期刊文献+
共找到42,529篇文章
< 1 2 250 >
每页显示 20 50 100
Safety and effectiveness of butorphanol in epidural labor analgesia:A protocol for a systematic review and meta-analysis 被引量:3
1
作者 Guan-Cheng Tang Man He +1 位作者 Zhen-Zhao Huang Yan Cheng 《World Journal of Clinical Cases》 SCIE 2024年第8期1416-1421,共6页
BACKGROUND Epidural analgesia is the most effective analgesic method during labor.Butorphanol administered epidurally has been shown to be a successful analgesic method during labor.However,no comprehensive study has ... BACKGROUND Epidural analgesia is the most effective analgesic method during labor.Butorphanol administered epidurally has been shown to be a successful analgesic method during labor.However,no comprehensive study has examined the safety and efficacy of using butorphanol as an epidural analgesic during labor.AIM To assess butorphanol's safety and efficacy for epidural labor analgesia.METHODS The PubMed,Cochrane Library,EMBASE,Web of Science,China National Knowledge Infrastructure,and Google Scholar databases will be searched from inception.Other types of literature,such as conference abstracts and references to pertinent reviews,will also be reviewed.We will include randomized controlled trials comparing butorphanol with other opioids combined with local anesthetics for epidural analgesia during labor.There will be no language restrictions.The primary outcomes will include the visual analog scale score for the first stage of labor,fetal effects,and Apgar score.Two independent reviewers will evaluate the full texts,extract data,and assess the risk of bias.Publication bias will be evaluated using Egger's or Begg's tests as well as visual analysis of a funnel plot,and heterogeneity will be evaluated using the Cochran Q test,P values,and I2 values.Meta-analysis,subgroup analysis,and sensitivity analysis will be performed using RevMan software version 5.4.This protocol was developed in accordance with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)Protocols statement,and the PRISMA statement will be used for the systematic review.RESULTS This study provides reliable information regarding the safety and efficacy of using butorphanol as an epidural analgesic during labor.CONCLUSION To support clinical practice and development,this study provides evidence-based findings regarding the safety and efficacy of using butorphanol as an epidural analgesic during labor. 展开更多
关键词 Epidural analgesia during labor BUTORPHANOL SAFETY protocol META-ANALYSIS
下载PDF
Corneal collagen cross-linking in patients with keratoconus from the Dresden protocol to customized solutions:theoretical basis 被引量:1
2
作者 Ciro Caruso Luca D’Andrea +4 位作者 Mario Troisi Michele Rinaldi Raffaele Piscopo Salvatore Troisi Ciro Costagliola 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2024年第5期951-962,共12页
Keratoconus is an ectatic condition characterized by gradual corneal thinning,corneal protrusion,progressive irregular astigmatism,corneal fibrosis,and visual impairment.The therapeutic options regarding improvement o... Keratoconus is an ectatic condition characterized by gradual corneal thinning,corneal protrusion,progressive irregular astigmatism,corneal fibrosis,and visual impairment.The therapeutic options regarding improvement of visual function include glasses or soft contact lenses correction for initial stages,gas-permeable rigid contact lenses,scleral lenses,implantation of intrastromal corneal ring or corneal transplants for most advanced stages.In keratoconus cases showing disease progression corneal collagen crosslinking(CXL)has been proven to be an effective,minimally invasive and safe procedure.CXL consists of a photochemical reaction of corneal collagen by riboflavin stimulation with ultraviolet A radiation,resulting in stromal crosslinks formation.The aim of this review is to carry out an examination of CXL methods based on theoretical basis and mathematical models,from the original Dresden protocol to the most recent developments in the technique,reporting the changes proposed in the last 15y and examining the advantages and disadvantages of the various treatment protocols.Finally,the limits of non-standardized methods and the perspectives offered by a customization of the treatment are highlighted. 展开更多
关键词 corneal collagen cross linking KERATOCONUS custom fast protocol Dresden protocol lambert-beer law Bunsen-roscoe law
下载PDF
Priority Based Energy Efficient MAC Protocol by Varying Data Ratefor Wireless Body Area Network
3
作者 R.Sangeetha Usha Devi Gandhi 《Computer Systems Science & Engineering》 2024年第2期395-411,共17页
