期刊文献+
共找到639篇文章
< 1 2 32 >
每页显示 20 50 100
Individualized music for dementia:Evolution and application of evidence-based protocol 被引量:3
1
作者 Linda A Gerdner 《World Journal of Psychiatry》 SCIE 2012年第2期26-32,共7页
The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded versio... The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded version of the protocol was written for professional health care providers with a consumer version tailored for family caregivers. The underlying mid-range theory is presented along with a seminal study that was followed by further research in the United States, Canada, Great Britain, France, Sweden, Norway, Japan and Taiwan. Key studies are summarized. Given its efficacy when implemented by research staff, studies have advanced to testing the intervention under real-life conditions when implemented and evaluated by trained nursing assistants in long-term care facilities and visiting family members. In addition, one study evaluated the implementation of music by family members in the home setting. Initial research focused on agitation as the dependent variable with subsequent research indicating a more holistic response such as positive affect, expressed satisfaction, and meaningful interaction with others. The article advances by describing on-line programs designed to train health care professionals in the assessment, implementation and evaluation of individualized music. In addition, Gerdner has written a story for apicture book intended for children and their families(in press). The story models principles of individualized music to elicit positive memories, reduce anxiety and agitation, and promote communication. The article concludes with implications for future research. 展开更多
关键词 Individualized MUSIC DEMENTIA Alzheimer’s disease AGITATION EVIDENCE-baseD protocol
暂未订购
Location-Based Routing Protocols for Wireless Sensor Networks: A Survey 被引量:6
2
作者 Arun Kumar Hnin Yu Shwe +1 位作者 Kai Juan Wong Peter H. J. Chong 《Wireless Sensor Network》 2017年第1期25-72,共48页
Recently, location-based routings in wireless sensor networks (WSNs) are attracting a lot of interest in the research community, especially because of its scalability. In location-based routing, the network size is sc... Recently, location-based routings in wireless sensor networks (WSNs) are attracting a lot of interest in the research community, especially because of its scalability. In location-based routing, the network size is scalable without increasing the signalling overhead as routing decisions are inherently localized. Here, each node is aware of its position in the network through some positioning device like GPS and uses this information in the routing mechanism. In this paper, we first discuss the basics of WSNs including the architecture of the network, energy consumption for the components of a typical sensor node, and draw a detailed picture of classification of location-based routing protocols. Then, we present a systematic and comprehensive taxonomy of location-based routing protocols, mostly for sensor networks. All the schemes are subsequently discussed in depth. Finally, we conclude the paper with some insights on potential research directions for location-based routing in WSNs. 展开更多
关键词 Location-based protocol GEOGRAPHIC ROUTING WIRELESS Sensor Networks Energy CONSERVATION ROUTING
在线阅读 下载PDF
Mathematical Model with Energy and Clustering Energy Based Routing Protocols as Remediation to the Directional Source Aware Routing Protocol in Wireless Sensor Networks 被引量:1
3
作者 Samir Haddad Jinane Sayah +5 位作者 Bachar El-Hassan Chadi Kallab Mohamad Chakroun Nisrine Turkey Jinan Charafeddine Hani Hamdan 《Wireless Sensor Network》 2022年第2期23-39,共17页
In this paper, a routing protocol for wireless sensor network, baptized energy based protocol (EBP) is proposed. Wireless sensor network presents many challenges and constraints, and one of the major constraints is th... In this paper, a routing protocol for wireless sensor network, baptized energy based protocol (EBP) is proposed. Wireless sensor network presents many challenges and constraints, and one of the major constraints is the routing problem. Due to the limited energy of sensor nodes, routing in this type of network shall perform efficiently to maximize the network lifetime. One of the proposed algorithms is the directional source aware routing protocol (DSAP) which, after simulation, showed a lot of limitations and drawbacks. The modified directional source aware routing protocol (MDSAP) was proposed by the authors of this paper to address some of the DSAP’s limitations but remains limited to a fixed topology, fixed source and stationary nodes. So EBP is proposed and operated under different scenarios and showed, after its simulation using TinyOS, many advantages in terms of load balancing, free looping, minimizing packet error rate and maximizing network lifetime. 展开更多
关键词 Cluster DSAP ENERGY MDSAP ROUTING Sensor Network TOPOLOGY Energy based protocol
在线阅读 下载PDF
Protocol of Jidong Women Health Cohort Study: Rationale, Design, and Baseline Characteristics 被引量:3
