期刊文献+
共找到1,409篇文章
< 1 2 71 >
每页显示 20 50 100
An efficient cross-layer buffer management optimization scheme for 5G protocol stack
1
作者 杨喜宁 ZHOU Yiqing CHEN Yang 《High Technology Letters》 EI CAS 2022年第4期384-391,共8页
It is extremely challenging for the 5G User Equipment(UE)to meet the requirement of low-latency data transmission with higher achievable data rates.And user plane processing of 5G protocol stack(PS)is one of the domin... It is extremely challenging for the 5G User Equipment(UE)to meet the requirement of low-latency data transmission with higher achievable data rates.And user plane processing of 5G protocol stack(PS)is one of the dominating components for end-to-end data transmission in the network system.In this paper,a cross-layer buffer management scheme(CLBM)is proposed.CLBM adopts a zero-copy technique for protocol data unit(PDU)processing between protocol layers and allows to improve the memory operation efficiency significantly with reduced processing latency and CPU usage.Moreover,the PS performance profiling(PSperf)tool,a general evaluation framework for the performance measurement and analysis of PS,is implemented based on the OpenAirInterface(OAI)5G platform.The evaluation result shows that compared with the PS of OAI the CLBM strategy reduces the CPU usage of RLC,PDCP,and MAC layer processing significantly up to 20.6%,63.4%,and 38.8%,respectively.In result,the processing delay of the whole user plane of PS also has been reduced distinctly at various offered traffic load. 展开更多
关键词 cross-layer optimization 5G protocol stack evaluation framework OpenAirInterface(OAI)
下载PDF
Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks 被引量:1
2
作者 Weidong Fang Wuxiong Zhang +3 位作者 Wei Yang Zhannan Li Weiwei Gao Yinxuan Yang 《Digital Communications and Networks》 SCIE CSCD 2021年第4期470-478,共9页
The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how... The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how to elect a secure cluster head and balance the network load becomes an enormous challenge.In this paper,a Trust Management-based and Low Energy Adaptive Clustering Hierarchy protocol(LEACH-TM)is proposed.In LEACH-TM,by using the number of dynamic decision cluster head nodes,residual energy and density of neighbor nodes,the size of the cluster can be better constrained to improve energy efficiency,and avoid excessive energy consumption of a node.Simultaneously,the trust management scheme is introduced into LEACH-TM to defend against internal attacks.The simulation results show that,compared with LEACH-SWDN protocol and LEACH protocol,LEACH-TM outperforms in prolonging the network lifetime and balancing the energy consumption,and can effectively mitigate the influence of malicious nodes on cluster head selection,which can greatiy guarantee the security of the overall network. 展开更多
关键词 Internet of things Wireless sensor network Secure routing protocol Trust management
下载PDF
Key Management Protocol of the IEEE 802.16e
3
作者 TIAN Haibo PANG Liaojun WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期59-62,共4页
IEEE 802.16e, as an amendment and corrigendum to the IEEE 802.16-2004, published on 28 February 2006, and intended to update and expand IEEE 802.16-2004 to allow for mobile subscriber stations. This paper summarizes t... IEEE 802.16e, as an amendment and corrigendum to the IEEE 802.16-2004, published on 28 February 2006, and intended to update and expand IEEE 802.16-2004 to allow for mobile subscriber stations. This paper summarizes the key management protocol belonging to security part of the IEEE 802.16e, which includes security negotiation, authorization, key derivation, handshake, and key transportation. While these building blocks are well designed, we point out some unwelcome features for these building blocks. We also give out suggestions to diminish the proposed problems. 展开更多
关键词 IEEE 802.16e security analysis key management protocol
下载PDF
Efficacy Analysis of an Experience on Development of the Combination Therapy Protocol for Endometriosis Management
4
作者 Abo Taleb Saremi Ameneh Lahooti Eshkevari +1 位作者 Katayoun Esmaili Pour Arash Pooladi 《Open Journal of Obstetrics and Gynecology》 2017年第1期31-40,共10页
