Recently, the China National Accreditation Service for Conformity Assessment (CNAS) has promulgated Measures for Hierarchical Management of Ratification Risk of Certification Institution (hereinafter referred to a... Recently, the China National Accreditation Service for Conformity Assessment (CNAS) has promulgated Measures for Hierarchical Management of Ratification Risk of Certification Institution (hereinafter referred to as Measures), which was put into execution.……展开更多
Wireless Sensor Network(WSN)has witnessed an unpredictable growth for the last few decades.It has many applications in various critical sectors such as real-time monitoring of nuclear power plant,disaster management,e...Wireless Sensor Network(WSN)has witnessed an unpredictable growth for the last few decades.It has many applications in various critical sectors such as real-time monitoring of nuclear power plant,disaster management,environment,military area etc.However,due to the distributed and remote deployment of sensor nodes in such networks,they are highly vulnerable to different security threats.The sensor network always needs a proficient key management scheme to secure data because of resourceconstrained nodes.Existing polynomial based key management schemes are simple,but the computational complexity is a big issue.Lucas polynomials,Fibonacci polynomials,Chebychev polynomials are used in Engineering,Physics,Combinatory and Numerical analysis etc.In this paper,we propose a key management scheme using(p,q)-Lucas polynomial to improve the security of WSN.In(p,q)-Lucas polynomial,p represents a random base number while q represents a substitute value of x in the polynomial.The value of p is unique,and q is different according to communication between nodes.Analysis of the proposed method on several parameters such as computational overhead,efficiency and storage cost have been performed and compared with existing related schemes.The analysis demonstrates that the proposed(p,q)-Lucas polynomial based key management scheme outperforms over other polynomials in terms of the number of keys used and efficiency.展开更多
The rapid global outbreak of coronavirus disease 2019(COVID-19)and the surge of infected patients have led to the verge of exhaustion of critical care medicine resources worldwide,especially with regard to critical ca...The rapid global outbreak of coronavirus disease 2019(COVID-19)and the surge of infected patients have led to the verge of exhaustion of critical care medicine resources worldwide,especially with regard to critical care staff.A holistic care model on time-sharing management for severe and critical COVID-19 patients is proposed,which includes formulation of individualized care objectives and plans,identification of care tasks in each shift and making detailed checklist,and management of quality of care.This study was conducted in the COVID-19 treatment center of Harbin,Heilongjiang Province.The data collected from the treatment center were recorded and analyzed.From the results we can deduce that it is especially suitable for non-intensive care unit(non-ICU)nurses to adapt care management mode of ICU as soon as possible and ensure the quality and efficiency of care during the epidemic.The holistic care model on time-sharing management for severe and critical cases with COVID-19 proposed based on our daily work experiences can assist in improving the quality and efficiency of care,thus reducing the mortality rate of patients in ICU.展开更多
In the present paper we propose a new hierarchical management scheme within suitable extensions of 2-adic numbers, in which the subfields are treated as classes, and the communications are realized by computation on e...In the present paper we propose a new hierarchical management scheme within suitable extensions of 2-adic numbers, in which the subfields are treated as classes, and the communications are realized by computation on elliptic curves. The security of our system is much stronger than that of the traditional public key cryptographic systems.展开更多
This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access reuters. The proposed soft handover s...This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access reuters. The proposed soft handover scheme in the high-speed HMAN can solve the micro-mobility management problem in the access network. This article also proposes the hybrid access muter (AR) advertisement scheme and AR selection algorithm, which uses the time delay and stable route to the AR as the gateway selection parameters. By simulation, the proposed micro-mobility,management scheme can achieve high packet delivery fraction and improve the lifetime of network.展开更多
文摘 Recently, the China National Accreditation Service for Conformity Assessment (CNAS) has promulgated Measures for Hierarchical Management of Ratification Risk of Certification Institution (hereinafter referred to as Measures), which was put into execution.……
文摘Wireless Sensor Network(WSN)has witnessed an unpredictable growth for the last few decades.It has many applications in various critical sectors such as real-time monitoring of nuclear power plant,disaster management,environment,military area etc.However,due to the distributed and remote deployment of sensor nodes in such networks,they are highly vulnerable to different security threats.The sensor network always needs a proficient key management scheme to secure data because of resourceconstrained nodes.Existing polynomial based key management schemes are simple,but the computational complexity is a big issue.Lucas polynomials,Fibonacci polynomials,Chebychev polynomials are used in Engineering,Physics,Combinatory and Numerical analysis etc.In this paper,we propose a key management scheme using(p,q)-Lucas polynomial to improve the security of WSN.In(p,q)-Lucas polynomial,p represents a random base number while q represents a substitute value of x in the polynomial.The value of p is unique,and q is different according to communication between nodes.Analysis of the proposed method on several parameters such as computational overhead,efficiency and storage cost have been performed and compared with existing related schemes.The analysis demonstrates that the proposed(p,q)-Lucas polynomial based key management scheme outperforms over other polynomials in terms of the number of keys used and efficiency.
基金Supported by The National Natural Science Foundation of China,No.81770276and Nn10 Program of Harbin Medical University Cancer Hospital and Scientific Research Project of Heilongjiang Health and Family Planning Commission,No.2018086.
文摘The rapid global outbreak of coronavirus disease 2019(COVID-19)and the surge of infected patients have led to the verge of exhaustion of critical care medicine resources worldwide,especially with regard to critical care staff.A holistic care model on time-sharing management for severe and critical COVID-19 patients is proposed,which includes formulation of individualized care objectives and plans,identification of care tasks in each shift and making detailed checklist,and management of quality of care.This study was conducted in the COVID-19 treatment center of Harbin,Heilongjiang Province.The data collected from the treatment center were recorded and analyzed.From the results we can deduce that it is especially suitable for non-intensive care unit(non-ICU)nurses to adapt care management mode of ICU as soon as possible and ensure the quality and efficiency of care during the epidemic.The holistic care model on time-sharing management for severe and critical cases with COVID-19 proposed based on our daily work experiences can assist in improving the quality and efficiency of care,thus reducing the mortality rate of patients in ICU.
基金Supported by National Natural Science Foundation of China (Grant Nos. 10990011, 60763009)
文摘In the present paper we propose a new hierarchical management scheme within suitable extensions of 2-adic numbers, in which the subfields are treated as classes, and the communications are realized by computation on elliptic curves. The security of our system is much stronger than that of the traditional public key cryptographic systems.
文摘This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access reuters. The proposed soft handover scheme in the high-speed HMAN can solve the micro-mobility management problem in the access network. This article also proposes the hybrid access muter (AR) advertisement scheme and AR selection algorithm, which uses the time delay and stable route to the AR as the gateway selection parameters. By simulation, the proposed micro-mobility,management scheme can achieve high packet delivery fraction and improve the lifetime of network.