期刊文献+
共找到1,420篇文章
< 1 2 71 >
每页显示 20 50 100
Optimizing Resource Management for IoT Devices in Constrained Environments
1
作者 Sadia Islam Nilima Md Khokan Bhuyan +3 位作者 Md Kamruzzaman Jahanara Akter Rakibul Hasan Fatema Tuz Johora 《Journal of Computer and Communications》 2024年第8期81-98,共18页
Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but... Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but extend to the network interfaces, particularly due to the low-power radio standards that these devices typically employ. The IPv6 protocol is shown to be a strong option for guaranteeing interoperability in the IoT, mostly because of its large address space, the range of current IP-based protocols, and its intrinsic versatility. Considering these benefits, we investigate if current IP-based network management protocols can be implemented on devices with limited resources. We investigate the resource needs in particular for implementing Network Configuration Protocol (NETCONF) and Simple Network Management Protocol (SNMP) on an 8-bit AVR-based device. Our investigation reveals the specific memory and processing demands of these protocols, providing valuable insights into their practicality and efficiency in constrained IoT environments. This study underscores the potential and challenges of leveraging IPv6-based network management protocols to enhance the functionality and interoperability of IoT devices while operating within stringent resource limitations. 展开更多
关键词 Internet of Things Resource Constraint IPv6 protocol IP-Based Network management Network management protocol Network Configuration protocol
下载PDF
An efficient cross-layer buffer management optimization scheme for 5G protocol stack
2
作者 YANG Xining ZHOU Yiqing CHEN Yang 《High Technology Letters》 EI CAS 2022年第4期384-391,共8页
It is extremely challenging for the 5G User Equipment(UE)to meet the requirement of low-latency data transmission with higher achievable data rates.And user plane processing of 5G protocol stack(PS)is one of the domin... It is extremely challenging for the 5G User Equipment(UE)to meet the requirement of low-latency data transmission with higher achievable data rates.And user plane processing of 5G protocol stack(PS)is one of the dominating components for end-to-end data transmission in the network system.In this paper,a cross-layer buffer management scheme(CLBM)is proposed.CLBM adopts a zero-copy technique for protocol data unit(PDU)processing between protocol layers and allows to improve the memory operation efficiency significantly with reduced processing latency and CPU usage.Moreover,the PS performance profiling(PSperf)tool,a general evaluation framework for the performance measurement and analysis of PS,is implemented based on the OpenAirInterface(OAI)5G platform.The evaluation result shows that compared with the PS of OAI the CLBM strategy reduces the CPU usage of RLC,PDCP,and MAC layer processing significantly up to 20.6%,63.4%,and 38.8%,respectively.In result,the processing delay of the whole user plane of PS also has been reduced distinctly at various offered traffic load. 展开更多
关键词 cross-layer optimization 5G protocol stack evaluation framework OpenAirInterface(OAI)
下载PDF
Light-Weight Simple Network Management Protocol in Wireless Sensor Networks 被引量:2
3
作者 高德云 朱婉婷 方然 《China Communications》 SCIE CSCD 2011年第8期121-129,共9页
A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node ag... A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node agents. Considering the resource limitations on the sensor nodes, we design new management messages, new data types and new management information base completely. The management messages between the cluster proxy and node agents are delivered as normal data packets. The experiment results show that LW-SNMP can meet the management demands in the resource-limited wireless sensor networks and has a good performance in stability, effectiveness of memory, extensibility than the traditional Simple Network Management Protocol (SNMP). 展开更多
关键词 WSNS network management lightweight simple network management protocol sink manager cluster proxy node agent
下载PDF
Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks 被引量:2
4
作者 Weidong Fang Wuxiong Zhang +3 位作者 Wei Yang Zhannan Li Weiwei Gao Yinxuan Yang 《Digital Communications and Networks》 SCIE CSCD 2021年第4期470-478,共9页