Purpose: Endometriosis can be managed effectively by medication, surgery, or a combination of both. Numerous studies have been conducted on surgical and medication treatment options, but their results are still under ... Purpose: Endometriosis can be managed effectively by medication, surgery, or a combination of both. Numerous studies have been conducted on surgical and medication treatment options, but their results are still under discussion. Therefore, we performed a study to develop a combinational treatment for various stages of endometriosis. Methods: Over a 3-year period, 218 documented endometriosis patients were classified in 4 stages. After first laparoscopy (with electrocoagulation and adhesion removal for stages I to III), the patients were treated with GnRH analogs (Gonadotropin Releasing Hormone Agonist-375 mg of Decapeptyl) for 3, 6 & 6 months, respectively. The second and third laparoscopy procedures were performed after 3 and 6 months, with add-back therapy. The treatment was evaluated by direct observation based on laparoscopic view and the pain relief was measured by the VAS (Visual Analogue Scale) after the first step of medication for patients of stages I-III. Results: After 3 months, 70/76 patients (91.9%) with stage-I endometriosis showed complete recovery (six cases after 6 months) while 65/72 and 32/43 cases with stage-II and -III (90.3 and 74.4%), respectively, showed complete recovery after 6 months of treatment. The remaining patients had GnRH treatment for another 3 months, and all showed a complete recovery after 9 months. Furthermore, 12 of the patients with stage-IV symptoms were candidates for laparoscopy or laparotomy, and their treatment response rate was 55.6%. The pain relief was significant after the combinational treatment in patients with stages I-III (P = 0.0001). Conclusion: Our study showed efficacy of the developed protocol for the endometriosis management. 展开更多
关键词 ENDOMETRIOSIS Combinational Therapy management protocol DEVELOPMENT EFFICACY
下载PDF
Advanced Transition/Cluster Key Management Scheme for End-System Multicast Protocol
5
作者 Ayman El-Sayed 《International Journal of Communications, Network and System Sciences》 2012年第5期286-297,共12页
The recent growth of the World Wide Web has sparked new research into using the Internet for novel types of group communication, like multiparty videoconferencing and real-time streaming. Multicast has the potential t... The recent growth of the World Wide Web has sparked new research into using the Internet for novel types of group communication, like multiparty videoconferencing and real-time streaming. Multicast has the potential to be very useful, but it suffers from many problems like security. To achieve secure multicast communications with the dynamic aspect of group applications due to free membership joins and leaves in addition to member's mobility, key management is one of the most critical problems. So far, a lot of multicast key management schemes have been proposed and most of them are centralized, which have the problem of 'one point failure' and that the group controller is the bottleneck of the group. In order to solve these two problems, we propose a Key Management Scheme, using cluster-based End-System Multicast (ESM). The group management is between both 1) the main controller (MRP, Main Rendezvous Point) and the second controllers (CRP, Cluster RP), and 2) the second controllers (CRPs) and its members. So, ESM simplifies the implementation of group communication and is efficient ways to deliver a secure message to a group of recipients in a network as a practical alternative to overcome the difficulty of large scale deployment of traditional IP multicast. In this paper, we analyze different key management schemes and propose a new scheme, namely Advanced Transition/Cluster Key management Scheme (ATCKS) and find it has appropriate performance in security. 展开更多
关键词 MULTICAST protocol End-System MULTICAST Application-Level MULTICAST Security Group KEY management
下载PDF
Contribution of Forest Management Credits in Kyoto Protocol Compliance and Future Perspectives
6
作者 Xiaoquan Zhang 《Advances in Climate Change Research》 SCIE 2011年第4期171-177,共7页
