期刊文献+
共找到300,135篇文章
< 1 2 250 >
每页显示 20 50 100
Advancing 5G Network Applications Lifecycle Security:An ML-Driven Approach
1
作者 Ana Hermosilla Jorge Gallego-Madrid +3 位作者 Pedro Martinez-Julia Jordi Ortiz Ved P.Kafle Antonio Skarmeta 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1447-1471,共25页
As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof pa... As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security. 展开更多
关键词 Network application network function virtualization machine learning security 5G
下载PDF
Food and Nutritional Security in the Refugee Women’s Life Narratives
2
作者 Juliana Vidal Vieira Guerra Valdecyr Herdy Alves +5 位作者 Brenda Caroline Martins da Silva Tatiana do Socorro dos Santos Calandrini Giovanna Rosario Soanno Marchiori Ediane de Andrade Ferreira Maria Bertilla Lutterbach Riker Branco Diego Pereira Rodrigues 《Food and Nutrition Sciences》 2023年第11期1031-1042,共12页
Objective: To understand, based on the life narratives of refugee women, food and nutritional security. Method: Qualitative, descriptive, exploratory study, Narratives of life method, by Daniel Bertaux. Conducted with... Objective: To understand, based on the life narratives of refugee women, food and nutritional security. Method: Qualitative, descriptive, exploratory study, Narratives of life method, by Daniel Bertaux. Conducted with 11 participants, refugee women residing in the state of Rio de Janeiro, Brazil. Results: The meanings and feelings evidenced in the life narratives of refugee women expressed the insecurities and weaknesses with food in the resettlement. Final Considerations: Given the meanings and feelings regarding food in the refuge, it is expected that the present study will contribute to the elaboration of new action plans and intersectoral public policies of agile action to meet the demands of the refugee population, in the attempt to mitigate starvation, poverty, social differences and the compromised health status of the refugee population. 展开更多
关键词 Food security Feeding Behavior Refugees Human Migration Human Right to Adequate Food
下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
3
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 Cloud Computing Information security Cloud Infrastructure Offerings Cloud Migration security Measures Data Breaches Cloud Service Providers CYBERsecurity Cloud security Case Studies Cloud Threat Landscape Data Encryption COMPLIANCE Cloud security Tools
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
4
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information security Network security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling security Architecture
下载PDF
Stochastic Modelling of Vulnerability Life Cycle and Security Risk Evaluation 被引量:4
5
作者 Sasith M. Rajasooriya Chris P. Tsokos Pubudu Kalpani Kaluarachchi 《Journal of Information Security》 2016年第4期269-279,共11页
The objective of the present study is to propose a risk evaluation statistical model for a given vulnerability by examining the Vulnerability Life Cycle and the CVSS score. Having a better understanding of the behavio... The objective of the present study is to propose a risk evaluation statistical model for a given vulnerability by examining the Vulnerability Life Cycle and the CVSS score. Having a better understanding of the behavior of vulnerability with respect to time will give us a great advantage. Such understanding will help us to avoid exploitations and introduce patches for a particular vulnerability before the attacker takes the advantage. Utilizing the proposed model one can identify the risk factor of a specific vulnerability being exploited as a function of time. Measuring of the risk factor of a given vulnerability will also help to improve the security level of software and to make appropriate decisions to patch the vulnerability before an exploitation takes place. 展开更多
关键词 Stochastic Modelling security Risk Evaluation Vulnerability life Cycle Risk Factor
下载PDF
Contribution of attachment insecurity to health-related quality of life in depressed patients 被引量:1
6
作者 Alexander M Ponizovsky Angela Drannikov 《World Journal of Psychiatry》 SCIE 2013年第2期41-49,共9页