The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how... The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how to elect a secure cluster head and balance the network load becomes an enormous challenge.In this paper,a Trust Management-based and Low Energy Adaptive Clustering Hierarchy protocol(LEACH-TM)is proposed.In LEACH-TM,by using the number of dynamic decision cluster head nodes,residual energy and density of neighbor nodes,the size of the cluster can be better constrained to improve energy efficiency,and avoid excessive energy consumption of a node.Simultaneously,the trust management scheme is introduced into LEACH-TM to defend against internal attacks.The simulation results show that,compared with LEACH-SWDN protocol and LEACH protocol,LEACH-TM outperforms in prolonging the network lifetime and balancing the energy consumption,and can effectively mitigate the influence of malicious nodes on cluster head selection,which can greatiy guarantee the security of the overall network. 展开更多
关键词 Internet of things Wireless sensor network Secure routing protocol Trust management
下载PDF
Key Management Protocol of the IEEE 802.16e
5
作者 TIAN Haibo PANG Liaojun WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期59-62,共4页
IEEE 802.16e, as an amendment and corrigendum to the IEEE 802.16-2004, published on 28 February 2006, and intended to update and expand IEEE 802.16-2004 to allow for mobile subscriber stations. This paper summarizes t... IEEE 802.16e, as an amendment and corrigendum to the IEEE 802.16-2004, published on 28 February 2006, and intended to update and expand IEEE 802.16-2004 to allow for mobile subscriber stations. This paper summarizes the key management protocol belonging to security part of the IEEE 802.16e, which includes security negotiation, authorization, key derivation, handshake, and key transportation. While these building blocks are well designed, we point out some unwelcome features for these building blocks. We also give out suggestions to diminish the proposed problems. 展开更多
关键词 IEEE 802.16e security analysis key management protocol
下载PDF
Efficacy Analysis of an Experience on Development of the Combination Therapy Protocol for Endometriosis Management
6
作者 Abo Taleb Saremi Ameneh Lahooti Eshkevari +1 位作者 Katayoun Esmaili Pour Arash Pooladi 《Open Journal of Obstetrics and Gynecology》 2017年第1期31-40,共10页
Purpose: Endometriosis can be managed effectively by medication, surgery, or a combination of both. Numerous studies have been conducted on surgical and medication treatment options, but their results are still under ... Purpose: Endometriosis can be managed effectively by medication, surgery, or a combination of both. Numerous studies have been conducted on surgical and medication treatment options, but their results are still under discussion. Therefore, we performed a study to develop a combinational treatment for various stages of endometriosis. Methods: Over a 3-year period, 218 documented endometriosis patients were classified in 4 stages. After first laparoscopy (with electrocoagulation and adhesion removal for stages I to III), the patients were treated with GnRH analogs (Gonadotropin Releasing Hormone Agonist-375 mg of Decapeptyl) for 3, 6 & 6 months, respectively. The second and third laparoscopy procedures were performed after 3 and 6 months, with add-back therapy. The treatment was evaluated by direct observation based on laparoscopic view and the pain relief was measured by the VAS (Visual Analogue Scale) after the first step of medication for patients of stages I-III. Results: After 3 months, 70/76 patients (91.9%) with stage-I endometriosis showed complete recovery (six cases after 6 months) while 65/72 and 32/43 cases with stage-II and -III (90.3 and 74.4%), respectively, showed complete recovery after 6 months of treatment. The remaining patients had GnRH treatment for another 3 months, and all showed a complete recovery after 9 months. Furthermore, 12 of the patients with stage-IV symptoms were candidates for laparoscopy or laparotomy, and their treatment response rate was 55.6%. The pain relief was significant after the combinational treatment in patients with stages I-III (P = 0.0001). Conclusion: Our study showed efficacy of the developed protocol for the endometriosis management. 展开更多
关键词 ENDOMETRIOSIS Combinational Therapy management protocol DEVELOPMENT EFFICACY
下载PDF
Component versioning for protocol configuration management
7
作者 陈天洲 贺臻杰 +1 位作者 黄江伟 戴鸿君 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第B08期75-78,共4页
Classical software configuration management which deals with source code versioning becomes insufficient when most components are distributed in binary form. As an important aspect of software configuration, protocol ... Classical software configuration management which deals with source code versioning becomes insufficient when most components are distributed in binary form. As an important aspect of software configuration, protocol configuration also encounters those problems. This paper focuses on solving protocol component versioning issues for protocol configuration man- agement on embedded system, incorporating the following versioning issues: version identification, version description and protocol component archiving and retrieving based on the version library. 展开更多
