The integration of digital twin(DT)and 6G edge intelligence provides accurate forecasting for distributed resources control in smart park.However,the adverse impact of model poisoning attacks on DT model training cann...The integration of digital twin(DT)and 6G edge intelligence provides accurate forecasting for distributed resources control in smart park.However,the adverse impact of model poisoning attacks on DT model training cannot be ignored.To address this issue,we firstly construct the models of DT model training and model poisoning attacks.An optimization problem is formulated to minimize the weighted sum of the DT loss function and DT model training delay.Then,the problem is transformed and solved by the proposed Multi-timescAle endogenouS securiTy-aware DQN-based rEsouRce management algorithm(MASTER)based on DT-assisted state information evaluation and attack detection.MASTER adopts multi-timescale deep Q-learning(DQN)networks to jointly schedule local training epochs and devices.It actively adjusts resource management strategies based on estimated attack probability to achieve endogenous security awareness.Simulation results demonstrate that MASTER has excellent performances in DT model training accuracy and delay.展开更多
Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but...Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but extend to the network interfaces, particularly due to the low-power radio standards that these devices typically employ. The IPv6 protocol is shown to be a strong option for guaranteeing interoperability in the IoT, mostly because of its large address space, the range of current IP-based protocols, and its intrinsic versatility. Considering these benefits, we investigate if current IP-based network management protocols can be implemented on devices with limited resources. We investigate the resource needs in particular for implementing Network Configuration Protocol (NETCONF) and Simple Network Management Protocol (SNMP) on an 8-bit AVR-based device. Our investigation reveals the specific memory and processing demands of these protocols, providing valuable insights into their practicality and efficiency in constrained IoT environments. This study underscores the potential and challenges of leveraging IPv6-based network management protocols to enhance the functionality and interoperability of IoT devices while operating within stringent resource limitations.展开更多
With the evolution of the sixth generation(6G)mobile communication technology,ample attention has gone to the integrated terrestrial-satellite networks.This paper notes that four typical application scenarios of integ...With the evolution of the sixth generation(6G)mobile communication technology,ample attention has gone to the integrated terrestrial-satellite networks.This paper notes that four typical application scenarios of integrated terrestrial-satellite networks are integrated into ultra dense satellite-enabled 6G networks architecture.Then the subchannel and power allocation schemes for the downlink of the ultra dense satellite-enabled 6G heterogeneous networks are introduced.Satellite mobile edge computing(SMEC)with edge caching in three-layer heterogeneous networks serves to reduce the link traffic of networks.Furthermore,a scheme for interference management is presented,involving quality-of-service(QoS)and co-tier/cross-tier interference constraints.The simulation results show that the proposed schemes can significantly increase the total capacity of ultra dense satellite-enabled 6G heterogeneous networks.展开更多
The sixth-generation(6G)network must provide better performance than previous generations to meet the requirements of emerging services and applications,such as multi-gigabit transmission rate,higher reliability,and s...The sixth-generation(6G)network must provide better performance than previous generations to meet the requirements of emerging services and applications,such as multi-gigabit transmission rate,higher reliability,and sub-1 ms latency and ubiquitous connection for the Internet of Everything(IoE).However,with the scarcity of spectrum resources,efficient resource management and sharing are crucial to achieving all these ambitious requirements.One possible technology to achieve all this is the blockchain.Because of its inherent properties,the blockchain has recently gained an important position,which is of great significance to the 6G network and other networks.In particular,the integration of the blockchain in 6G will enable the network to monitor and manage resource utilization and sharing efficiently.Hence,in this paper,we discuss the potentials of the blockchain for resource management and sharing in 6G using multiple application scenarios,namely,Internet of things,deviceto-device communications,network slicing,and inter-domain blockchain ecosystems.展开更多