AIM: To examine the individual contributions of insecure attachment styles and depression symptom severity to health-related quality of life(HRQo L) in patients diagnosed with adjustment disorder(AJD) with depressed m... AIM: To examine the individual contributions of insecure attachment styles and depression symptom severity to health-related quality of life(HRQo L) in patients diagnosed with adjustment disorder(AJD) with depressed mood. METHODS: Participants were 67 patients diagnosed with International Classification of Diseases, Tenth edition AJD with depressed mood, who completed standardised self-report questionnaires measuring study variables. Mean scores and SDs were computed for the outcome and predictor measures. Pearson correlations among the measures were computed. The study hypotheses were tested using analysis of variance(ANOVA) and multiple regression analyses. All analyses were performed using the SPSS-17 software package(SPSS Inc., Chicago, IL, United States).RESULTS: ANOVA showed a significant main effect of the insecure attachment styles on depression symptom severity and life satisfaction scores. The results suggestthat depressive symptoms were more severe(F = 4.13, df = 2.67, P < 0.05) and life satisfaction was poorer(F = 5.69, df = 2.67, P < 0.01) in both anxious-ambivalently and avoidantly attached patients compared with their securely attached counterparts, whereas the two insecure groups did not significantly differ by these variables. The anxious/ambivalent attachment style and depression symptom severity significantly contributed to HRQo L, accounting for 21.4% and 29.7% of the total variance, respectively [R2 = 0.79; Adjusted R2 = 0.77; F(5, 67) = 33.68, P < 0.0001], even after controlling for gender, marital and employment status confounders.CONCLUSION: The results show that the anxious/ambivalent attachment style together with depression symptom severity substantially and independently predict the HRQo L outcome in AJD with depressed mood. 展开更多
关键词 ATTACHMENT INsecurity ADULT ATTACHMENT style HEALTH-RELATED quality of life Depression Adjustment DISORDER
下载PDF
Practice and Research on Construction of Basic Life Security Program for Land-Expropriated Farmers in China
7
作者 Cuiying Yang Yonghui Zhang Zuhui Huang 《Chinese Business Review》 2003年第4期60-66,共7页
To set up basic life security program (BLSP) for land-expropriated farmers in the process of urbanization is an effective measure to solve existing issues in China. Theprogram, which Zhejiang Province initiated in t... To set up basic life security program (BLSP) for land-expropriated farmers in the process of urbanization is an effective measure to solve existing issues in China. Theprogram, which Zhejiang Province initiated in the world, has great significance. Through deep investigation in ten cities, the thesis has normatively evaluated current situations, characteristics, advantages and disadvantages of basic life security program for land-expropriated farmers in Zhejiang. Furthermore, it put forward some academic suggestions to further perfect and improve the system. 展开更多
关键词 Land-expropriated Farmer life security Program Social Insurance Urbanization Zhejiang
下载PDF
Theoretical Application to Understand Food Insecurity Among College Students: A Multi-Systems Life Course Perspective
8
作者 Tracey Marie Barnett Reina Olivo +1 位作者 Valandra Kameri Christy 《Sociology Study》 2019年第2期75-83,共9页
Empirical studies have shown a distinct relationship between academic performance and food insecurity in college students. Specifically, food-insecure students are more likely to report a lower grade point average tha... Empirical studies have shown a distinct relationship between academic performance and food insecurity in college students. Specifically, food-insecure students are more likely to report a lower grade point average than their food secure counterparts. Since the Great Recession, more attention has been given to the topic of hunger and food insecurity among college students;however, the literature still lacks a comprehensive examination of various issues facing today’s college students. Using a multi-systems life course (MSLC) perspective, this paper provides a conceptual explanation of the lived experience of college students by offering a better understanding of the unique challenges faced by this population. Findings from this study will assist researchers, practitioners, and university administrators in their efforts to address hunger among this population. 展开更多
关键词 multi-systems life course perspective HUNGER FOOD INsecurity COLLEGE students university
下载PDF
Global and International Security Under Spatial Grasp Paradigm
9
作者 Peter Simon Sapaty 《International Relations and Diplomacy》 2024年第2期72-85,共14页
Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrat... Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrated with bodies of real systems wherever in physical,virtual,or combined spaces they may exist.So global security capabilities should not only be distributed,but rather be really spatial,self-organized,and dynamic,also exhibiting overall integrity,awareness,and consciousness features.The paper describes applicability of the patented and revealed in 10 books Spatial Grasp Model and Technology(SGT)and its basic Spatial Grasp Language(SGL)which conceptually and functionally match security problems of large distributed and heterogeneous systems.It investigates very practical security solutions for finding and tracing distribution of forbidden items,world roaming criminals,recovery from natural and human-made disasters,tracing and elimination of moving dangerous objects in terrestrial and celestial spaces,as well as analysis and restoration of damaged transport networks.It advises how different security infrastructures can be organized and managed,and how to cooperate and integrate within global security systems with higher awareness and consciousness levels over them.The provided security-oriented version of SGL can be quickly implemented and integrated with existing distributed management and security systems. 展开更多
关键词 global security international security critical infrastructures Spatial Grasp Technology Spatial Grasp Language distributed language interpretation self-recovering security scenarios global security awareness and consciousness
下载PDF
An Investigation on Open-RAN Specifications:Use Cases,Security Threats,Requirements,Discussions
10
作者 Heejae Park Tri-HaiNguyen Laihyuk Park 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期13-41,共29页
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Rece... The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security. 展开更多
关键词 O-RAN ARCHITECTURE use cases security issues security requirements security discussions
下载PDF
Survey on Video Security:Examining Threats,Challenges,and Future Trends
11
作者 Ali Asghar Amna Shifa Mamoona Naveed Asghar 《Computers, Materials & Continua》 SCIE EI 2024年第9期3591-3635,共45页
Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing s... Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant challenges.In response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital videos.This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be manipulated.It then investigates current developments in the field of video security by exploring two critical research questions.First,it examine the techniques used by adversaries to compromise video data and evaluate their impact.Understanding these attack methodologies is crucial for developing effective defense mechanisms.Second,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and trustworthiness.It compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease diagnostics.Finally,it identifies potential research opportunities to enhance video data protection in response to the evolving threat landscape.Through this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world. 展开更多
关键词 ATTACKS threats security services video manipulation video security
下载PDF
Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia:A Fuzzy Decision-Making Approach
12
作者 Wajdi Alhakami 《Computers, Materials & Continua》 SCIE EI 2024年第5期3211-3237,共27页
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual user... The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare. 展开更多
关键词 Cyber security fuzzy DMTAEL security policy cyber crime MCDM
下载PDF
Impact of cancer diagnosis on life expectancy by area-level socioeconomic groups in New South Wales, Australia: a population-based study
13
作者 Md Mijanur Rahman Michael David +5 位作者 David Goldsbury Karen Canfell Kou Kou Paramita Dasgupta Peter Baade Xue Qin Yu 《Cancer Biology & Medicine》 SCIE CAS CSCD 2024年第8期692-702,共11页
Objective: Improvement in cancer survival over recent decades has not been accompanied by a narrowing of socioeconomic disparities. This study aimed to quantify the loss of life expectancy(LOLE) resulting from a cance... Objective: Improvement in cancer survival over recent decades has not been accompanied by a narrowing of socioeconomic disparities. This study aimed to quantify the loss of life expectancy(LOLE) resulting from a cancer diagnosis and examine disparities in LOLE based on area-level socioeconomic status(SES).Methods: Data were collected for all people between 50 and 89 years of age who were diagnosed with cancer, registered in the NSW Cancer Registry between 2001 and 2019, and underwent mortality follow-up evaluations until December 2020. Flexible parametric survival models were fitted to estimate the LOLE