期刊文献+
共找到38,272篇文章
< 1 2 250 >
每页显示 20 50 100
Safety and effectiveness of butorphanol in epidural labor analgesia:A protocol for a systematic review and meta-analysis 被引量:1
1
作者 Guan-Cheng Tang Man He +1 位作者 Zhen-Zhao Huang Yan Cheng 《World Journal of Clinical Cases》 SCIE 2024年第8期1416-1421,共6页
BACKGROUND Epidural analgesia is the most effective analgesic method during labor.Butorphanol administered epidurally has been shown to be a successful analgesic method during labor.However,no comprehensive study has ... BACKGROUND Epidural analgesia is the most effective analgesic method during labor.Butorphanol administered epidurally has been shown to be a successful analgesic method during labor.However,no comprehensive study has examined the safety and efficacy of using butorphanol as an epidural analgesic during labor.AIM To assess butorphanol's safety and efficacy for epidural labor analgesia.METHODS The PubMed,Cochrane Library,EMBASE,Web of Science,China National Knowledge Infrastructure,and Google Scholar databases will be searched from inception.Other types of literature,such as conference abstracts and references to pertinent reviews,will also be reviewed.We will include randomized controlled trials comparing butorphanol with other opioids combined with local anesthetics for epidural analgesia during labor.There will be no language restrictions.The primary outcomes will include the visual analog scale score for the first stage of labor,fetal effects,and Apgar score.Two independent reviewers will evaluate the full texts,extract data,and assess the risk of bias.Publication bias will be evaluated using Egger's or Begg's tests as well as visual analysis of a funnel plot,and heterogeneity will be evaluated using the Cochran Q test,P values,and I2 values.Meta-analysis,subgroup analysis,and sensitivity analysis will be performed using RevMan software version 5.4.This protocol was developed in accordance with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)Protocols statement,and the PRISMA statement will be used for the systematic review.RESULTS This study provides reliable information regarding the safety and efficacy of using butorphanol as an epidural analgesic during labor.CONCLUSION To support clinical practice and development,this study provides evidence-based findings regarding the safety and efficacy of using butorphanol as an epidural analgesic during labor. 展开更多
关键词 Epidural analgesia during labor BUTORPHANOL SAFETY protocol META-ANALYSIS
下载PDF
Cell replacement with stem cell-derived retinal ganglion cells from different protocols 被引量:1
2
作者 Ziming Luo Kun-Che Chang 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第4期807-810,共4页
Glaucoma,characterized by a degenerative loss of retinal ganglion cells,is the second leading cause of blindness worldwide.There is currently no cure for vision loss in glaucoma because retinal ganglion cells do not r... Glaucoma,characterized by a degenerative loss of retinal ganglion cells,is the second leading cause of blindness worldwide.There is currently no cure for vision loss in glaucoma because retinal ganglion cells do not regenerate and are not replaced after injury.Human stem cell-derived retinal ganglion cell transplant is a potential therapeutic strategy for retinal ganglion cell degenerative diseases.In this review,we first discuss a 2D protocol for retinal ganglion cell differentiation from human stem cell culture,including a rapid protocol that can generate retinal ganglion cells in less than two weeks and focus on their transplantation outcomes.Next,we discuss using 3D retinal organoids for retinal ganglion cell transplantation,comparing cell suspensions and clusters.This review provides insight into current knowledge on human stem cell-derived retinal ganglion cell differentiation and transplantation,with an impact on the field of regenerative medicine and especially retinal ganglion cell degenerative diseases such as glaucoma and other optic neuropathies. 展开更多
关键词 cell clumps cell suspension cell transplantation DIFFERENTIATION direct-induced protocol GLAUCOMA optic neuropathy regenerative medicine retinal ganglion cell retinal organoids stem cells
下载PDF
Corneal collagen cross-linking in patients with keratoconus from the Dresden protocol to customized solutions:theoretical basis
3
作者 Ciro Caruso Luca D’Andrea +4 位作者 Mario Troisi Michele Rinaldi Raffaele Piscopo Salvatore Troisi Ciro Costagliola 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2024年第5期951-962,共12页
