期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Traumatic brain injury:A case-based review 被引量:4
1
作者 Liza Victoria S Escobedo Joseph Habboushe +3 位作者 Haytham Kaafarani George Velmahos kaushal shah Jarone Lee 《World Journal of Emergency Medicine》 CAS 2013年第4期252-259,共8页
BACKGROUND:Traumatic brain injuries are common and costly to hospital systems.Most of the guidelines on management of traumatic brain injuries are taken from the Brain Trauma Foundation Guidelines.This is a review of ... BACKGROUND:Traumatic brain injuries are common and costly to hospital systems.Most of the guidelines on management of traumatic brain injuries are taken from the Brain Trauma Foundation Guidelines.This is a review of the current literature discussing the evolving practice of traumatic brain injury.DATA SOURCES:A literature search using multiple databases was performed for articles published through September 2012 with concentration on meta-analyses,systematic reviews,and randomized controlled trials.RESULTS:The focus of care should be to minimize secondary brain injury by surgically decompressing certain hematomas,maintain systolic blood pressure above 90 mmHg,oxygen saturations above 93%,euthermia,intracranial pressures below 20 mmHg,and cerebral perfusion pressure between 60-80 mmHg.CONCLUSION:Much is still unknown about the management of traumatic brain injury.The current practice guidelines have not yet been sufficiently validated,however equipoise is a major issue when conducting randomized control trials among patients with traumatic brain injury. 展开更多
关键词 Traumatic brain injury Emergency departments Glascow Coma Scale
下载PDF
Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks
2
作者 kaushal shah Devesh JINWALA 《Frontiers of Computer Science》 SCIE EI CSCD 2021年第6期155-163,共9页
The Wireless Sensor Networks(WSNs)used for the monitoring applications like pipelines carrying oil,water,and gas;perimeter surveillance;border monitoring;and subway tunnel monitoring form linearWSNs.Here,the infrastru... The Wireless Sensor Networks(WSNs)used for the monitoring applications like pipelines carrying oil,water,and gas;perimeter surveillance;border monitoring;and subway tunnel monitoring form linearWSNs.Here,the infrastructure being monitored inherently forms linearity(straight line through the placement of sensor nodes).Therefore,suchWSNs are called linear WSNs.These applications are security critical because the data being communicated can be used for malicious purposes.The contemporary research of WSNs data security cannot fit in directly to linear WSN as only by capturing few nodes,the adversary can disrupt the entire service of linear WSN.Therefore,we propose a data aggregation scheme that takes care of privacy,confidentiality,and integrity of data.In addition,the scheme is resilient against node capture attack and collusion attacks.There are several schemes detecting the malicious nodes.However,the proposed scheme also provides an identification of malicious nodes with lesser key storage requirements.Moreover,we provide an analysis of communication cost regarding the number of messages being communicated.To the best of our knowledge,the proposed data aggregation scheme is the first lightweight scheme that achieves privacy and verification of data,resistance against node capture and collusion attacks,and malicious node identification in linear WSNs. 展开更多
关键词 linear wireless sensor networks secure data aggregation PRIVACY malicious node identification
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部