by gender and area-level SES for 12 common cancers.Results: Of 422,680 people with cancer, 24% and 18% lived in the most and least disadvantaged areas, respectively. Patients from the most disadvantaged areas had a significantly greater average LOLE than patients from the least disadvantaged areas for cancers with high survival rates, including prostate [2.9 years(95% CI: 2.5±3.2 years) vs. 1.6 years(95% CI: 1.3±1.9 years)] and breast cancer [1.6 years(95% CI: 1.4±1.8 years) vs. 1.2 years(95% CI: 1.0±1.4 years)]. The highest average LOLE occurred in males residing in the most disadvantaged areas with pancreatic [16.5 years(95% CI: 16.1±16.8 years) vs. 16.2 years(95% CI: 15.7±16.7 years)] and liver cancer [15.5 years(95% CI: 15.0±16.0 years) vs. 14.7 years(95% CI: 14.0±15.5 years)]. Females residing in the least disadvantaged areas with thyroid cancer [0.9 years(95% CI: 0.4±1.4 years) vs. 0.6 years(95% CI: 0.2±1.0 years)] or melanoma [0.9 years(95% CI: 0.8±1.1 years) vs. 0.7 years(95% CI: 0.5±0.8 years)] had the lowest average LOLE.Conclusions: Patients from the most disadvantaged areas had the highest LOLE with SES-based differences greatest for patients diagnosed with cancer at an early stage or cancers with higher survival rates, suggesting the need to prioritise early detection and reduce treatment-related barriers and survivorship challenges to improve life expectancy. 展开更多
关键词 Cancer diagnosis life expectancy loss of life expectancy area-level socioeconomic status flexible parametric model
下载PDF
Enhancing Security in QR Code Technology Using AI: Exploration and Mitigation Strategies
14
作者 Saranya Vaithilingam Santhosh Aradhya Mohan Shankar 《International Journal of Intelligence Science》 2024年第2期49-57,共9页
The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potentia... The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potential security risks that malicious actors can exploit. QR code Phishing, or “Quishing”, is a type of phishing attack that leverages QR codes to deceive individuals into visiting malicious websites or downloading harmful software. These attacks can be particularly effective due to the growing popularity and trust in QR codes. This paper examines the importance of enhancing the security of QR codes through the utilization of artificial intelligence (AI). The abstract investigates the integration of AI methods for identifying and mitigating security threats associated with QR code usage. By assessing the current state of QR code security and evaluating the effectiveness of AI-driven solutions, this research aims to propose comprehensive strategies for strengthening QR code technology’s resilience. The study contributes to discussions on secure data encoding and retrieval, providing valuable insights into the evolving synergy between QR codes and AI for the advancement of secure digital communication. 展开更多
关键词 Artificial Intelligence Cyber security QR Codes Quishing AI Framework Machine Learning AI-Enhanced security
下载PDF
Security and Privacy in Solar Insecticidal Lamps Internet of Things:Requirements and Challenges
15
作者 Qingsong Zhao Lei Shu +3 位作者 Kailiang Li Mohamed Amine Ferrag Ximeng Liu Yanbin Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期58-73,共16页
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the... Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT. 展开更多
关键词 CHALLENGES Internet of Things(IoT) privacy and security security requirements solar insecticidal lamps(SIL)
下载PDF
Quality of Life in Living Kidney Donors Grenoble Teaching Hospital (France)
16
作者 Manzan Edwige Anastasie Wognin Abdoul Yannick Gonan +6 位作者 Kéhi Jonathan Kpan Monlet Cyr Guei Konan Nguessan Michel Christ Ziahy Reine Marie Tia Weu Melanie Bourhaïma Ouattara Lionel Rostaing 《Open Journal of Nephrology》 2024年第3期313-323,共11页
Context: Kidney transplantation is today the standard treatment for patients suffering from chronic end-stage renal failure. Living kidney donation offers many advantages for the recipient, but requires a subject with... Context: Kidney transplantation is today the standard treatment for patients suffering from chronic end-stage renal failure. Living kidney donation offers many advantages for the recipient, but requires a subject without comorbidities to undergo surgery. The aim of this study was to assess the quality of life and psychosocial experience of living kidney donors after donation. Methods: This was a cross-sectional study with an analytical aim, involving living kidney donors during the period from January 2016 to April 2019 at CHUGA. (University