Keratoconus is an ectatic condition characterized by gradual corneal thinning,corneal protrusion,progressive irregular astigmatism,corneal fibrosis,and visual impairment.The therapeutic options regarding improvement o... Keratoconus is an ectatic condition characterized by gradual corneal thinning,corneal protrusion,progressive irregular astigmatism,corneal fibrosis,and visual impairment.The therapeutic options regarding improvement of visual function include glasses or soft contact lenses correction for initial stages,gas-permeable rigid contact lenses,scleral lenses,implantation of intrastromal corneal ring or corneal transplants for most advanced stages.In keratoconus cases showing disease progression corneal collagen crosslinking(CXL)has been proven to be an effective,minimally invasive and safe procedure.CXL consists of a photochemical reaction of corneal collagen by riboflavin stimulation with ultraviolet A radiation,resulting in stromal crosslinks formation.The aim of this review is to carry out an examination of CXL methods based on theoretical basis and mathematical models,from the original Dresden protocol to the most recent developments in the technique,reporting the changes proposed in the last 15y and examining the advantages and disadvantages of the various treatment protocols.Finally,the limits of non-standardized methods and the perspectives offered by a customization of the treatment are highlighted. 展开更多
关键词 corneal collagen cross linking KERATOCONUS custom fast protocol Dresden protocol lambert-beer law Bunsen-roscoe law
下载PDF
Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies
4
作者 Waseem Akram Khalid Mahmood +3 位作者 Hafiz Burhan ul Haq Muhammad Asif Shehzad Ashraf Chaudhry Taeshik Shon 《Computers, Materials & Continua》 SCIE EI 2024年第7期263-280,共18页
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the Internet.HTTP cookie... Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the Internet.HTTP cookies are exploited to carry client patterns observed by a website.These client patterns facilitate the particular client’s future visit to the corresponding website.However,security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the browser.Several protocols have been introduced that maintain HTTP cookies,but many of those fail to achieve the required security,or require a lot of resource overheads.In this article,we have introduced a lightweight Elliptic Curve Cryptographic(ECC)based protocol for authenticating client and server transactions to maintain the privacy and security of HTTP cookies.Our proposed protocol uses a secret key embedded within a cookie.The proposed protocol ismore efficient and lightweight than related protocols because of its reduced computation,storage,and communication costs.Moreover,the analysis presented in this paper confirms that proposed protocol resists various known attacks. 展开更多
关键词 COOKIES authentication protocol impersonation attack ECC
下载PDF
Enhancing Network Design through Statistical Evaluation of MANET Routing Protocols
5
作者 Ibrahim Alameri Tawfik Al-Hadhrami +2 位作者 Anjum Nazir Abdulsamad Ebrahim Yahya Atef Gharbi 《Computers, Materials & Continua》 SCIE EI 2024年第7期319-339,共21页
This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network(MANET)routing protocols:Destination Sequenced Distance Vector(DSDV),Ad hoc... This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network(MANET)routing protocols:Destination Sequenced Distance Vector(DSDV),Ad hoc On-Demand Distance Vector(AODV),Dynamic Source Routing(DSR),and Zone Routing Protocol(ZRP).In this paper,the evaluation will be carried out using complete sets of statistical tests such as Kruskal-Wallis,Mann-Whitney,and Friedman.It articulates a systematic evaluation of how the performance of the previous protocols varies with the number of nodes and the mobility patterns.The study is premised upon the Quality of Service(QoS)metrics of throughput,packet delivery ratio,and end-to-end delay to gain an adequate understanding of the operational efficiency of each protocol under different network scenarios.The findings explained significant differences in the performance of different routing protocols;as a result,decisions for the selection and optimization of routing protocols can be taken effectively according to different network requirements.This paper is a step forward in the general understanding of the routing dynamics of MANETs and contributes significantly to the strategic deployment of robust and efficient network infrastructures. 展开更多
关键词 Routing protocols statistical approach friedman MANET
下载PDF
Designing Proportional-Integral Consensus Protocols for Second-Order Multi-Agent Systems Using Delayed and Memorized State Information
6
作者 Honghai Wang Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期878-892,共15页
