we propose a robust and secure authentication and session key agreement protocol using the elliptic curve cryptography(ECC).We show that the proposed protocol meets common security requirements and is resistant to known security attacks.Moreover,we prove that the proposed scheme satisfies the security features using the Automated Validation of Internet Security Protocols and Applications(AVISPA)formal verification tool and On-the fly Model-Checker(OFMC)and ATtack SEarcher(ATSE)model checkers.We have also proved the security of the session key exchange of our protocol using theReal orRandom(RoR)model.Finally,the comparison of our scheme with similar methods shows its superiority. 展开更多
关键词 Satellite communications AUTHENTICATION session key agreement secure communication security protocols formal verification
下载PDF
Cell replacement with stem cell-derived retinal ganglion cells from different protocols 被引量:1
13
作者 Ziming Luo Kun-Che Chang 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第4期807-810,共4页
Glaucoma,characterized by a degenerative loss of retinal ganglion cells,is the second leading cause of blindness worldwide.There is currently no cure for vision loss in glaucoma because retinal ganglion cells do not r... Glaucoma,characterized by a degenerative loss of retinal ganglion cells,is the second leading cause of blindness worldwide.There is currently no cure for vision loss in glaucoma because retinal ganglion cells do not regenerate and are not replaced after injury.Human stem cell-derived retinal ganglion cell transplant is a potential therapeutic strategy for retinal ganglion cell degenerative diseases.In this review,we first discuss a 2D protocol for retinal ganglion cell differentiation from human stem cell culture,including a rapid protocol that can generate retinal ganglion cells in less than two weeks and focus on their transplantation outcomes.Next,we discuss using 3D retinal organoids for retinal ganglion cell transplantation,comparing cell suspensions and clusters.This review provides insight into current knowledge on human stem cell-derived retinal ganglion cell differentiation and transplantation,with an impact on the field of regenerative medicine and especially retinal ganglion cell degenerative diseases such as glaucoma and other optic neuropathies. 展开更多
关键词 cell clumps cell suspension cell transplantation DIFFERENTIATION direct-induced protocol GLAUCOMA optic neuropathy regenerative medicine retinal ganglion cell retinal organoids stem cells
下载PDF
Home Monitoring of Estrone-3-Glucuronide (E1-3G) Levels in Two Different Ovarian Stimulation Protocols: A Pilot Study
14
作者 Iavor K. Vladimirov Desislava Tacheva +2 位作者 Evan Gatev Magdalena Rangelova Martin Vladimirov 《Open Journal of Obstetrics and Gynecology》 2024年第10期1640-1656,共17页
Background: Studies have shown a strong correlation between the growth of E2 in serum and estrone-3-glucuronide (E1-3G) in urine during ovarian stimulation. Thus, we developed theoretical models for using urinary E1-3... Background: Studies have shown a strong correlation between the growth of E2 in serum and estrone-3-glucuronide (E1-3G) in urine during ovarian stimulation. Thus, we developed theoretical models for using urinary E1-3G in ovarian stimulation and focused on their experimental verification and analysis. Methods: A prospective, observational pilot study was conducted involving 54 patients who underwent 54 cycles of ovarian stimulation. The goal was to establish the growth rate of urinary E1-3G during the course of stimulation and to determine the daily upper and lower limits of growth rates at which stimulation is appropriate and safe. Controlled ovarian stimulation was performed using two different stimulation protocols—an antagonist protocol in 25 cases and a progestin-primed ovarian stimulation protocol (PPOS) in 29 cases, with fixed doses of gonadotropins. From the second day of stimulation, patients self-measured their daily urine E1-3G levels at home using a portable analyzer. In parallel, a standard ultrasound follow-up protocol accompanied by a determination of E2, LH, and P levels was applied to optimally control stimulation. Results: The average daily growth rates in both groups were about 50%. The daily increase in E1-3G for the antagonist protocol ranged from 14% to 79%, while they were 28% to 79% for the PPOS protocol. Conclusion: This is the first study to analyze the dynamics of E1-3G in two different protocols and to estimate the limits of its increase during the entire course of the stimulation. The results confirm our theoretical model for the viability of using urinary E1-3G for monitoring ovarian stimulation. 展开更多