Performance evaluation shows that Hierarchical Mobile IPv6 (HMIPv6) cannot outperform standard Mobile IPv6 (MIPv6) in all scenarios. Thus, adaptive protocol selection under certain circumstances is desired. Moreover, ...Performance evaluation shows that Hierarchical Mobile IPv6 (HMIPv6) cannot outperform standard Mobile IPv6 (MIPv6) in all scenarios. Thus, adaptive protocol selection under certain circumstances is desired. Moreover, it is necessary to balance the load among different Mobility Anchor Points (MAPs). This paper proposes an efficient three-level hierarchical ar- chitecture for mobility management in HMIPv6 networks, in which a mobile node (MN) may register with either a higher/lower MAP or its home agent according to its speed and the number of connecting correspondent nodes (CNs). An admission control algorithm and a replacement algorithm are introduced to achieve load balancing between two MAP levels and among different MAPs within the same MAP level. Admission control is based on the number of CNs but not MNs that an MAP serves. In case there is no capacity for an MN, the MAP chooses an existing MN to be replaced. The replaced MN uses the MAP selection al- gorithm again to choose another mobility agent. Simulation results showed that the proposed scheme achieves better performance not only in reducing the signaling overhead, but also in load balancing among different MAPs.展开更多
This paper presents a co-time co-frequency fullduplex(CCFD)massive multiple-input multiple-output(MIMO)system to meet high spectrum efficiency requirements for beyond the fifth-generation(5G)and the forthcoming the si...This paper presents a co-time co-frequency fullduplex(CCFD)massive multiple-input multiple-output(MIMO)system to meet high spectrum efficiency requirements for beyond the fifth-generation(5G)and the forthcoming the sixth-generation(6G)networks.To achieve equilibrium of energy consumption,system resource utilization,and overall transmission capacity,an energy-efficient resource management strategy concerning power allocation and antenna selection is designed.A continuous quantum-inspired termite colony optimization(CQTCO)algorithm is proposed as a solution to the resource management considering the communication reliability while promoting energy conservation for the CCFD massive MIMO system.The effectiveness of CQTCO compared with other algorithms is evaluated through simulations.The results reveal that the proposed resource management scheme under CQTCO can obtain a superior performance in different communication scenarios,which can be considered as an eco-friendly solution for promoting reliable and efficient communication in future wireless networks.展开更多
Internet of Everything(IoE)has emerged as a promising paradigm for the purpose of connecting and exchanging data among physical objects and humans over the Internet,and it can be widely applied in the fields of indust...Internet of Everything(IoE)has emerged as a promising paradigm for the purpose of connecting and exchanging data among physical objects and humans over the Internet,and it can be widely applied in the fields of industry,transportation,commerce,and education.Recently,the emergence of 6G-enabled cybertwin network architecture provides the technical and theoretical foundation for the realization of IoE paradigm.However,the IoE has three open issues in the 6G-enabled cybertwin architecture,i.e.,data authenticity,data storage and node reliability.To address these issues,we propose a blockchain-based decentralized reputation management system(BC-DRMS)for IoE in 6G-enabled Cybertwin architecture.In the proposed BC-DRMS,the traffic data collected from end nodes is stored on the blockchain and the decentralized file system,i.e.,InterPlanetary File System(IPFS),to resist data tampering,and then the data is further processed by the edge clouds and core clouds to provide services to users.Also,a multi-level reputation evaluation scheme is designed to compute the reputation scores of IoE nodes to prevent malicious node attacks.The experiment results and analysis demonstrate that,compared to the traditional centralized reputation management systems(CRMS),the proposed BC-DRMS cannot only address the issues of data authenticity and storage,but also provides high reliability for IoE in 6G-enabled cybertwin architecture.展开更多
Introduction: the problem of Severe Acute Malnutrition (SAM) and its consequences concern and challenge all social actors worldwide. The objective of the study was to identify the real obstacles that actors face in th...Introduction: the problem of Severe Acute Malnutrition (SAM) and its consequences concern and challenge all social actors worldwide. The objective of the study was to identify the real obstacles that actors face in the integrated management of children aged 6 - 59 months suffering from SAM at the University Hospital of Mother and Child (CHUME) and the Chad-China Friendship Hospital (HATC) of N’Djamena. Methodology: this is a cross-sectional descriptive and interpretative study conducted from January to October 2023 at the CHUME and HATC of N’Djamena. It is based on questionnaires and direct observation of two hundred and thirty-six (236) parents or guardians of malnourished children admitted to these health facilities. All 236 agreed to participate freely in this study. Results: it appears from this study that the obstacles to the integrated management of malnourished children were: poor care-care relationship (26.7%) permanent product breaks (22.9%), the direct costs of services ranged from 30,000 to 60,000 FCFA (41.53%), drugs used for the treatment of patients came from the street (66.10%), malaria and anemia occupy an important place (27.5%), 57.2% respondents had monthly income below 60,000 CFAF. Conclusion: the present study carried out has identified the real bottlenecks to the integrated management of children suffering from SAM in the therapeutic nutritional units of the city of N’Djamena. .展开更多