This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consens... This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consensus protocol is designed by using delayed and memorized state information.Under the proportional-integral consensus protocol,the consensus problem of the multi-agent system is transformed into the problem of asymptotic stability of the corresponding linear time-invariant time-delay system.Note that the location of the eigenvalues of the corresponding characteristic function of the linear time-invariant time-delay system not only determines the stability of the system,but also plays a critical role in the dynamic performance of the system.In this paper,based on recent results on the distribution of roots of quasi-polynomials,several necessary conditions for Hurwitz stability for a class of quasi-polynomials are first derived.Then allowable regions of consensus protocol parameters are estimated.Some necessary and sufficient conditions for determining effective protocol parameters are provided.The designed protocol can achieve consensus and improve the dynamic performance of the second-order multi-agent system.Moreover,the effects of delays on consensus of systems of harmonic oscillators/double integrators under proportional-integral consensus protocols are investigated.Furthermore,some results on proportional-integral consensus are derived for a class of high-order linear time-invariant multi-agent systems. 展开更多
关键词 Consensus protocol Hurwitz stability multi-agent systems quasi-polynomials time delay
下载PDF
A Formal Model for Analyzing Fair Exchange Protocols Based on Event Logic
7
作者 Ke Yang Meihua Xiao Zehuan Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2641-2663,共23页
Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and elec... Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and electronic contract signing,ensuring the reliability and security of network transactions.In order to address the limitations of current research methods and enhance the analytical capabilities for fair exchange protocols,this paper proposes a formal model for analyzing such protocols.The proposed model begins with a thorough analysis of fair exchange protocols,followed by the formal definition of fairness.This definition accurately captures the inherent requirements of fair exchange protocols.Building upon event logic,the model incorporates the time factor into predicates and introduces knowledge set axioms.This enhancement empowers the improved logic to effectively describe the state and knowledge of protocol participants at different time points,facilitating reasoning about their acquired knowledge.To maximize the intruder’s capabilities,channel errors are translated into the behaviors of the intruder.The participants are further categorized into honest participants and malicious participants,enabling a comprehensive evaluation of the intruder’s potential impact.By employing a typical fair exchange protocol as an illustrative example,this paper demonstrates the detailed steps of utilizing the proposed model for protocol analysis.The entire process of protocol execution under attack scenarios is presented,shedding light on the underlying reasons for the attacks and proposing corresponding countermeasures.The developedmodel enhances the ability to reason about and evaluate the security properties of fair exchange protocols,thereby contributing to the advancement of secure network transactions. 展开更多
关键词 Fair exchange protocols FAIRNESS formal analysis logic reasoning
下载PDF
Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks
8
作者 Youseef Alotaibi B.Rajasekar +1 位作者 R.Jayalakshmi Surendran Rajendran 《Computers, Materials & Continua》 SCIE EI 2024年第3期4243-4262,共20页
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effect... Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods. 展开更多
关键词 Vehicular networks communication protocol CLUSTERING falcon optimization algorithm ROUTING
下载PDF
Hyperbolic Tangent Function-Based Protocols for Global/Semi-Global Finite-Time Consensus of Multi-Agent Systems
9
作者 Zongyu Zuo Jingchuan Tang +1 位作者 Ruiqi Ke Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第6期1381-1397,共17页
This paper investigates the problem of global/semi-global finite-time consensus for integrator-type multi-agent sys-tems.New hyperbolic tangent function-based protocols are pro-posed to achieve global and semi-global ... This paper investigates the problem of global/semi-global finite-time consensus for integrator-type multi-agent sys-tems.New hyperbolic tangent function-based protocols are pro-posed to achieve global and semi-global finite-time consensus for both single-integrator and double-integrator multi-agent systems with leaderless undirected and leader-following directed commu-nication topologies.These new protocols not only provide an explicit upper-bound estimate for the settling time,but also have a user-prescribed bounded control level.In addition,compared to some existing results based on the saturation function,the pro-posed approach considerably simplifies the protocol design and the stability analysis.Illustrative examples and an application demonstrate the effectiveness of the proposed protocols. 展开更多
关键词 Consensus protocol finite-time consensus hyper-bolic tangent function multi-agent systems.