关键词 Ovarian Stimulation Monitoring E1-3G Antagonist protocol PPOS protocol IVF ART
下载PDF
D^(∗)Lite算法在商场机器人导航中的应用
15
作者 黄旭 唐陈宇 曾孟佳 《计算机与网络》 2024年第2期136-143,共8页
机器人室内导航在医院、场馆、商场等大型室内环境中有着重要的作用,正确的路径规划是机器人室内导航有效的重要保证,指的是从起点位置开始,根据某种策略,寻找一条满足条件的到达终点位置的最优路径。D^(∗)Lite算法是路径搜索算法中的... 机器人室内导航在医院、场馆、商场等大型室内环境中有着重要的作用,正确的路径规划是机器人室内导航有效的重要保证,指的是从起点位置开始,根据某种策略,寻找一条满足条件的到达终点位置的最优路径。D^(∗)Lite算法是路径搜索算法中的一种重要算法,可在信息不全情况下求解路径,适合应用于商场及其他复杂环境。对D^(∗)Lite算法在商场机器人导航中的应用进行了分析研究。仿真模拟实验中通过对三维商场场景进行栅格化,将三维场景渲染到二维平面,再通过对二维平面中的场景随机变化障碍点来检验D^(∗)Lite算法对变化场景的适应度。实验结果表明,D^(∗)Lite算法能快速求解最优路径,并在阻碍点变化时做出快速响应。 展开更多
关键词 路径规划 D^(∗)lite 栅格化
下载PDF
Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies
16
作者 Waseem Akram Khalid Mahmood +3 位作者 Hafiz Burhan ul Haq Muhammad Asif Shehzad Ashraf Chaudhry Taeshik Shon 《Computers, Materials & Continua》 SCIE EI 2024年第7期263-280,共18页
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the Internet.HTTP cookie... Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the Internet.HTTP cookies are exploited to carry client patterns observed by a website.These client patterns facilitate the particular client’s future visit to the corresponding website.However,security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the browser.Several protocols have been introduced that maintain HTTP cookies,but many of those fail to achieve the required security,or require a lot of resource overheads.In this article,we have introduced a lightweight Elliptic Curve Cryptographic(ECC)based protocol for authenticating client and server transactions to maintain the privacy and security of HTTP cookies.Our proposed protocol uses a secret key embedded within a cookie.The proposed protocol ismore efficient and lightweight than related protocols because of its reduced computation,storage,and communication costs.Moreover,the analysis presented in this paper confirms that proposed protocol resists various known attacks. 展开更多
关键词 COOKIES authentication protocol impersonation attack ECC
下载PDF
Enhancing Network Design through Statistical Evaluation of MANET Routing Protocols
17
作者 Ibrahim Alameri Tawfik Al-Hadhrami +2 位作者 Anjum Nazir Abdulsamad Ebrahim Yahya Atef Gharbi 《Computers, Materials & Continua》 SCIE EI 2024年第7期319-339,共21页
This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network(MANET)routing protocols:Destination Sequenced Distance Vector(DSDV),Ad hoc... This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network(MANET)routing protocols:Destination Sequenced Distance Vector(DSDV),Ad hoc On-Demand Distance Vector(AODV),Dynamic Source Routing(DSR),and Zone Routing Protocol(ZRP).In this paper,the evaluation will be carried out using complete sets of statistical tests such as Kruskal-Wallis,Mann-Whitney,and Friedman.It articulates a systematic evaluation of how the performance of the previous protocols varies with the number of nodes and the mobility patterns.The study is premised upon the Quality of Service(QoS)metrics of throughput,packet delivery ratio,and end-to-end delay to gain an adequate understanding of the operational efficiency of each protocol under different network scenarios.The findings explained significant differences in the performance of different routing protocols;as a result,decisions for the selection and optimization of routing protocols can be taken effectively according to different network requirements.This paper is a step forward in the general understanding of the routing dynamics of MANETs and contributes significantly to the strategic deployment of robust and efficient network infrastructures. 展开更多
关键词 Routing protocols statistical approach friedman MANET
下载PDF
Designing Proportional-Integral Consensus Protocols for Second-Order Multi-Agent Systems Using Delayed and Memorized State Information
18
作者 Honghai Wang Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期878-892,共15页