Wireless Body Area Network(WBAN)is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body.WBAN is a collection of in-body and on-body sensors that monitor ... Wireless Body Area Network(WBAN)is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body.WBAN is a collection of in-body and on-body sensors that monitor human physical parameters such as temperature,blood pressure,pulse rate,oxygen level,body motion,and so on.They sense the data and communicate it to the Body Area Network(BAN)Coordinator.The main challenge for the WBAN is energy consumption.These issues can be addressed by implementing an effective Medium Access Control(MAC)protocol that reduces energy consumption and increases network lifetime.The purpose of the study is to minimize the energy consumption and minimize the delay using IEEE 802.15.4 standard.In our proposed work,if any critical events have occurred the proposed work is to classify and prioritize the data.We gave priority to the highly critical data to get the Guarantee Tine Slots(GTS)in IEEE 802.15.4 standard superframe to achieve greater energy efficiency.The proposed MAC provides higher data rates for critical data based on the history and current condition and also provides the best reliable service to high critical data and critical data by predicting node similarity.As an outcome,we proposed a MAC protocol for Variable Data Rates(MVDR).When compared to existing MAC protocols,the MVDR performed very well with low energy intake,less interruption,and an enhanced packet-sharing ratio. 展开更多
关键词 Wireless Body Area Network(WBAN) IEEE 802.15.4 energy efficiency MAC protocol ZIGBEE
下载PDF
BDSec:Security Authentication Protocol for BeiDou-Ⅱ Civil Navigation Message
4
作者 Wu Zhijun Zhang Yuan +2 位作者 Yang Yiming Wang Peng Yue Meng 《China Communications》 SCIE CSCD 2024年第6期206-218,共13页
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a s... Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV. 展开更多
关键词 BDII civil navigation messages(BDIICNAV) BeiDou navigation satellite system(BDS) identity-based cryptography mechanism navigation message authentication protocol(BDSec)
下载PDF
Issues in automated negotiation:protocol and ontology
5
作者 刘克兴 冯玉强 《Journal of Southeast University(English Edition)》 EI CAS 2006年第3期430-434,共5页
In the environment of e-commerce, agents in automated negotiation should share common concept of what they are bargaining and a rule of how to bargain. State of the art overviews of automated negotiation is given. The... In the environment of e-commerce, agents in automated negotiation should share common concept of what they are bargaining and a rule of how to bargain. State of the art overviews of automated negotiation is given. The main barriers to automated negotiation such as protocol and ontology are discussed. Then, a model of automated negotiation is presented with the ontologies of roles and goods described by web ontology language (OWL), the proposal strategies based on the information sets, and a set of rules for agent interaction. In this model, agents coming from different organizations can negotiate automatically based on common ontologies defined by OWL and formal protocol. This makes it possible for the automated negotiation to be performed in an open environment such as Internet, not merely in a closed system. 展开更多
关键词 E-COMMERCE automated negotiation negotiation protocol ONTOLOGY
下载PDF
美标碳素钢SS钢轨成分及轧制工艺优化
6
作者 赵桂英 梁正伟 +2 位作者 李永强 王嘉伟 边影 《包钢科技》 2024年第3期81-85,98,共6页
通过60E1和115RE断面钢轨对比,优化钢轨化学成分,采取窄成分控制,提高C含量,控制Mn、Cr元素含量,优化轧制工艺,小批量生产了60E1断面SS钢轨,钢轨性能达到R_(p0.2)≥512 MPa,R_(m)≥982 MPa,A≥10%,踏面硬度(HB)≥310。小批量工业生产实... 通过60E1和115RE断面钢轨对比,优化钢轨化学成分,采取窄成分控制,提高C含量,控制Mn、Cr元素含量,优化轧制工艺,小批量生产了60E1断面SS钢轨,钢轨性能达到R_(p0.2)≥512 MPa,R_(m)≥982 MPa,A≥10%,踏面硬度(HB)≥310。小批量工业生产实践证明,60E1断面SS钢轨生产工艺顺行,性能稳定,满足用户需要,可以扩量生产。 展开更多
关键词 ss钢种 60E1断面 钢轨 优化
下载PDF
基于ICEEMDAN和分布熵的SS-Y伸缩仪信号随机噪声压制方法 被引量:1
7
作者 吴林斌 《大地测量与地球动力学》 CSCD 北大核心 2024年第4期429-435,共7页
结合改进的自适应噪声完备集合经验模态分解(ICEEMDAN)与分布熵(DistEn),提出一种无需自定义算法参数、去噪效果较好的伸缩仪信号随机噪声压制方法。首先将伸缩仪信号进行ICEEMDAN处理,得到若干个本征模态函数(IMF);然后计算各IMF分量... 结合改进的自适应噪声完备集合经验模态分解(ICEEMDAN)与分布熵(DistEn),提出一种无需自定义算法参数、去噪效果较好的伸缩仪信号随机噪声压制方法。首先将伸缩仪信号进行ICEEMDAN处理,得到若干个本征模态函数(IMF);然后计算各IMF分量的分布熵值,根据不同分布熵值的大小和表征的分量信号混乱程度,有针对性地对各IMF进行取舍;最后进行线性重构。设计仿真信号去噪实验和SS-Y伸缩仪信号去噪实验,结果表明,基于ICEEMDAN-DistEn去噪模型的伸缩仪信号重构还原度较好,去噪效果显著,明显优于CEEMDAN-DistEn、小波去噪和卡尔曼滤波等去噪模型。 展开更多
关键词 ss-Y伸缩仪 随机噪声压制 改进的自适应噪声完备集合经验模态分解 分布熵 信噪比
下载PDF
SLEACH: Secure Low-Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks 被引量:12
8
作者 WANGXiao-yun YANGLi-zhen CHENKe-fei 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期127-131,共5页