关键词 Component-Based Software Engineering (CBSE) protocol component protocol Configuration management (PCM) VERSIONING META-MODEL
下载PDF
Advanced Transition/Cluster Key Management Scheme for End-System Multicast Protocol
8
作者 Ayman El-Sayed 《International Journal of Communications, Network and System Sciences》 2012年第5期286-297,共12页
The recent growth of the World Wide Web has sparked new research into using the Internet for novel types of group communication, like multiparty videoconferencing and real-time streaming. Multicast has the potential t... The recent growth of the World Wide Web has sparked new research into using the Internet for novel types of group communication, like multiparty videoconferencing and real-time streaming. Multicast has the potential to be very useful, but it suffers from many problems like security. To achieve secure multicast communications with the dynamic aspect of group applications due to free membership joins and leaves in addition to member's mobility, key management is one of the most critical problems. So far, a lot of multicast key management schemes have been proposed and most of them are centralized, which have the problem of 'one point failure' and that the group controller is the bottleneck of the group. In order to solve these two problems, we propose a Key Management Scheme, using cluster-based End-System Multicast (ESM). The group management is between both 1) the main controller (MRP, Main Rendezvous Point) and the second controllers (CRP, Cluster RP), and 2) the second controllers (CRPs) and its members. So, ESM simplifies the implementation of group communication and is efficient ways to deliver a secure message to a group of recipients in a network as a practical alternative to overcome the difficulty of large scale deployment of traditional IP multicast. In this paper, we analyze different key management schemes and propose a new scheme, namely Advanced Transition/Cluster Key management Scheme (ATCKS) and find it has appropriate performance in security. 展开更多
关键词 MULTICAST protocol End-System MULTICAST Application-Level MULTICAST Security Group KEY management
下载PDF
Contribution of Forest Management Credits in Kyoto Protocol Compliance and Future Perspectives
9
作者 Xiaoquan Zhang 《Advances in Climate Change Research》 SCIE 2011年第4期171-177,共7页
Article 3 paragraph 3 and paragraph 4 of the Kyoto Protocol (KP) allow parties to use credits from land-based activities for offsetting their emission reduction/limitation target committed in the KP. Forest manageme... Article 3 paragraph 3 and paragraph 4 of the Kyoto Protocol (KP) allow parties to use credits from land-based activities for offsetting their emission reduction/limitation target committed in the KP. Forest management (FM) is the dominant activity accounted by Annex I parties of the United Nation Framework Convention on Climate Change in the first commitment period of KP (2008-2012). Data reported for 2008 and 2009 indicate that over half of the emission reduction target of 24 Annex I parties that expect to use FM removals can be offset by FM credits in the first commitment period. EspeciMly the majority of the emission reduction target of Slovenia, Sweden, Latvia, Finland, Japan, and Croatia may be achieved through FM credits. The total FM CAP as contained in decision 16/CMP.1 in the first commitment period was over-estimated significantly by 50% for all KP parties and 36% for parties that elected FM. Some parties such as Russia, Japan, Italy, Germany, and Switzerland that elected FM activity may benefit largely from the over-estimated CAP. Presuming a significant increase of the harvest rate, the FM reference level (FMRL) for 2013-2020 is only 1/5 of the historical mean value of FM removals even though most parties show an increasing or a steady trend of net removals from 1990 to 2009. As a result Annex I parties would be able to use FM credits in the future that are over 4 times of FM CAP in the first commitment period. This potentiM FM credit would account for 7.7% of total emissions by sources without land use, land-use change and forestry activities (LULUCF) in the base year or 1990, and more Annex I parties would share the "benefit" from the FMRL accounting approach. 展开更多
关键词 forest management reference level credits Kyoto protocol
下载PDF
A web product data management system based on Simple Object Access Protocol
10
作者 陆静平 《Journal of Chongqing University》 CAS 2003年第1期57-61,共5页
