Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but...Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but extend to the network interfaces, particularly due to the low-power radio standards that these devices typically employ. The IPv6 protocol is shown to be a strong option for guaranteeing interoperability in the IoT, mostly because of its large address space, the range of current IP-based protocols, and its intrinsic versatility. Considering these benefits, we investigate if current IP-based network management protocols can be implemented on devices with limited resources. We investigate the resource needs in particular for implementing Network Configuration Protocol (NETCONF) and Simple Network Management Protocol (SNMP) on an 8-bit AVR-based device. Our investigation reveals the specific memory and processing demands of these protocols, providing valuable insights into their practicality and efficiency in constrained IoT environments. This study underscores the potential and challenges of leveraging IPv6-based network management protocols to enhance the functionality and interoperability of IoT devices while operating within stringent resource limitations.展开更多
It is extremely challenging for the 5G User Equipment(UE)to meet the requirement of low-latency data transmission with higher achievable data rates.And user plane processing of 5G protocol stack(PS)is one of the domin...It is extremely challenging for the 5G User Equipment(UE)to meet the requirement of low-latency data transmission with higher achievable data rates.And user plane processing of 5G protocol stack(PS)is one of the dominating components for end-to-end data transmission in the network system.In this paper,a cross-layer buffer management scheme(CLBM)is proposed.CLBM adopts a zero-copy technique for protocol data unit(PDU)processing between protocol layers and allows to improve the memory operation efficiency significantly with reduced processing latency and CPU usage.Moreover,the PS performance profiling(PSperf)tool,a general evaluation framework for the performance measurement and analysis of PS,is implemented based on the OpenAirInterface(OAI)5G platform.The evaluation result shows that compared with the PS of OAI the CLBM strategy reduces the CPU usage of RLC,PDCP,and MAC layer processing significantly up to 20.6%,63.4%,and 38.8%,respectively.In result,the processing delay of the whole user plane of PS also has been reduced distinctly at various offered traffic load.展开更多
A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node ag...A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node agents. Considering the resource limitations on the sensor nodes, we design new management messages, new data types and new management information base completely. The management messages between the cluster proxy and node agents are delivered as normal data packets. The experiment results show that LW-SNMP can meet the management demands in the resource-limited wireless sensor networks and has a good performance in stability, effectiveness of memory, extensibility than the traditional Simple Network Management Protocol (SNMP).展开更多
The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how...The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how to elect a secure cluster head and balance the network load becomes an enormous challenge.In this paper,a Trust Management-based and Low Energy Adaptive Clustering Hierarchy protocol(LEACH-TM)is proposed.In LEACH-TM,by using the number of dynamic decision cluster head nodes,residual energy and density of neighbor nodes,the size of the cluster can be better constrained to improve energy efficiency,and avoid excessive energy consumption of a node.Simultaneously,the trust management scheme is introduced into LEACH-TM to defend against internal attacks.The simulation results show that,compared with LEACH-SWDN protocol and LEACH protocol,LEACH-TM outperforms in prolonging the network lifetime and balancing the energy consumption,and can effectively mitigate the influence of malicious nodes on cluster head selection,which can greatiy guarantee the security of the overall network.展开更多
IEEE 802.16e, as an amendment and corrigendum to the IEEE 802.16-2004, published on 28 February 2006, and intended to update and expand IEEE 802.16-2004 to allow for mobile subscriber stations. This paper summarizes t...IEEE 802.16e, as an amendment and corrigendum to the IEEE 802.16-2004, published on 28 February 2006, and intended to update and expand IEEE 802.16-2004 to allow for mobile subscriber stations. This paper summarizes the key management protocol belonging to security part of the IEEE 802.16e, which includes security negotiation, authorization, key derivation, handshake, and key transportation. While these building blocks are well designed, we point out some unwelcome features for these building blocks. We also give out suggestions to diminish the proposed problems.展开更多
Purpose: Endometriosis can be managed effectively by medication, surgery, or a combination of both. Numerous studies have been conducted on surgical and medication treatment options, but their results are still under ...Purpose: Endometriosis can be managed effectively by medication, surgery, or a combination of both. Numerous studies have been conducted on surgical and medication treatment options, but their results are still under discussion. Therefore, we performed a study to develop a combinational treatment for various stages of endometriosis. Methods: Over a 3-year period, 218 documented endometriosis patients were classified in 4 stages. After first laparoscopy (with electrocoagulation and adhesion removal for stages I to III), the patients were treated with GnRH analogs (Gonadotropin Releasing Hormone Agonist-375 mg of Decapeptyl) for 3, 6 & 6 months, respectively. The second and third laparoscopy procedures were performed after 3 and 6 months, with add-back therapy. The treatment was evaluated by direct observation based on laparoscopic view and the pain relief was measured by the VAS (Visual Analogue Scale) after the first step of medication for patients of stages I-III. Results: After 3 months, 70/76 patients (91.9%) with stage-I endometriosis showed complete recovery (six cases after 6 months) while 65/72 and 32/43 cases with stage-II and -III (90.3 and 74.4%), respectively, showed complete recovery after 6 months of treatment. The remaining patients had GnRH treatment for another 3 months, and all showed a complete recovery after 9 months. Furthermore, 12 of the patients with stage-IV symptoms were candidates for laparoscopy or laparotomy, and their treatment response rate was 55.6%. The pain relief was significant after the combinational treatment in patients with stages I-III (P = 0.0001). Conclusion: Our study showed efficacy of the developed protocol for the endometriosis management.展开更多