Objective:In 2022,a pneumonia caused by novel coronavirus broke out in Shanghai.A large number of medical personnel were deployed nationwide to support the Fangcang Shelter Hospital of National Exhibition and Conventi...Objective:In 2022,a pneumonia caused by novel coronavirus broke out in Shanghai.A large number of medical personnel were deployed nationwide to support the Fangcang Shelter Hospital of National Exhibition and Convention Center(Shanghai).Because the of the underdeveloped infrastructure and the disorganized layout process,the phenomenon of infection among medical personnel was rampant given the highly contagious nature of the Omicron variant.This paper discusses the effect of 6S management in infection control management of Fangcang Shelter Hospital of National Exhibition and Convention Center(Shanghai).Methods:A series of 6S management practices were carried out based on the evaluation of the control management of Fangcang Shelter Hospital of National Exhibition and Convention Center(Shanghai)during the anti-epidemic period,and the effect of the implementation of 6S management was studied based on the rapport among team members and the overall control system process,the management of wearing and stripping channels,the time of wearing protective articles and the psychological and emotional changes of the team members.Results:After the implementation of 6S management mode,the management of dressing room,epidemic prevention materials,and occupational protection awareness and infection control safety were significantly improved.More than 95.5%of the team members believed that improving the working environment in the shelter increased the confidence of victory in the fight against the epidemic,reduced the preparations before entering and leaving the cabin,improved the work efficiency and ensured occupational safety.It ensures the realization of the goal of“zero infection”and is set as a benchmark of control work of Fangcang Shelter Hospital of National Exhibition and Convention Center(Shanghai).Conclusion:The application of 6S management mode to the shelter infection control management can create and maintain a good working environment in the shelter,promote the implementation effect of various systems and processes of infection control,reduce the potential infection risk in the shelter and improve the efficiency of infection control management.展开更多
Proxy Mobile IPv6 (PMIPv6) is designed to provide a network-based localized mobility management protocol, but it does not handle the global mobility of hosts. In this paper, we propose a location management scheme bas...Proxy Mobile IPv6 (PMIPv6) is designed to provide a network-based localized mobility management protocol, but it does not handle the global mobility of hosts. In this paper, we propose a location management scheme based on Domain Name System (DNS) for PMIPv6 which can support global mobility by using DNS as a location manager. In addition, to support large numbers of mobile terminals and enhance network scalability a paging extension scheme is introduced to PMIPv6. To evaluate the proposed location management scheme, we establish an analytical model, formulate the location update cost and the paging cost, and analyze the influence of the different factors on the total signaling cost. The performance results show that our proposed scheme outperforms the basic PMIPv6 under various parameters in terms of reducing the signaling overhead and the proposed scheme reduces signaling overhead compared to the basic PMIPv6.展开更多
This paper presents a management process for creating adaptive, real-time security policies within the Six Sigma (6σ) framework. A key challenge for the creation of a management process is the integration with models...This paper presents a management process for creating adaptive, real-time security policies within the Six Sigma (6σ) framework. A key challenge for the creation of a management process is the integration with models of known Industrial processes. One of the most used industrial process models is Six Sigma which is a business management model wherein customer centric needs are put in perspective with business data to create an efficient system. The security policy creation and management process proposed in this paper is based on the Six Sigma model and presents a method to adapt security goals and risk management of a computing service. By formalizing a security policy management process within an industrial process model, the adaptability of this model to existing industrial tools is seamless and offers a clear risk based policy decision framework. In particular, this paper presents the necessary tools and procedures to map Six Sigma DMAIC (Define-Measure-Analyze-Improve-Control) methodology to security policy management.展开更多