LEACH (Low-Encrgy Adaptive Clustering Hi-erarchy) protocol is a basic clustering-based routing protocol of sensor networks. In this paper, we present the design of SLEACH, asecure extension for the LEACH protocol. We ... LEACH (Low-Encrgy Adaptive Clustering Hi-erarchy) protocol is a basic clustering-based routing protocol of sensor networks. In this paper, we present the design of SLEACH, asecure extension for the LEACH protocol. We divide SLEACH into four phases and fit inexpensivecryplp-graphic operations to each part of the protocol functionality to create an efficient,practical protocol. Then we give security analyses of SLEACH. Our security analyses show that ourschemeis robust against any external attacker or compromised nodes in the sensor network. 展开更多
关键词 wireless sensoi network routing protocol SECURITY
下载PDF
Breaking and Repairing the Certificateless Key Agreement Protocol from ASIAN 2006 被引量:8
9
作者 XIA Liang WANG Shengbao +1 位作者 SHEN Jiajun XU Guoming 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期562-566,共5页
The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their... The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their protocol is proposed in this paper. In particular, our improved protocol is proved to be immune to the K-CI attack and at the same time possess other security properties. 展开更多
关键词 cryptographic protocols key agreement certificate-less scheme CRYPTANALYSIS
下载PDF
Quantum key distribution series network protocol with M-classical Bobs 被引量:3
10
作者 张现周 公伟贵 +2 位作者 谭勇刚 任振忠 郭笑天 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第6期2143-2148,共6页
Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one qu... Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one quantum party and numerous classical parties who have no quantum capacity. We prove that our protocol is completely robust, i.e., any eavesdropping attack should be detected with nonzero probability. Our calculations show that our protocol may be secure against Eve's symmetrically individual attack. 展开更多
关键词 quantum key distribution symmetrical attack network protocol
下载PDF
Reliable adaptive multicast protocol in wireless Ad hoc networks 被引量:3
11
作者 Sun Baolin Li Layuan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第1期187-192,共6页
In wireless ad hoe network environments, every link is wireless and every node is mobile. Those features make data lost easily as well as multicasting inefficient and unreliable. Moreover, Efficient and reliable multi... In wireless ad hoe network environments, every link is wireless and every node is mobile. Those features make data lost easily as well as multicasting inefficient and unreliable. Moreover, Efficient and reliable multicast in wireless ad hoe network is a difficult issue. It is a major challenge to transmission delays and packet losses due to link changes of a multicast tree at the provision of high delivery ratio for each packet transmission in wireless ad hoe network environment. In this paler, we propose and evaluate Reliable Adaptive Multicast Protocol (RAMP) based on a relay node concept. Relay nodes are placed along the multieast tree. Data recovery is done between relay nodes. RAMP supports a reliable multicasting suitable for mobile ad hoe network by reducing the number of packet retransmissions. We compare RAMP with SRM (Scalable Reliable Multicast). Simulation results show that the RAMP has high delivery ratio and low end-to-end delay for packet transmsission. 展开更多
关键词 muhicast multicast protocol reliable muhicast wireless ad hoc networks.
下载PDF
Prediction-based protocol for mobile target tracking in wireless sensor networks 被引量:3
12
作者 Liang Xue Zhixin Liu Xinping Guan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第2期347-352,共6页
Remote tracking for mobile targets is one of the most important applications in wireless sensor networks (WSNs). A target tracking protoco–exponential distributed predictive tracking (EDPT) is proposed. To reduce... Remote tracking for mobile targets is one of the most important applications in wireless sensor networks (WSNs). A target tracking protoco–exponential distributed predictive tracking (EDPT) is proposed. To reduce energy waste and response time, an improved predictive algorithm–exponential smoothing predictive algorithm (ESPA) is presented. With the aid of an additive proportion and differential (PD) controller, ESPA decreases the system predictive delay effectively. As a recovery mechanism, an optimal searching radius (OSR) algorithm is applied to calculate the optimal radius of the recovery zone. The simulation results validate that the proposed EDPT protocol performes better in terms of track failed ratio, energy waste ratio and enlarged sensing nodes ratio, respectively. 展开更多
关键词 wireless sensor network target tracking protocol predictive algorithm recovery mechanism.