This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consens... This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consensus protocol is designed by using delayed and memorized state information.Under the proportional-integral consensus protocol,the consensus problem of the multi-agent system is transformed into the problem of asymptotic stability of the corresponding linear time-invariant time-delay system.Note that the location of the eigenvalues of the corresponding characteristic function of the linear time-invariant time-delay system not only determines the stability of the system,but also plays a critical role in the dynamic performance of the system.In this paper,based on recent results on the distribution of roots of quasi-polynomials,several necessary conditions for Hurwitz stability for a class of quasi-polynomials are first derived.Then allowable regions of consensus protocol parameters are estimated.Some necessary and sufficient conditions for determining effective protocol parameters are provided.The designed protocol can achieve consensus and improve the dynamic performance of the second-order multi-agent system.Moreover,the effects of delays on consensus of systems of harmonic oscillators/double integrators under proportional-integral consensus protocols are investigated.Furthermore,some results on proportional-integral consensus are derived for a class of high-order linear time-invariant multi-agent systems. 展开更多
关键词 Consensus protocol Hurwitz stability multi-agent systems quasi-polynomials time delay
下载PDF
A Formal Model for Analyzing Fair Exchange Protocols Based on Event Logic
19
作者 Ke Yang Meihua Xiao Zehuan Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2641-2663,共23页
Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and elec... Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and electronic contract signing,ensuring the reliability and security of network transactions.In order to address the limitations of current research methods and enhance the analytical capabilities for fair exchange protocols,this paper proposes a formal model for analyzing such protocols.The proposed model begins with a thorough analysis of fair exchange protocols,followed by the formal definition of fairness.This definition accurately captures the inherent requirements of fair exchange protocols.Building upon event logic,the model incorporates the time factor into predicates and introduces knowledge set axioms.This enhancement empowers the improved logic to effectively describe the state and knowledge of protocol participants at different time points,facilitating reasoning about their acquired knowledge.To maximize the intruder’s capabilities,channel errors are translated into the behaviors of the intruder.The participants are further categorized into honest participants and malicious participants,enabling a comprehensive evaluation of the intruder’s potential impact.By employing a typical fair exchange protocol as an illustrative example,this paper demonstrates the detailed steps of utilizing the proposed model for protocol analysis.The entire process of protocol execution under attack scenarios is presented,shedding light on the underlying reasons for the attacks and proposing corresponding countermeasures.The developedmodel enhances the ability to reason about and evaluate the security properties of fair exchange protocols,thereby contributing to the advancement of secure network transactions. 展开更多
关键词 Fair exchange protocols FAIRNESS formal analysis logic reasoning
下载PDF
Hyperbolic Tangent Function-Based Protocols for Global/Semi-Global Finite-Time Consensus of Multi-Agent Systems
20
作者 Zongyu Zuo Jingchuan Tang +1 位作者 Ruiqi Ke Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第6期1381-1397,共17页
This paper investigates the problem of global/semi-global finite-time consensus for integrator-type multi-agent sys-tems.New hyperbolic tangent function-based protocols are pro-posed to achieve global and semi-global ... This paper investigates the problem of global/semi-global finite-time consensus for integrator-type multi-agent sys-tems.New hyperbolic tangent function-based protocols are pro-posed to achieve global and semi-global finite-time consensus for both single-integrator and double-integrator multi-agent systems with leaderless undirected and leader-following directed commu-nication topologies.These new protocols not only provide an explicit upper-bound estimate for the settling time,but also have a user-prescribed bounded control level.In addition,compared to some existing results based on the saturation function,the pro-posed approach considerably simplifies the protocol design and the stability analysis.Illustrative examples and an application demonstrate the effectiveness of the proposed protocols. 展开更多
关键词 Consensus protocol finite-time consensus hyper-bolic tangent function multi-agent systems.
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部