4
作者 QIU Meng Si WANG Xian Wei +4 位作者 YAO Yan GE Si Qi LIU Hua Min DAI Ying Chun ZHOU Yong 《Biomedical and Environmental Sciences》 SCIE CAS CSCD 2019年第2期144-152,共9页
Objective The Jidong Women Health Cohort Study is a prospective cohort study on female-specific characteristics and risks of chronic diseases in Chinese women and focuses on the potential association between menopause... Objective The Jidong Women Health Cohort Study is a prospective cohort study on female-specific characteristics and risks of chronic diseases in Chinese women and focuses on the potential association between menopause and risks of cardiovascular disease(CVD). Methods The study includes 4,179 female participants with an age of older than 18 years from Caofeidian district, Tangshan city, northern China. Baseline information on female-specific characteristics and potential cardiovascular risk factors was collected and all the participants underwent a physical examination with blood samples collected in 2013. To establish a better risk assessment tool of female CVD, updated information from questionnaire investigation, physical examinations and occurrence of outcome events will be collected through a longitudinal follow-up annually up to the year 2024. Results At baseline, Mean age of the participants was 42.3 ± 12.8 years. Reproduction occurred in 2,948 participants(70.5%), menopausal transition in 173(4.3%), and postmenopause in 1,058(25.3%). The incidence of arterial hypertension, dyslipidemia, and diabetes showed significant difference across different groups stratified by Stage of Reproductive Aging Workshop(STRAW) system(P < 0.05). Conclusion The Jidong Women Health Cohort Study will contribute to the scientific evidence on association between female-specific characteristics and cardiovascular risks, and will also be helpful to provide a new path for early detection and prevention of CVD. 展开更多
关键词 CARDIOVASCULAR disease MENOPAUSE WOMEN protocol Chinese POPULATION-baseD
暂未订购
Performance Comparison between Delay-Tolerant and Non-Delay-Tolerant Position-Based Routing Protocols in VANETs 被引量:1
5
作者 Ahmed Mohamed Abdalla Salem H. Salamah 《International Journal of Communications, Network and System Sciences》 2022年第1期1-14,共14页
Vehicular ad hoc networks (VANETs) are a new emerging recently developed advanced technology that allows a wide group of applications related to providing more safety on roads, more convenience for passengers, self-dr... Vehicular ad hoc networks (VANETs) are a new emerging recently developed advanced technology that allows a wide group of applications related to providing more safety on roads, more convenience for passengers, self-driven vehicles, and intelligent transportation systems (ITS). There are various routing protocol categories used in VANETs, like unicast, multicast, and broadcast protocols. In unicast position-based protocols, the routing decisions are based on the geographic position of the vehicles. This does not require establishment or maintenance of routes but needs location services to determine the position of the destination. Non-delay-tolerant network protocols (non-DTN), also identified as minimum delay protocols, are aimed at minimizing the delivery time of the information. Delay-tolerant protocols (DTN) are used in a variety of operating environments, including those that are subject to failures and interruptions and those with high delay, such as VANETs. This paper discusses the comparison between non-DTN and DTN routing protocols belonging to the unicast delay-tolerant position-based category. The comparison was conducted using the NS2 simulator, and the simulations of three non-DTN routing protocols and three DTN routing protocols were recorded. Simulation results show that the DTN routing protocols outperform in delivery ratio compared to the non-DTN routing protocols, but they lead to more average delay due to buffering, the processing algorithm, and priority calculation. In conclusion, non-DTN protocols are more suitable for the city environment since the distance between nodes is relatively smaller and the variations in the network topology are slower than they are on highways. On the other hand, DTN protocols are more suitable for highways due to the buffering of packets until a clear route to destination is available. 展开更多
关键词 VANETS Position-based Routing protocols Non-DTN DTN
在线阅读 下载PDF
Twin-Field Quantum Key Distribution Protocol Based on Wavelength-Division-Multiplexing Technology
6
作者 Yanxin Han Zhongqi Sun +5 位作者 Tianqi Dou Jipeng Wang Zhenhua Li Yuqing Huang Pengyun Li Haiqiang Ma 《Chinese Physics Letters》 SCIE EI CAS CSCD 2022年第7期3-8,共6页
