The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded versio...The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded version of the protocol was written for professional health care providers with a consumer version tailored for family caregivers. The underlying mid-range theory is presented along with a seminal study that was followed by further research in the United States, Canada, Great Britain, France, Sweden, Norway, Japan and Taiwan. Key studies are summarized. Given its efficacy when implemented by research staff, studies have advanced to testing the intervention under real-life conditions when implemented and evaluated by trained nursing assistants in long-term care facilities and visiting family members. In addition, one study evaluated the implementation of music by family members in the home setting. Initial research focused on agitation as the dependent variable with subsequent research indicating a more holistic response such as positive affect, expressed satisfaction, and meaningful interaction with others. The article advances by describing on-line programs designed to train health care professionals in the assessment, implementation and evaluation of individualized music. In addition, Gerdner has written a story for apicture book intended for children and their families(in press). The story models principles of individualized music to elicit positive memories, reduce anxiety and agitation, and promote communication. The article concludes with implications for future research.展开更多
Recently, location-based routings in wireless sensor networks (WSNs) are attracting a lot of interest in the research community, especially because of its scalability. In location-based routing, the network size is sc...Recently, location-based routings in wireless sensor networks (WSNs) are attracting a lot of interest in the research community, especially because of its scalability. In location-based routing, the network size is scalable without increasing the signalling overhead as routing decisions are inherently localized. Here, each node is aware of its position in the network through some positioning device like GPS and uses this information in the routing mechanism. In this paper, we first discuss the basics of WSNs including the architecture of the network, energy consumption for the components of a typical sensor node, and draw a detailed picture of classification of location-based routing protocols. Then, we present a systematic and comprehensive taxonomy of location-based routing protocols, mostly for sensor networks. All the schemes are subsequently discussed in depth. Finally, we conclude the paper with some insights on potential research directions for location-based routing in WSNs.展开更多
Objective The Jidong Women Health Cohort Study is a prospective cohort study on female-specific characteristics and risks of chronic diseases in Chinese women and focuses on the potential association between menopause...Objective The Jidong Women Health Cohort Study is a prospective cohort study on female-specific characteristics and risks of chronic diseases in Chinese women and focuses on the potential association between menopause and risks of cardiovascular disease(CVD). Methods The study includes 4,179 female participants with an age of older than 18 years from Caofeidian district, Tangshan city, northern China. Baseline information on female-specific characteristics and potential cardiovascular risk factors was collected and all the participants underwent a physical examination with blood samples collected in 2013. To establish a better risk assessment tool of female CVD, updated information from questionnaire investigation, physical examinations and occurrence of outcome events will be collected through a longitudinal follow-up annually up to the year 2024. Results At baseline, Mean age of the participants was 42.3 ± 12.8 years. Reproduction occurred in 2,948 participants(70.5%), menopausal transition in 173(4.3%), and postmenopause in 1,058(25.3%). The incidence of arterial hypertension, dyslipidemia, and diabetes showed significant difference across different groups stratified by Stage of Reproductive Aging Workshop(STRAW) system(P < 0.05). Conclusion The Jidong Women Health Cohort Study will contribute to the scientific evidence on association between female-specific characteristics and cardiovascular risks, and will also be helpful to provide a new path for early detection and prevention of CVD.展开更多