A new web product data management architecture is presented. The three-tier web architecture and Simple Object Access Protocol (SOAP) are combined to build the web-based product data management (PDM) system which incl... A new web product data management architecture is presented. The three-tier web architecture and Simple Object Access Protocol (SOAP) are combined to build the web-based product data management (PDM) system which includes three tiers: the user services tier, the business services tier, and the data services tier. The client service component uses the server-side technology, and Extensible Markup Language (XML) web service which uses SOAP as the communication protocol is chosen as the business service component. To illustrate how to build a web-based PDM system using the proposed architecture, a case PDM system which included three logical tires was built. To use the security and central management features of the database, a stored procedure was recommended in the data services tier. The business object was implemented as an XML web service so that client could use standard internet protocols to communicate with the business object from any platform. In order to satisfy users using all sorts of browser, the server-side technology and Microsoft ASP.NET was used to create the dynamic user interface. 展开更多
关键词 web-based product data management Extensible Markup Language (XML) Simple Object Access protocol (SOAP) XML web service
下载PDF
Perioperative blood management strategies for patients undergoing total knee replacement:Where do we stand now? 被引量:13
11
作者 Tzatzairis Themistoklis Vogiatzaki Theodosia +1 位作者 Kazakos Konstantinos Drosos I Georgios 《World Journal of Orthopedics》 2017年第6期441-454,共14页
Total knee replacement(TKR) is one of the most common surgeries over the last decade. Patients undergoing TKR are at high risk for postoperative anemia and furthermore for allogeneic blood transfusions(ABT). Complicat... Total knee replacement(TKR) is one of the most common surgeries over the last decade. Patients undergoing TKR are at high risk for postoperative anemia and furthermore for allogeneic blood transfusions(ABT). Complications associated with ABT including chills, rigor, fever, dyspnea, light-headedness should be early recognized in order to lead to a better prognosis. Therefore, perioperative blood management program should be adopted with main aim to reduce the risk of blood transfusion while maximizing hemoglobin simultaneously. Many blood conservation strategies have been attempted including preoperative autologous blood donation, acute normovolemic haemodilution, autologous blood transfusion, intraoperative cell saver, drain clamping, pneumatic tourniquet application, and the use of tranexamic acid. For practical and clinical reasons we will try to classify these strategies in three main stages/pillars: Pre-operative optimization, intra-operative and post-operative protocols. The aim of this work is review the strategies currently in use and reports our experience regarding the perioperative blood management strategies in TKR. 展开更多
关键词 TOTAL KNEE replacement TRANSFUSION TOTAL KNEE arthroplasty BLOOD loss Autologous BLOOD donation BLOOD management PERIOPERATIVE Tranexamic acid Tourniquet HAEMODILUTION Anaemia TRANSFUSION protocol
下载PDF
Active Queue Management Exploiting the Rate Information in TCP-IP Networks 被引量:2
12
作者 Abderrahmane Boudi Malik Loudini 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第1期223-231,共9页
In this paper, we propose a new mechanism called explicit rate notification(ERN) to be used in end-to-end communications. The ERN scheme encodes in the header of transmission control protocol(TCP) packets information ... In this paper, we propose a new mechanism called explicit rate notification(ERN) to be used in end-to-end communications. The ERN scheme encodes in the header of transmission control protocol(TCP) packets information about the sending rate and the round trip time(RTT) of the flows. This new available information to the intermediate nodes(routers) is used to improve fairness, increase utilization, decrease the number of drops, and minimize queueing delays. Thus, it induces a better management of the queue. A comparison of our scheme with preexistent schemes, like the explicit congestion notification scheme, shows the effectiveness of the proposed mechanism. 展开更多
关键词 Active queue management congestion control FAIRNESS transmission control protocol(TCP)
下载PDF
HAS Dynamic Buffer-Driven Resource Management to Enhance QoE in Mobile Network 被引量:2
13
作者 Fei Wang Zesong Fei Jing Wang 《China Communications》 SCIE CSCD 2017年第7期11-24,共14页
Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource manag... Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource management(BDRM) method to enhance HAS quality of experience(QoE) in mobile network. Different from the traditional methods only focusing on base station side without considering the buffer, the proposed method takes both station and client sides into account and end user's buffer plays as the drive of whole schedule process. The proposed HAS QoE influencing factors are composed of initial delay, rebuffering and quality level. The BDRM method decomposes the HAS QoE maximization problem into client and base station sides separately to solve it in multicell and multi-user video playing scene in mobile network. In client side, the decision is made based on buffer probe and rate request algorithm by each user separately. It guarantees the less rebuffering events and decides which HAS segment rate to fetch. While, in the base station side, the schedule of wireless resource is made to maximize the quality level of all access clients and decides the final rate pulled from HAS server. The drive of buffer and twice rate request schemes make BDRMtake full advantage of HAS's multi-segment and multi-rate features. As to the simulation results, compared with proportional fair(PF), Max C/I and traditional HAS schedule(THS) methods, the proposed BDRM method decreases rebuffering percent to 1.96% from 11.1% with PF and from 7.01% with THS and increases the mean MOS of all users to 3.94 from 3.42 with PF method and from 2.15 with Max C/I method. It also guarantees a high fairness with 0.98 from the view of objective and subjective assessment metrics. 展开更多
关键词 resource management Hypertexl transfer protocol (HTTP) adaptive streaming (HAS) BUFFER rate request quality of experience (QoE) mobile network
下载PDF
Management of neurosurgical patients during coronavirus disease 2019 pandemics:The Ljubljana,Slovenia experience 被引量:1
14
作者 Tomaz Velnar Roman Bosnjak 《World Journal of Clinical Cases》 SCIE 2022年第15期4726-4736,共11页
The novel coronavirus disease 2019(COVID-19)is an emerging disease,caused by severe acute respiratory syndrome coronavirus-2.It bears unique biological characteristics,clinical symptoms and imaging manifestations,ther... The novel coronavirus disease 2019(COVID-19)is an emerging disease,caused by severe acute respiratory syndrome coronavirus-2.It bears unique biological characteristics,clinical symptoms and imaging manifestations,therefore presenting an important and urgent threat to global health.As a result,a new public health crisis arose,threatening the world with the spread of the 2019 novel coronavirus.Despite the maximal worldwide public health responses aimed at containing the disease and delaying its spread,many countries have been confronted with a critical care crisis,and even more,countries will almost certainly follow.In Slovenia,the COVID-19 has struck the health system immensely and among all the specialities,neurosurgery has also been experiencing difficulties in the service,not only in regular,elective surgeries but especially during emergencies.The management of these neurosurgical patients has become more difficult than ever.We describe our protocol in the management of neurosurgical patients in the University Medical Centre Ljubljana,Slovenia and how neurosurgical pathology was tackled during the pandemics. 展开更多
关键词 Coronavirus disease 2019 PANDEMIC NEUROSURGERY Patient management Antivirus protocol LJUBLJANA
下载PDF
基于WS-Management的系统管理模型
15
作者 刘倩 吕智慧 +1 位作者 吴杰 钟亦平 《计算机应用与软件》 CSCD 2010年第10期146-149,161,共5页
目前,IT系统管理环境发生了很大变化,管理对象种类日益复杂,管理规范多样化,造成系统管理复杂低效。为了解决这些问题,将Web服务管理标准用在分布式系统管理领域。首先分析了WS-Management(Web Service for Management)管理行业规范,然... 目前,IT系统管理环境发生了很大变化,管理对象种类日益复杂,管理规范多样化,造成系统管理复杂低效。为了解决这些问题,将Web服务管理标准用在分布式系统管理领域。首先分析了WS-Management(Web Service for Management)管理行业规范,然后提出了一种基于WS-Management规范的分布式系统管理模型。该模型管理接口标准化,并容易扩展,适用于多种异构的系统管理环境。并详细介绍和实现了该模型。最后基于目前研究状况和实验结果提出了未来的研究方向。 展开更多
关键词 基于Web服务的企业管理 WS-management SNMP
下载PDF
Model of Trust Management in Open Network Environment
16
作者 曹元大 宁宇鹏 《Journal of Beijing Institute of Technology》 EI CAS 2003年第3期265-268,共4页
To keep open network more efficacious and secure, it is necessary that a nice trust model and method of trust management must be developed. The reason why traditional trust models are incomplete in their function to m... To keep open network more efficacious and secure, it is necessary that a nice trust model and method of trust management must be developed. The reason why traditional trust models are incomplete in their function to manage trust is explained, and a general model based on hybrid trust model and introducer protocol is provided. The hybrid model is more flexible and efficacious to manage trust compared with hierarchy model and Web model. The introducer protocol is a better solution to build, maintain and refresh the trust relationship in open network environment. 展开更多
关键词 trust model trust management introducer protocol
下载PDF