下载PDF
Protocol for lower back pain management: Insights from the French healthcare system
10
作者 Lea Evangeline Boyer Mathieu Boudier-Revéret Min Cheol Chang 《World Journal of Clinical Cases》 SCIE 2024年第11期1875-1880,共6页
In this editorial we comment on the article published in a recent issue of the World Journal of Clinical Cases.This article described a novel ultrasound-guided lateral recess block approach in treating a patient with ... In this editorial we comment on the article published in a recent issue of the World Journal of Clinical Cases.This article described a novel ultrasound-guided lateral recess block approach in treating a patient with lateral recess stenosis.The impact of spinal pain-related disability extends significantly,causing substantial human suffering and medical costs.Each county has its preferred treatment strategies for spinal pain.Here,we explore the lower back pain(LBP)treatment algorithm recommended in France.The treatment algorithm for LBP recommended by the French National Authority for Health emphasizes early patient activity and minimal medication use.It encourages the continuation of daily activities,limits excessive medication and spinal injections,and incorporates psychological assessments and non-pharmacological therapies for chronic cases.However,the algorithm may not aggressively address acute pain in the early stages,potentially delaying relief and increasing the risk of chronicity.Additionally,the recommended infiltrations primarily involve caudal epidural steroid injections,with limited consideration for other injection procedures,such as transforaminal or interlaminar epidural steroid injections.The fixed follow-up timeline may not accommodate patients who do not respond to initial treatment or experience intense pain,potentially delaying the exploration of alternative therapies.Despite these limitations,understanding the strengths and weaknesses of the French approach could inform adaptations in LBP treatment strategies globally,potentially enhancing patient outcomes and satisfaction across diverse healthcare systems. 展开更多
关键词 Lower back pain protocol FRANCE TREATMENT Chronic pain
下载PDF
A Multi-Token Sector Antenna Neighbor Discovery Protocol for Directional Ad Hoc Networks
11
作者 Zhang Hang Li Bo +2 位作者 Yan Zhongjiang Yang Mao Li Xinru 《China Communications》 SCIE CSCD 2024年第7期149-168,共20页
In this paper,we propose a Multi-token Sector Antenna Neighbor Discovery(M-SAND)protocol to enhance the efficiency of neighbor discovery in asynchronous directional ad hoc networks.The central concept of our work invo... In this paper,we propose a Multi-token Sector Antenna Neighbor Discovery(M-SAND)protocol to enhance the efficiency of neighbor discovery in asynchronous directional ad hoc networks.The central concept of our work involves maintaining multiple tokens across the network.To prevent mutual interference among multi-token holders,we introduce the time and space non-interference theorems.Furthermore,we propose a master-slave strategy between tokens.When the master token holder(MTH)performs the neighbor discovery,it decides which 1-hop neighbor is the next MTH and which 2-hop neighbors can be the new slave token holders(STHs).Using this approach,the MTH and multiple STHs can simultaneously discover their neighbors without causing interference with each other.Building on this foundation,we provide a comprehensive procedure for the M-SAND protocol.We also conduct theoretical analyses on the maximum number of STHs and the lower bound of multi-token generation probability.Finally,simulation results demonstrate the time efficiency of the M-SAND protocol.When compared to the QSAND protocol,which uses only one token,the total neighbor discovery time is reduced by 28% when 6beams and 112 nodes are employed. 展开更多
关键词 multi-token neighbor discovery SAND protocol sector antenna ad hoc network
下载PDF
Distributed Fault Estimation for Nonlinear Systems With Sensor Saturation and Deception Attacks Using Stochastic Communication Protocols
12
作者 Weiwei Sun Xinci Gao +1 位作者 Lusong Ding Xiangyu Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第8期1865-1876,共12页
This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimati... This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimation structure under consideration,an estimation center is not necessary,and the estimator derives its information from itself and neighboring nodes,which fuses the state vector and the measurement vector.In an effort to cut down data conflicts in communication networks,the stochastic communication protocol(SCP)is employed so that the output signals from sensors can be selected.Additionally,a recursive security estimator scheme is created since attackers randomly inject malicious signals into the selected data.On this basis,sufficient conditions for a fault estimator with less conservatism are presented which ensure an upper bound of the estimation error covariance and the mean-square exponential boundedness of the estimating error.Finally,a numerical example is used to show the reliability and effectiveness of the considered distributed estimation algorithm. 展开更多
关键词 Actuator fault deception attacks distributed estimation sensor saturation stochastic communication protocol(SCP).