Classical software configuration management which deals with source code versioning becomes insufficient when most components are distributed in binary form. As an important aspect of software configuration, protocol ...Classical software configuration management which deals with source code versioning becomes insufficient when most components are distributed in binary form. As an important aspect of software configuration, protocol configuration also encounters those problems. This paper focuses on solving protocol component versioning issues for protocol configuration man- agement on embedded system, incorporating the following versioning issues: version identification, version description and protocol component archiving and retrieving based on the version library.展开更多
The recent growth of the World Wide Web has sparked new research into using the Internet for novel types of group communication, like multiparty videoconferencing and real-time streaming. Multicast has the potential t...The recent growth of the World Wide Web has sparked new research into using the Internet for novel types of group communication, like multiparty videoconferencing and real-time streaming. Multicast has the potential to be very useful, but it suffers from many problems like security. To achieve secure multicast communications with the dynamic aspect of group applications due to free membership joins and leaves in addition to member's mobility, key management is one of the most critical problems. So far, a lot of multicast key management schemes have been proposed and most of them are centralized, which have the problem of 'one point failure' and that the group controller is the bottleneck of the group. In order to solve these two problems, we propose a Key Management Scheme, using cluster-based End-System Multicast (ESM). The group management is between both 1) the main controller (MRP, Main Rendezvous Point) and the second controllers (CRP, Cluster RP), and 2) the second controllers (CRPs) and its members. So, ESM simplifies the implementation of group communication and is efficient ways to deliver a secure message to a group of recipients in a network as a practical alternative to overcome the difficulty of large scale deployment of traditional IP multicast. In this paper, we analyze different key management schemes and propose a new scheme, namely Advanced Transition/Cluster Key management Scheme (ATCKS) and find it has appropriate performance in security.展开更多
Article 3 paragraph 3 and paragraph 4 of the Kyoto Protocol (KP) allow parties to use credits from land-based activities for offsetting their emission reduction/limitation target committed in the KP. Forest manageme...Article 3 paragraph 3 and paragraph 4 of the Kyoto Protocol (KP) allow parties to use credits from land-based activities for offsetting their emission reduction/limitation target committed in the KP. Forest management (FM) is the dominant activity accounted by Annex I parties of the United Nation Framework Convention on Climate Change in the first commitment period of KP (2008-2012). Data reported for 2008 and 2009 indicate that over half of the emission reduction target of 24 Annex I parties that expect to use FM removals can be offset by FM credits in the first commitment period. EspeciMly the majority of the emission reduction target of Slovenia, Sweden, Latvia, Finland, Japan, and Croatia may be achieved through FM credits. The total FM CAP as contained in decision 16/CMP.1 in the first commitment period was over-estimated significantly by 50% for all KP parties and 36% for parties that elected FM. Some parties such as Russia, Japan, Italy, Germany, and Switzerland that elected FM activity may benefit largely from the over-estimated CAP. Presuming a significant increase of the harvest rate, the FM reference level (FMRL) for 2013-2020 is only 1/5 of the historical mean value of FM removals even though most parties show an increasing or a steady trend of net removals from 1990 to 2009. As a result Annex I parties would be able to use FM credits in the future that are over 4 times of FM CAP in the first commitment period. This potentiM FM credit would account for 7.7% of total emissions by sources without land use, land-use change and forestry activities (LULUCF) in the base year or 1990, and more Annex I parties would share the "benefit" from the FMRL accounting approach.展开更多
A new web product data management architecture is presented. The three-tier web architecture and Simple Object Access Protocol (SOAP) are combined to build the web-based product data management (PDM) system which incl...A new web product data management architecture is presented. The three-tier web architecture and Simple Object Access Protocol (SOAP) are combined to build the web-based product data management (PDM) system which includes three tiers: the user services tier, the business services tier, and the data services tier. The client service component uses the server-side technology, and Extensible Markup Language (XML) web service which uses SOAP as the communication protocol is chosen as the business service component. To illustrate how to build a web-based PDM system using the proposed architecture, a case PDM system which included three logical tires was built. To use the security and central management features of the database, a stored procedure was recommended in the data services tier. The business object was implemented as an XML web service so that client could use standard internet protocols to communicate with the business object from any platform. In order to satisfy users using all sorts of browser, the server-side technology and Microsoft ASP.NET was used to create the dynamic user interface.展开更多
Total knee replacement(TKR) is one of the most common surgeries over the last decade. Patients undergoing TKR are at high risk for postoperative anemia and furthermore for allogeneic blood transfusions(ABT). Complicat...Total knee replacement(TKR) is one of the most common surgeries over the last decade. Patients undergoing TKR are at high risk for postoperative anemia and furthermore for allogeneic blood transfusions(ABT). Complications associated with ABT including chills, rigor, fever, dyspnea, light-headedness should be early recognized in order to lead to a better prognosis. Therefore, perioperative blood management program should be adopted with main aim to reduce the risk of blood transfusion while maximizing hemoglobin simultaneously. Many blood conservation strategies have been attempted including preoperative autologous blood donation, acute normovolemic haemodilution, autologous blood transfusion, intraoperative cell saver, drain clamping, pneumatic tourniquet application, and the use of tranexamic acid. For practical and clinical reasons we will try to classify these strategies in three main stages/pillars: Pre-operative optimization, intra-operative and post-operative protocols. The aim of this work is review the strategies currently in use and reports our experience regarding the perioperative blood management strategies in TKR.展开更多
