BACKGROUND Epidural analgesia is the most effective analgesic method during labor.Butorphanol administered epidurally has been shown to be a successful analgesic method during labor.However,no comprehensive study has ...BACKGROUND Epidural analgesia is the most effective analgesic method during labor.Butorphanol administered epidurally has been shown to be a successful analgesic method during labor.However,no comprehensive study has examined the safety and efficacy of using butorphanol as an epidural analgesic during labor.AIM To assess butorphanol's safety and efficacy for epidural labor analgesia.METHODS The PubMed,Cochrane Library,EMBASE,Web of Science,China National Knowledge Infrastructure,and Google Scholar databases will be searched from inception.Other types of literature,such as conference abstracts and references to pertinent reviews,will also be reviewed.We will include randomized controlled trials comparing butorphanol with other opioids combined with local anesthetics for epidural analgesia during labor.There will be no language restrictions.The primary outcomes will include the visual analog scale score for the first stage of labor,fetal effects,and Apgar score.Two independent reviewers will evaluate the full texts,extract data,and assess the risk of bias.Publication bias will be evaluated using Egger's or Begg's tests as well as visual analysis of a funnel plot,and heterogeneity will be evaluated using the Cochran Q test,P values,and I2 values.Meta-analysis,subgroup analysis,and sensitivity analysis will be performed using RevMan software version 5.4.This protocol was developed in accordance with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)Protocols statement,and the PRISMA statement will be used for the systematic review.RESULTS This study provides reliable information regarding the safety and efficacy of using butorphanol as an epidural analgesic during labor.CONCLUSION To support clinical practice and development,this study provides evidence-based findings regarding the safety and efficacy of using butorphanol as an epidural analgesic during labor.展开更多
Keratoconus is an ectatic condition characterized by gradual corneal thinning,corneal protrusion,progressive irregular astigmatism,corneal fibrosis,and visual impairment.The therapeutic options regarding improvement o...Keratoconus is an ectatic condition characterized by gradual corneal thinning,corneal protrusion,progressive irregular astigmatism,corneal fibrosis,and visual impairment.The therapeutic options regarding improvement of visual function include glasses or soft contact lenses correction for initial stages,gas-permeable rigid contact lenses,scleral lenses,implantation of intrastromal corneal ring or corneal transplants for most advanced stages.In keratoconus cases showing disease progression corneal collagen crosslinking(CXL)has been proven to be an effective,minimally invasive and safe procedure.CXL consists of a photochemical reaction of corneal collagen by riboflavin stimulation with ultraviolet A radiation,resulting in stromal crosslinks formation.The aim of this review is to carry out an examination of CXL methods based on theoretical basis and mathematical models,from the original Dresden protocol to the most recent developments in the technique,reporting the changes proposed in the last 15y and examining the advantages and disadvantages of the various treatment protocols.Finally,the limits of non-standardized methods and the perspectives offered by a customization of the treatment are highlighted.展开更多
Wireless Body Area Network(WBAN)is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body.WBAN is a collection of in-body and on-body sensors that monitor ...Wireless Body Area Network(WBAN)is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body.WBAN is a collection of in-body and on-body sensors that monitor human physical parameters such as temperature,blood pressure,pulse rate,oxygen level,body motion,and so on.They sense the data and communicate it to the Body Area Network(BAN)Coordinator.The main challenge for the WBAN is energy consumption.These issues can be addressed by implementing an effective Medium Access Control(MAC)protocol that reduces energy consumption and increases network lifetime.The purpose of the study is to minimize the energy consumption and minimize the delay using IEEE 802.15.4 standard.In our proposed work,if any critical events have occurred the proposed work is to classify and prioritize the data.We gave priority to the highly critical data to get the Guarantee Tine Slots(GTS)in IEEE 802.15.4 standard superframe to achieve greater energy efficiency.The proposed MAC provides higher data rates for critical data based on the history and current condition and also provides the best reliable service to high critical data and critical data by predicting node similarity.As an outcome,we proposed a MAC protocol for Variable Data Rates(MVDR).When compared to existing MAC protocols,the MVDR performed very well with low energy intake,less interruption,and an enhanced packet-sharing ratio.展开更多
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a s...Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV.展开更多