Vehicular ad hoc networks (VANETs) are a new emerging recently developed advanced technology that allows a wide group of applications related to providing more safety on roads, more convenience for passengers, self-dr...Vehicular ad hoc networks (VANETs) are a new emerging recently developed advanced technology that allows a wide group of applications related to providing more safety on roads, more convenience for passengers, self-driven vehicles, and intelligent transportation systems (ITS). There are various routing protocol categories used in VANETs, like unicast, multicast, and broadcast protocols. In unicast position-based protocols, the routing decisions are based on the geographic position of the vehicles. This does not require establishment or maintenance of routes but needs location services to determine the position of the destination. Non-delay-tolerant network protocols (non-DTN), also identified as minimum delay protocols, are aimed at minimizing the delivery time of the information. Delay-tolerant protocols (DTN) are used in a variety of operating environments, including those that are subject to failures and interruptions and those with high delay, such as VANETs. This paper discusses the comparison between non-DTN and DTN routing protocols belonging to the unicast delay-tolerant position-based category. The comparison was conducted using the NS2 simulator, and the simulations of three non-DTN routing protocols and three DTN routing protocols were recorded. Simulation results show that the DTN routing protocols outperform in delivery ratio compared to the non-DTN routing protocols, but they lead to more average delay due to buffering, the processing algorithm, and priority calculation. In conclusion, non-DTN protocols are more suitable for the city environment since the distance between nodes is relatively smaller and the variations in the network topology are slower than they are on highways. On the other hand, DTN protocols are more suitable for highways due to the buffering of packets until a clear route to destination is available.展开更多
Quantum key distribution(QKD) generates information-theoretical secret keys between two parties based on the physical laws of quantum mechanics. Following the advancement in quantum communication networks, it becomes ...Quantum key distribution(QKD) generates information-theoretical secret keys between two parties based on the physical laws of quantum mechanics. Following the advancement in quantum communication networks, it becomes feasible and economical to combine QKD with classical optical communication through the same fiber using dense wavelength division multiplexing(DWDM) technology. This study proposes a detailed scheme of TF-QKD protocol with DWDM technology and analyzes its performance, considering the influence of quantum channel number and adjacent quantum crosstalk on the secret key rates. The simulation results show that the scheme further increases the secret key rate of TF-QKD and its variants. Therefore, this scheme provides a method for improving the secret key rate for practical quantum networks.展开更多
This paper addresses an interesting security problem in wireless ad hoc networks: the dynamic group key agreement key establishment. For secure group communication in an ad hoc network, a group key shared by all group...This paper addresses an interesting security problem in wireless ad hoc networks: the dynamic group key agreement key establishment. For secure group communication in an ad hoc network, a group key shared by all group members is required. This group key should be updated when there are membership changes (when the new member joins or current member leaves) in the group. In this paper, we propose a novel, secure, scalable and efficient region-based group key agreement protocol for ad hoc networks. This is implemented by a two-level structure and a new scheme of group key update. The idea is to divide the group into subgroups, each maintaining its subgroup keys using group elliptic curve diffie-hellman (GECDH) Protocol and links with other subgroups in a tree structure using tree-based group elliptic curve diffie-hellman (TGECDH) protocol. By introducing region-based approach, messages and key updates will be limited within subgroup and outer group;hence computation load is distributed to many hosts. Both theoretical analysis and experimental results show that this Region-based key agreement protocol performs well for the key establishment problem in ad hoc network in terms of memory cost, computation cost and communication cost.展开更多
The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity mak...The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity make them difficult to detect and defend themselves against variety of attacks. The radio interference attacks that generate for WSN at the Physical Layer cannot be defeated through conventional security mechanisms proposed for 802.15.4 standards. The first section introduces the deployment model of two-tier hierarchical cluster topology architecture and investigates different jamming techniques proposed for WSN by creating specific classification of different types of jamming attacks. The following sections expose the mitigation techniques and possible built-in mechanisms to mitigate the link layer jamming attacks on proposed two-tier hierarchical clustered WSN topology. The two-tier hierarchical cluster based topology is investigated based on contention based protocol suite through OPNET simulation scenarios.展开更多
