期刊文献+
共找到6,030篇文章
< 1 2 250 >
每页显示 20 50 100
Safety and effectiveness of butorphanol in epidural labor analgesia:A protocol for a systematic review and meta-analysis 被引量:3
1
作者 Guan-Cheng Tang Man He +1 位作者 Zhen-Zhao Huang Yan Cheng 《World Journal of Clinical Cases》 SCIE 2024年第8期1416-1421,共6页
BACKGROUND Epidural analgesia is the most effective analgesic method during labor.Butorphanol administered epidurally has been shown to be a successful analgesic method during labor.However,no comprehensive study has ... BACKGROUND Epidural analgesia is the most effective analgesic method during labor.Butorphanol administered epidurally has been shown to be a successful analgesic method during labor.However,no comprehensive study has examined the safety and efficacy of using butorphanol as an epidural analgesic during labor.AIM To assess butorphanol's safety and efficacy for epidural labor analgesia.METHODS The PubMed,Cochrane Library,EMBASE,Web of Science,China National Knowledge Infrastructure,and Google Scholar databases will be searched from inception.Other types of literature,such as conference abstracts and references to pertinent reviews,will also be reviewed.We will include randomized controlled trials comparing butorphanol with other opioids combined with local anesthetics for epidural analgesia during labor.There will be no language restrictions.The primary outcomes will include the visual analog scale score for the first stage of labor,fetal effects,and Apgar score.Two independent reviewers will evaluate the full texts,extract data,and assess the risk of bias.Publication bias will be evaluated using Egger's or Begg's tests as well as visual analysis of a funnel plot,and heterogeneity will be evaluated using the Cochran Q test,P values,and I2 values.Meta-analysis,subgroup analysis,and sensitivity analysis will be performed using RevMan software version 5.4.This protocol was developed in accordance with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)Protocols statement,and the PRISMA statement will be used for the systematic review.RESULTS This study provides reliable information regarding the safety and efficacy of using butorphanol as an epidural analgesic during labor.CONCLUSION To support clinical practice and development,this study provides evidence-based findings regarding the safety and efficacy of using butorphanol as an epidural analgesic during labor. 展开更多
关键词 Epidural analgesia during labor BUTORPHANOL SAFETY protocol META-ANALYSIS
下载PDF
Designing Proportional-Integral Consensus Protocols for Second-Order Multi-Agent Systems Using Delayed and Memorized State Information
2
作者 Honghai Wang Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期878-892,共15页
This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consens... This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consensus protocol is designed by using delayed and memorized state information.Under the proportional-integral consensus protocol,the consensus problem of the multi-agent system is transformed into the problem of asymptotic stability of the corresponding linear time-invariant time-delay system.Note that the location of the eigenvalues of the corresponding characteristic function of the linear time-invariant time-delay system not only determines the stability of the system,but also plays a critical role in the dynamic performance of the system.In this paper,based on recent results on the distribution of roots of quasi-polynomials,several necessary conditions for Hurwitz stability for a class of quasi-polynomials are first derived.Then allowable regions of consensus protocol parameters are estimated.Some necessary and sufficient conditions for determining effective protocol parameters are provided.The designed protocol can achieve consensus and improve the dynamic performance of the second-order multi-agent system.Moreover,the effects of delays on consensus of systems of harmonic oscillators/double integrators under proportional-integral consensus protocols are investigated.Furthermore,some results on proportional-integral consensus are derived for a class of high-order linear time-invariant multi-agent systems. 展开更多
关键词 Consensus protocol Hurwitz stability multi-agent systems quasi-polynomials time delay
下载PDF
Hyperbolic Tangent Function-Based Protocols for Global/Semi-Global Finite-Time Consensus of Multi-Agent Systems
3
作者 Zongyu Zuo Jingchuan Tang +1 位作者 Ruiqi Ke Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第6期1381-1397,共17页
This paper investigates the problem of global/semi-global finite-time consensus for integrator-type multi-agent sys-tems.New hyperbolic tangent function-based protocols are pro-posed to achieve global and semi-global ... This paper investigates the problem of global/semi-global finite-time consensus for integrator-type multi-agent sys-tems.New hyperbolic tangent function-based protocols are pro-posed to achieve global and semi-global finite-time consensus for both single-integrator and double-integrator multi-agent systems with leaderless undirected and leader-following directed commu-nication topologies.These new protocols not only provide an explicit upper-bound estimate for the settling time,but also have a user-prescribed bounded control level.In addition,compared to some existing results based on the saturation function,the pro-posed approach considerably simplifies the protocol design and the stability analysis.Illustrative examples and an application demonstrate the effectiveness of the proposed protocols. 展开更多
关键词 Consensus protocol finite-time consensus hyper-bolic tangent function multi-agent systems.