Today, the demand for security software is Six Sigma quality, i.e. practically zero-defects. A practical and stochastic method is proposed for a Six Sigma security software quality management. Monte Carlo Simulation i...Today, the demand for security software is Six Sigma quality, i.e. practically zero-defects. A practical and stochastic method is proposed for a Six Sigma security software quality management. Monte Carlo Simulation is used in a Six Sigma DMAIC (Define, Measure, Analyze, Improve, Control) approach to security software testing. This elaboration used a published real project’s data from the final product testing lasted for 15 weeks, after which the product was delivered. The experiment utilised the first 12 weeks’ data to allow the results verification on the actual data from the last three weeks. A hypothetical testing project was applied, supposed to be completed in 15 weeks. The product due-date was Week 16 with zero-defects quality assurance aim. The testing project was analysed at the end of the 12th week with three weeks of testing remaining. Running a Monte Carlo Simulation with data from the first 12 weeks produced results which indicated that the product would not be able to meet its due-date with the desired zero-defects quality. To quantify an improvement, another simulation was run to find when zero-defects would be achieved. Simulation predicted that zero-defects would be achieved in week 35 with 56% probability, and there would be 82 defects from Weeks 16 - 35. Therefore, to meet the quality goals, either more resources should be allocated to the project, or the deadline for the project should be moved to Week 36. The paper concluded that utilising Monte Carlo Simulations in a Six Sigma DMAIC structured framework is better than conventional approaches using static analysis methods. When the simulation results were compared to the actual data, it was found to be accurate within ﹣3.5% to +1.3%. This approach helps to improve software quality and achieve the zero-defects quality assurance goal, while assigning quality confidence levels to scheduled product releases.展开更多
IPv6 is the foundation of the development of Next Generation Internet (NGI). An IPv6 network management and operations support system is necessary for real operable NGI. Presently there are no approved standards yet a...IPv6 is the foundation of the development of Next Generation Internet (NGI). An IPv6 network management and operations support system is necessary for real operable NGI. Presently there are no approved standards yet and relevant equipment interfaces are not perfect. A Network Management System (NMS) at the network layer helps implement the integrated management of a network with equipment from multiple vendors, including the network resources and topology, end-to-end network performance, network failures and customer Service Level Agreement (SLA) management. Though the NMS will finally realize pure IPv6 network management, it must be accommodated to the management of relevant IPv4 equipment. Therefore, modularized and layered structure is adopted for the NMS in order to implement its smooth transition.展开更多
基金supported by the Science and Technology Project of State Grid Corporation of China under Grant Number 52094021N010 (5400-202199534A-05-ZN)。
文摘The integration of digital twin(DT)and 6G edge intelligence provides accurate forecasting for distributed resources control in smart park.However,the adverse impact of model poisoning attacks on DT model training cannot be ignored.To address this issue,we firstly construct the models of DT model training and model poisoning attacks.An optimization problem is formulated to minimize the weighted sum of the DT loss function and DT model training delay.Then,the problem is transformed and solved by the proposed Multi-timescAle endogenouS securiTy-aware DQN-based rEsouRce management algorithm(MASTER)based on DT-assisted state information evaluation and attack detection.MASTER adopts multi-timescale deep Q-learning(DQN)networks to jointly schedule local training epochs and devices.It actively adjusts resource management strategies based on estimated attack probability to achieve endogenous security awareness.Simulation results demonstrate that MASTER has excellent performances in DT model training accuracy and delay.
文摘Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but extend to the network interfaces, particularly due to the low-power radio standards that these devices typically employ. The IPv6 protocol is shown to be a strong option for guaranteeing interoperability in the IoT, mostly because of its large address space, the range of current IP-based protocols, and its intrinsic versatility. Considering these benefits, we investigate if current IP-based network management protocols can be implemented on devices with limited resources. We investigate the resource needs in particular for implementing Network Configuration Protocol (NETCONF) and Simple Network Management Protocol (SNMP) on an 8-bit AVR-based device. Our investigation reveals the specific memory and processing demands of these protocols, providing valuable insights into their practicality and efficiency in constrained IoT environments. This study underscores the potential and challenges of leveraging IPv6-based network management protocols to enhance the functionality and interoperability of IoT devices while operating within stringent resource limitations.
基金supported in part by the National Key R&D Program of China(2020YFB1806103)the National Natural Science Foundation of China under Grant 62225103 and U22B2003+1 种基金Beijing Natural Science Foundation(L212004)China University Industry-University-Research Collaborative Innovation Fund(2021FNA05001).