下载PDF
Design and analysis of MAC protocol for wireless ATM network 被引量:2
13
作者 沙学军 徐玉滨 张乃通 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2000年第4期42-46,共5页
Presents the new design of a reservation based medium access protocol,dynamic frame packet reservation multiple access (DF PRMA), for wireless ATM environments its mathematic model built, and analysis of such performa... Presents the new design of a reservation based medium access protocol,dynamic frame packet reservation multiple access (DF PRMA), for wireless ATM environments its mathematic model built, and analysis of such performance as delay and channel throughput its adaptbility to the fluctuation of traffic by controlling frame length dynamically and guarantee delay performance by forced collision and special reservarion slot. Thereby providing a limited access delay and QoS level and maintaining a resonable high channel throughput. 展开更多
关键词 MAC protocol WIRELEss ATM DELAY channel THROUGHPUT
下载PDF
Reliable transmission of consultative committee for space data systems file delivery protocol in deep space communication 被引量:7
14
作者 Hui Li Hao Luo Faxin Yu Zheming Lu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第3期349-354,共6页
In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative ac... In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification. 展开更多
关键词 deep space communication consultative committee for space data systems (CCSDS) CCSDS file delivery protocol (CFDP) RELIABLE delay.
下载PDF
A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access 被引量:8
15
作者 Xin Jiang Mingzhe Liu +2 位作者 Chen Yang Yanhua Liu Ruili Wang 《Computers, Materials & Continua》 SCIE EI 2019年第1期45-59,共15页
In order to deploy a secure WLAN mesh network,authentication of both users and APs is needed,and a secure authentication mechanism should be employed.However,some additional configurations of trusted third party agenc... In order to deploy a secure WLAN mesh network,authentication of both users and APs is needed,and a secure authentication mechanism should be employed.However,some additional configurations of trusted third party agencies are still needed on-site to deploy a secure authentication system.This paper proposes a new block chain-based authentication protocol for WLAN mesh security access,to reduce the deployment costs and resolve the issues of requiring key delivery and central server during IEEE 802.11X authentication.This method takes the user’s authentication request as a transaction,considers all the authentication records in the mesh network as the public ledger and realizes the effective monitoring of the malicious attack.Finally,this paper analyzes the security of the protocol in detail,and proves that the new method can solve the dependence of the authentication node on PKI and CA. 展开更多
关键词 WLAN MESH BLOCK CHAIN AUTHENTICATION protocol PUBLIC ledger
下载PDF
Location-Based Routing Protocols for Wireless Sensor Networks: A Survey 被引量:6
16
作者 Arun Kumar Hnin Yu Shwe +1 位作者 Kai Juan Wong Peter H. J. Chong 《Wireless Sensor Network》 2017年第1期25-72,共48页
Recently, location-based routings in wireless sensor networks (WSNs) are attracting a lot of interest in the research community, especially because of its scalability. In location-based routing, the network size is sc... Recently, location-based routings in wireless sensor networks (WSNs) are attracting a lot of interest in the research community, especially because of its scalability. In location-based routing, the network size is scalable without increasing the signalling overhead as routing decisions are inherently localized. Here, each node is aware of its position in the network through some positioning device like GPS and uses this information in the routing mechanism. In this paper, we first discuss the basics of WSNs including the architecture of the network, energy consumption for the components of a typical sensor node, and draw a detailed picture of classification of location-based routing protocols. Then, we present a systematic and comprehensive taxonomy of location-based routing protocols, mostly for sensor networks. All the schemes are subsequently discussed in depth. Finally, we conclude the paper with some insights on potential research directions for location-based routing in WSNs. 展开更多
关键词 Location-Based protocol GEOGRAPHIC ROUTING WIRELEss Sensor Networks Energy CONSERVATION ROUTING
下载PDF
Research on ZigBee Wireless Sensors Network Based on ModBus Protocol 被引量:8
17
作者 Chengbo YU Yanfei LIU Cheng WANG 《Wireless Sensor Network》 2009年第1期43-47,共5页
The information transmission is transparent for the user in the ZigBee wireless sensors network, which are lack of interactivity and self-constrain. The information in the ZigBee wireless sensors network can not be vi... The information transmission is transparent for the user in the ZigBee wireless sensors network, which are lack of interactivity and self-constrain. The information in the ZigBee wireless sensors network can not be viewed in a real time by a friendly interface. Modbus protocol is embedded into ZigBee stack, in this way, we can implement interaction well and the information can be viewed in a friendly interface. The paper presents the measures to embed the Modbus protocol into the ZigBee stack provided by Chipcon company, which contains address bound mechanism, information centralized storage, and flexible monitoring, by which we can monitor the real time information from the ZigBee wireless network and use some instructions to control the remote device in a friendly interface, which can be used well in the middle and small ZigBee monitoring wireless sensors network. We implement it in the plant physiological ecology monitoring system. 展开更多