下载PDF
Distributed Fault Estimation for Nonlinear Systems With Sensor Saturation and Deception Attacks Using Stochastic Communication Protocols
4
作者 Weiwei Sun Xinci Gao +1 位作者 Lusong Ding Xiangyu Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第8期1865-1876,共12页
This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimati... This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimation structure under consideration,an estimation center is not necessary,and the estimator derives its information from itself and neighboring nodes,which fuses the state vector and the measurement vector.In an effort to cut down data conflicts in communication networks,the stochastic communication protocol(SCP)is employed so that the output signals from sensors can be selected.Additionally,a recursive security estimator scheme is created since attackers randomly inject malicious signals into the selected data.On this basis,sufficient conditions for a fault estimator with less conservatism are presented which ensure an upper bound of the estimation error covariance and the mean-square exponential boundedness of the estimating error.Finally,a numerical example is used to show the reliability and effectiveness of the considered distributed estimation algorithm. 展开更多
关键词 Actuator fault deception attacks distributed estimation sensor saturation stochastic communication protocol(SCP).
下载PDF
Protocol for lower back pain management: Insights from the French healthcare system
5
作者 Lea Evangeline Boyer Mathieu Boudier-Revéret Min Cheol Chang 《World Journal of Clinical Cases》 SCIE 2024年第11期1875-1880,共6页
In this editorial we comment on the article published in a recent issue of the World Journal of Clinical Cases.This article described a novel ultrasound-guided lateral recess block approach in treating a patient with ... In this editorial we comment on the article published in a recent issue of the World Journal of Clinical Cases.This article described a novel ultrasound-guided lateral recess block approach in treating a patient with lateral recess stenosis.The impact of spinal pain-related disability extends significantly,causing substantial human suffering and medical costs.Each county has its preferred treatment strategies for spinal pain.Here,we explore the lower back pain(LBP)treatment algorithm recommended in France.The treatment algorithm for LBP recommended by the French National Authority for Health emphasizes early patient activity and minimal medication use.It encourages the continuation of daily activities,limits excessive medication and spinal injections,and incorporates psychological assessments and non-pharmacological therapies for chronic cases.However,the algorithm may not aggressively address acute pain in the early stages,potentially delaying relief and increasing the risk of chronicity.Additionally,the recommended infiltrations primarily involve caudal epidural steroid injections,with limited consideration for other injection procedures,such as transforaminal or interlaminar epidural steroid injections.The fixed follow-up timeline may not accommodate patients who do not respond to initial treatment or experience intense pain,potentially delaying the exploration of alternative therapies.Despite these limitations,understanding the strengths and weaknesses of the French approach could inform adaptations in LBP treatment strategies globally,potentially enhancing patient outcomes and satisfaction across diverse healthcare systems. 展开更多
关键词 Lower back pain protocol FRANCE TREATMENT Chronic pain
下载PDF
Corneal collagen cross-linking in patients with keratoconus from the Dresden protocol to customized solutions:theoretical basis 被引量:1
6
作者 Ciro Caruso Luca D’Andrea +4 位作者 Mario Troisi Michele Rinaldi Raffaele Piscopo Salvatore Troisi Ciro Costagliola 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2024年第5期951-962,共12页