In this paper, a routing protocol for wireless sensor network, baptized energy based protocol (EBP) is proposed. Wireless sensor network presents many challenges and constraints, and one of the major constraints is th...In this paper, a routing protocol for wireless sensor network, baptized energy based protocol (EBP) is proposed. Wireless sensor network presents many challenges and constraints, and one of the major constraints is the routing problem. Due to the limited energy of sensor nodes, routing in this type of network shall perform efficiently to maximize the network lifetime. One of the proposed algorithms is the directional source aware routing protocol (DSAP) which, after simulation, showed a lot of limitations and drawbacks. The modified directional source aware routing protocol (MDSAP) was proposed by the authors of this paper to address some of the DSAP’s limitations but remains limited to a fixed topology, fixed source and stationary nodes. So EBP is proposed and operated under different scenarios and showed, after its simulation using TinyOS, many advantages in terms of load balancing, free looping, minimizing packet error rate and maximizing network lifetime.展开更多
We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercep...We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercept- resend strategy, our simulation results of the basis-splitting scheme under the non-ideal condition show a greater performance, especially with the increase of the length of shifted bits. Consequently our scheme can aid eaves- dropper to gather much more useful information.展开更多
Wireless Sensor Networks (WSNs) have inherent and unique characteristics rather than traditional networks. They have many different constraints, such as computational power, storage capacity, energy supply and etc;of ...Wireless Sensor Networks (WSNs) have inherent and unique characteristics rather than traditional networks. They have many different constraints, such as computational power, storage capacity, energy supply and etc;of course the most important issue is their energy constraint. Energy aware routing protocol is very important in WSN, but routing protocol which only considers energy has not efficient performance. Therefore considering other parameters beside energy efficiency is crucial for protocols efficiency. Depending on sensor network application, different parameters can be considered for its protocols. Congestion management can affect routing protocol performance. Congestion occurrence in network nodes leads to increasing packet loss and energy consumption. Another parameter which affects routing protocol efficiency is providing fairness in nodes energy consumption. When fairness is not considered in routing process, network will be partitioned very soon and then the network performance will be decreased. In this paper a Tree based Energy and Congestion Aware Routing Protocol (TECARP) is proposed. The proposed protocol is an energy efficient routing protocol which tries to manage congestion and to provide fairness in network. Simulation results shown in this paper imply that the TECARP has achieved its goals.展开更多
Clustering algorithms can balance the power consumption of energy constraint wireless sensor networks. This paper proposes a new clustering protocol called Mean Territorial Energy Based Clustering Protocol (MTEP) for ...Clustering algorithms can balance the power consumption of energy constraint wireless sensor networks. This paper proposes a new clustering protocol called Mean Territorial Energy Based Clustering Protocol (MTEP) for randomly deployed wireless sensor networks. In MTEP, cluster heads are selected according to residual energy and location information of a node in current round as well as mean territorial energy and total base station distance of node’s corresponding cluster territory in previous round. Energy consumption in conventional protocols becomes unbalanced because of clusters having different lengths. Proposed MTEP protocol addresses this problem by setting thresholds on cluster length and node to cluster head distance for producing equal length clusters. Simulation results show that MTEP protocol extends network lifetime and stability with reduction in energy dissipation compared to other clustering protocols such as LEACH and REAC.展开更多
Objective: Postpartum hemorrhage(PPH) is a leading cause of maternal death. Although guidelines have been updated, those with detailed protocols are limited for nursing practice. This study aims at establishing an ear...Objective: Postpartum hemorrhage(PPH) is a leading cause of maternal death. Although guidelines have been updated, those with detailed protocols are limited for nursing practice. This study aims at establishing an early assessment and intervention protocol as a toolkit for PPH for midwives and obstetrical nurses.Methods: Employing the evidence-based method, a systematic Internet search of guidelines was conducted and appraisal of literatures was conducted with AGREE system and Oxman-Guyatt Overview Quality Assessment Questionnaire(OQAQ), according to which a protocol draft was therefore developed. Then, a two-round modified Delphi method was utilized to reach a consensus of the protocol built on best practices. Selection criteria for each intervention measure included consensus level with a threshold of 70%, mean of importance(M) >3.5, and coefficient of variation(CV) <0.25. Reliability of experts' opinion was calculated by positive coefficient and authoritative coefficient. Items without consistency were enlisted in the second-round consult. When all items met the selection criteria, the protocol would be finally formulated.Results: A 122-measure protocol was established, including prevention, assessment, and intervention of PPH. With a panel of 14 experts participated in the consult, the positivity coefficient was 0.93 and 1.00 for two rounds, respectively, and the authority coefficient was 0.88. After a two-round consult and revision of the draft, the final program was formulated, containing 5 first-level indexes and 14 second-level indexes with a total item of 120.Conclusions: The PPH protocol, based on high-quality evidences, was formulated with a two-round Delphi method, which can provide insight for midwives and obstetrical nurses to effectively deal with PPH.展开更多