Quantum key distribution(QKD) generates information-theoretical secret keys between two parties based on the physical laws of quantum mechanics. Following the advancement in quantum communication networks, it becomes ... Quantum key distribution(QKD) generates information-theoretical secret keys between two parties based on the physical laws of quantum mechanics. Following the advancement in quantum communication networks, it becomes feasible and economical to combine QKD with classical optical communication through the same fiber using dense wavelength division multiplexing(DWDM) technology. This study proposes a detailed scheme of TF-QKD protocol with DWDM technology and analyzes its performance, considering the influence of quantum channel number and adjacent quantum crosstalk on the secret key rates. The simulation results show that the scheme further increases the secret key rate of TF-QKD and its variants. Therefore, this scheme provides a method for improving the secret key rate for practical quantum networks. 展开更多
关键词 Twin-Field Quantum Key Distribution protocol based on Wavelength-Division-Multiplexing Technology QKD Quantum protocol KEY
原文传递
Index-Based Cache Coherence Protocol
7
作者 Soha S. Zaghloul Najlaa A1Huwaishel Maram AlAlwan 《通讯和计算机(中英文版)》 2014年第6期479-483,共5页
关键词 一致性协议 高速缓存 索引表 多处理器 主存储器 负载均衡 工作原理 网络结构
在线阅读 下载PDF
A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography 被引量:1
8
作者 Krishnan Kumar J. Nafeesa Begum V. Sumathy 《International Journal of Communications, Network and System Sciences》 2010年第4期369-379,共11页
This paper addresses an interesting security problem in wireless ad hoc networks: the dynamic group key agreement key establishment. For secure group communication in an ad hoc network, a group key shared by all group... This paper addresses an interesting security problem in wireless ad hoc networks: the dynamic group key agreement key establishment. For secure group communication in an ad hoc network, a group key shared by all group members is required. This group key should be updated when there are membership changes (when the new member joins or current member leaves) in the group. In this paper, we propose a novel, secure, scalable and efficient region-based group key agreement protocol for ad hoc networks. This is implemented by a two-level structure and a new scheme of group key update. The idea is to divide the group into subgroups, each maintaining its subgroup keys using group elliptic curve diffie-hellman (GECDH) Protocol and links with other subgroups in a tree structure using tree-based group elliptic curve diffie-hellman (TGECDH) protocol. By introducing region-based approach, messages and key updates will be limited within subgroup and outer group;hence computation load is distributed to many hosts. Both theoretical analysis and experimental results show that this Region-based key agreement protocol performs well for the key establishment problem in ad hoc network in terms of memory cost, computation cost and communication cost. 展开更多
关键词 Ad HOC Network Region-based GROUP Key AGREEMENT protocol ELLIPTIC CURVE DIFFIE-HELLMAN Tree-based GROUP ELLIPTIC CURVE DIFFIE-HELLMAN
在线阅读 下载PDF
Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite
9
作者 Arif Sari 《International Journal of Communications, Network and System Sciences》 2015年第3期29-42,共14页
The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity mak... The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity make them difficult to detect and defend themselves against variety of attacks. The radio interference attacks that generate for WSN at the Physical Layer cannot be defeated through conventional security mechanisms proposed for 802.15.4 standards. The first section introduces the deployment model of two-tier hierarchical cluster topology architecture and investigates different jamming techniques proposed for WSN by creating specific classification of different types of jamming attacks. The following sections expose the mitigation techniques and possible built-in mechanisms to mitigate the link layer jamming attacks on proposed two-tier hierarchical clustered WSN topology. The two-tier hierarchical cluster based topology is investigated based on contention based protocol suite through OPNET simulation scenarios. 展开更多
关键词 802.15.4 WSN Communication Hierarchical CLUSTER TOPOLOGY Simulation Security Jamming ATTACK Contention-based protocols
在线阅读 下载PDF
A Novel Basis Splitting Eavesdropping Scheme in Quantum Cryptography Based on the BB84 Protocol
10
作者 赵楠 朱畅华 权东晓 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期22-26,共5页
We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercep... We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercept- resend strategy, our simulation results of the basis-splitting scheme under the non-ideal condition show a greater performance, especially with the increase of the length of shifted bits. Consequently our scheme can aid eaves- dropper to gather much more useful information. 展开更多
关键词 A Novel Basis Splitting Eavesdropping Scheme in Quantum Cryptography based on the BB84 protocol BB
原文传递
Tree Based Energy and Congestion Aware Routing Protocol for Wireless Sensor Networks 被引量:1
11
作者 Amir Hossein Mohajerzadeh Mohammad Hossien Yaghmaee 《Wireless Sensor Network》 2010年第2期161-167,共7页