文摘With the evolution of the sixth generation(6G)mobile communication technology,ample attention has gone to the integrated terrestrial-satellite networks.This paper notes that four typical application scenarios of integrated terrestrial-satellite networks are integrated into ultra dense satellite-enabled 6G networks architecture.Then the subchannel and power allocation schemes for the downlink of the ultra dense satellite-enabled 6G heterogeneous networks are introduced.Satellite mobile edge computing(SMEC)with edge caching in three-layer heterogeneous networks serves to reduce the link traffic of networks.Furthermore,a scheme for interference management is presented,involving quality-of-service(QoS)and co-tier/cross-tier interference constraints.The simulation results show that the proposed schemes can significantly increase the total capacity of ultra dense satellite-enabled 6G heterogeneous networks.
基金This work was supported in part by the U.K.EPSRC(EP/S02476X/1)Sichuan International Science and Technology Innovation Cooperation/Hong Kong,Macao and Taiwan Science and Technology Innovation Cooperation Project(2019YFH0163)Key Research and Development Project of Sichuan Provincial Department of Science and Technology(2018JZ0071).
文摘The sixth-generation(6G)network must provide better performance than previous generations to meet the requirements of emerging services and applications,such as multi-gigabit transmission rate,higher reliability,and sub-1 ms latency and ubiquitous connection for the Internet of Everything(IoE).However,with the scarcity of spectrum resources,efficient resource management and sharing are crucial to achieving all these ambitious requirements.One possible technology to achieve all this is the blockchain.Because of its inherent properties,the blockchain has recently gained an important position,which is of great significance to the 6G network and other networks.In particular,the integration of the blockchain in 6G will enable the network to monitor and manage resource utilization and sharing efficiently.Hence,in this paper,we discuss the potentials of the blockchain for resource management and sharing in 6G using multiple application scenarios,namely,Internet of things,deviceto-device communications,network slicing,and inter-domain blockchain ecosystems.
基金Project supported by the National Natural Science Foundation of China (Nos. 60662003 and 60462003), the Huawei Funds for Scienceand Technology (No. YJCB2004025SP) and the Science and Tech-nology Plan of Zhejiang Province (No. 2005C21002), China
文摘Performance evaluation shows that Hierarchical Mobile IPv6 (HMIPv6) cannot outperform standard Mobile IPv6 (MIPv6) in all scenarios. Thus, adaptive protocol selection under certain circumstances is desired. Moreover, it is necessary to balance the load among different Mobility Anchor Points (MAPs). This paper proposes an efficient three-level hierarchical ar- chitecture for mobility management in HMIPv6 networks, in which a mobile node (MN) may register with either a higher/lower MAP or its home agent according to its speed and the number of connecting correspondent nodes (CNs). An admission control algorithm and a replacement algorithm are introduced to achieve load balancing between two MAP levels and among different MAPs within the same MAP level. Admission control is based on the number of CNs but not MNs that an MAP serves. In case there is no capacity for an MN, the MAP chooses an existing MN to be replaced. The replaced MN uses the MAP selection al- gorithm again to choose another mobility agent. Simulation results showed that the proposed scheme achieves better performance not only in reducing the signaling overhead, but also in load balancing among different MAPs.
基金supported by the Ph.D.Student Research and Innovation Fund of the Fundamental Research Funds for the Central Universities(3072020GIP0803)Heilongjiang Province Key Laboratory Fund of High Accuracy Satellite Navigation and Marine Application Laboratory(HKL-2020-Y01)+2 种基金the National Natural Science Foundation of China(61571149)the Initiation Fund for Postdoctoral Research in Heilongjiang Province(LBH-Q19098)the Key Laboratory of Advanced Marine Communication and Information Technology,Ministry of Industry and Information Technology。
文摘This paper presents a co-time co-frequency fullduplex(CCFD)massive multiple-input multiple-output(MIMO)system to meet high spectrum efficiency requirements for beyond the fifth-generation(5G)and the forthcoming the sixth-generation(6G)networks.To achieve equilibrium of energy consumption,system resource utilization,and overall transmission capacity,an energy-efficient resource management strategy concerning power allocation and antenna selection is designed.A continuous quantum-inspired termite colony optimization(CQTCO)algorithm is proposed as a solution to the resource management considering the communication reliability while promoting energy conservation for the CCFD massive MIMO system.The effectiveness of CQTCO compared with other algorithms is evaluated through simulations.The results reveal that the proposed resource management scheme under CQTCO can obtain a superior performance in different communication scenarios,which can be considered as an eco-friendly solution for promoting reliable and efficient communication in future wireless networks.