In this paper, we propose a new mechanism called explicit rate notification(ERN) to be used in end-to-end communications. The ERN scheme encodes in the header of transmission control protocol(TCP) packets information ...In this paper, we propose a new mechanism called explicit rate notification(ERN) to be used in end-to-end communications. The ERN scheme encodes in the header of transmission control protocol(TCP) packets information about the sending rate and the round trip time(RTT) of the flows. This new available information to the intermediate nodes(routers) is used to improve fairness, increase utilization, decrease the number of drops, and minimize queueing delays. Thus, it induces a better management of the queue. A comparison of our scheme with preexistent schemes, like the explicit congestion notification scheme, shows the effectiveness of the proposed mechanism.展开更多
Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource manag...Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource management(BDRM) method to enhance HAS quality of experience(QoE) in mobile network. Different from the traditional methods only focusing on base station side without considering the buffer, the proposed method takes both station and client sides into account and end user's buffer plays as the drive of whole schedule process. The proposed HAS QoE influencing factors are composed of initial delay, rebuffering and quality level. The BDRM method decomposes the HAS QoE maximization problem into client and base station sides separately to solve it in multicell and multi-user video playing scene in mobile network. In client side, the decision is made based on buffer probe and rate request algorithm by each user separately. It guarantees the less rebuffering events and decides which HAS segment rate to fetch. While, in the base station side, the schedule of wireless resource is made to maximize the quality level of all access clients and decides the final rate pulled from HAS server. The drive of buffer and twice rate request schemes make BDRMtake full advantage of HAS's multi-segment and multi-rate features. As to the simulation results, compared with proportional fair(PF), Max C/I and traditional HAS schedule(THS) methods, the proposed BDRM method decreases rebuffering percent to 1.96% from 11.1% with PF and from 7.01% with THS and increases the mean MOS of all users to 3.94 from 3.42 with PF method and from 2.15 with Max C/I method. It also guarantees a high fairness with 0.98 from the view of objective and subjective assessment metrics.展开更多
The novel coronavirus disease 2019(COVID-19)is an emerging disease,caused by severe acute respiratory syndrome coronavirus-2.It bears unique biological characteristics,clinical symptoms and imaging manifestations,ther...The novel coronavirus disease 2019(COVID-19)is an emerging disease,caused by severe acute respiratory syndrome coronavirus-2.It bears unique biological characteristics,clinical symptoms and imaging manifestations,therefore presenting an important and urgent threat to global health.As a result,a new public health crisis arose,threatening the world with the spread of the 2019 novel coronavirus.Despite the maximal worldwide public health responses aimed at containing the disease and delaying its spread,many countries have been confronted with a critical care crisis,and even more,countries will almost certainly follow.In Slovenia,the COVID-19 has struck the health system immensely and among all the specialities,neurosurgery has also been experiencing difficulties in the service,not only in regular,elective surgeries but especially during emergencies.The management of these neurosurgical patients has become more difficult than ever.We describe our protocol in the management of neurosurgical patients in the University Medical Centre Ljubljana,Slovenia and how neurosurgical pathology was tackled during the pandemics.展开更多
目前,IT系统管理环境发生了很大变化,管理对象种类日益复杂,管理规范多样化,造成系统管理复杂低效。为了解决这些问题,将Web服务管理标准用在分布式系统管理领域。首先分析了WS-Management(Web Service for Management)管理行业规范,然...目前,IT系统管理环境发生了很大变化,管理对象种类日益复杂,管理规范多样化,造成系统管理复杂低效。为了解决这些问题,将Web服务管理标准用在分布式系统管理领域。首先分析了WS-Management(Web Service for Management)管理行业规范,然后提出了一种基于WS-Management规范的分布式系统管理模型。该模型管理接口标准化,并容易扩展,适用于多种异构的系统管理环境。并详细介绍和实现了该模型。最后基于目前研究状况和实验结果提出了未来的研究方向。展开更多
To keep open network more efficacious and secure, it is necessary that a nice trust model and method of trust management must be developed. The reason why traditional trust models are incomplete in their function to m...To keep open network more efficacious and secure, it is necessary that a nice trust model and method of trust management must be developed. The reason why traditional trust models are incomplete in their function to manage trust is explained, and a general model based on hybrid trust model and introducer protocol is provided. The hybrid model is more flexible and efficacious to manage trust compared with hierarchy model and Web model. The introducer protocol is a better solution to build, maintain and refresh the trust relationship in open network environment.展开更多
A proactive routing protocol CL-OLSR (cross-layer based optimized link state routing) by using a brand-new routing metric CLM (cross-layer metric) is proposed. CL-OLSR takes into account four link quality impact f...A proactive routing protocol CL-OLSR (cross-layer based optimized link state routing) by using a brand-new routing metric CLM (cross-layer metric) is proposed. CL-OLSR takes into account four link quality impact factors in route calculation through the cross-layer operation mechanism: the node available bandwidth, the node load, the link delivery rate, and the link interference, and thus the effect of route selection is optimized greatly. The simulation results show that the proposed CL-OLSR protocol can not only improve the network throughput to a large extent, but also reduce the end-to-end delay, while achieving load balance route results.展开更多
Waste management is one of urgent challenges in the world. In rapidly growing cities of developing countries like Accura, Ghana, waste collection is done without sufficient protection of workers. This situation became...Waste management is one of urgent challenges in the world. In rapidly growing cities of developing countries like Accura, Ghana, waste collection is done without sufficient protection of workers. This situation became worse when the COVID-19 pandemic began to threaten the health and safety of waste collection workers. This paper aims to examine waste management workers’ safety concerns during the COVID-19 pandemic in Ghana. To better understand waste management workers’ safety concerns during the pandemic, we used the questionnaire survey. Our questionnaire survey was conducted among 60 waste management workers in Accra, the capital city of Ghana. The study then discusses how municipal waste management authorities can ensure safety of waste management workers during the pandemic. Our results showed that 58% of the respondents were worried about the COVID-19 pandemic, while 20% were not even sure of the existence of the Covid-19 pandemic. Besides their worry, we also found that about 40% of the respondents had access to face masks/shields at their workplace, and 30% had hand sanitizers. This paper highlights that providing more advanced safety protocols in terms of workers daily operations and safety measures will enable a safe working environment for the workers even in terms of future pandemics.展开更多