Hospital Center of Grenoble Alpes in France). Results: Our study shows that out of 88 donors, 70 responded to our questionnaires, representing a prevalence of 80.5%. The average age of our donors was 55.6 years with a female predominance. Seven out of eight domains of the SF36 score had a good quality of life after donation and the donation did not alter their psychosocial experience. The majority of our donors expressed their pride and enthusiasm, did not regret having saved a life, and this experience was considered positive. Conclusion: Kidney donation does not have a negative impact on quality of life and psychosocial life. The majority of donors do not regret their donation. The dissemination of such results could make it possible to increase the number of kidney transplants from living donors in France, especially in our African countries where the management of ESRD remains a real public health problem. 展开更多
关键词 Quality of life Kidney Donors Psychosocial life
下载PDF
Life Review the Impact of Combined Watson Care Theory Intervention on Psychological Status and Quality of Life in Patients with Terminal Lung Cancer
17
作者 Jing Liu Hang Su 《Journal of Biosciences and Medicines》 2024年第7期207-213,共7页
Objective: To analyze the impact of combined Watson care theory intervention on the psychological state and quality of life in patients with terminal lung cancer. Methods: 72 patients with terminal lung cancer admitte... Objective: To analyze the impact of combined Watson care theory intervention on the psychological state and quality of life in patients with terminal lung cancer. Methods: 72 patients with terminal lung cancer admitted from March 2021 to January 2024 were selected, which were divided into research group (life review combined with Watson care theory intervention) and control group (conventional intervention), with 36 cases each. Compare the nursing effect between the two groups. Results: The anxiety self-rating scale (SAS) and depression self-rating scale (SDS) scores were significantly lower than those of the control group, and the quality of life score was significantly higher than that of the control group (P < 0.05). Conclusion: Life review combined with Watson care theory intervention can improve the psychological state and improve the quality of life of patients with terminal lung cancer. 展开更多
关键词 life Review Watson Theory of Care Lung Cancer Quality of life
下载PDF
Quality-adjusted life years and surgical waiting list:Systematic review of the literature
18
作者 Roberto de la Plaza Llamas Lorena Ortega Azor +5 位作者 Marina Hernández Yuste Ludovica Gorini Raquel Aránzazu Latorre-Fragua Daniel Alejandro Díaz Candelas Farah Al Shwely Abduljabar Ignacio Antonio Gemio del Rey 《World Journal of Gastrointestinal Surgery》 SCIE 2024年第4期1155-1164,共10页
BACKGROUND The quality-adjusted life year(QALY)is a metric that is increasingly used today in the field of health economics to evaluate the value of different medical treatments and procedures.Surgical waiting lists(S... BACKGROUND The quality-adjusted life year(QALY)is a metric that is increasingly used today in the field of health economics to evaluate the value of different medical treatments and procedures.Surgical waiting lists(SWLs)represent a pressing problem in public healthcare.The QALY measure has rarely been used in the context of surgery.It would be interesting to know how many QALYs are lost by patients on SWLs.AIM To investigate the relationship between QALYs and SWLs in a systematic review of the scientific literature.METHODS The study was conducted in accordance with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Statement.An unlimited search was carried out in PubMed,updated on January 19,2024.Data on the following variables were investigated and analyzed:Specialty,country of study,procedure under study,scale used to measure QALYs,the use of a theoretical or real-life model,objectives of the study and items measured,the economic value assigned to the QALY in the country in question,and the results and conclusions published.RESULTS Forty-eight articles were selected for the study.No data were found regarding QALYs lost on SWLs.The specialties in which QALYs were studied the most in relation to the waiting list were urology and general surgery,with 15 articles each.The country in which the most studies of QALYs were carried out was the United States(n=21),followed by the United Kingdom(n=9)and Canada(n=7).The most studied procedure was organ transplantation(n=39),including 15 kidney,14 liver,5 heart,4 lung,and 1 