Keratoconus is an ectatic condition characterized by gradual corneal thinning,corneal protrusion,progressive irregular astigmatism,corneal fibrosis,and visual impairment.The therapeutic options regarding improvement o... Keratoconus is an ectatic condition characterized by gradual corneal thinning,corneal protrusion,progressive irregular astigmatism,corneal fibrosis,and visual impairment.The therapeutic options regarding improvement of visual function include glasses or soft contact lenses correction for initial stages,gas-permeable rigid contact lenses,scleral lenses,implantation of intrastromal corneal ring or corneal transplants for most advanced stages.In keratoconus cases showing disease progression corneal collagen crosslinking(CXL)has been proven to be an effective,minimally invasive and safe procedure.CXL consists of a photochemical reaction of corneal collagen by riboflavin stimulation with ultraviolet A radiation,resulting in stromal crosslinks formation.The aim of this review is to carry out an examination of CXL methods based on theoretical basis and mathematical models,from the original Dresden protocol to the most recent developments in the technique,reporting the changes proposed in the last 15y and examining the advantages and disadvantages of the various treatment protocols.Finally,the limits of non-standardized methods and the perspectives offered by a customization of the treatment are highlighted. 展开更多
关键词 corneal collagen cross linking KERATOCONUS custom fast protocol Dresden protocol lambert-beer law Bunsen-roscoe law
下载PDF
Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks 被引量:1
7
作者 Youseef Alotaibi B.Rajasekar +1 位作者 R.Jayalakshmi Surendran Rajendran 《Computers, Materials & Continua》 SCIE EI 2024年第3期4243-4262,共20页
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effect... Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods. 展开更多
关键词 Vehicular networks communication protocol CLUSTERING falcon optimization algorithm ROUTING
下载PDF
Cell replacement with stem cell-derived retinal ganglion cells from different protocols 被引量:1
8
作者 Ziming Luo Kun-Che Chang 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第4期807-810,共4页
Glaucoma,characterized by a degenerative loss of retinal ganglion cells,is the second leading cause of blindness worldwide.There is currently no cure for vision loss in glaucoma because retinal ganglion cells do not r... Glaucoma,characterized by a degenerative loss of retinal ganglion cells,is the second leading cause of blindness worldwide.There is currently no cure for vision loss in glaucoma because retinal ganglion cells do not regenerate and are not replaced after injury.Human stem cell-derived retinal ganglion cell transplant is a potential therapeutic strategy for retinal ganglion cell degenerative diseases.In this review,we first discuss a 2D protocol for retinal ganglion cell differentiation from human stem cell culture,including a rapid protocol that can generate retinal ganglion cells in less than two weeks and focus on their transplantation outcomes.Next,we discuss using 3D retinal organoids for retinal ganglion cell transplantation,comparing cell suspensions and clusters.This review provides insight into current knowledge on human stem cell-derived retinal ganglion cell differentiation and transplantation,with an impact on the field of regenerative medicine and especially retinal ganglion cell degenerative diseases such as glaucoma and other optic neuropathies. 展开更多
关键词 cell clumps cell suspension cell transplantation DIFFERENTIATION direct-induced protocol GLAUCOMA optic neuropathy regenerative medicine retinal ganglion cell retinal organoids stem cells
下载PDF
UAV-Assisted FSO Communication System with Amplify-and-Forward Protocol under AOA Fluctuations:A Performance Analysis
9
作者 Maozhe Xu Guanjun Xu +3 位作者 Youran Dong Weizhi Wang Qinyu Zhang Zhaohui Song 《China Communications》 SCIE CSCD 2023年第11期111-130,共20页
Free space optical(FSO)communication has recently aroused great interest in academia due to its unique features,such as large transmission band,high data rates,and strong anti-electromagnetic interference.With the aim... Free space optical(FSO)communication has recently aroused great interest in academia due to its unique features,such as large transmission band,high data rates,and strong anti-electromagnetic interference.With the aim of evaluating the performance of an FSO communication system and extending the line-of-sight transmission distance,we propose an unmanned aerial vehicle(UAV)-assisted dual-hop FSO communication system equipped with amplifyand-forward protocol at the relay node.Specifically,we consider impairments of atmospheric absorption,pointing errors,atmospheric turbulence,and link interruptions due to angle-of-arrival fluctuations in the relay system.The Gamma-Gamma and Malaga distributions are used