Modern mobile devices have several network interfaces and can run various network applications. In order to remain always best connected, events need to be communicated through the entire protocol stack in an efficien...Modern mobile devices have several network interfaces and can run various network applications. In order to remain always best connected, events need to be communicated through the entire protocol stack in an efficient manner. Current implementations can handle only a handful of low level events that may trigger actions for mobility management, such as signal strength indicators and cell load. In this paper, we present a framework for managing mobility triggers that can deal with a greater variety of triggering events, which may originate from any component of the node’s protocol stack as well as mobility management entities within the network. We explain the main concepts that govern our trigger management framework and discuss its architecture which aims at operating in a richer mobility management framework, enabling the deployment of new applications and services. We address several implementation issues, such as, event collection and processing, storage, and trigger dissemination, and introduce a real implementation for commodity mobile devices. We review our testbed environment and provide experimental results showcasing a lossless streaming video session handover between a laptop and a PDA using mobility and sensor-driven orientation triggers. Moreover, we empirically evaluate and analyze the performance of our prototype. We position our work and implementation within the Ambient Networks architecture and common prototype, centring in particular on the use of policies to steer operation. Finally, we outline current and future work items.展开更多
<strong>Background</strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"><strong>&l...<strong>Background</strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"><strong></strong></span></b></span></span><strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;">:</span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"></span></b></span></span></strong><span><span><b><span style="font-family:;" "=""> </span></b></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;">Benin republic is a sub-Saharan African country endemic to malaria caused by </span><i><span style="font-family:Verdana;">Plasmodium falciparum</span></i><span style="font-family:Verdana;">. To reduce the death rate due to this scourge, it is essential to ensure quality care, especially for children under five years who are the most vulnerable. The main objective of this study is to assess the quality of severe malaria case management in patients under five years.</span></span></span></span><span><span><span style="font-family:;" "=""> </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"><strong>Methods</strong><strong></strong></span></b></span></span><strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;">:</span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"></span></b></span></span></strong><span><span><b><span style="font-family:;" "=""> </span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">Descriptive and analytical cross-sectional stud</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">y</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> w</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">as</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> performed in health facilities in Cotonou city, the economic capital of Benin Republic. Study sample included 205 suspected cases of severe malaria among children aged under five years, in four health facilities. In each of hospitals, all children under five years with severe malaria presumption were enrolled in the study. Quality was assessed through five components: diagnosis, treatment, </span><a name="_Hlk44629869"></a><span style="font-family:Verdana;">patient monitoring, counselling/advice, and patient’s follow-up. Base</span></span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">d</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> on the Benin Republic’s malaria case management standard protocol, the assessment criteria of each component were defined.</span></span></span><span><span><span style="font-family:;" "=""> </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"><strong>Results</strong><strong></strong></span></b></span></span><strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;">:</span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"></span></b></span></span></strong><span><span><b><span style="font-family:;" "=""> </span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">The sex ratio was 1.25 boys to a girl. The median of hospitalisation duration was 3 days with first quartile (Q1) = 2 and third quartile (Q3) = 5. Among 205 severe malaria cases included, 157 (76.59%) were not managed in accordance with the requirements of the national protocol of malaria case management. The different components of cases management are not all implemented during the care of patients.</span></span></span><span><span><span style="font-family:;" "=""> </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"><strong>Conclusion</strong><strong></strong></span></b></span></span><strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;">:</span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"></span></b></span></span></strong><span><span><b><span style="font-family:;" "=""> </span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">There is a need for training to health workers on implementation of severe malaria in children under 5 years protocol. Also, there is a need for investigation about factors associated with malaria protocol implementation.</span></span></span>展开更多
文摘Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but extend to the network interfaces, particularly due to the low-power radio standards that these devices typically employ. The IPv6 protocol is shown to be a strong option for guaranteeing interoperability in the IoT, mostly because of its large address space, the range of current IP-based protocols, and its intrinsic versatility. Considering these benefits, we investigate if current IP-based network management protocols can be implemented on devices with limited resources. We investigate the resource needs in particular for implementing Network Configuration Protocol (NETCONF) and Simple Network Management Protocol (SNMP) on an 8-bit AVR-based device. Our investigation reveals the specific memory and processing demands of these protocols, providing valuable insights into their practicality and efficiency in constrained IoT environments. This study underscores the potential and challenges of leveraging IPv6-based network management protocols to enhance the functionality and interoperability of IoT devices while operating within stringent resource limitations.