In the environment of e-commerce, agents in automated negotiation should share common concept of what they are bargaining and a rule of how to bargain. State of the art overviews of automated negotiation is given. The...In the environment of e-commerce, agents in automated negotiation should share common concept of what they are bargaining and a rule of how to bargain. State of the art overviews of automated negotiation is given. The main barriers to automated negotiation such as protocol and ontology are discussed. Then, a model of automated negotiation is presented with the ontologies of roles and goods described by web ontology language (OWL), the proposal strategies based on the information sets, and a set of rules for agent interaction. In this model, agents coming from different organizations can negotiate automatically based on common ontologies defined by OWL and formal protocol. This makes it possible for the automated negotiation to be performed in an open environment such as Internet, not merely in a closed system.展开更多
LEACH (Low-Encrgy Adaptive Clustering Hi-erarchy) protocol is a basic clustering-based routing protocol of sensor networks. In this paper, we present the design of SLEACH, asecure extension for the LEACH protocol. We ...LEACH (Low-Encrgy Adaptive Clustering Hi-erarchy) protocol is a basic clustering-based routing protocol of sensor networks. In this paper, we present the design of SLEACH, asecure extension for the LEACH protocol. We divide SLEACH into four phases and fit inexpensivecryplp-graphic operations to each part of the protocol functionality to create an efficient,practical protocol. Then we give security analyses of SLEACH. Our security analyses show that ourschemeis robust against any external attacker or compromised nodes in the sensor network.展开更多
The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their...The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their protocol is proposed in this paper. In particular, our improved protocol is proved to be immune to the K-CI attack and at the same time possess other security properties.展开更多
Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one qu...Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one quantum party and numerous classical parties who have no quantum capacity. We prove that our protocol is completely robust, i.e., any eavesdropping attack should be detected with nonzero probability. Our calculations show that our protocol may be secure against Eve's symmetrically individual attack.展开更多
In wireless ad hoe network environments, every link is wireless and every node is mobile. Those features make data lost easily as well as multicasting inefficient and unreliable. Moreover, Efficient and reliable multi...In wireless ad hoe network environments, every link is wireless and every node is mobile. Those features make data lost easily as well as multicasting inefficient and unreliable. Moreover, Efficient and reliable multicast in wireless ad hoe network is a difficult issue. It is a major challenge to transmission delays and packet losses due to link changes of a multicast tree at the provision of high delivery ratio for each packet transmission in wireless ad hoe network environment. In this paler, we propose and evaluate Reliable Adaptive Multicast Protocol (RAMP) based on a relay node concept. Relay nodes are placed along the multieast tree. Data recovery is done between relay nodes. RAMP supports a reliable multicasting suitable for mobile ad hoe network by reducing the number of packet retransmissions. We compare RAMP with SRM (Scalable Reliable Multicast). Simulation results show that the RAMP has high delivery ratio and low end-to-end delay for packet transmsission.展开更多
Remote tracking for mobile targets is one of the most important applications in wireless sensor networks (WSNs). A target tracking protoco–exponential distributed predictive tracking (EDPT) is proposed. To reduce...Remote tracking for mobile targets is one of the most important applications in wireless sensor networks (WSNs). A target tracking protoco–exponential distributed predictive tracking (EDPT) is proposed. To reduce energy waste and response time, an improved predictive algorithm–exponential smoothing predictive algorithm (ESPA) is presented. With the aid of an additive proportion and differential (PD) controller, ESPA decreases the system predictive delay effectively. As a recovery mechanism, an optimal searching radius (OSR) algorithm is applied to calculate the optimal radius of the recovery zone. The simulation results validate that the proposed EDPT protocol performes better in terms of track failed ratio, energy waste ratio and enlarged sensing nodes ratio, respectively.展开更多
Presents the new design of a reservation based medium access protocol,dynamic frame packet reservation multiple access (DF PRMA), for wireless ATM environments its mathematic model built, and analysis of such performa...Presents the new design of a reservation based medium access protocol,dynamic frame packet reservation multiple access (DF PRMA), for wireless ATM environments its mathematic model built, and analysis of such performance as delay and channel throughput its adaptbility to the fluctuation of traffic by controlling frame length dynamically and guarantee delay performance by forced collision and special reservarion slot. Thereby providing a limited access delay and QoS level and maintaining a resonable high channel throughput.展开更多
In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative ac...In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification.展开更多