3 京都协议和段 4 (KP ) 允许聚会使用的第 3 款段为抵消他们在 KP 承诺的排放减小 / 限制目标从以地为基地的活动承认。福雷斯特管理(FM ) 是主导的活动由附属建筑说明了我在 KP (20082012 ) 的第一个承诺时期在气候变化上联合国框架... 3 京都协议和段 4 (KP ) 允许聚会使用的第 3 款段为抵消他们在 KP 承诺的排放减小 / 限制目标从以地为基地的活动承认。福雷斯特管理(FM ) 是主导的活动由附属建筑说明了我在 KP (20082012 ) 的第一个承诺时期在气候变化上联合国框架习惯狂欢。数据报导了因为 2008 和 2009 显示在 24 附属建筑的排放减小目标的一半上,我狂欢期望使用 FM 移动能是由在第一个承诺时期的 FM 学分的偏移量。特别斯洛文尼亚,瑞典,拉脱维亚,芬兰,日本,和克罗地亚的排放减小目标的多数可以通过 FM 学分被完成。在第一个承诺时期在决定 16/CMP.1 包含了的全部的 FM 帽子被 50% 为所有 KP 聚会显著地过高估计并且 36% 为聚会,那选了 FM。一些聚会象那项选的 FM 活动可以主要从过高估计的帽子有益于的俄国,日本,意大利,德国,和瑞士那样。假定收获率的重要增加,尽管大多数聚会显示出一从 1990 ~ 2009 增加或网络移动的一个稳定的趋势,为 20132020 的 FM 引用水平(FMRL ) 仅仅是 FM 移动的历史的吝啬的值的 1/5。作为一座结果附属建筑,我狂欢将能在是超过 4 次在第一个承诺时期的 FM 帽子的未来使用 FM 学分。没有陆地使用,陆地使用变化和林地活动(LULUCF ) ,这个潜在的 FM 学分将在基础年里由来源说明 7.7% 全部的排出物或 1990,并且更多的附属建筑我聚会将从 FMRL 财务途径分享利益。引证张, X. , 2011:在京都协议依从和未来观点的森林管理学分的贡献。副词。Clim。变化物件, 2 (4 ) , doi:10.3724/SP .J.1248.2011.00171。 展开更多
关键词 京都议定书 森林管理 气候变化框架公约 土地利用变化 FM调频 展望 积分 斯洛文尼亚
下载PDF
Component versioning for protocol configuration management
7
作者 陈天洲 贺臻杰 +1 位作者 黄江伟 戴鸿君 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第B08期75-78,共4页
Classical software configuration management which deals with source code versioning becomes insufficient when most components are distributed in binary form. As an important aspect of software configuration, protocol ... Classical software configuration management which deals with source code versioning becomes insufficient when most components are distributed in binary form. As an important aspect of software configuration, protocol configuration also encounters those problems. This paper focuses on solving protocol component versioning issues for protocol configuration man- agement on embedded system, incorporating the following versioning issues: version identification, version description and protocol component archiving and retrieving based on the version library. 展开更多
关键词 软件工程 CBSE 协议构成管理 软件开发 代码编译
下载PDF
A web product data management system based on Simple Object Access Protocol
8
作者 陆静平 《Journal of Chongqing University》 CAS 2003年第1期57-61,共5页
A new web product data management architecture is presented. The three-tier web architecture and Simple Object Access Protocol (SOAP) are combined to build the web-based product data management (PDM) system which incl... A new web product data management architecture is presented. The three-tier web architecture and Simple Object Access Protocol (SOAP) are combined to build the web-based product data management (PDM) system which includes three tiers: the user services tier, the business services tier, and the data services tier. The client service component uses the server-side technology, and Extensible Markup Language (XML) web service which uses SOAP as the communication protocol is chosen as the business service component. To illustrate how to build a web-based PDM system using the proposed architecture, a case PDM system which included three logical tires was built. To use the security and central management features of the database, a stored procedure was recommended in the data services tier. The business object was implemented as an XML web service so that client could use standard internet protocols to communicate with the business object from any platform. In order to satisfy users using all sorts of browser, the server-side technology and Microsoft ASP.NET was used to create the dynamic user interface. 展开更多
关键词 产品数据管理系统 可扩展标记语言 WEB服务 ACCESS数据库 单目标协议 XML
下载PDF
Perioperative blood management strategies for patients undergoing total knee replacement:Where do we stand now? 被引量:13
9
作者 Tzatzairis Themistoklis Vogiatzaki Theodosia +1 位作者 Kazakos Konstantinos Drosos I Georgios 《World Journal of Orthopedics》 2017年第6期441-454,共14页
Total knee replacement(TKR) is one of the most common surgeries over the last decade. Patients undergoing TKR are at high risk for postoperative anemia and furthermore for allogeneic blood transfusions(ABT). Complicat... Total knee replacement(TKR) is one of the most common surgeries over the last decade. Patients undergoing TKR are at high risk for postoperative anemia and furthermore for allogeneic blood transfusions(ABT). Complications associated with ABT including chills, rigor, fever, dyspnea, light-headedness should be early recognized in order to lead to a better prognosis. Therefore, perioperative blood management program should be adopted with main aim to reduce the risk of blood transfusion while maximizing hemoglobin simultaneously. Many blood conservation strategies have been attempted including preoperative autologous blood donation, acute normovolemic haemodilution, autologous blood transfusion, intraoperative cell saver, drain clamping, pneumatic tourniquet application, and the use of tranexamic acid. For practical and clinical reasons we will try to classify these strategies in three main stages/pillars: Pre-operative optimization, intra-operative and post-operative protocols. The aim of this work is review the strategies currently in use and reports our experience regarding the perioperative blood management strategies in TKR. 展开更多