Wireless Sensor Networks (WSNs) have inherent and unique characteristics rather than traditional networks. They have many different constraints, such as computational power, storage capacity, energy supply and etc;of ... Wireless Sensor Networks (WSNs) have inherent and unique characteristics rather than traditional networks. They have many different constraints, such as computational power, storage capacity, energy supply and etc;of course the most important issue is their energy constraint. Energy aware routing protocol is very important in WSN, but routing protocol which only considers energy has not efficient performance. Therefore considering other parameters beside energy efficiency is crucial for protocols efficiency. Depending on sensor network application, different parameters can be considered for its protocols. Congestion management can affect routing protocol performance. Congestion occurrence in network nodes leads to increasing packet loss and energy consumption. Another parameter which affects routing protocol efficiency is providing fairness in nodes energy consumption. When fairness is not considered in routing process, network will be partitioned very soon and then the network performance will be decreased. In this paper a Tree based Energy and Congestion Aware Routing Protocol (TECARP) is proposed. The proposed protocol is an energy efficient routing protocol which tries to manage congestion and to provide fairness in network. Simulation results shown in this paper imply that the TECARP has achieved its goals. 展开更多
关键词 CONGESTION Aware ENERGY Efficiency ROUTING protocol FAIRNESS TREE based ROUTING Wireless Sensor Networks
在线阅读 下载PDF
Mean Territorial Energy Based Clustering Protocol for Randomly Deployed Wireless Sensor Networks
12
作者 Rohit D. Gawade Sanjay L. Nalbalwar 《Advances in Internet of Things》 2017年第3期87-96,共10页
Clustering algorithms can balance the power consumption of energy constraint wireless sensor networks. This paper proposes a new clustering protocol called Mean Territorial Energy Based Clustering Protocol (MTEP) for ... Clustering algorithms can balance the power consumption of energy constraint wireless sensor networks. This paper proposes a new clustering protocol called Mean Territorial Energy Based Clustering Protocol (MTEP) for randomly deployed wireless sensor networks. In MTEP, cluster heads are selected according to residual energy and location information of a node in current round as well as mean territorial energy and total base station distance of node’s corresponding cluster territory in previous round. Energy consumption in conventional protocols becomes unbalanced because of clusters having different lengths. Proposed MTEP protocol addresses this problem by setting thresholds on cluster length and node to cluster head distance for producing equal length clusters. Simulation results show that MTEP protocol extends network lifetime and stability with reduction in energy dissipation compared to other clustering protocols such as LEACH and REAC. 展开更多
关键词 CLUSTER HEAD base STATION CLUSTERING protocol Energy Efficiency Network LIFETIME
在线阅读 下载PDF
Development of an assessment and intervention protocol for postpartum hemorrhage in the mainland of China: an evidence-based method and Delphi consult
13
作者 Ying Liu Ya-Jing Fan +1 位作者 Wei Zhuang Qun Huang 《Frontiers of Nursing》 CAS 2019年第4期285-291,共7页
Objective: Postpartum hemorrhage(PPH) is a leading cause of maternal death. Although guidelines have been updated, those with detailed protocols are limited for nursing practice. This study aims at establishing an ear... Objective: Postpartum hemorrhage(PPH) is a leading cause of maternal death. Although guidelines have been updated, those with detailed protocols are limited for nursing practice. This study aims at establishing an early assessment and intervention protocol as a toolkit for PPH for midwives and obstetrical nurses.Methods: Employing the evidence-based method, a systematic Internet search of guidelines was conducted and appraisal of literatures was conducted with AGREE system and Oxman-Guyatt Overview Quality Assessment Questionnaire(OQAQ), according to which a protocol draft was therefore developed. Then, a two-round modified Delphi method was utilized to reach a consensus of the protocol built on best practices. Selection criteria for each intervention measure included consensus level with a threshold of 70%, mean of importance(M) >3.5, and coefficient of variation(CV) <0.25. Reliability of experts' opinion was calculated by positive coefficient and authoritative coefficient. Items without consistency were enlisted in the second-round consult. When all items met the selection criteria, the protocol would be finally formulated.Results: A 122-measure protocol was established, including prevention, assessment, and intervention of PPH. With a panel of 14 experts participated in the consult, the positivity coefficient was 0.93 and 1.00 for two rounds, respectively, and the authority coefficient was 0.88. After a two-round consult and revision of the draft, the final program was formulated, containing 5 first-level indexes and 14 second-level indexes with a total item of 120.Conclusions: The PPH protocol, based on high-quality evidences, was formulated with a two-round Delphi method, which can provide insight for midwives and obstetrical nurses to effectively deal with PPH. 展开更多