下载PDF
Research trends of clinical studies on acupuncture protocols over the past 20 years:a bibliometric analysis
13
作者 Zhi-Qiang Li Xue-Feng Wang +3 位作者 Heng Yin Feng Cao Yu-Tong Fei Jian-Ping Liu 《Integrative Medicine Discovery》 2024年第28期1-14,共14页
Background:Acupuncture protocols are essential as they guide study design and improve the quality of clinical trial,thus preventing avoid research waste.Given the increasing number of publications on acupuncture proto... Background:Acupuncture protocols are essential as they guide study design and improve the quality of clinical trial,thus preventing avoid research waste.Given the increasing number of publications on acupuncture protocols,this study aimed to assess the publications trends of acupuncture protocols over the past two decades and provided an overview for future research directions.Methods:Publications focusing on acupuncture protocols in clinical settings were retrieved and compiled from the Web of Science Core Collection spanning the period from 2004 to 2023.CiteSpace and Microsoft Excel software were used to analyze the relationship of publication with countries,institutions,authors,co-cited author,journals,references,keywords and other literature aspects.Results:This study analyzed 721 articles encompassing acupuncture protocols.A continuous yet fluctuating growth in publications volume were observed from 2004 to 2023.Notably,China stands at the forefront in contributing to acupuncture protocols,publishing 513 papers and demonstrating a high centrality score of 1.07 in cooperative network.Furthermore,China has fostered close collaborations with the USA and South Korea.Beijing University of Chinese Medicine(89),Zhishun Liu(36)and Trials(306)emerged as the top contributors in terms of institution,author,and journal,respectively.However,inter-institutional and author collaboration was relatively weak.Macpherson H was the most frequently cited author.High-frequency keywords included“randomized controlled trials”,“acupuncture”,“management”,“study protocol”,“quality of life”.Analysis of timeline diagram of keywords indicated that“functional dyspepsia”,“stroke”,“electroacupuncture”,and“colorectal cancer”were the research development trends and focus.Conclusion:Clinical acupuncture protocols have experienced robust development over the past two decades,with current research hotspots focusing on disease management and quality of life,which remain key research concerns.Moreover,we advocate for researchers to publish acupuncture protocols,which remain key research concerns.This approach allows for thorough pre-study planning of methodologies and objectives,enhancing scientific rigor through peer review,thereby laying the foundation for conducting high-quality research. 展开更多
关键词 ACUPUNCTURE protocol BIBLIOMETRIC HOTSPOTS CiteSpace
下载PDF
Exploration of standard dosage for GnRH antagonist protocol and dosage adjustments after premature luteinizing hormone surge
14
作者 HAN Zhong-yi WU Ting-ting MA Yan-lin 《Journal of Hainan Medical University》 CAS 2024年第3期74-78,共5页
The gonadotropin-releasing hormone (GnRH) antagonist protocol has emerged as an efficacious alternative to the GnRH agonist protocol for controlled ovarian hyperstimulation (COH) during in vitro fertilization (IVF) cy... The gonadotropin-releasing hormone (GnRH) antagonist protocol has emerged as an efficacious alternative to the GnRH agonist protocol for controlled ovarian hyperstimulation (COH) during in vitro fertilization (IVF) cycles, and has been demonstrated applicability in infertile female patients with diverse ovarian responses. While the clinical implementation of the antagonist COH protocol has achieved widespread consensus, opportunities for refinement persist. Therefore, this review article focuses on the advantages and disadvantages of GnRH antagonist protocol, the selection of optimal standard doses, and the strategies for adjusting antagonist doses after the premature luteinizing hormone (LH) surge, aiming to provide more reasonable and scientific recommendations for the application of this scheme. 展开更多
关键词 GnRH antagonist protocol Optimal dosage Premature LH surge
下载PDF
Priority Based Energy Efficient MAC Protocol by Varying Data Ratefor Wireless Body Area Network
15
作者 R.Sangeetha Usha Devi Gandhi 《Computer Systems Science & Engineering》 2024年第2期395-411,共17页