关键词 TOTAL KNEE replacement TRANSFUSION TOTAL KNEE arthroplasty BLOOD loss Autologous BLOOD donation BLOOD management PERIOPERATIVE Tranexamic acid Tourniquet HAEMODILUTION Anaemia TRANSFUSION protocol
下载PDF
Active Queue Management Exploiting the Rate Information in TCP-IP Networks 被引量:2
10
作者 Abderrahmane Boudi Malik Loudini 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第1期223-231,共9页
In this paper, we propose a new mechanism called explicit rate notification(ERN) to be used in end-to-end communications. The ERN scheme encodes in the header of transmission control protocol(TCP) packets information ... In this paper, we propose a new mechanism called explicit rate notification(ERN) to be used in end-to-end communications. The ERN scheme encodes in the header of transmission control protocol(TCP) packets information about the sending rate and the round trip time(RTT) of the flows. This new available information to the intermediate nodes(routers) is used to improve fairness, increase utilization, decrease the number of drops, and minimize queueing delays. Thus, it induces a better management of the queue. A comparison of our scheme with preexistent schemes, like the explicit congestion notification scheme, shows the effectiveness of the proposed mechanism. 展开更多
关键词 Active queue management congestion control FAIRNESS transmission control protocol(TCP)
下载PDF
基于WS-Management的系统管理模型
11
作者 刘倩 吕智慧 +1 位作者 吴杰 钟亦平 《计算机应用与软件》 CSCD 2010年第10期146-149,161,共5页
目前,IT系统管理环境发生了很大变化,管理对象种类日益复杂,管理规范多样化,造成系统管理复杂低效。为了解决这些问题,将Web服务管理标准用在分布式系统管理领域。首先分析了WS-Management(Web Service for Management)管理行业规范,然... 目前,IT系统管理环境发生了很大变化,管理对象种类日益复杂,管理规范多样化,造成系统管理复杂低效。为了解决这些问题,将Web服务管理标准用在分布式系统管理领域。首先分析了WS-Management(Web Service for Management)管理行业规范,然后提出了一种基于WS-Management规范的分布式系统管理模型。该模型管理接口标准化,并容易扩展,适用于多种异构的系统管理环境。并详细介绍和实现了该模型。最后基于目前研究状况和实验结果提出了未来的研究方向。 展开更多
关键词 基于Web服务的企业管理 WS-management SNMP
下载PDF
Model of Trust Management in Open Network Environment
12
作者 曹元大 宁宇鹏 《Journal of Beijing Institute of Technology》 EI CAS 2003年第3期265-268,共4页
To keep open network more efficacious and secure, it is necessary that a nice trust model and method of trust management must be developed. The reason why traditional trust models are incomplete in their function to m... To keep open network more efficacious and secure, it is necessary that a nice trust model and method of trust management must be developed. The reason why traditional trust models are incomplete in their function to manage trust is explained, and a general model based on hybrid trust model and introducer protocol is provided. The hybrid model is more flexible and efficacious to manage trust compared with hierarchy model and Web model. The introducer protocol is a better solution to build, maintain and refresh the trust relationship in open network environment. 展开更多
关键词 trust model trust management introducer protocol
下载PDF
Cross-Layer Design Based Optimized Link State Routing Protocol for Wireless Mesh Networks
13
作者 Huai-Yu Wen Guang-Chun Luo 《Journal of Electronic Science and Technology》 CAS 2011年第4期368-372,共5页
A proactive routing protocol CL-OLSR (cross-layer based optimized link state routing) by using a brand-new routing metric CLM (cross-layer metric) is proposed. CL-OLSR takes into account four link quality impact f... A proactive routing protocol CL-OLSR (cross-layer based optimized link state routing) by using a brand-new routing metric CLM (cross-layer metric) is proposed. CL-OLSR takes into account four link quality impact factors in route calculation through the cross-layer operation mechanism: the node available bandwidth, the node load, the link delivery rate, and the link interference, and thus the effect of route selection is optimized greatly. The simulation results show that the proposed CL-OLSR protocol can not only improve the network throughput to a large extent, but also reduce the end-to-end delay, while achieving load balance route results. 展开更多
关键词 cross-layer design proactive routing routing protocol wireless mesh network.