关键词 MODBUS protocol ZIGBEE STACK MONITORING
下载PDF
A Computing Resource Adjustment Mechanism for Communication Protocol Processing in Centralized Radio Access Networks 被引量:3
18
作者 Guowei Zhai Lin Tian +2 位作者 Yiqing Zhou Qian Sun Jinglin Shi 《China Communications》 SCIE CSCD 2016年第12期79-89,共11页
The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular n... The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular networks. With CSBS, the computing resource for communication protocol processing could be managed flexibly according the protocol load to improve the resource efficiency. Since the protocol load changes frequently and may exceed the capacity of processors, load balancing is needed. However, existing load balancing mechanisms used in data centers cannot satisfy the real-time requirement of the communication protocol processing. Therefore, a new computing resource adjustment scheme is proposed for communication protocol processing in the CSBS architecture. First of all, the main principles of protocol processing resource adjustment is concluded, followed by the analysis on the processing resource outage probability that the computing resource becomes inadequate for protocol processing as load changes. Following the adjustment principles, the proposed scheme is designed to reduce the processing resource outage probability based onthe optimized connected graph which is constructed by the approximate Kruskal algorithm. Simulation re-sults show that compared with the conventional load balancing mechanisms, the proposed scheme can reduce the occurrence number of inadequate processing resource and the additional resource consumption of adjustment greatly. 展开更多
关键词 computing resource adjustment communication protocol processing cloud RAN super BS processing resource outage probability optimized connected graph
下载PDF
Joint channel assignment and cross-layer routing protocol for multi-radio multi-channel Ad Hoc networks 被引量:2
19
作者 Yang Lu Junming Guan +1 位作者 Zhen Wei Qilin Wu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第6期1095-1102,共8页
To study multi-radio multi-channel (MR-MC) Ad Hoc networks based on 802.11, an efficient cross-layer routing protocol with the function of joint channel assignment, called joint channel assignment and cross-layer ro... To study multi-radio multi-channel (MR-MC) Ad Hoc networks based on 802.11, an efficient cross-layer routing protocol with the function of joint channel assignment, called joint channel assignment and cross-layer routing (JCACR), is presented. Firstly, this paper introduces a new concept called channel utilization percentage (CUP), which is for measuring the contention level of different channels in a node’s neighborhood, and deduces its optimal value for determining whether a channel is overloaded or not. Then, a metric parameter named channel selection metric (CSM) is designed, which actually reffects not only the channel status but also corresponding node’s capacity to seize it. JCACR evaluates channel assignment by CSM, performs a local optimization by assigning each node a channel with the smaller CSM value, and changes the working channel dynamically when the channel is overloaded. Therefore, the network load balancing can be achieved. In addition, simulation shows that, when compared with the protocol of weighted cumulative expected transfer time (WCETT), the new protocol can improve the network throughput and reduce the end-to-end average delay with fewer overheads. 展开更多
关键词 Ad Hoc network multi-radio multi-channel channel assignment routing protocol channel utilization percentage.
下载PDF
Light-Weight Simple Network Management Protocol in Wireless Sensor Networks 被引量:2
20
作者 高德云 朱婉婷 方然 《China Communications》 SCIE CSCD 2011年第8期121-129,共9页
A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node ag... A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node agents. Considering the resource limitations on the sensor nodes, we design new management messages, new data types and new management information base completely. The management messages between the cluster proxy and node agents are delivered as normal data packets. The experiment results show that LW-SNMP can meet the management demands in the resource-limited wireless sensor networks and has a good performance in stability, effectiveness of memory, extensibility than the traditional Simple Network Management Protocol (SNMP). 展开更多
关键词 WSNS network management lightweight simple network management protocol sink manager cluster proxy node agent
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部