基金Supported by the National Key R&D Project of China(No.2020YFB1807803)。
文摘It is extremely challenging for the 5G User Equipment(UE)to meet the requirement of low-latency data transmission with higher achievable data rates.And user plane processing of 5G protocol stack(PS)is one of the dominating components for end-to-end data transmission in the network system.In this paper,a cross-layer buffer management scheme(CLBM)is proposed.CLBM adopts a zero-copy technique for protocol data unit(PDU)processing between protocol layers and allows to improve the memory operation efficiency significantly with reduced processing latency and CPU usage.Moreover,the PS performance profiling(PSperf)tool,a general evaluation framework for the performance measurement and analysis of PS,is implemented based on the OpenAirInterface(OAI)5G platform.The evaluation result shows that compared with the PS of OAI the CLBM strategy reduces the CPU usage of RLC,PDCP,and MAC layer processing significantly up to 20.6%,63.4%,and 38.8%,respectively.In result,the processing delay of the whole user plane of PS also has been reduced distinctly at various offered traffic load.
基金supported by the Fundamental Research Funds for the Central Universities under grant No.2009JBM007supported by the National Natural Science Foundation of China under Grants No. 60802016, 60833002 and 60972010
文摘A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node agents. Considering the resource limitations on the sensor nodes, we design new management messages, new data types and new management information base completely. The management messages between the cluster proxy and node agents are delivered as normal data packets. The experiment results show that LW-SNMP can meet the management demands in the resource-limited wireless sensor networks and has a good performance in stability, effectiveness of memory, extensibility than the traditional Simple Network Management Protocol (SNMP).
基金supported by the National Natural Science Foundation of China(Grant No.61571303,No.61571004)the Shanghai Natural Science Foundation(Grant No.21ZR1461700)+3 种基金the Shanghai Sailing Program(Grant No.19YF1455800)the National Science and Technology Major Project of China(No.2018ZX03001031)the Fundamental Research Funds for State Key Laboratory of Synthetical Automation for Process Industries(Grant No.PAL-N201703)the National Key Research and Development Program of China-Internet of Things and Smart City Key Program(No.2019YFB2101600,NO.2019YFB2101602,No.2019YFB2101602-03).
文摘The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how to elect a secure cluster head and balance the network load becomes an enormous challenge.In this paper,a Trust Management-based and Low Energy Adaptive Clustering Hierarchy protocol(LEACH-TM)is proposed.In LEACH-TM,by using the number of dynamic decision cluster head nodes,residual energy and density of neighbor nodes,the size of the cluster can be better constrained to improve energy efficiency,and avoid excessive energy consumption of a node.Simultaneously,the trust management scheme is introduced into LEACH-TM to defend against internal attacks.The simulation results show that,compared with LEACH-SWDN protocol and LEACH protocol,LEACH-TM outperforms in prolonging the network lifetime and balancing the energy consumption,and can effectively mitigate the influence of malicious nodes on cluster head selection,which can greatiy guarantee the security of the overall network.
基金Supported by the National Natural Science Foundation of China (60473027)
文摘IEEE 802.16e, as an amendment and corrigendum to the IEEE 802.16-2004, published on 28 February 2006, and intended to update and expand IEEE 802.16-2004 to allow for mobile subscriber stations. This paper summarizes the key management protocol belonging to security part of the IEEE 802.16e, which includes security negotiation, authorization, key derivation, handshake, and key transportation. While these building blocks are well designed, we point out some unwelcome features for these building blocks. We also give out suggestions to diminish the proposed problems.