to model the influence of atmospheric turbulence on the source-to-UAV and UAVto-destination links,respectively.We derive closedform expressions of the probability density function(PDF)and cumulative distribution function(CDF)for the proposed communication system,in terms of the Meijer-G function.Based on the precise PDF and CDF,analytical expressions for the outage probability,average bit error rate,and ergodic capacity are proposed with the aid of the extended generalized bivariate Fox’s H function.Finally,we show that there is a match between the analytical results and numerical results,and we analyze the influence of the system and channel parameters on the performance. 展开更多
关键词 amplify-and-forward protocol angle-ofarrival fluctuations FSO communication Malaga distribution UAV relay
下载PDF
An Efficient MPPT Tracking in Solar PV System with Smart Grid Enhancement Using CMCMAC Protocol
10
作者 B.Jegajothi Sundaram Arumugam +3 位作者 Neeraj Kumar Shukla I.Kathir P.Yamunaa Monia Digra 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2417-2437,共21页
Renewable energy sources like solar,wind,and hydro are becoming increasingly popular due to the fewer negative impacts they have on the environment.Because,Since the production of renewable energy sources is still in ... Renewable energy sources like solar,wind,and hydro are becoming increasingly popular due to the fewer negative impacts they have on the environment.Because,Since the production of renewable energy sources is still in the process of being created,photovoltaic(PV)systems are commonly utilized for installation situations that are acceptable,clean,and simple.This study presents an adaptive artificial intelligence approach that can be used for maximum power point tracking(MPPT)in solar systems with the help of an embedded controller.The adaptive method incorporates both the Whale Optimization Algorithm(WOA)and the Artificial Neural Network(ANN).The WOA was implemented to enhance the process of the ANN model’s training,and the ANN model was developed using the WOA.In addition to this,the inverter circuit is connected to the smart grid system,and the strengthening of the smart grid is achieved through the implementation of the CMCMAC protocol.This protocol prevents interference between customers and the organizations that provide their utilities.Using a protocol known as Cross-Layer Multi-Channel MAC(CMCMAC),the effect of interference is removed using the way that was suggested.Also,with the utilization of the ZIGBEE communication technology,bidirectional communication is made possible.The strategy that was suggested has been put into practice,and the results have shown that the PV system produces an output power of 73.32 KW and an efficiency of 98.72%.In addition to this,a built-in regulator is utilized to validate the proposed model.In this paper,the results of various experiments are analyzed,and a comparison is made between the suggested WOA with the ANN controller approach and others,such as the Particle Swarm Optimization(PSO)based MPPT and the Cuckoo Search(CS)based MPPT.By examining the comparison findings,it was determined that the adaptive AI-based embedded controller was superior to the other alternatives. 展开更多
关键词 DC/DC converter MPPT controller Artificial Neural Network(ANN)algorithm ZIGBEE communication CMCMAC protocol Smart Grid(SG)
下载PDF
Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies
11
作者 Waseem Akram Khalid Mahmood +3 位作者 Hafiz Burhan ul Haq Muhammad Asif Shehzad Ashraf Chaudhry Taeshik Shon 《Computers, Materials & Continua》 SCIE EI 2024年第7期263-280,共18页
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the Internet.HTTP cookie... Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the Internet.HTTP cookies are exploited to carry client patterns observed by a website.These client patterns facilitate the particular client’s future visit to the corresponding website.However,security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the browser.Several protocols have been introduced that maintain HTTP cookies,but many of those fail to achieve the required security,or require a lot of resource overheads.In this article,we have introduced a lightweight Elliptic Curve Cryptographic(ECC)based protocol for authenticating client and server transactions to maintain the privacy and security of HTTP cookies.Our proposed protocol uses a secret key embedded within a cookie.The proposed protocol ismore efficient and lightweight than related protocols because of its reduced computation,storage,and communication costs.Moreover,the analysis presented in this paper confirms that proposed protocol resists various known attacks. 展开更多