下载PDF
Management of neurosurgical patients during coronavirus disease 2019 pandemics:The Ljubljana,Slovenia experience
14
作者 Tomaz Velnar Roman Bosnjak 《World Journal of Clinical Cases》 SCIE 2022年第15期4726-4736,共11页
The novel coronavirus disease 2019(COVID-19)is an emerging disease,caused by severe acute respiratory syndrome coronavirus-2.It bears unique biological characteristics,clinical symptoms and imaging manifestations,ther... The novel coronavirus disease 2019(COVID-19)is an emerging disease,caused by severe acute respiratory syndrome coronavirus-2.It bears unique biological characteristics,clinical symptoms and imaging manifestations,therefore presenting an important and urgent threat to global health.As a result,a new public health crisis arose,threatening the world with the spread of the 2019 novel coronavirus.Despite the maximal worldwide public health responses aimed at containing the disease and delaying its spread,many countries have been confronted with a critical care crisis,and even more,countries will almost certainly follow.In Slovenia,the COVID-19 has struck the health system immensely and among all the specialities,neurosurgery has also been experiencing difficulties in the service,not only in regular,elective surgeries but especially during emergencies.The management of these neurosurgical patients has become more difficult than ever.We describe our protocol in the management of neurosurgical patients in the University Medical Centre Ljubljana,Slovenia and how neurosurgical pathology was tackled during the pandemics. 展开更多
关键词 Coronavirus disease 2019 PANDEMIC NEUROSURGERY Patient management Antivirus protocol LJUBLJANA
下载PDF
Mobility Trigger Management: Implementation and Evaluation
15
作者 Jukka MAKELA Kostas PENTIKOUSIS Vesa KYLLONEN 《International Journal of Communications, Network and System Sciences》 2009年第3期211-221,共11页
Modern mobile devices have several network interfaces and can run various network applications. In order to remain always best connected, events need to be communicated through the entire protocol stack in an efficien... Modern mobile devices have several network interfaces and can run various network applications. In order to remain always best connected, events need to be communicated through the entire protocol stack in an efficient manner. Current implementations can handle only a handful of low level events that may trigger actions for mobility management, such as signal strength indicators and cell load. In this paper, we present a framework for managing mobility triggers that can deal with a greater variety of triggering events, which may originate from any component of the node’s protocol stack as well as mobility management entities within the network. We explain the main concepts that govern our trigger management framework and discuss its architecture which aims at operating in a richer mobility management framework, enabling the deployment of new applications and services. We address several implementation issues, such as, event collection and processing, storage, and trigger dissemination, and introduce a real implementation for commodity mobile devices. We review our testbed environment and provide experimental results showcasing a lossless streaming video session handover between a laptop and a PDA using mobility and sensor-driven orientation triggers. Moreover, we empirically evaluate and analyze the performance of our prototype. We position our work and implementation within the Ambient Networks architecture and common prototype, centring in particular on the use of policies to steer operation. Finally, we outline current and future work items. 展开更多
关键词 TRIGGERING MOBILITY management Mobile Networks HANDOVER cross-layER Information management
下载PDF
Waste Management Workers’ Safety Concerns during the COVID-19 Pandemic in Ghana
16
作者 Julius Mensah-Akoto Kenichi Matsui 《Journal of Environmental Protection》 CAS 2022年第9期603-612,共10页
Waste management is one of urgent challenges in the world. In rapidly growing cities of developing countries like Accura, Ghana, waste collection is done without sufficient protection of workers. This situation became... Waste management is one of urgent challenges in the world. In rapidly growing cities of developing countries like Accura, Ghana, waste collection is done without sufficient protection of workers. This situation became worse when the COVID-19 pandemic began to threaten the health and safety of waste collection workers. This paper aims to examine waste management workers’ safety concerns during the COVID-19 pandemic in Ghana. To better understand waste management workers’ safety concerns during the pandemic, we used the questionnaire survey. Our questionnaire survey was conducted among 60 waste management workers in Accra, the capital city of Ghana. The study then discusses how municipal waste management authorities can ensure safety of waste management workers during the pandemic. Our results showed that 58% of the respondents were worried about the COVID-19 pandemic, while 20% were not even sure of the existence of the Covid-19 pandemic. Besides their worry, we also found that about 40% of the respondents had access to face masks/shields at their workplace, and 30% had hand sanitizers. This paper highlights that providing more advanced safety protocols in terms of workers daily operations and safety measures will enable a safe working environment for the workers even in terms of future pandemics. 展开更多