关键词 postpartum hemorrhage ASSESSMENT INTERVENTION protocol evidence-based method modified Delphi technique
在线阅读 下载PDF
Contention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks
14
作者 Chao Huang Guoli Wang 《Wireless Sensor Network》 2010年第7期528-537,共10页
This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at ... This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks. 展开更多
关键词 Wireless Sensor Network REAL-TIME Routing protocol Contention-based Scheme Beaconless
在线阅读 下载PDF
Ad Hoc Network Hybrid Management Protocol Based on Genetic Classifiers
15
作者 Fabio Garzia Cristina Perna Roberto Cusani 《Wireless Engineering and Technology》 2010年第2期69-80,共12页
The purpose of this paper is to solve the problem of Ad Hoc network routing protocol using a Genetic Algorithm based approach. In particular, the greater reliability and efficiency, in term of duration of communicatio... The purpose of this paper is to solve the problem of Ad Hoc network routing protocol using a Genetic Algorithm based approach. In particular, the greater reliability and efficiency, in term of duration of communication paths, due to the introduction of Genetic Classifier is demonstrated. 展开更多
关键词 Ad HOC Networks GENETIC Algorithms GENETIC CLASSIFIER Systems Routing protocols RULE-baseD Processing
在线阅读 下载PDF
Event-based Control and Filtering of Networked Systems:A Survey 被引量:7
16
作者 Lei Zou Zi-Dong Wang Dong-Hua Zhou 《International Journal of Automation and computing》 EI CSCD 2017年第3期239-253,共15页
In recent years, theoretical and practical research on event-based communication strategies has gained considerable research attention due primarily to their irreplaceable superiority in resource-constrained systems(... In recent years, theoretical and practical research on event-based communication strategies has gained considerable research attention due primarily to their irreplaceable superiority in resource-constrained systems(especially networked systems). For networked systems, event-based transmission scheme is capable of improving the efficiency in resource utilization and prolonging the lifetime of the network components compared with the widely adopted periodic transmission scheme. As such, it would be interesting to 1) examining how the event-triggering mechanisms affect the control or filtering performance for networked systems, and 2) developing some suitable approaches for the controller and filter design problems. In this paper, a bibliographical review is presented on event-based control and filtering problems for various networked systems. First, the event-driven communication scheme is introduced in detail according to its engineering background, characteristic, and representative research frameworks. Then, different event-based control and filtering(or state estimation) problems are categorized and then discussed. Finally, we conclude the paper by outlining future research challenges for event-based networked systems. 展开更多
关键词 Event-triggered transmission networked systems event-based control event-based filtering event-triggered distributed state estimation distributed control with event-based protocol
原文传递
Formal Verification of the Merchant Registration Phase of the SET Protocol 被引量:1
17
作者 Xiao-Qi Ma Xiao-Chun Cheng 《International Journal of Automation and computing》 EI 2005年第2期155-162,共8页
This paper describes the formal verification of the Merchant Registration phase of the Secure Electronic Transactions (SET) protocol, a realistic electronic transaction security protocol which is used to protect the s... This paper describes the formal verification of the Merchant Registration phase of the Secure Electronic Transactions (SET) protocol, a realistic electronic transaction security protocol which is used to protect the secrecy of online purchases. A number of concepts, notations, functions, predicates, assumptions and rules are introduced. We describe the knowledge of all legal participants, and a malicious spy, to assess the security of the sub-protocol. Avoiding search in a large state space, the method converges very quickly. We implemented our method in the Isabelle/Isar automated reasoning environment, therefore the whole verification process can be executed mechanically and efficiently. Keywords Formal verification - electronic transaction protocol - knowledge-based system This work was supported by EC, EPSRC, the National Natural Science Foundation of China (No.60496320, 60496321), and Hong Kong K C Wang Education Foundation.Xiao-Qi Ma graduated from Nanjing University of Science and Technology, China, in 1997. He received his Master’s degree from the Institute of Software, Chinese Academy of Sciences in 2003. He is currently a PhD student at the University of Reading. His research interests include computer network security, knowledge-based systems, and operating systems.Xiao-Chun Cheng obtained his PhD in 1996. He has worked as a lecturer at the University of Reading since 2000. He is a vip professor at North East Normal University and Beijing Normal University. His research interests include theoretical and applied aspects in decision support systems, knowledge-based systems and intelligent systems. 展开更多