关键词 COOKIES authentication protocol impersonation attack ECC
下载PDF
Enhancing Network Design through Statistical Evaluation of MANET Routing Protocols
12
作者 Ibrahim Alameri Tawfik Al-Hadhrami +2 位作者 Anjum Nazir Abdulsamad Ebrahim Yahya Atef Gharbi 《Computers, Materials & Continua》 SCIE EI 2024年第7期319-339,共21页
This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network(MANET)routing protocols:Destination Sequenced Distance Vector(DSDV),Ad hoc... This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network(MANET)routing protocols:Destination Sequenced Distance Vector(DSDV),Ad hoc On-Demand Distance Vector(AODV),Dynamic Source Routing(DSR),and Zone Routing Protocol(ZRP).In this paper,the evaluation will be carried out using complete sets of statistical tests such as Kruskal-Wallis,Mann-Whitney,and Friedman.It articulates a systematic evaluation of how the performance of the previous protocols varies with the number of nodes and the mobility patterns.The study is premised upon the Quality of Service(QoS)metrics of throughput,packet delivery ratio,and end-to-end delay to gain an adequate understanding of the operational efficiency of each protocol under different network scenarios.The findings explained significant differences in the performance of different routing protocols;as a result,decisions for the selection and optimization of routing protocols can be taken effectively according to different network requirements.This paper is a step forward in the general understanding of the routing dynamics of MANETs and contributes significantly to the strategic deployment of robust and efficient network infrastructures. 展开更多
关键词 Routing protocols statistical approach friedman MANET
下载PDF
A Formal Model for Analyzing Fair Exchange Protocols Based on Event Logic
13
作者 Ke Yang Meihua Xiao Zehuan Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2641-2663,共23页
Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and elec... Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and electronic contract signing,ensuring the reliability and security of network transactions.In order to address the limitations of current research methods and enhance the analytical capabilities for fair exchange protocols,this paper proposes a formal model for analyzing such protocols.The proposed model begins with a thorough analysis of fair exchange protocols,followed by the formal definition of fairness.This definition accurately captures the inherent requirements of fair exchange protocols.Building upon event logic,the model incorporates the time factor into predicates and introduces knowledge set axioms.This enhancement empowers the improved logic to effectively describe the state and knowledge of protocol participants at different time points,facilitating reasoning about their acquired knowledge.To maximize the intruder’s capabilities,channel errors are translated into the behaviors of the intruder.The participants are further categorized into honest participants and malicious participants,enabling a comprehensive evaluation of the intruder’s potential impact.By employing a typical fair exchange protocol as an illustrative example,this paper demonstrates the detailed steps of utilizing the proposed model for protocol analysis.The entire process of protocol execution under attack scenarios is presented,shedding light on the underlying reasons for the attacks and proposing corresponding countermeasures.The developedmodel enhances the ability to reason about and evaluate the security properties of fair exchange protocols,thereby contributing to the advancement of secure network transactions. 展开更多
关键词 Fair exchange protocols FAIRNESS formal analysis logic reasoning
下载PDF
A Multi-Token Sector Antenna Neighbor Discovery Protocol for Directional Ad Hoc Networks
14
作者 Zhang Hang Li Bo +2 位作者 Yan Zhongjiang Yang Mao Li Xinru 《China Communications》 SCIE CSCD 2024年第7期149-168,共20页