基金This work was supported in part by the National Natural Science Foundation of China under Grants 61972205,U1836208,U1836110in part by the National Key R&D Program of China under Grant 2018YFB1003205+2 种基金in part by MOST under Contract 108-2221-E-259-009-MY2 throSugh Pervasive Artificial Intelligence Research(PAIR)Labs(Taiwan)in part by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fundin part by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET)Fund(China).
文摘Internet of Everything(IoE)has emerged as a promising paradigm for the purpose of connecting and exchanging data among physical objects and humans over the Internet,and it can be widely applied in the fields of industry,transportation,commerce,and education.Recently,the emergence of 6G-enabled cybertwin network architecture provides the technical and theoretical foundation for the realization of IoE paradigm.However,the IoE has three open issues in the 6G-enabled cybertwin architecture,i.e.,data authenticity,data storage and node reliability.To address these issues,we propose a blockchain-based decentralized reputation management system(BC-DRMS)for IoE in 6G-enabled Cybertwin architecture.In the proposed BC-DRMS,the traffic data collected from end nodes is stored on the blockchain and the decentralized file system,i.e.,InterPlanetary File System(IPFS),to resist data tampering,and then the data is further processed by the edge clouds and core clouds to provide services to users.Also,a multi-level reputation evaluation scheme is designed to compute the reputation scores of IoE nodes to prevent malicious node attacks.The experiment results and analysis demonstrate that,compared to the traditional centralized reputation management systems(CRMS),the proposed BC-DRMS cannot only address the issues of data authenticity and storage,but also provides high reliability for IoE in 6G-enabled cybertwin architecture.
文摘Introduction: the problem of Severe Acute Malnutrition (SAM) and its consequences concern and challenge all social actors worldwide. The objective of the study was to identify the real obstacles that actors face in the integrated management of children aged 6 - 59 months suffering from SAM at the University Hospital of Mother and Child (CHUME) and the Chad-China Friendship Hospital (HATC) of N’Djamena. Methodology: this is a cross-sectional descriptive and interpretative study conducted from January to October 2023 at the CHUME and HATC of N’Djamena. It is based on questionnaires and direct observation of two hundred and thirty-six (236) parents or guardians of malnourished children admitted to these health facilities. All 236 agreed to participate freely in this study. Results: it appears from this study that the obstacles to the integrated management of malnourished children were: poor care-care relationship (26.7%) permanent product breaks (22.9%), the direct costs of services ranged from 30,000 to 60,000 FCFA (41.53%), drugs used for the treatment of patients came from the street (66.10%), malaria and anemia occupy an important place (27.5%), 57.2% respondents had monthly income below 60,000 CFAF. Conclusion: the present study carried out has identified the real bottlenecks to the integrated management of children suffering from SAM in the therapeutic nutritional units of the city of N’Djamena. .
文摘Objective:In 2022,a pneumonia caused by novel coronavirus broke out in Shanghai.A large number of medical personnel were deployed nationwide to support the Fangcang Shelter Hospital of National Exhibition and Convention Center(Shanghai).Because the of the underdeveloped infrastructure and the disorganized layout process,the phenomenon of infection among medical personnel was rampant given the highly contagious nature of the Omicron variant.This paper discusses the effect of 6S management in infection control management of Fangcang Shelter Hospital of National Exhibition and Convention Center(Shanghai).Methods:A series of 6S management practices were carried out based on the evaluation of the control management of Fangcang Shelter Hospital of National Exhibition and Convention Center(Shanghai)during the anti-epidemic period,and the effect of the implementation of 6S management was studied based on the rapport among team members and the overall control system process,the management of wearing and stripping channels,the time of wearing protective articles and the psychological and emotional changes of the team members.Results:After the implementation of 6S management mode,the management of dressing room,epidemic prevention materials,and occupational protection awareness and infection control safety were significantly improved.More than 95.5%of the team members believed that improving the working environment in the shelter increased the confidence of victory in the fight against the epidemic,reduced the preparations before entering and leaving the cabin,improved the work efficiency and ensured occupational safety.It ensures the realization of the goal of“zero infection”and is set as a benchmark of control work of Fangcang Shelter Hospital of National Exhibition and Convention Center(Shanghai).Conclusion:The application of 6S management mode to the shelter infection control management can create and maintain a good working environment in the shelter,promote the implementation effect of various systems and processes of infection control,reduce the potential infection risk in the shelter and improve the efficiency of infection control management.