关键词 Formal verification electronic transaction protocol knowledge-based system
在线阅读 下载PDF
A NEW PRIVACY-PRESERVING EUCLID-DISTANCE PROTOCOL AND ITS APPLICATIONS IN WSNS
18
作者 Chen Ping Ji Yimu +2 位作者 Wang Ruchuan Huang Haiping Zhang Dan 《Journal of Electronics(China)》 2013年第2期190-197,共8页
Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-... Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-party computation. In this paper, we devote to investigating the solutions to some secure geometric problems in a cooperative environment. The problem is collaboratively computing the Euclid-distance between two private vectors without disclosing the private input to each other. A general privacy-preserving Euclid-distance protocol is firstly presented as a building block and is proved to be secure and efficient in the comparison with the previous methods. And we proposed a new protocol for the application in Wireless Sensor Networks (WSNs), based on the novel Euclid-distance protocol and Density-Based Clustering Protocol (DBCP), so that the nodes from two sides can compute cooperatively to divide them into clusters without disclosing their location information to the opposite side. 展开更多
关键词 Secure multi-party computation PRIVACY-PRESERVING Euclid-distance protocol Wireless Sensor Networks (WSNs) Density-based Clustering protocol (DBCP)
在线阅读 下载PDF
An Integrated Strategy for the Cultural Adaptation of Evidence-Based Interventions
19
作者 Souraya Sidani Sarah Ibrahim +3 位作者 Jana Lok Lifeng Fan Mary Fox Sepali Guruge 《Health》 2017年第4期738-755,共18页
Background: The importance of adapting evidence-based health interventions to enhance their congruence with the beliefs of ethno-cultural communities is well recognized. Although a systematic cultural adaptation proce... Background: The importance of adapting evidence-based health interventions to enhance their congruence with the beliefs of ethno-cultural communities is well recognized. Although a systematic cultural adaptation process is available, it lacks specific instructions on how to adapt interventions so that they are aligned with cultural beliefs. In this paper, we present an integrated strategy that operationalizes the adaptation process by describing specific practical instructions on how to align interventions with cultural beliefs. Methods: The strategy integrates concept and intervention mapping, and uses mixed methods for gathering data from community representatives. The data pertain to a community’s cultural beliefs and values related to a health problem, acceptability of evidence-based interventions targeting the problem, and aspects of the interventions that should be modified to enhance their fit with cultural beliefs. A step-by-step protocol is described to guide application of the integrated strategy for cultural adaptation. Conclusions: The strength of the integrated strategy relies on the use of concept and intervention mapping approaches for specifying a step-by-step protocol to actively engage community representatives in the cultural adaptation of interventions. Future research should evaluate the utility of this strategy. 展开更多
关键词 ACCEPTABILITY CULTURAL ADAPTATION EVIDENCE-baseD Practice HEALTH Interventions protocol
暂未订购
Topology and Position Aware Overlay Network Construction Protocol for Augmentation Information of Satellite Navigation System
20
作者 赵军 《China Communications》 SCIE CSCD 2011年第3期23-31,共9页
It is an effective method to broadcast the augmentation information of satellite navigation system using GEO technology.However,it becomes difficult to receive GEO signal in some special situation,for example in citie... It is an effective method to broadcast the augmentation information of satellite navigation system using GEO technology.However,it becomes difficult to receive GEO signal in some special situation,for example in cities or canyons,in which the signal will be sheltered by big buildings or mountains.In order to solve this problem,an Internet-based broadcast network has been proposed to utilize the infrastructure of the Internet to broadcast the augmentation information of satellite navigation system,which is based on application-layer multicast protocols.In this paper,a topology and position aware overlay network construction protocol is proposed to build the network for augmentation information of satellite navigation system.Simulation results show that the new algorithm is able to achieve better performance in terms of delay,depth and degree utilization. 展开更多
关键词 augmentation information of satellite navigation system BROADCAST Internet-based application-layer multicast protocol topology and position aware
在线阅读 下载PDF
上一页 1 2 32 下一页 到第
使用帮助 返回顶部