This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at ...This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks.展开更多
The purpose of this paper is to solve the problem of Ad Hoc network routing protocol using a Genetic Algorithm based approach. In particular, the greater reliability and efficiency, in term of duration of communicatio...The purpose of this paper is to solve the problem of Ad Hoc network routing protocol using a Genetic Algorithm based approach. In particular, the greater reliability and efficiency, in term of duration of communication paths, due to the introduction of Genetic Classifier is demonstrated.展开更多
文摘The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded version of the protocol was written for professional health care providers with a consumer version tailored for family caregivers. The underlying mid-range theory is presented along with a seminal study that was followed by further research in the United States, Canada, Great Britain, France, Sweden, Norway, Japan and Taiwan. Key studies are summarized. Given its efficacy when implemented by research staff, studies have advanced to testing the intervention under real-life conditions when implemented and evaluated by trained nursing assistants in long-term care facilities and visiting family members. In addition, one study evaluated the implementation of music by family members in the home setting. Initial research focused on agitation as the dependent variable with subsequent research indicating a more holistic response such as positive affect, expressed satisfaction, and meaningful interaction with others. The article advances by describing on-line programs designed to train health care professionals in the assessment, implementation and evaluation of individualized music. In addition, Gerdner has written a story for apicture book intended for children and their families(in press). The story models principles of individualized music to elicit positive memories, reduce anxiety and agitation, and promote communication. The article concludes with implications for future research.
文摘Recently, location-based routings in wireless sensor networks (WSNs) are attracting a lot of interest in the research community, especially because of its scalability. In location-based routing, the network size is scalable without increasing the signalling overhead as routing decisions are inherently localized. Here, each node is aware of its position in the network through some positioning device like GPS and uses this information in the routing mechanism. In this paper, we first discuss the basics of WSNs including the architecture of the network, energy consumption for the components of a typical sensor node, and draw a detailed picture of classification of location-based routing protocols. Then, we present a systematic and comprehensive taxonomy of location-based routing protocols, mostly for sensor networks. All the schemes are subsequently discussed in depth. Finally, we conclude the paper with some insights on potential research directions for location-based routing in WSNs.
基金supported by National Natural Science Foundation of China [81202279,81473057]
文摘Objective The Jidong Women Health Cohort Study is a prospective cohort study on female-specific characteristics and risks of chronic diseases in Chinese women and focuses on the potential association between menopause and risks of cardiovascular disease(CVD). Methods The study includes 4,179 female participants with an age of older than 18 years from Caofeidian district, Tangshan city, northern China. Baseline information on female-specific characteristics and potential cardiovascular risk factors was collected and all the participants underwent a physical examination with blood samples collected in 2013. To establish a better risk assessment tool of female CVD, updated information from questionnaire investigation, physical examinations and occurrence of outcome events will be collected through a longitudinal follow-up annually up to the year 2024. Results At baseline, Mean age of the participants was 42.3 ± 12.8 years. Reproduction occurred in 2,948 participants(70.5%), menopausal transition in 173(4.3%), and postmenopause in 1,058(25.3%). The incidence of arterial hypertension, dyslipidemia, and diabetes showed significant difference across different groups stratified by Stage of Reproductive Aging Workshop(STRAW) system(P < 0.05). Conclusion The Jidong Women Health Cohort Study will contribute to the scientific evidence on association between female-specific characteristics and cardiovascular risks, and will also be helpful to provide a new path for early detection and prevention of CVD.