Cross-Layer Design Based Optimized Link State Routing Protocol for Wireless Mesh Networks
17
作者 Huai-Yu Wen Guang-Chun Luo 《Journal of Electronic Science and Technology》 CAS 2011年第4期368-372,共5页
A proactive routing protocol CL-OLSR (cross-layer based optimized link state routing) by using a brand-new routing metric CLM (cross-layer metric) is proposed. CL-OLSR takes into account four link quality impact f... A proactive routing protocol CL-OLSR (cross-layer based optimized link state routing) by using a brand-new routing metric CLM (cross-layer metric) is proposed. CL-OLSR takes into account four link quality impact factors in route calculation through the cross-layer operation mechanism: the node available bandwidth, the node load, the link delivery rate, and the link interference, and thus the effect of route selection is optimized greatly. The simulation results show that the proposed CL-OLSR protocol can not only improve the network throughput to a large extent, but also reduce the end-to-end delay, while achieving load balance route results. 展开更多
关键词 cross-layer design proactive routing routing protocol wireless mesh network.
下载PDF
Waste Management Workers’ Safety Concerns during the COVID-19 Pandemic in Ghana
18
作者 Julius Mensah-Akoto Kenichi Matsui 《Journal of Environmental Protection》 CAS 2022年第9期603-612,共10页
Waste management is one of urgent challenges in the world. In rapidly growing cities of developing countries like Accura, Ghana, waste collection is done without sufficient protection of workers. This situation became... Waste management is one of urgent challenges in the world. In rapidly growing cities of developing countries like Accura, Ghana, waste collection is done without sufficient protection of workers. This situation became worse when the COVID-19 pandemic began to threaten the health and safety of waste collection workers. This paper aims to examine waste management workers’ safety concerns during the COVID-19 pandemic in Ghana. To better understand waste management workers’ safety concerns during the pandemic, we used the questionnaire survey. Our questionnaire survey was conducted among 60 waste management workers in Accra, the capital city of Ghana. The study then discusses how municipal waste management authorities can ensure safety of waste management workers during the pandemic. Our results showed that 58% of the respondents were worried about the COVID-19 pandemic, while 20% were not even sure of the existence of the Covid-19 pandemic. Besides their worry, we also found that about 40% of the respondents had access to face masks/shields at their workplace, and 30% had hand sanitizers. This paper highlights that providing more advanced safety protocols in terms of workers daily operations and safety measures will enable a safe working environment for the workers even in terms of future pandemics. 展开更多
关键词 COVID-19 Waste management Worker Waste Collection Ghana Safety protocols
下载PDF
Mobility Trigger Management: Implementation and Evaluation
19
作者 Jukka MAKELA Kostas PENTIKOUSIS Vesa KYLLONEN 《International Journal of Communications, Network and System Sciences》 2009年第3期211-221,共11页
Modern mobile devices have several network interfaces and can run various network applications. In order to remain always best connected, events need to be communicated through the entire protocol stack in an efficien... Modern mobile devices have several network interfaces and can run various network applications. In order to remain always best connected, events need to be communicated through the entire protocol stack in an efficient manner. Current implementations can handle only a handful of low level events that may trigger actions for mobility management, such as signal strength indicators and cell load. In this paper, we present a framework for managing mobility triggers that can deal with a greater variety of triggering events, which may originate from any component of the node’s protocol stack as well as mobility management entities within the network. We explain the main concepts that govern our trigger management framework and discuss its architecture which aims at operating in a richer mobility management framework, enabling the deployment of new applications and services. We address several implementation issues, such as, event collection and processing, storage, and trigger dissemination, and introduce a real implementation for commodity mobile devices. We review our testbed environment and provide experimental results showcasing a lossless streaming video session handover between a laptop and a PDA using mobility and sensor-driven orientation triggers. Moreover, we empirically evaluate and analyze the performance of our prototype. We position our work and implementation within the Ambient Networks architecture and common prototype, centring in particular on the use of policies to steer operation. Finally, we outline current and future work items. 展开更多