文摘Purpose: Endometriosis can be managed effectively by medication, surgery, or a combination of both. Numerous studies have been conducted on surgical and medication treatment options, but their results are still under discussion. Therefore, we performed a study to develop a combinational treatment for various stages of endometriosis. Methods: Over a 3-year period, 218 documented endometriosis patients were classified in 4 stages. After first laparoscopy (with electrocoagulation and adhesion removal for stages I to III), the patients were treated with GnRH analogs (Gonadotropin Releasing Hormone Agonist-375 mg of Decapeptyl) for 3, 6 & 6 months, respectively. The second and third laparoscopy procedures were performed after 3 and 6 months, with add-back therapy. The treatment was evaluated by direct observation based on laparoscopic view and the pain relief was measured by the VAS (Visual Analogue Scale) after the first step of medication for patients of stages I-III. Results: After 3 months, 70/76 patients (91.9%) with stage-I endometriosis showed complete recovery (six cases after 6 months) while 65/72 and 32/43 cases with stage-II and -III (90.3 and 74.4%), respectively, showed complete recovery after 6 months of treatment. The remaining patients had GnRH treatment for another 3 months, and all showed a complete recovery after 9 months. Furthermore, 12 of the patients with stage-IV symptoms were candidates for laparoscopy or laparotomy, and their treatment response rate was 55.6%. The pain relief was significant after the combinational treatment in patients with stages I-III (P = 0.0001). Conclusion: Our study showed efficacy of the developed protocol for the endometriosis management.
基金Project supported by the Hi-Tech Research and Development Program (863) of China (No. 2002AA1Z2306) and HP Embedded Laboratory of Zhejiang University, China
文摘Classical software configuration management which deals with source code versioning becomes insufficient when most components are distributed in binary form. As an important aspect of software configuration, protocol configuration also encounters those problems. This paper focuses on solving protocol component versioning issues for protocol configuration man- agement on embedded system, incorporating the following versioning issues: version identification, version description and protocol component archiving and retrieving based on the version library.
文摘The recent growth of the World Wide Web has sparked new research into using the Internet for novel types of group communication, like multiparty videoconferencing and real-time streaming. Multicast has the potential to be very useful, but it suffers from many problems like security. To achieve secure multicast communications with the dynamic aspect of group applications due to free membership joins and leaves in addition to member's mobility, key management is one of the most critical problems. So far, a lot of multicast key management schemes have been proposed and most of them are centralized, which have the problem of 'one point failure' and that the group controller is the bottleneck of the group. In order to solve these two problems, we propose a Key Management Scheme, using cluster-based End-System Multicast (ESM). The group management is between both 1) the main controller (MRP, Main Rendezvous Point) and the second controllers (CRP, Cluster RP), and 2) the second controllers (CRPs) and its members. So, ESM simplifies the implementation of group communication and is efficient ways to deliver a secure message to a group of recipients in a network as a practical alternative to overcome the difficulty of large scale deployment of traditional IP multicast. In this paper, we analyze different key management schemes and propose a new scheme, namely Advanced Transition/Cluster Key management Scheme (ATCKS) and find it has appropriate performance in security.
基金supported by Integrated Monitoring and Assessment on Carbon Sequestration Potential of Terrestrial Ecosystem in China(NoXDA05050602)
文摘Article 3 paragraph 3 and paragraph 4 of the Kyoto Protocol (KP) allow parties to use credits from land-based activities for offsetting their emission reduction/limitation target committed in the KP. Forest management (FM) is the dominant activity accounted by Annex I parties of the United Nation Framework Convention on Climate Change in the first commitment period of KP (2008-2012). Data reported for 2008 and 2009 indicate that over half of the emission reduction target of 24 Annex I parties that expect to use FM removals can be offset by FM credits in the first commitment period. EspeciMly the majority of the emission reduction target of Slovenia, Sweden, Latvia, Finland, Japan, and Croatia may be achieved through FM credits. The total FM CAP as contained in decision 16/CMP.1 in the first commitment period was over-estimated significantly by 50% for all KP parties and 36% for parties that elected FM. Some parties such as Russia, Japan, Italy, Germany, and Switzerland that elected FM activity may benefit largely from the over-estimated CAP. Presuming a significant increase of the harvest rate, the FM reference level (FMRL) for 2013-2020 is only 1/5 of the historical mean value of FM removals even though most parties show an increasing or a steady trend of net removals from 1990 to 2009. As a result Annex I parties would be able to use FM credits in the future that are over 4 times of FM CAP in the first commitment period. This potentiM FM credit would account for 7.7% of total emissions by sources without land use, land-use change and forestry activities (LULUCF) in the base year or 1990, and more Annex I parties would share the "benefit" from the FMRL accounting approach.
基金the National Key Project Foundation of China (No. 2001BA201A0605) and partially supported by the State Key Lab for Mechanical Transmission..
文摘A new web product data management architecture is presented. The three-tier web architecture and Simple Object Access Protocol (SOAP) are combined to build the web-based product data management (PDM) system which includes three tiers: the user services tier, the business services tier, and the data services tier. The client service component uses the server-side technology, and Extensible Markup Language (XML) web service which uses SOAP as the communication protocol is chosen as the business service component. To illustrate how to build a web-based PDM system using the proposed architecture, a case PDM system which included three logical tires was built. To use the security and central management features of the database, a stored procedure was recommended in the data services tier. The business object was implemented as an XML web service so that client could use standard internet protocols to communicate with the business object from any platform. In order to satisfy users using all sorts of browser, the server-side technology and Microsoft ASP.NET was used to create the dynamic user interface.