文摘Vehicular ad hoc networks (VANETs) are a new emerging recently developed advanced technology that allows a wide group of applications related to providing more safety on roads, more convenience for passengers, self-driven vehicles, and intelligent transportation systems (ITS). There are various routing protocol categories used in VANETs, like unicast, multicast, and broadcast protocols. In unicast position-based protocols, the routing decisions are based on the geographic position of the vehicles. This does not require establishment or maintenance of routes but needs location services to determine the position of the destination. Non-delay-tolerant network protocols (non-DTN), also identified as minimum delay protocols, are aimed at minimizing the delivery time of the information. Delay-tolerant protocols (DTN) are used in a variety of operating environments, including those that are subject to failures and interruptions and those with high delay, such as VANETs. This paper discusses the comparison between non-DTN and DTN routing protocols belonging to the unicast delay-tolerant position-based category. The comparison was conducted using the NS2 simulator, and the simulations of three non-DTN routing protocols and three DTN routing protocols were recorded. Simulation results show that the DTN routing protocols outperform in delivery ratio compared to the non-DTN routing protocols, but they lead to more average delay due to buffering, the processing algorithm, and priority calculation. In conclusion, non-DTN protocols are more suitable for the city environment since the distance between nodes is relatively smaller and the variations in the network topology are slower than they are on highways. On the other hand, DTN protocols are more suitable for highways due to the buffering of packets until a clear route to destination is available.
基金supported by the State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications (Grant No. IPOC2021ZT10)the National Natural Science Foundation of China (Grant No. 11904333)+1 种基金the Fundamental Research Funds for the Central Universities (Grant No. 2019XD-A02)BUPT Innovation and Entrepreneurship Support Program (Grant No. 2022YC-T051)。
文摘Quantum key distribution(QKD) generates information-theoretical secret keys between two parties based on the physical laws of quantum mechanics. Following the advancement in quantum communication networks, it becomes feasible and economical to combine QKD with classical optical communication through the same fiber using dense wavelength division multiplexing(DWDM) technology. This study proposes a detailed scheme of TF-QKD protocol with DWDM technology and analyzes its performance, considering the influence of quantum channel number and adjacent quantum crosstalk on the secret key rates. The simulation results show that the scheme further increases the secret key rate of TF-QKD and its variants. Therefore, this scheme provides a method for improving the secret key rate for practical quantum networks.
文摘This paper addresses an interesting security problem in wireless ad hoc networks: the dynamic group key agreement key establishment. For secure group communication in an ad hoc network, a group key shared by all group members is required. This group key should be updated when there are membership changes (when the new member joins or current member leaves) in the group. In this paper, we propose a novel, secure, scalable and efficient region-based group key agreement protocol for ad hoc networks. This is implemented by a two-level structure and a new scheme of group key update. The idea is to divide the group into subgroups, each maintaining its subgroup keys using group elliptic curve diffie-hellman (GECDH) Protocol and links with other subgroups in a tree structure using tree-based group elliptic curve diffie-hellman (TGECDH) protocol. By introducing region-based approach, messages and key updates will be limited within subgroup and outer group;hence computation load is distributed to many hosts. Both theoretical analysis and experimental results show that this Region-based key agreement protocol performs well for the key establishment problem in ad hoc network in terms of memory cost, computation cost and communication cost.
文摘The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity make them difficult to detect and defend themselves against variety of attacks. The radio interference attacks that generate for WSN at the Physical Layer cannot be defeated through conventional security mechanisms proposed for 802.15.4 standards. The first section introduces the deployment model of two-tier hierarchical cluster topology architecture and investigates different jamming techniques proposed for WSN by creating specific classification of different types of jamming attacks. The following sections expose the mitigation techniques and possible built-in mechanisms to mitigate the link layer jamming attacks on proposed two-tier hierarchical clustered WSN topology. The two-tier hierarchical cluster based topology is investigated based on contention based protocol suite through OPNET simulation scenarios.
文摘In this paper, a routing protocol for wireless sensor network, baptized energy based protocol (EBP) is proposed. Wireless sensor network presents many challenges and constraints, and one of the major constraints is the routing problem. Due to the limited energy of sensor nodes, routing in this type of network shall perform efficiently to maximize the network lifetime. One of the proposed algorithms is the directional source aware routing protocol (DSAP) which, after simulation, showed a lot of limitations and drawbacks. The modified directional source aware routing protocol (MDSAP) was proposed by the authors of this paper to address some of the DSAP’s limitations but remains limited to a fixed topology, fixed source and stationary nodes. So EBP is proposed and operated under different scenarios and showed, after its simulation using TinyOS, many advantages in terms of load balancing, free looping, minimizing packet error rate and maximizing network lifetime.