关键词 TRIGGERING MOBILITY management Mobile Networks HANDOVER cross-layER Information management
下载PDF
Quality of Management of Severe Malaria Cases in Children under Five: A Case of Four Health Facilities in the Littoral Department in Benin
20
作者 Gloria Ayivi-Vinz Ghislain E. Sopoh +4 位作者 Charles Sossa Chabi Olaniran Alphonse Biaou Abdou-Rahim Ouro-Koura Michel Makoutodé Edgar-Marius Ouendo 《Advances in Infectious Diseases》 2020年第3期163-175,共13页
<strong>Background</strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"><strong>&l... <strong>Background</strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"><strong></strong></span></b></span></span><strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;">:</span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"></span></b></span></span></strong><span><span><b><span style="font-family:;" "=""> </span></b></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;">Benin republic is a sub-Saharan African country endemic to malaria caused by </span><i><span style="font-family:Verdana;">Plasmodium falciparum</span></i><span style="font-family:Verdana;">. To reduce the death rate due to this scourge, it is essential to ensure quality care, especially for children under five years who are the most vulnerable. The main objective of this study is to assess the quality of severe malaria case management in patients under five years.</span></span></span></span><span><span><span style="font-family:;" "=""> </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"><strong>Methods</strong><strong></strong></span></b></span></span><strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;">:</span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"></span></b></span></span></strong><span><span><b><span style="font-family:;" "=""> </span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">Descriptive and analytical cross-sectional stud</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">y</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> w</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">as</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> performed in health facilities in Cotonou city, the economic capital of Benin Republic. Study sample included 205 suspected cases of severe malaria among children aged under five years, in four health facilities. In each of hospitals, all children under five years with severe malaria presumption were enrolled in the study. Quality was assessed through five components: diagnosis, treatment, </span><a name="_Hlk44629869"></a><span style="font-family:Verdana;">patient monitoring, counselling/advice, and patient’s follow-up. Base</span></span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">d</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> on the Benin Republic’s malaria case management standard protocol, the assessment criteria of each component were defined.</span></span></span><span><span><span style="font-family:;" "=""> </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"><strong>Results</strong><strong></strong></span></b></span></span><strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;">:</span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"></span></b></span></span></strong><span><span><b><span style="font-family:;" "=""> </span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">The sex ratio was 1.25 boys to a girl. The median of hospitalisation duration was 3 days with first quartile (Q1) = 2 and third quartile (Q3) = 5. Among 205 severe malaria cases included, 157 (76.59%) were not managed in accordance with the requirements of the national protocol of malaria case management. The different components of cases management are not all implemented during the care of patients.</span></span></span><span><span><span style="font-family:;" "=""> </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"><strong>Conclusion</strong><strong></strong></span></b></span></span><strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;">:</span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"></span></b></span></span></strong><span><span><b><span style="font-family:;" "=""> </span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">There is a need for training to health workers on implementation of severe malaria in children under 5 years protocol. Also, there is a need for investigation about factors associated with malaria protocol implementation.</span></span></span> 展开更多
关键词 Severe Malaria Case management protocol Observance Quality of Care BENIN
下载PDF
上一页 1 2 71 下一页 到第
使用帮助 返回顶部