In this paper,we propose a Multi-token Sector Antenna Neighbor Discovery(M-SAND)protocol to enhance the efficiency of neighbor discovery in asynchronous directional ad hoc networks.The central concept of our work invo... In this paper,we propose a Multi-token Sector Antenna Neighbor Discovery(M-SAND)protocol to enhance the efficiency of neighbor discovery in asynchronous directional ad hoc networks.The central concept of our work involves maintaining multiple tokens across the network.To prevent mutual interference among multi-token holders,we introduce the time and space non-interference theorems.Furthermore,we propose a master-slave strategy between tokens.When the master token holder(MTH)performs the neighbor discovery,it decides which 1-hop neighbor is the next MTH and which 2-hop neighbors can be the new slave token holders(STHs).Using this approach,the MTH and multiple STHs can simultaneously discover their neighbors without causing interference with each other.Building on this foundation,we provide a comprehensive procedure for the M-SAND protocol.We also conduct theoretical analyses on the maximum number of STHs and the lower bound of multi-token generation probability.Finally,simulation results demonstrate the time efficiency of the M-SAND protocol.When compared to the QSAND protocol,which uses only one token,the total neighbor discovery time is reduced by 28% when 6beams and 112 nodes are employed. 展开更多
关键词 multi-token neighbor discovery SAND protocol sector antenna ad hoc network
下载PDF
A CSMA/CA based MAC protocol for hybrid Power-line/Visible-light communication networks:Design and analysis
15
作者 Sheng Hao Huyin Zhang +2 位作者 Fei Yang Chenghao Li Jing Wang 《Digital Communications and Networks》 SCIE CSCD 2024年第2期481-497,共17页
Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and har... Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and hardware efficiency.Current research on HPVC networks focuses on the performance analysis and optimization of the Physical(PHY)layer,where the Power Line Communication(PLC)component only serves as the backbone to provide power to light Emitting Diode(LED)devices.So designing a Media Access Control(MAC)protocol remains a great challenge because it allows both PLC and Visible Light Communication(VLC)components to operate data transmission,i.e.,to achieve a true HPVC network CC.To solve this problem,we propose a new HPC network MAC protocol(HPVC MAC)based on Carrier Sense Multiple Access/Collision Avoidance(CSMA/CA)by combining IEEE 802.15.7 and IEEE 1901 standards.Firstly,we add an Additional Assistance(AA)layer to provide the channel selection strategies for sensor stations,so that they can complete data transmission on the selected channel via the specified CSMA/CA mechanism,respectively.Based on this,we give a detailed working principle of the HPVC MAC,followed by the construction of a joint analytical model for mathematicalmathematical validation of the HPVC MAC.In the modeling process,the impacts of PHY layer settings(including channel fading types and additive noise feature),CSMA/CA mechanisms of 802.15.7 and 1901,and practical configurations(such as traffic rate,transit buffer size)are comprehensively taken into consideration.Moreover,we prove the proposed analytical model has the solvability.Finally,through extensive simulations,we characterize the HPVC MAC performance under different system parameters and verify the correctness of the corresponding analytical model with an average error rate of 4.62%between the simulation and analytical results. 展开更多
关键词 Hybrid power-line/Visible light communication (HPVC)networks MAC protocol CSMA/CA IEEE 802.15.7 IEEE 1901 Performance analysis
下载PDF
A Secure Blockchain-Based Vehicular Collision Avoidance Protocol: Detecting and Preventing Blackhole Attacks
16
作者 Mosab Manaseer Maram Bani Younes 《Computer Systems Science & Engineering》 2024年第6期1699-1721,共23页