In order to deploy a secure WLAN mesh network,authentication of both users and APs is needed,and a secure authentication mechanism should be employed.However,some additional configurations of trusted third party agenc...In order to deploy a secure WLAN mesh network,authentication of both users and APs is needed,and a secure authentication mechanism should be employed.However,some additional configurations of trusted third party agencies are still needed on-site to deploy a secure authentication system.This paper proposes a new block chain-based authentication protocol for WLAN mesh security access,to reduce the deployment costs and resolve the issues of requiring key delivery and central server during IEEE 802.11X authentication.This method takes the user’s authentication request as a transaction,considers all the authentication records in the mesh network as the public ledger and realizes the effective monitoring of the malicious attack.Finally,this paper analyzes the security of the protocol in detail,and proves that the new method can solve the dependence of the authentication node on PKI and CA.展开更多
Recently, location-based routings in wireless sensor networks (WSNs) are attracting a lot of interest in the research community, especially because of its scalability. In location-based routing, the network size is sc...Recently, location-based routings in wireless sensor networks (WSNs) are attracting a lot of interest in the research community, especially because of its scalability. In location-based routing, the network size is scalable without increasing the signalling overhead as routing decisions are inherently localized. Here, each node is aware of its position in the network through some positioning device like GPS and uses this information in the routing mechanism. In this paper, we first discuss the basics of WSNs including the architecture of the network, energy consumption for the components of a typical sensor node, and draw a detailed picture of classification of location-based routing protocols. Then, we present a systematic and comprehensive taxonomy of location-based routing protocols, mostly for sensor networks. All the schemes are subsequently discussed in depth. Finally, we conclude the paper with some insights on potential research directions for location-based routing in WSNs.展开更多
The information transmission is transparent for the user in the ZigBee wireless sensors network, which are lack of interactivity and self-constrain. The information in the ZigBee wireless sensors network can not be vi...The information transmission is transparent for the user in the ZigBee wireless sensors network, which are lack of interactivity and self-constrain. The information in the ZigBee wireless sensors network can not be viewed in a real time by a friendly interface. Modbus protocol is embedded into ZigBee stack, in this way, we can implement interaction well and the information can be viewed in a friendly interface. The paper presents the measures to embed the Modbus protocol into the ZigBee stack provided by Chipcon company, which contains address bound mechanism, information centralized storage, and flexible monitoring, by which we can monitor the real time information from the ZigBee wireless network and use some instructions to control the remote device in a friendly interface, which can be used well in the middle and small ZigBee monitoring wireless sensors network. We implement it in the plant physiological ecology monitoring system.展开更多
The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular n...The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular networks. With CSBS, the computing resource for communication protocol processing could be managed flexibly according the protocol load to improve the resource efficiency. Since the protocol load changes frequently and may exceed the capacity of processors, load balancing is needed. However, existing load balancing mechanisms used in data centers cannot satisfy the real-time requirement of the communication protocol processing. Therefore, a new computing resource adjustment scheme is proposed for communication protocol processing in the CSBS architecture. First of all, the main principles of protocol processing resource adjustment is concluded, followed by the analysis on the processing resource outage probability that the computing resource becomes inadequate for protocol processing as load changes. Following the adjustment principles, the proposed scheme is designed to reduce the processing resource outage probability based onthe optimized connected graph which is constructed by the approximate Kruskal algorithm. Simulation re-sults show that compared with the conventional load balancing mechanisms, the proposed scheme can reduce the occurrence number of inadequate processing resource and the additional resource consumption of adjustment greatly.展开更多
To study multi-radio multi-channel (MR-MC) Ad Hoc networks based on 802.11, an efficient cross-layer routing protocol with the function of joint channel assignment, called joint channel assignment and cross-layer ro...To study multi-radio multi-channel (MR-MC) Ad Hoc networks based on 802.11, an efficient cross-layer routing protocol with the function of joint channel assignment, called joint channel assignment and cross-layer routing (JCACR), is presented. Firstly, this paper introduces a new concept called channel utilization percentage (CUP), which is for measuring the contention level of different channels in a node’s neighborhood, and deduces its optimal value for determining whether a channel is overloaded or not. Then, a metric parameter named channel selection metric (CSM) is designed, which actually reffects not only the channel status but also corresponding node’s capacity to seize it. JCACR evaluates channel assignment by CSM, performs a local optimization by assigning each node a channel with the smaller CSM value, and changes the working channel dynamically when the channel is overloaded. Therefore, the network load balancing can be achieved. In addition, simulation shows that, when compared with the protocol of weighted cumulative expected transfer time (WCETT), the new protocol can improve the network throughput and reduce the end-to-end average delay with fewer overheads.展开更多