intestinal.Arthroplasty(n=4),cataract surgery(n=2),bariatric surgery(n=1),mosaicplasty(n=1),and septoplasty(n=1)completed the surgical interventions included.Thirty-nine of the models used were theoretical(the most frequently applied being the Markov model,n=34),and nine were real-life.The survey used to measure quality of life in 11 articles was the European Quality of Life-5 dimensions,but in 32 articles the survey was not specified.The willingness-to-pay per QALY gained ranged from$100000 in the United States to€20000 in Spain.CONCLUSION The relationship between QALYs and SWLs has only rarely been studied in the literature.The rate of QALYs lost on SWLs has not been determined.Future research is warranted to address this issue. 展开更多
关键词 Quality-adjusted life year Waitlist Quality of life SURGERY Systematic review
下载PDF
Intelligent Solution System for Cloud Security Based on Equity Distribution:Model and Algorithms
19
作者 Sarah Mustafa Eljack Mahdi Jemmali +3 位作者 Mohsen Denden Mutasim Al Sadig Abdullah M.Algashami Sadok Turki 《Computers, Materials & Continua》 SCIE EI 2024年第1期1461-1479,共19页
In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding ... In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding the risk of data loss and data overlapping.The development of data flow scheduling approaches in the cloud environment taking security parameters into account is insufficient.In our work,we propose a data scheduling model for the cloud environment.Themodel is made up of three parts that together help dispatch user data flow to the appropriate cloudVMs.The first component is the Collector Agent whichmust periodically collect information on the state of the network links.The second one is the monitoring agent which must then analyze,classify,and make a decision on the state of the link and finally transmit this information to the scheduler.The third one is the scheduler who must consider previous information to transfer user data,including fair distribution and reliable paths.It should be noted that each part of the proposedmodel requires the development of its algorithms.In this article,we are interested in the development of data transfer algorithms,including fairness distribution with the consideration of a stable link state.These algorithms are based on the grouping of transmitted files and the iterative method.The proposed algorithms showthe performances to obtain an approximate solution to the studied problem which is an NP-hard(Non-Polynomial solution)problem.The experimental results show that the best algorithm is the half-grouped minimum excluding(HME),with a percentage of 91.3%,an average deviation of 0.042,and an execution time of 0.001 s. 展开更多
关键词 Cyber-security cloud computing cloud security ALGORITHMS HEURISTICS
下载PDF
Adaptive Network Sustainability and Defense Based on Artificial Bees Colony Optimization Algorithm for Nature Inspired Cyber Security
20
作者 Chirag Ganguli Shishir Kumar Shandilya +1 位作者 Michal Gregus Oleh Basystiuk 《Computer Systems Science & Engineering》 2024年第3期739-758,共20页
Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algori... Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algorithm(ABC)as an Nature Inspired Cyber Security mechanism to achieve adaptive defense.It experiments on the Denial-Of-Service attack scenarios which involves limiting the traffic flow for each node.Businesses today have adapted their service distribution models to include the use of the Internet,allowing them to effectively manage and interact with their customer data.This shift has created an increased reliance on online services to store vast amounts of confidential customer data,meaning any disruption or outage of these services could be disastrous for the business,leaving them without the knowledge to serve their customers.Adversaries can exploit such an event to gain unauthorized access to the confidential data of the customers.The proposed algorithm utilizes an Adaptive Defense approach to continuously select nodes that could present characteristics of a probable malicious entity.For any changes in network parameters,the cluster of nodes is selected in the prepared solution set as a probable malicious node and the traffic rate with the ratio of packet delivery is managed with respect to the properties of normal nodes to deliver a disaster recovery plan for potential businesses. 展开更多
关键词 Artificial bee colonization adaptive defense cyber attack nature inspired cyber security cyber security cyber physical infrastructure
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部