Wireless Body Area Network(WBAN)is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body.WBAN is a collection of in-body and on-body sensors that monitor ... Wireless Body Area Network(WBAN)is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body.WBAN is a collection of in-body and on-body sensors that monitor human physical parameters such as temperature,blood pressure,pulse rate,oxygen level,body motion,and so on.They sense the data and communicate it to the Body Area Network(BAN)Coordinator.The main challenge for the WBAN is energy consumption.These issues can be addressed by implementing an effective Medium Access Control(MAC)protocol that reduces energy consumption and increases network lifetime.The purpose of the study is to minimize the energy consumption and minimize the delay using IEEE 802.15.4 standard.In our proposed work,if any critical events have occurred the proposed work is to classify and prioritize the data.We gave priority to the highly critical data to get the Guarantee Tine Slots(GTS)in IEEE 802.15.4 standard superframe to achieve greater energy efficiency.The proposed MAC provides higher data rates for critical data based on the history and current condition and also provides the best reliable service to high critical data and critical data by predicting node similarity.As an outcome,we proposed a MAC protocol for Variable Data Rates(MVDR).When compared to existing MAC protocols,the MVDR performed very well with low energy intake,less interruption,and an enhanced packet-sharing ratio. 展开更多
关键词 Wireless Body Area Network(WBAN) IEEE 802.15.4 energy efficiency MAC protocol ZIGBEE
下载PDF
A Generic and Reliable Land Acquisition Protocol Implementation for Sub-Saharan Africa Countries
16
作者 Bayomock Linwa André Claude Traore Hamidou 《Journal of Computer and Communications》 2024年第1期208-245,共38页
Land acquisition is subject of many frauds worldwide. In Africa countries, land acquisition frauds are a real curse. Main reasons of the high land acquisition frauds in Africa are a lack of a reliable land acquisition... Land acquisition is subject of many frauds worldwide. In Africa countries, land acquisition frauds are a real curse. Main reasons of the high land acquisition frauds in Africa are a lack of a reliable land acquisition protocol implementation, no centralized information system that records land transactions and integrates all actors, lack of education about the acquisition protocol and lack of applied sanctions in case of frauds. As of sanctions, the issue is bound to the corruption plague in Africa. Authorities that are supposed to rule the laws are not well paid and are part of the corruption scheme. Most frequent frauds are multiple sales of the same land, falsified land title, false owner identification. In Africa, a land belongs generally to the first residents of the area. To claim ownership of a land, an owner should be recognized by the rural or city authorities. To achieve this recognition, he must obtain from those authorities an attribution letter. The author proposed a complete and reliable land acquisition protocol named ACLAP (Africa Countries Land Acquisition Protocol). The purpose of this paper is to explain the main components of the protocol implementation and show its efficiency when confronting fraud threats. In this paper, a Generic and Reliable Land Acquisition Protocol Implementation in Sub-Saharan Africa countries context is proposed. The platform keeps relevant land transaction information for administrators, managers, buyers, sellers, or for people consultation purpose. The application may be used in village, city, department, region, or country for land management decision making. 展开更多
关键词 Land ACQUISITION protocol RELIABLE AFRICA
下载PDF
Clinical comprehensive treatment protocol for managing diabetic foot ulcers:A retrospective cohort study
17
作者 Yan-Bin Wang Yan Lv +3 位作者 Guang-Yu Li Ji-Ting Zheng Qing-Xin Jiang Ran Wei 《World Journal of Clinical Cases》 SCIE 2024年第17期2976-2982,共7页
BACKGROUND Diabetic foot ulcers(DFUs)are a common complication of diabetes,often leading to severe infections,amputations,and reduced quality of life.The current standard treatment protocols for DFUs have limitations ... BACKGROUND Diabetic foot ulcers(DFUs)are a common complication of diabetes,often leading to severe infections,amputations,and reduced quality of life.The current standard treatment protocols for DFUs have limitations in promoting efficient wound healing and preventing complications.A comprehensive treatment approach targeting multiple aspects of wound care may offer improved outcomes for patients with DFUs.The hypothesis of this study is that a comprehensive treatment protocol for DFUs will result in faster wound healing,reduced amputation rates,and improved overall patient outcomes compared to standard treatment protocols.AIM To compare the efficacy and safety of a comprehensive treatment protocol for DFUs with those of the standard treatment protocol.METHODS This retrospective study included 62 patients with DFUs,enrolled between January 2022 and January 2024,randomly assigned to the experimental(n=32)or control(n=30)group.The experimental group received a comprehensive treatment comprising blood circulation improvement,debridement,vacuum sealing drainage,recombinant human epidermal growth factor and anti-inflammatory dressing,and skin grafting.The control group received standard treatment,which included wound cleaning and dressing,antibiotics administration,and surgical debridement or amputation,if necessary.Time taken to reduce the white blood cell count,number of dressing changes,wound healing rate and time,and amputation rate were assessed.RESULTS The experimental group exhibited significantly better outcomes than those of the control group in terms of the wound healing rate,wound healing time,and amputation rate.Additionally,the comprehensive treatment protocol was safe and well tolerated by the patients.CONCLUSION Comprehensive treatment for DFUs is more effective than standard treatment,promoting granulation tissue growth,shortening hospitalization time,reducing pain and amputation rate,improving wound healing,and enhancing quality of life. 展开更多