A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node ag...A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node agents. Considering the resource limitations on the sensor nodes, we design new management messages, new data types and new management information base completely. The management messages between the cluster proxy and node agents are delivered as normal data packets. The experiment results show that LW-SNMP can meet the management demands in the resource-limited wireless sensor networks and has a good performance in stability, effectiveness of memory, extensibility than the traditional Simple Network Management Protocol (SNMP).展开更多
文摘BACKGROUND Epidural analgesia is the most effective analgesic method during labor.Butorphanol administered epidurally has been shown to be a successful analgesic method during labor.However,no comprehensive study has examined the safety and efficacy of using butorphanol as an epidural analgesic during labor.AIM To assess butorphanol's safety and efficacy for epidural labor analgesia.METHODS The PubMed,Cochrane Library,EMBASE,Web of Science,China National Knowledge Infrastructure,and Google Scholar databases will be searched from inception.Other types of literature,such as conference abstracts and references to pertinent reviews,will also be reviewed.We will include randomized controlled trials comparing butorphanol with other opioids combined with local anesthetics for epidural analgesia during labor.There will be no language restrictions.The primary outcomes will include the visual analog scale score for the first stage of labor,fetal effects,and Apgar score.Two independent reviewers will evaluate the full texts,extract data,and assess the risk of bias.Publication bias will be evaluated using Egger's or Begg's tests as well as visual analysis of a funnel plot,and heterogeneity will be evaluated using the Cochran Q test,P values,and I2 values.Meta-analysis,subgroup analysis,and sensitivity analysis will be performed using RevMan software version 5.4.This protocol was developed in accordance with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)Protocols statement,and the PRISMA statement will be used for the systematic review.RESULTS This study provides reliable information regarding the safety and efficacy of using butorphanol as an epidural analgesic during labor.CONCLUSION To support clinical practice and development,this study provides evidence-based findings regarding the safety and efficacy of using butorphanol as an epidural analgesic during labor.
文摘Keratoconus is an ectatic condition characterized by gradual corneal thinning,corneal protrusion,progressive irregular astigmatism,corneal fibrosis,and visual impairment.The therapeutic options regarding improvement of visual function include glasses or soft contact lenses correction for initial stages,gas-permeable rigid contact lenses,scleral lenses,implantation of intrastromal corneal ring or corneal transplants for most advanced stages.In keratoconus cases showing disease progression corneal collagen crosslinking(CXL)has been proven to be an effective,minimally invasive and safe procedure.CXL consists of a photochemical reaction of corneal collagen by riboflavin stimulation with ultraviolet A radiation,resulting in stromal crosslinks formation.The aim of this review is to carry out an examination of CXL methods based on theoretical basis and mathematical models,from the original Dresden protocol to the most recent developments in the technique,reporting the changes proposed in the last 15y and examining the advantages and disadvantages of the various treatment protocols.Finally,the limits of non-standardized methods and the perspectives offered by a customization of the treatment are highlighted.
文摘Wireless Body Area Network(WBAN)is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body.WBAN is a collection of in-body and on-body sensors that monitor human physical parameters such as temperature,blood pressure,pulse rate,oxygen level,body motion,and so on.They sense the data and communicate it to the Body Area Network(BAN)Coordinator.The main challenge for the WBAN is energy consumption.These issues can be addressed by implementing an effective Medium Access Control(MAC)protocol that reduces energy consumption and increases network lifetime.The purpose of the study is to minimize the energy consumption and minimize the delay using IEEE 802.15.4 standard.In our proposed work,if any critical events have occurred the proposed work is to classify and prioritize the data.We gave priority to the highly critical data to get the Guarantee Tine Slots(GTS)in IEEE 802.15.4 standard superframe to achieve greater energy efficiency.The proposed MAC provides higher data rates for critical data based on the history and current condition and also provides the best reliable service to high critical data and critical data by predicting node similarity.As an outcome,we proposed a MAC protocol for Variable Data Rates(MVDR).When compared to existing MAC protocols,the MVDR performed very well with low energy intake,less interruption,and an enhanced packet-sharing ratio.
基金supported in part by the National Key R&D Program of China(No.2022YFB3904503)National Natural Science Foundation of China(No.62172418)the joint funds of National Natural Science Foundation of China and Civil Aviation Administration of China(No.U2133203).
文摘Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV.
基金The National Natural Science Foundation of China(No.70171011).