基金supported in part by the National Basic Research Program of China ("973 program") under contract No. 2007CB307101 and No. 2007CB307106in part by the Program of Introducing Talents of Discipline to Universities ("111 Project") under contract No. B08002+1 种基金in part by the Cultivation Fund of the Key Scientifi c and Technical Innovation Project, Ministry of Education of China under contract No. 706005in part by the Ph.D. Student Scientifi c Research Innovation Fund of Beijing Jiaotong University (No.141057522)
文摘Proxy Mobile IPv6 (PMIPv6) is designed to provide a network-based localized mobility management protocol, but it does not handle the global mobility of hosts. In this paper, we propose a location management scheme based on Domain Name System (DNS) for PMIPv6 which can support global mobility by using DNS as a location manager. In addition, to support large numbers of mobile terminals and enhance network scalability a paging extension scheme is introduced to PMIPv6. To evaluate the proposed location management scheme, we establish an analytical model, formulate the location update cost and the paging cost, and analyze the influence of the different factors on the total signaling cost. The performance results show that our proposed scheme outperforms the basic PMIPv6 under various parameters in terms of reducing the signaling overhead and the proposed scheme reduces signaling overhead compared to the basic PMIPv6.
文摘This paper presents a management process for creating adaptive, real-time security policies within the Six Sigma (6σ) framework. A key challenge for the creation of a management process is the integration with models of known Industrial processes. One of the most used industrial process models is Six Sigma which is a business management model wherein customer centric needs are put in perspective with business data to create an efficient system. The security policy creation and management process proposed in this paper is based on the Six Sigma model and presents a method to adapt security goals and risk management of a computing service. By formalizing a security policy management process within an industrial process model, the adaptability of this model to existing industrial tools is seamless and offers a clear risk based policy decision framework. In particular, this paper presents the necessary tools and procedures to map Six Sigma DMAIC (Define-Measure-Analyze-Improve-Control) methodology to security policy management.
文摘Today, the demand for security software is Six Sigma quality, i.e. practically zero-defects. A practical and stochastic method is proposed for a Six Sigma security software quality management. Monte Carlo Simulation is used in a Six Sigma DMAIC (Define, Measure, Analyze, Improve, Control) approach to security software testing. This elaboration used a published real project’s data from the final product testing lasted for 15 weeks, after which the product was delivered. The experiment utilised the first 12 weeks’ data to allow the results verification on the actual data from the last three weeks. A hypothetical testing project was applied, supposed to be completed in 15 weeks. The product due-date was Week 16 with zero-defects quality assurance aim. The testing project was analysed at the end of the 12th week with three weeks of testing remaining. Running a Monte Carlo Simulation with data from the first 12 weeks produced results which indicated that the product would not be able to meet its due-date with the desired zero-defects quality. To quantify an improvement, another simulation was run to find when zero-defects would be achieved. Simulation predicted that zero-defects would be achieved in week 35 with 56% probability, and there would be 82 defects from Weeks 16 - 35. Therefore, to meet the quality goals, either more resources should be allocated to the project, or the deadline for the project should be moved to Week 36. The paper concluded that utilising Monte Carlo Simulations in a Six Sigma DMAIC structured framework is better than conventional approaches using static analysis methods. When the simulation results were compared to the actual data, it was found to be accurate within ﹣3.5% to +1.3%. This approach helps to improve software quality and achieve the zero-defects quality assurance goal, while assigning quality confidence levels to scheduled product releases.
文摘IPv6 is the foundation of the development of Next Generation Internet (NGI). An IPv6 network management and operations support system is necessary for real operable NGI. Presently there are no approved standards yet and relevant equipment interfaces are not perfect. A Network Management System (NMS) at the network layer helps implement the integrated management of a network with equipment from multiple vendors, including the network resources and topology, end-to-end network performance, network failures and customer Service Level Agreement (SLA) management. Though the NMS will finally realize pure IPv6 network management, it must be accommodated to the management of relevant IPv4 equipment. Therefore, modularized and layered structure is adopted for the NMS in order to implement its smooth transition.