文摘Total knee replacement(TKR) is one of the most common surgeries over the last decade. Patients undergoing TKR are at high risk for postoperative anemia and furthermore for allogeneic blood transfusions(ABT). Complications associated with ABT including chills, rigor, fever, dyspnea, light-headedness should be early recognized in order to lead to a better prognosis. Therefore, perioperative blood management program should be adopted with main aim to reduce the risk of blood transfusion while maximizing hemoglobin simultaneously. Many blood conservation strategies have been attempted including preoperative autologous blood donation, acute normovolemic haemodilution, autologous blood transfusion, intraoperative cell saver, drain clamping, pneumatic tourniquet application, and the use of tranexamic acid. For practical and clinical reasons we will try to classify these strategies in three main stages/pillars: Pre-operative optimization, intra-operative and post-operative protocols. The aim of this work is review the strategies currently in use and reports our experience regarding the perioperative blood management strategies in TKR.
文摘In this paper, we propose a new mechanism called explicit rate notification(ERN) to be used in end-to-end communications. The ERN scheme encodes in the header of transmission control protocol(TCP) packets information about the sending rate and the round trip time(RTT) of the flows. This new available information to the intermediate nodes(routers) is used to improve fairness, increase utilization, decrease the number of drops, and minimize queueing delays. Thus, it induces a better management of the queue. A comparison of our scheme with preexistent schemes, like the explicit congestion notification scheme, shows the effectiveness of the proposed mechanism.
基金supported by the 863 project (Grant No. 2014AA01A701) Beijing Natural Science Foundation (Grant No. 4152047)
文摘Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource management(BDRM) method to enhance HAS quality of experience(QoE) in mobile network. Different from the traditional methods only focusing on base station side without considering the buffer, the proposed method takes both station and client sides into account and end user's buffer plays as the drive of whole schedule process. The proposed HAS QoE influencing factors are composed of initial delay, rebuffering and quality level. The BDRM method decomposes the HAS QoE maximization problem into client and base station sides separately to solve it in multicell and multi-user video playing scene in mobile network. In client side, the decision is made based on buffer probe and rate request algorithm by each user separately. It guarantees the less rebuffering events and decides which HAS segment rate to fetch. While, in the base station side, the schedule of wireless resource is made to maximize the quality level of all access clients and decides the final rate pulled from HAS server. The drive of buffer and twice rate request schemes make BDRMtake full advantage of HAS's multi-segment and multi-rate features. As to the simulation results, compared with proportional fair(PF), Max C/I and traditional HAS schedule(THS) methods, the proposed BDRM method decreases rebuffering percent to 1.96% from 11.1% with PF and from 7.01% with THS and increases the mean MOS of all users to 3.94 from 3.42 with PF method and from 2.15 with Max C/I method. It also guarantees a high fairness with 0.98 from the view of objective and subjective assessment metrics.
文摘The novel coronavirus disease 2019(COVID-19)is an emerging disease,caused by severe acute respiratory syndrome coronavirus-2.It bears unique biological characteristics,clinical symptoms and imaging manifestations,therefore presenting an important and urgent threat to global health.As a result,a new public health crisis arose,threatening the world with the spread of the 2019 novel coronavirus.Despite the maximal worldwide public health responses aimed at containing the disease and delaying its spread,many countries have been confronted with a critical care crisis,and even more,countries will almost certainly follow.In Slovenia,the COVID-19 has struck the health system immensely and among all the specialities,neurosurgery has also been experiencing difficulties in the service,not only in regular,elective surgeries but especially during emergencies.The management of these neurosurgical patients has become more difficult than ever.We describe our protocol in the management of neurosurgical patients in the University Medical Centre Ljubljana,Slovenia and how neurosurgical pathology was tackled during the pandemics.
文摘目前,IT系统管理环境发生了很大变化,管理对象种类日益复杂,管理规范多样化,造成系统管理复杂低效。为了解决这些问题,将Web服务管理标准用在分布式系统管理领域。首先分析了WS-Management(Web Service for Management)管理行业规范,然后提出了一种基于WS-Management规范的分布式系统管理模型。该模型管理接口标准化,并容易扩展,适用于多种异构的系统管理环境。并详细介绍和实现了该模型。最后基于目前研究状况和实验结果提出了未来的研究方向。
文摘To keep open network more efficacious and secure, it is necessary that a nice trust model and method of trust management must be developed. The reason why traditional trust models are incomplete in their function to manage trust is explained, and a general model based on hybrid trust model and introducer protocol is provided. The hybrid model is more flexible and efficacious to manage trust compared with hierarchy model and Web model. The introducer protocol is a better solution to build, maintain and refresh the trust relationship in open network environment.