关键词 Diabetic foot ulcers Comprehensive treatment protocol Clinical study White blood cell count Wound healing Amputation rate
下载PDF
A CSMA/CA based MAC protocol for hybrid Power-line/Visible-light communication networks:Design and analysis
18
作者 Sheng Hao Huyin Zhang +2 位作者 Fei Yang Chenghao Li Jing Wang 《Digital Communications and Networks》 SCIE CSCD 2024年第2期481-497,共17页
Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and har... Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and hardware efficiency.Current research on HPVC networks focuses on the performance analysis and optimization of the Physical(PHY)layer,where the Power Line Communication(PLC)component only serves as the backbone to provide power to light Emitting Diode(LED)devices.So designing a Media Access Control(MAC)protocol remains a great challenge because it allows both PLC and Visible Light Communication(VLC)components to operate data transmission,i.e.,to achieve a true HPVC network CC.To solve this problem,we propose a new HPC network MAC protocol(HPVC MAC)based on Carrier Sense Multiple Access/Collision Avoidance(CSMA/CA)by combining IEEE 802.15.7 and IEEE 1901 standards.Firstly,we add an Additional Assistance(AA)layer to provide the channel selection strategies for sensor stations,so that they can complete data transmission on the selected channel via the specified CSMA/CA mechanism,respectively.Based on this,we give a detailed working principle of the HPVC MAC,followed by the construction of a joint analytical model for mathematicalmathematical validation of the HPVC MAC.In the modeling process,the impacts of PHY layer settings(including channel fading types and additive noise feature),CSMA/CA mechanisms of 802.15.7 and 1901,and practical configurations(such as traffic rate,transit buffer size)are comprehensively taken into consideration.Moreover,we prove the proposed analytical model has the solvability.Finally,through extensive simulations,we characterize the HPVC MAC performance under different system parameters and verify the correctness of the corresponding analytical model with an average error rate of 4.62%between the simulation and analytical results. 展开更多
关键词 Hybrid power-line/Visible light communication (HPVC)networks MAC protocol CSMA/CA IEEE 802.15.7 IEEE 1901 Performance analysis
下载PDF
BDSec:Security Authentication Protocol for BeiDou-Ⅱ Civil Navigation Message
19
作者 Wu Zhijun Zhang Yuan +2 位作者 Yang Yiming Wang Peng Yue Meng 《China Communications》 SCIE CSCD 2024年第6期206-218,共13页
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a s... Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV. 展开更多
关键词 BDII civil navigation messages(BDIICNAV) BeiDou navigation satellite system(BDS) identity-based cryptography mechanism navigation message authentication protocol(BDSec)
下载PDF
A fixed clustering protocol based on random relay strategy for EHWSN 被引量:2
20
作者 Xianquan Luoa Chunjiong Zhang Longju Bai 《Digital Communications and Networks》 SCIE CSCD 2023年第1期90-100,共11页
In Energy Harvesting Wireless Sensor Networks(EHWSN),the communication protocol will directly affect the final performance of the network,so it is necessary to study the communication protocol based on EHWSN.In this p... In Energy Harvesting Wireless Sensor Networks(EHWSN),the communication protocol will directly affect the final performance of the network,so it is necessary to study the communication protocol based on EHWSN.In this paper,for the low-cost fixed clustering problem,a fixed clustering protocol RRCEH is based on random relaying.Our proposed RRCEH abandons the inefficient inter-cluster communication method of the traditional fixed clustering protocol.To coordinate the data upload of the cluster head,RRCEH allocates different random relay vectors to each ring area of the network,and combines all the random relay vectors into a random relay matrix of RRCEH.In each communication round,the cluster head node randomly selects its relay target node to send data according to the probability distribution in the random relay vector in the area.For two different cluster head configuration scenarios,by optimizing the random relay matrix,RRCEH can effectively reduce the network's configuration requirements for cluster head energy harvesting capability,thus reducing the deployment cost of EHWSN. 展开更多
关键词 Energy harvesting Wireless sensor networks Clustering protocol Random relay strategy
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部