This work aims to examine the vulnerabilities and threats in the applications of intelligent transport systems,especially collision avoidance protocols.It focuses on achieving the availability of network communication... This work aims to examine the vulnerabilities and threats in the applications of intelligent transport systems,especially collision avoidance protocols.It focuses on achieving the availability of network communication among traveling vehicles.Finally,it aims to find a secure solution to prevent blackhole attacks on vehicular network communications.The proposed solution relies on authenticating vehicles by joining a blockchain network.This technology provides identification information and receives cryptography keys.Moreover,the ad hoc on-demand distance vector(AODV)protocol is used for route discovery and ensuring reliable node communication.The system activates an adaptive mode for monitoring communications and continually adjusts trust scores based on packet delivery performance.From the experimental study,we can infer that the proposed protocol has successfully detected and prevented blackhole attacks for different numbers of simulated vehicles and at different traveling speeds.This reduces accident rates by 60%and increases the packet delivery ratio and the throughput of the connecting network by 40%and 20%,respectively.However,extra overheads in delay and memory are required to create and initialize the blockchain network. 展开更多
关键词 Vehicular networks blockchain collision avoidance protocol design security mechanisms
下载PDF
BDSec:Security Authentication Protocol for BeiDou-Ⅱ Civil Navigation Message
17
作者 Wu Zhijun Zhang Yuan +2 位作者 Yang Yiming Wang Peng Yue Meng 《China Communications》 SCIE CSCD 2024年第6期206-218,共13页
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a s... Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV. 展开更多
关键词 BDII civil navigation messages(BDIICNAV) BeiDou navigation satellite system(BDS) identity-based cryptography mechanism navigation message authentication protocol(BDSec)
下载PDF
Priority Based Energy Efficient MAC Protocol by Varying Data Ratefor Wireless Body Area Network
18
作者 R.Sangeetha Usha Devi Gandhi 《Computer Systems Science & Engineering》 2024年第2期395-411,共17页
Wireless Body Area Network(WBAN)is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body.WBAN is a collection of in-body and on-body sensors that monitor ... Wireless Body Area Network(WBAN)is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body.WBAN is a collection of in-body and on-body sensors that monitor human physical parameters such as temperature,blood pressure,pulse rate,oxygen level,body motion,and so on.They sense the data and communicate it to the Body Area Network(BAN)Coordinator.The main challenge for the WBAN is energy consumption.These issues can be addressed by implementing an effective Medium Access Control(MAC)protocol that reduces energy consumption and increases network lifetime.The purpose of the study is to minimize the energy consumption and minimize the delay using IEEE 802.15.4 standard.In our proposed work,if any critical events have occurred the proposed work is to classify and prioritize the data.We gave priority to the highly critical data to get the Guarantee Tine Slots(GTS)in IEEE 802.15.4 standard superframe to achieve greater energy efficiency.The proposed MAC provides higher data rates for critical data based on the history and current condition and also provides the best reliable service to high critical data and critical data by predicting node similarity.As an outcome,we proposed a MAC protocol for Variable Data Rates(MVDR).When compared to existing MAC protocols,the MVDR performed very well with low energy intake,less interruption,and an enhanced packet-sharing ratio. 展开更多
关键词 Wireless Body Area Network(WBAN) IEEE 802.15.4 energy efficiency MAC protocol ZIGBEE
下载PDF
Clinical comprehensive treatment protocol for managing diabetic foot ulcers:A retrospective cohort study
19
作者 Yan-Bin Wang Yan Lv +3 位作者 Guang-Yu Li Ji-Ting Zheng Qing-Xin Jiang Ran Wei 《World Journal of Clinical Cases》 SCIE 2024年第17期2976-2982,共7页
BACKGROUND Diabetic foot ulcers(DFUs)are a common complication of diabetes,often leading to severe infections,amputations,and reduced quality of life.The current standard treatment protocols for DFUs have limitations ... BACKGROUND Diabetic foot ulcers(DFUs)are a common complication of diabetes,often leading to severe infections,amputations,and reduced quality of life.The current standard treatment protocols for DFUs have limitations in promoting efficient wound healing and preventing complications.A comprehensive treatment approach targeting multiple aspects of wound care may offer improved outcomes for patients with DFUs.The hypothesis of this study is that a comprehensive treatment protocol for DFUs will result in faster wound healing,reduced amputation rates,and improved overall patient outcomes compared to standard treatment