关键词 COVID-19 Waste management Worker Waste Collection Ghana Safety protocols
下载PDF
Quality of Management of Severe Malaria Cases in Children under Five: A Case of Four Health Facilities in the Littoral Department in Benin
17
作者 Gloria Ayivi-Vinz Ghislain E. Sopoh +4 位作者 Charles Sossa Chabi Olaniran Alphonse Biaou Abdou-Rahim Ouro-Koura Michel Makoutodé Edgar-Marius Ouendo 《Advances in Infectious Diseases》 2020年第3期163-175,共13页
<strong>Background</strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"><strong>&l... <strong>Background</strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"><strong></strong></span></b></span></span><strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;">:</span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"></span></b></span></span></strong><span><span><b><span style="font-family:;" "=""> </span></b></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;">Benin republic is a sub-Saharan African country endemic to malaria caused by </span><i><span style="font-family:Verdana;">Plasmodium falciparum</span></i><span style="font-family:Verdana;">. To reduce the death rate due to this scourge, it is essential to ensure quality care, especially for children under five years who are the most vulnerable. The main objective of this study is to assess the quality of severe malaria case management in patients under five years.</span></span></span></span><span><span><span style="font-family:;" "=""> </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"><strong>Methods</strong><strong></strong></span></b></span></span><strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;">:</span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"></span></b></span></span></strong><span><span><b><span style="font-family:;" "=""> </span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">Descriptive and analytical cross-sectional stud</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">y</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> w</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">as</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> performed in health facilities in Cotonou city, the economic capital of Benin Republic. Study sample included 205 suspected cases of severe malaria among children aged under five years, in four health facilities. In each of hospitals, all children under five years with severe malaria presumption were enrolled in the study. Quality was assessed through five components: diagnosis, treatment, </span><a name="_Hlk44629869"></a><span style="font-family:Verdana;">patient monitoring, counselling/advice, and patient’s follow-up. Base</span></span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">d</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> on the Benin Republic’s malaria case management standard protocol, the assessment criteria of each component were defined.</span></span></span><span><span><span style="font-family:;" "=""> </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"><strong>Results</strong><strong></strong></span></b></span></span><strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;">:</span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"></span></b></span></span></strong><span><span><b><span style="font-family:;" "=""> </span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">The sex ratio was 1.25 boys to a girl. The median of hospitalisation duration was 3 days with first quartile (Q1) = 2 and third quartile (Q3) = 5. Among 205 severe malaria cases included, 157 (76.59%) were not managed in accordance with the requirements of the national protocol of malaria case management. The different components of cases management are not all implemented during the care of patients.</span></span></span><span><span><span style="font-family:;" "=""> </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"><strong>Conclusion</strong><strong></strong></span></b></span></span><strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;">:</span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"></span></b></span></span></strong><span><span><b><span style="font-family:;" "=""> </span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">There is a need for training to health workers on implementation of severe malaria in children under 5 years protocol. Also, there is a need for investigation about factors associated with malaria protocol implementation.</span></span></span> 展开更多
关键词 Severe Malaria Case management protocol Observance Quality of Care BENIN
下载PDF
HAS Dynamic Buffer-Driven Resource Management to Enhance QoE in Mobile Network 被引量:2
18
作者 Fei Wang Zesong Fei Jing Wang 《China Communications》 SCIE CSCD 2017年第7期11-24,共14页
Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource manag... Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource management(BDRM) method to enhance HAS quality of experience(QoE) in mobile network. Different from the traditional methods only focusing on base station side without considering the buffer, the proposed method takes both station and client sides into account and end user's buffer plays as the drive of whole schedule process. The proposed HAS QoE influencing factors are composed of initial delay, rebuffering and quality level. The BDRM method decomposes the HAS QoE maximization problem into client and base station sides separately to solve it in multicell and multi-user video playing scene in mobile network. In client side, the decision is made based on buffer probe and rate request algorithm by each user separately. It guarantees the less rebuffering events and decides which HAS segment rate to fetch. While, in the base station side, the schedule of wireless resource is made to maximize the quality level of all access clients and decides the final rate pulled from HAS server. The drive of buffer and twice rate request schemes make BDRMtake full advantage of HAS's multi-segment and multi-rate features. As to the simulation results, compared with proportional fair(PF), Max C/I and traditional HAS schedule(THS) methods, the proposed BDRM method decreases rebuffering percent to 1.96% from 11.1% with PF and from 7.01% with THS and increases the mean MOS of all users to 3.94 from 3.42 with PF method and from 2.15 with Max C/I method. It also guarantees a high fairness with 0.98 from the view of objective and subjective assessment metrics. 展开更多
关键词 动态缓冲区 移动网络 资源管理 驱动 超文本传输协议 最大化问题 终端用户 平均方法
下载PDF
Dynamic channel estimation-aware routing protocol in mobile cognitive radio networks for smart IIoT applications
19
作者 Qusay M.Salih Md Arafatur Rahman +4 位作者 A.Taufiq Asyhari Muhammad Kamran Naeem Mohammad Patwary Ryan Alturki Mohammed Abdulaziz Ikram 《Digital Communications and Networks》 SCIE CSCD 2023年第2期367-382,共16页
Cognitive Radio Networks(CRNs)have become a successful platform in recent years for a diverse range of future systems,in particularly,industrial internet of things(IIoT)applications.In order to provide an efficient co... Cognitive Radio Networks(CRNs)have become a successful platform in recent years for a diverse range of future systems,in particularly,industrial internet of things(IIoT)applications.In order to provide an efficient connection among IIoT devices,CRNs enhance spectrum utilization by using licensed spectrum.However,the routing protocol in these networks is considered one of the main problems due to node mobility and time-variant channel selection.Specifically,the channel selection for routing protocol is indispensable in CRNs to provide an adequate adaptation to the Primary User(PU)activity and create a robust routing path.This study aims to construct a robust routing path by minimizing PU interference and routing delay to maximize throughput within the IIoT domain.Thus,a generic routing framework from a cross-layer perspective is investigated that intends to share the information resources by exploiting a recently proposed method,namely,Channel Availability Probability.Moreover,a novel cross-layer-oriented routing protocol is proposed by using a time-variant channel estimation technique.This protocol combines lower layer(Physical layer and Data Link layer)sensing that is derived from the channel estimation model.Also,it periodically updates and stores the routing table for optimal route decision-making.Moreover,in order to achieve higher throughput and lower delay,a new routing metric is presented.To evaluate the performance of the proposed protocol,network simulations have been conducted and also compared to the widely used routing protocols,as a benchmark.The simulation results of different routing scenarios demonstrate that our proposed solution outperforms the existing protocols in terms of the standard network performance metrics involving packet delivery ratio(with an improved margin of around 5–20%approximately)under varying numbers of PUs and cognitive users in Mobile Cognitive Radio Networks(MCRNs).Moreover,the cross-layer routing protocol successfully achieves high routing performance in finding a robust route,selecting the high channel stability,and reducing the probability of PU interference for continued communication. 展开更多
关键词 Channel selection cross-layer design Mobile cognitive radio networks Routing protocol IIoT applications
下载PDF
STUDY AND ENHANCEMENT ON BUFFER MANAGEMENT FOR SMOOTH HANDOVER IN MIPV6
20
作者 LinHuasheng JinYuehui ChengShiduan FanRui 《Journal of Electronics(China)》 2005年第2期131-141,共11页
For improving Transfer Control Protocol (TCP) performance in mobile environment,smooth handover with buffer management has been proposed to realize seamless handovers. However in our simulation, even if smooth handove... For improving Transfer Control Protocol (TCP) performance in mobile environment,smooth handover with buffer management has been proposed to realize seamless handovers. However in our simulation, even if smooth handover in Mobile IPv6 (MIPv6) is implemented, TCP can not always achieve better performance due to packets forwarding burst. Based on the study of buffer management for smooth handover, this paper proposes an enhanced buffer management scheme for smooth handover to improve TCP performance. In this scheme, a packet-pair probing technology is adopted to estimate the available bandwidth of the new path from Previous router (Prtr) to Mobile Node (MN), which will be used by Prtr to control the buffered packets forwarding. The simulation results demonstrate that smooth handover with this scheme can achieve better TCP performance than the original scheme. 展开更多
关键词 传输控制协议 平滑转移 TCP MIPV6 缓冲器管理
下载PDF
上一页 1 2 71 下一页 到第
使用帮助 返回顶部