文摘In the environment of e-commerce, agents in automated negotiation should share common concept of what they are bargaining and a rule of how to bargain. State of the art overviews of automated negotiation is given. The main barriers to automated negotiation such as protocol and ontology are discussed. Then, a model of automated negotiation is presented with the ontologies of roles and goods described by web ontology language (OWL), the proposal strategies based on the information sets, and a set of rules for agent interaction. In this model, agents coming from different organizations can negotiate automatically based on common ontologies defined by OWL and formal protocol. This makes it possible for the automated negotiation to be performed in an open environment such as Internet, not merely in a closed system.
文摘LEACH (Low-Encrgy Adaptive Clustering Hi-erarchy) protocol is a basic clustering-based routing protocol of sensor networks. In this paper, we present the design of SLEACH, asecure extension for the LEACH protocol. We divide SLEACH into four phases and fit inexpensivecryplp-graphic operations to each part of the protocol functionality to create an efficient,practical protocol. Then we give security analyses of SLEACH. Our security analyses show that ourschemeis robust against any external attacker or compromised nodes in the sensor network.
基金the National Natural Science Foundation of China (60773086)
文摘The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their protocol is proposed in this paper. In particular, our improved protocol is proved to be immune to the K-CI attack and at the same time possess other security properties.
基金Project supported by the National Natural Science Foundation of China (Grant No 10774039)
文摘Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one quantum party and numerous classical parties who have no quantum capacity. We prove that our protocol is completely robust, i.e., any eavesdropping attack should be detected with nonzero probability. Our calculations show that our protocol may be secure against Eve's symmetrically individual attack.
文摘In wireless ad hoe network environments, every link is wireless and every node is mobile. Those features make data lost easily as well as multicasting inefficient and unreliable. Moreover, Efficient and reliable multicast in wireless ad hoe network is a difficult issue. It is a major challenge to transmission delays and packet losses due to link changes of a multicast tree at the provision of high delivery ratio for each packet transmission in wireless ad hoe network environment. In this paler, we propose and evaluate Reliable Adaptive Multicast Protocol (RAMP) based on a relay node concept. Relay nodes are placed along the multieast tree. Data recovery is done between relay nodes. RAMP supports a reliable multicasting suitable for mobile ad hoe network by reducing the number of packet retransmissions. We compare RAMP with SRM (Scalable Reliable Multicast). Simulation results show that the RAMP has high delivery ratio and low end-to-end delay for packet transmsission.
基金supported by the National Basic Research Program of China (973 Program) (2010CB731800)the National Natural Science Foundation of China (60934003+2 种基金 60974123 60804010)the Hebei Provincial Educational Foundation of China (2008147)
文摘Remote tracking for mobile targets is one of the most important applications in wireless sensor networks (WSNs). A target tracking protoco–exponential distributed predictive tracking (EDPT) is proposed. To reduce energy waste and response time, an improved predictive algorithm–exponential smoothing predictive algorithm (ESPA) is presented. With the aid of an additive proportion and differential (PD) controller, ESPA decreases the system predictive delay effectively. As a recovery mechanism, an optimal searching radius (OSR) algorithm is applied to calculate the optimal radius of the recovery zone. The simulation results validate that the proposed EDPT protocol performes better in terms of track failed ratio, energy waste ratio and enlarged sensing nodes ratio, respectively.
文摘Presents the new design of a reservation based medium access protocol,dynamic frame packet reservation multiple access (DF PRMA), for wireless ATM environments its mathematic model built, and analysis of such performance as delay and channel throughput its adaptbility to the fluctuation of traffic by controlling frame length dynamically and guarantee delay performance by forced collision and special reservarion slot. Thereby providing a limited access delay and QoS level and maintaining a resonable high channel throughput.
基金supported by the National Natural Science Fandation of China (6067208960772075)
文摘In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification.
文摘In order to deploy a secure WLAN mesh network,authentication of both users and APs is needed,and a secure authentication mechanism should be employed.However,some additional configurations of trusted third party agencies are still needed on-site to deploy a secure authentication system.This paper proposes a new block chain-based authentication protocol for WLAN mesh security access,to reduce the deployment costs and resolve the issues of requiring key delivery and central server during IEEE 802.11X authentication.This method takes the user’s authentication request as a transaction,considers all the authentication records in the mesh network as the public ledger and realizes the effective monitoring of the malicious attack.Finally,this paper analyzes the security of the protocol in detail,and proves that the new method can solve the dependence of the authentication node on PKI and CA.