protocols.AIM To compare the efficacy and safety of a comprehensive treatment protocol for DFUs with those of the standard treatment protocol.METHODS This retrospective study included 62 patients with DFUs,enrolled between January 2022 and January 2024,randomly assigned to the experimental(n=32)or control(n=30)group.The experimental group received a comprehensive treatment comprising blood circulation improvement,debridement,vacuum sealing drainage,recombinant human epidermal growth factor and anti-inflammatory dressing,and skin grafting.The control group received standard treatment,which included wound cleaning and dressing,antibiotics administration,and surgical debridement or amputation,if necessary.Time taken to reduce the white blood cell count,number of dressing changes,wound healing rate and time,and amputation rate were assessed.RESULTS The experimental group exhibited significantly better outcomes than those of the control group in terms of the wound healing rate,wound healing time,and amputation rate.Additionally,the comprehensive treatment protocol was safe and well tolerated by the patients.CONCLUSION Comprehensive treatment for DFUs is more effective than standard treatment,promoting granulation tissue growth,shortening hospitalization time,reducing pain and amputation rate,improving wound healing,and enhancing quality of life. 展开更多
关键词 Diabetic foot ulcers Comprehensive treatment protocol Clinical study White blood cell count Wound healing Amputation rate
下载PDF
Research trends of clinical studies on acupuncture protocols over the past 20 years:a bibliometric analysis
20
作者 Zhi-Qiang Li Xue-Feng Wang +3 位作者 Heng Yin Feng Cao Yu-Tong Fei Jian-Ping Liu 《Integrative Medicine Discovery》 2024年第28期1-14,共14页
Background:Acupuncture protocols are essential as they guide study design and improve the quality of clinical trial,thus preventing avoid research waste.Given the increasing number of publications on acupuncture proto... Background:Acupuncture protocols are essential as they guide study design and improve the quality of clinical trial,thus preventing avoid research waste.Given the increasing number of publications on acupuncture protocols,this study aimed to assess the publications trends of acupuncture protocols over the past two decades and provided an overview for future research directions.Methods:Publications focusing on acupuncture protocols in clinical settings were retrieved and compiled from the Web of Science Core Collection spanning the period from 2004 to 2023.CiteSpace and Microsoft Excel software were used to analyze the relationship of publication with countries,institutions,authors,co-cited author,journals,references,keywords and other literature aspects.Results:This study analyzed 721 articles encompassing acupuncture protocols.A continuous yet fluctuating growth in publications volume were observed from 2004 to 2023.Notably,China stands at the forefront in contributing to acupuncture protocols,publishing 513 papers and demonstrating a high centrality score of 1.07 in cooperative network.Furthermore,China has fostered close collaborations with the USA and South Korea.Beijing University of Chinese Medicine(89),Zhishun Liu(36)and Trials(306)emerged as the top contributors in terms of institution,author,and journal,respectively.However,inter-institutional and author collaboration was relatively weak.Macpherson H was the most frequently cited author.High-frequency keywords included“randomized controlled trials”,“acupuncture”,“management”,“study protocol”,“quality of life”.Analysis of timeline diagram of keywords indicated that“functional dyspepsia”,“stroke”,“electroacupuncture”,and“colorectal cancer”were the research development trends and focus.Conclusion:Clinical acupuncture protocols have experienced robust development over the past two decades,with current research hotspots focusing on disease management and quality of life,which remain key research concerns.Moreover,we advocate for researchers to publish acupuncture protocols,which remain key research concerns.This approach allows for thorough pre-study planning of methodologies and objectives,enhancing scientific rigor through peer review,thereby laying the foundation for conducting high-quality research. 展开更多
关键词 ACUPUNCTURE protocol BIBLIOMETRIC HOTSPOTS CiteSpace
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部