基金Supported by the National Natural Science Foundation of China under Grant Nos 61301171 and 61372076the Fundamental Research Funds for the Central Universities of China under Grant No K5051301018the National 111 Project of Higher Education of China under Grant No B8038
文摘We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercept- resend strategy, our simulation results of the basis-splitting scheme under the non-ideal condition show a greater performance, especially with the increase of the length of shifted bits. Consequently our scheme can aid eaves- dropper to gather much more useful information.
文摘Wireless Sensor Networks (WSNs) have inherent and unique characteristics rather than traditional networks. They have many different constraints, such as computational power, storage capacity, energy supply and etc;of course the most important issue is their energy constraint. Energy aware routing protocol is very important in WSN, but routing protocol which only considers energy has not efficient performance. Therefore considering other parameters beside energy efficiency is crucial for protocols efficiency. Depending on sensor network application, different parameters can be considered for its protocols. Congestion management can affect routing protocol performance. Congestion occurrence in network nodes leads to increasing packet loss and energy consumption. Another parameter which affects routing protocol efficiency is providing fairness in nodes energy consumption. When fairness is not considered in routing process, network will be partitioned very soon and then the network performance will be decreased. In this paper a Tree based Energy and Congestion Aware Routing Protocol (TECARP) is proposed. The proposed protocol is an energy efficient routing protocol which tries to manage congestion and to provide fairness in network. Simulation results shown in this paper imply that the TECARP has achieved its goals.
文摘Clustering algorithms can balance the power consumption of energy constraint wireless sensor networks. This paper proposes a new clustering protocol called Mean Territorial Energy Based Clustering Protocol (MTEP) for randomly deployed wireless sensor networks. In MTEP, cluster heads are selected according to residual energy and location information of a node in current round as well as mean territorial energy and total base station distance of node’s corresponding cluster territory in previous round. Energy consumption in conventional protocols becomes unbalanced because of clusters having different lengths. Proposed MTEP protocol addresses this problem by setting thresholds on cluster length and node to cluster head distance for producing equal length clusters. Simulation results show that MTEP protocol extends network lifetime and stability with reduction in energy dissipation compared to other clustering protocols such as LEACH and REAC.
基金supported by Nursing Research Program of Shanghai Nursing Association(No.2016SD-B03)
文摘Objective: Postpartum hemorrhage(PPH) is a leading cause of maternal death. Although guidelines have been updated, those with detailed protocols are limited for nursing practice. This study aims at establishing an early assessment and intervention protocol as a toolkit for PPH for midwives and obstetrical nurses.Methods: Employing the evidence-based method, a systematic Internet search of guidelines was conducted and appraisal of literatures was conducted with AGREE system and Oxman-Guyatt Overview Quality Assessment Questionnaire(OQAQ), according to which a protocol draft was therefore developed. Then, a two-round modified Delphi method was utilized to reach a consensus of the protocol built on best practices. Selection criteria for each intervention measure included consensus level with a threshold of 70%, mean of importance(M) >3.5, and coefficient of variation(CV) <0.25. Reliability of experts' opinion was calculated by positive coefficient and authoritative coefficient. Items without consistency were enlisted in the second-round consult. When all items met the selection criteria, the protocol would be finally formulated.Results: A 122-measure protocol was established, including prevention, assessment, and intervention of PPH. With a panel of 14 experts participated in the consult, the positivity coefficient was 0.93 and 1.00 for two rounds, respectively, and the authority coefficient was 0.88. After a two-round consult and revision of the draft, the final program was formulated, containing 5 first-level indexes and 14 second-level indexes with a total item of 120.Conclusions: The PPH protocol, based on high-quality evidences, was formulated with a two-round Delphi method, which can provide insight for midwives and obstetrical nurses to effectively deal with PPH.
文摘This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks.
文摘The purpose of this paper is to solve the problem of Ad Hoc network routing protocol using a Genetic Algorithm based approach. In particular, the greater reliability and efficiency, in term of duration of communication paths, due to the introduction of Genetic Classifier is demonstrated.