文摘Recently, location-based routings in wireless sensor networks (WSNs) are attracting a lot of interest in the research community, especially because of its scalability. In location-based routing, the network size is scalable without increasing the signalling overhead as routing decisions are inherently localized. Here, each node is aware of its position in the network through some positioning device like GPS and uses this information in the routing mechanism. In this paper, we first discuss the basics of WSNs including the architecture of the network, energy consumption for the components of a typical sensor node, and draw a detailed picture of classification of location-based routing protocols. Then, we present a systematic and comprehensive taxonomy of location-based routing protocols, mostly for sensor networks. All the schemes are subsequently discussed in depth. Finally, we conclude the paper with some insights on potential research directions for location-based routing in WSNs.
文摘The information transmission is transparent for the user in the ZigBee wireless sensors network, which are lack of interactivity and self-constrain. The information in the ZigBee wireless sensors network can not be viewed in a real time by a friendly interface. Modbus protocol is embedded into ZigBee stack, in this way, we can implement interaction well and the information can be viewed in a friendly interface. The paper presents the measures to embed the Modbus protocol into the ZigBee stack provided by Chipcon company, which contains address bound mechanism, information centralized storage, and flexible monitoring, by which we can monitor the real time information from the ZigBee wireless network and use some instructions to control the remote device in a friendly interface, which can be used well in the middle and small ZigBee monitoring wireless sensors network. We implement it in the plant physiological ecology monitoring system.
基金supported in part by the National Science Foundationof China under Grant number 61431001the Beijing Talents Fund under Grant number 2015000021223ZK31
文摘The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular networks. With CSBS, the computing resource for communication protocol processing could be managed flexibly according the protocol load to improve the resource efficiency. Since the protocol load changes frequently and may exceed the capacity of processors, load balancing is needed. However, existing load balancing mechanisms used in data centers cannot satisfy the real-time requirement of the communication protocol processing. Therefore, a new computing resource adjustment scheme is proposed for communication protocol processing in the CSBS architecture. First of all, the main principles of protocol processing resource adjustment is concluded, followed by the analysis on the processing resource outage probability that the computing resource becomes inadequate for protocol processing as load changes. Following the adjustment principles, the proposed scheme is designed to reduce the processing resource outage probability based onthe optimized connected graph which is constructed by the approximate Kruskal algorithm. Simulation re-sults show that compared with the conventional load balancing mechanisms, the proposed scheme can reduce the occurrence number of inadequate processing resource and the additional resource consumption of adjustment greatly.
基金supported by the National Natural Science Foundationof China (60873195 61070220)+3 种基金the Natural Science Foundation of Anhui Province (070412049)the Outstanding Young Teacher Foundation of Anhui Higher Education Institutions of China (2009SQRZ167)the Natural Science Foundation of Anhui Higher Education Institutions of China (KJ2009B114)the Open Project Program of Engineering Research Center of Safety Critical Industry Measure and Control Technology (SCIMCT0802)
文摘To study multi-radio multi-channel (MR-MC) Ad Hoc networks based on 802.11, an efficient cross-layer routing protocol with the function of joint channel assignment, called joint channel assignment and cross-layer routing (JCACR), is presented. Firstly, this paper introduces a new concept called channel utilization percentage (CUP), which is for measuring the contention level of different channels in a node’s neighborhood, and deduces its optimal value for determining whether a channel is overloaded or not. Then, a metric parameter named channel selection metric (CSM) is designed, which actually reffects not only the channel status but also corresponding node’s capacity to seize it. JCACR evaluates channel assignment by CSM, performs a local optimization by assigning each node a channel with the smaller CSM value, and changes the working channel dynamically when the channel is overloaded. Therefore, the network load balancing can be achieved. In addition, simulation shows that, when compared with the protocol of weighted cumulative expected transfer time (WCETT), the new protocol can improve the network throughput and reduce the end-to-end average delay with fewer overheads.
基金supported by the Fundamental Research Funds for the Central Universities under grant No.2009JBM007supported by the National Natural Science Foundation of China under Grants No. 60802016, 60833002 and 60972010
文摘A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node agents. Considering the resource limitations on the sensor nodes, we design new management messages, new data types and new management information base completely. The management messages between the cluster proxy and node agents are delivered as normal data packets. The experiment results show that LW-SNMP can meet the management demands in the resource-limited wireless sensor networks and has a good performance in stability, effectiveness of memory, extensibility than the traditional Simple Network Management Protocol (SNMP).