BACKGROUND:Traumatic brain injuries are common and costly to hospital systems.Most of the guidelines on management of traumatic brain injuries are taken from the Brain Trauma Foundation Guidelines.This is a review of ...BACKGROUND:Traumatic brain injuries are common and costly to hospital systems.Most of the guidelines on management of traumatic brain injuries are taken from the Brain Trauma Foundation Guidelines.This is a review of the current literature discussing the evolving practice of traumatic brain injury.DATA SOURCES:A literature search using multiple databases was performed for articles published through September 2012 with concentration on meta-analyses,systematic reviews,and randomized controlled trials.RESULTS:The focus of care should be to minimize secondary brain injury by surgically decompressing certain hematomas,maintain systolic blood pressure above 90 mmHg,oxygen saturations above 93%,euthermia,intracranial pressures below 20 mmHg,and cerebral perfusion pressure between 60-80 mmHg.CONCLUSION:Much is still unknown about the management of traumatic brain injury.The current practice guidelines have not yet been sufficiently validated,however equipoise is a major issue when conducting randomized control trials among patients with traumatic brain injury.展开更多
The Wireless Sensor Networks(WSNs)used for the monitoring applications like pipelines carrying oil,water,and gas;perimeter surveillance;border monitoring;and subway tunnel monitoring form linearWSNs.Here,the infrastru...The Wireless Sensor Networks(WSNs)used for the monitoring applications like pipelines carrying oil,water,and gas;perimeter surveillance;border monitoring;and subway tunnel monitoring form linearWSNs.Here,the infrastructure being monitored inherently forms linearity(straight line through the placement of sensor nodes).Therefore,suchWSNs are called linear WSNs.These applications are security critical because the data being communicated can be used for malicious purposes.The contemporary research of WSNs data security cannot fit in directly to linear WSN as only by capturing few nodes,the adversary can disrupt the entire service of linear WSN.Therefore,we propose a data aggregation scheme that takes care of privacy,confidentiality,and integrity of data.In addition,the scheme is resilient against node capture attack and collusion attacks.There are several schemes detecting the malicious nodes.However,the proposed scheme also provides an identification of malicious nodes with lesser key storage requirements.Moreover,we provide an analysis of communication cost regarding the number of messages being communicated.To the best of our knowledge,the proposed data aggregation scheme is the first lightweight scheme that achieves privacy and verification of data,resistance against node capture and collusion attacks,and malicious node identification in linear WSNs.展开更多
文摘BACKGROUND:Traumatic brain injuries are common and costly to hospital systems.Most of the guidelines on management of traumatic brain injuries are taken from the Brain Trauma Foundation Guidelines.This is a review of the current literature discussing the evolving practice of traumatic brain injury.DATA SOURCES:A literature search using multiple databases was performed for articles published through September 2012 with concentration on meta-analyses,systematic reviews,and randomized controlled trials.RESULTS:The focus of care should be to minimize secondary brain injury by surgically decompressing certain hematomas,maintain systolic blood pressure above 90 mmHg,oxygen saturations above 93%,euthermia,intracranial pressures below 20 mmHg,and cerebral perfusion pressure between 60-80 mmHg.CONCLUSION:Much is still unknown about the management of traumatic brain injury.The current practice guidelines have not yet been sufficiently validated,however equipoise is a major issue when conducting randomized control trials among patients with traumatic brain injury.
文摘The Wireless Sensor Networks(WSNs)used for the monitoring applications like pipelines carrying oil,water,and gas;perimeter surveillance;border monitoring;and subway tunnel monitoring form linearWSNs.Here,the infrastructure being monitored inherently forms linearity(straight line through the placement of sensor nodes).Therefore,suchWSNs are called linear WSNs.These applications are security critical because the data being communicated can be used for malicious purposes.The contemporary research of WSNs data security cannot fit in directly to linear WSN as only by capturing few nodes,the adversary can disrupt the entire service of linear WSN.Therefore,we propose a data aggregation scheme that takes care of privacy,confidentiality,and integrity of data.In addition,the scheme is resilient against node capture attack and collusion attacks.There are several schemes detecting the malicious nodes.However,the proposed scheme also provides an identification of malicious nodes with lesser key storage requirements.Moreover,we provide an analysis of communication cost regarding the number of messages being communicated.To the best of our knowledge,the proposed data aggregation scheme is the first lightweight scheme that achieves privacy and verification of data,resistance against node capture and collusion attacks,and malicious node identification in linear WSNs.