基金supported by the Fundamental Research Funds for the Central Universities under Grant No.ZYGX2009j006Foundation of Science & Technology Department of Sichuan Province under Grant No.2011GZ0192
文摘A proactive routing protocol CL-OLSR (cross-layer based optimized link state routing) by using a brand-new routing metric CLM (cross-layer metric) is proposed. CL-OLSR takes into account four link quality impact factors in route calculation through the cross-layer operation mechanism: the node available bandwidth, the node load, the link delivery rate, and the link interference, and thus the effect of route selection is optimized greatly. The simulation results show that the proposed CL-OLSR protocol can not only improve the network throughput to a large extent, but also reduce the end-to-end delay, while achieving load balance route results.
文摘Waste management is one of urgent challenges in the world. In rapidly growing cities of developing countries like Accura, Ghana, waste collection is done without sufficient protection of workers. This situation became worse when the COVID-19 pandemic began to threaten the health and safety of waste collection workers. This paper aims to examine waste management workers’ safety concerns during the COVID-19 pandemic in Ghana. To better understand waste management workers’ safety concerns during the pandemic, we used the questionnaire survey. Our questionnaire survey was conducted among 60 waste management workers in Accra, the capital city of Ghana. The study then discusses how municipal waste management authorities can ensure safety of waste management workers during the pandemic. Our results showed that 58% of the respondents were worried about the COVID-19 pandemic, while 20% were not even sure of the existence of the Covid-19 pandemic. Besides their worry, we also found that about 40% of the respondents had access to face masks/shields at their workplace, and 30% had hand sanitizers. This paper highlights that providing more advanced safety protocols in terms of workers daily operations and safety measures will enable a safe working environment for the workers even in terms of future pandemics.
文摘Modern mobile devices have several network interfaces and can run various network applications. In order to remain always best connected, events need to be communicated through the entire protocol stack in an efficient manner. Current implementations can handle only a handful of low level events that may trigger actions for mobility management, such as signal strength indicators and cell load. In this paper, we present a framework for managing mobility triggers that can deal with a greater variety of triggering events, which may originate from any component of the node’s protocol stack as well as mobility management entities within the network. We explain the main concepts that govern our trigger management framework and discuss its architecture which aims at operating in a richer mobility management framework, enabling the deployment of new applications and services. We address several implementation issues, such as, event collection and processing, storage, and trigger dissemination, and introduce a real implementation for commodity mobile devices. We review our testbed environment and provide experimental results showcasing a lossless streaming video session handover between a laptop and a PDA using mobility and sensor-driven orientation triggers. Moreover, we empirically evaluate and analyze the performance of our prototype. We position our work and implementation within the Ambient Networks architecture and common prototype, centring in particular on the use of policies to steer operation. Finally, we outline current and future work items.
文摘<strong>Background</strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"><strong></strong></span></b></span></span><strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;">:</span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"></span></b></span></span></strong><span><span><b><span style="font-family:;" "=""> </span></b></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;">Benin republic is a sub-Saharan African country endemic to malaria caused by </span><i><span style="font-family:Verdana;">Plasmodium falciparum</span></i><span style="font-family:Verdana;">. To reduce the death rate due to this scourge, it is essential to ensure quality care, especially for children under five years who are the most vulnerable. The main objective of this study is to assess the quality of severe malaria case management in patients under five years.</span></span></span></span><span><span><span style="font-family:;" "=""> </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"><strong>Methods</strong><strong></strong></span></b></span></span><strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;">:</span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"></span></b></span></span></strong><span><span><b><span style="font-family:;" "=""> </span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">Descriptive and analytical cross-sectional stud</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">y</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> w</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">as</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> performed in health facilities in Cotonou city, the economic capital of Benin Republic. Study sample included 205 suspected cases of severe malaria among children aged under five years, in four health facilities. In each of hospitals, all children under five years with severe malaria presumption were enrolled in the study. Quality was assessed through five components: diagnosis, treatment, </span><a name="_Hlk44629869"></a><span style="font-family:Verdana;">patient monitoring, counselling/advice, and patient’s follow-up. Base</span></span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">d</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> on the Benin Republic’s malaria case management standard protocol, the assessment criteria of each component were defined.</span></span></span><span><span><span style="font-family:;" "=""> </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"><strong>Results</strong><strong></strong></span></b></span></span><strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;">:</span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"></span></b></span></span></strong><span><span><b><span style="font-family:;" "=""> </span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">The sex ratio was 1.25 boys to a girl. The median of hospitalisation duration was 3 days with first quartile (Q1) = 2 and third quartile (Q3) = 5. Among 205 severe malaria cases included, 157 (76.59%) were not managed in accordance with the requirements of the national protocol of malaria case management. The different components of cases management are not all implemented during the care of patients.</span></span></span><span><span><span style="font-family:;" "=""> </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"><strong>Conclusion</strong><strong></strong></span></b></span></span><strong><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;">:</span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><b><span style="font-family:Verdana;"></span></b></span></span></strong><span><span><b><span style="font-family:;" "=""> </span></b></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">There is a need for training to health workers on implementation of severe malaria in children under 5 years protocol. Also, there is a need for investigation about factors associated with malaria protocol implementation.</span></span></span>