期刊文献+
共找到646篇文章
< 1 2 33 >
每页显示 20 50 100
Individualized music for dementia:Evolution and application of evidence-based protocol 被引量:3
1
作者 Linda A Gerdner 《World Journal of Psychiatry》 SCIE 2012年第2期26-32,共7页
The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded versio... The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded version of the protocol was written for professional health care providers with a consumer version tailored for family caregivers. The underlying mid-range theory is presented along with a seminal study that was followed by further research in the United States, Canada, Great Britain, France, Sweden, Norway, Japan and Taiwan. Key studies are summarized. Given its efficacy when implemented by research staff, studies have advanced to testing the intervention under real-life conditions when implemented and evaluated by trained nursing assistants in long-term care facilities and visiting family members. In addition, one study evaluated the implementation of music by family members in the home setting. Initial research focused on agitation as the dependent variable with subsequent research indicating a more holistic response such as positive affect, expressed satisfaction, and meaningful interaction with others. The article advances by describing on-line programs designed to train health care professionals in the assessment, implementation and evaluation of individualized music. In addition, Gerdner has written a story for apicture book intended for children and their families(in press). The story models principles of individualized music to elicit positive memories, reduce anxiety and agitation, and promote communication. The article concludes with implications for future research. 展开更多
关键词 Individualized MUSIC DEMENTIA Alzheimer’s disease AGITATION EVIDENCE-baseD protocol
暂未订购
Location-Based Routing Protocols for Wireless Sensor Networks: A Survey 被引量:6
2
作者 Arun Kumar Hnin Yu Shwe +1 位作者 Kai Juan Wong Peter H. J. Chong 《Wireless Sensor Network》 2017年第1期25-72,共48页
Recently, location-based routings in wireless sensor networks (WSNs) are attracting a lot of interest in the research community, especially because of its scalability. In location-based routing, the network size is sc... Recently, location-based routings in wireless sensor networks (WSNs) are attracting a lot of interest in the research community, especially because of its scalability. In location-based routing, the network size is scalable without increasing the signalling overhead as routing decisions are inherently localized. Here, each node is aware of its position in the network through some positioning device like GPS and uses this information in the routing mechanism. In this paper, we first discuss the basics of WSNs including the architecture of the network, energy consumption for the components of a typical sensor node, and draw a detailed picture of classification of location-based routing protocols. Then, we present a systematic and comprehensive taxonomy of location-based routing protocols, mostly for sensor networks. All the schemes are subsequently discussed in depth. Finally, we conclude the paper with some insights on potential research directions for location-based routing in WSNs. 展开更多
关键词 Location-based protocol GEOGRAPHIC ROUTING WIRELESS Sensor Networks Energy CONSERVATION ROUTING
在线阅读 下载PDF
Mathematical Model with Energy and Clustering Energy Based Routing Protocols as Remediation to the Directional Source Aware Routing Protocol in Wireless Sensor Networks 被引量:1
3
作者 Samir Haddad Jinane Sayah +5 位作者 Bachar El-Hassan Chadi Kallab Mohamad Chakroun Nisrine Turkey Jinan Charafeddine Hani Hamdan 《Wireless Sensor Network》 2022年第2期23-39,共17页
In this paper, a routing protocol for wireless sensor network, baptized energy based protocol (EBP) is proposed. Wireless sensor network presents many challenges and constraints, and one of the major constraints is th... In this paper, a routing protocol for wireless sensor network, baptized energy based protocol (EBP) is proposed. Wireless sensor network presents many challenges and constraints, and one of the major constraints is the routing problem. Due to the limited energy of sensor nodes, routing in this type of network shall perform efficiently to maximize the network lifetime. One of the proposed algorithms is the directional source aware routing protocol (DSAP) which, after simulation, showed a lot of limitations and drawbacks. The modified directional source aware routing protocol (MDSAP) was proposed by the authors of this paper to address some of the DSAP’s limitations but remains limited to a fixed topology, fixed source and stationary nodes. So EBP is proposed and operated under different scenarios and showed, after its simulation using TinyOS, many advantages in terms of load balancing, free looping, minimizing packet error rate and maximizing network lifetime. 展开更多
关键词 Cluster DSAP ENERGY MDSAP ROUTING Sensor Network TOPOLOGY Energy based protocol
在线阅读 下载PDF
Protocol of Jidong Women Health Cohort Study: Rationale, Design, and Baseline Characteristics 被引量:3
4
作者 QIU Meng Si WANG Xian Wei +4 位作者 YAO Yan GE Si Qi LIU Hua Min DAI Ying Chun ZHOU Yong 《Biomedical and Environmental Sciences》 SCIE CAS CSCD 2019年第2期144-152,共9页
Objective The Jidong Women Health Cohort Study is a prospective cohort study on female-specific characteristics and risks of chronic diseases in Chinese women and focuses on the potential association between menopause... Objective The Jidong Women Health Cohort Study is a prospective cohort study on female-specific characteristics and risks of chronic diseases in Chinese women and focuses on the potential association between menopause and risks of cardiovascular disease(CVD). Methods The study includes 4,179 female participants with an age of older than 18 years from Caofeidian district, Tangshan city, northern China. Baseline information on female-specific characteristics and potential cardiovascular risk factors was collected and all the participants underwent a physical examination with blood samples collected in 2013. To establish a better risk assessment tool of female CVD, updated information from questionnaire investigation, physical examinations and occurrence of outcome events will be collected through a longitudinal follow-up annually up to the year 2024. Results At baseline, Mean age of the participants was 42.3 ± 12.8 years. Reproduction occurred in 2,948 participants(70.5%), menopausal transition in 173(4.3%), and postmenopause in 1,058(25.3%). The incidence of arterial hypertension, dyslipidemia, and diabetes showed significant difference across different groups stratified by Stage of Reproductive Aging Workshop(STRAW) system(P < 0.05). Conclusion The Jidong Women Health Cohort Study will contribute to the scientific evidence on association between female-specific characteristics and cardiovascular risks, and will also be helpful to provide a new path for early detection and prevention of CVD. 展开更多
关键词 CARDIOVASCULAR disease MENOPAUSE WOMEN protocol Chinese POPULATION-baseD
暂未订购
Performance Comparison between Delay-Tolerant and Non-Delay-Tolerant Position-Based Routing Protocols in VANETs 被引量:1
5
作者 Ahmed Mohamed Abdalla Salem H. Salamah 《International Journal of Communications, Network and System Sciences》 2022年第1期1-14,共14页
Vehicular ad hoc networks (VANETs) are a new emerging recently developed advanced technology that allows a wide group of applications related to providing more safety on roads, more convenience for passengers, self-dr... Vehicular ad hoc networks (VANETs) are a new emerging recently developed advanced technology that allows a wide group of applications related to providing more safety on roads, more convenience for passengers, self-driven vehicles, and intelligent transportation systems (ITS). There are various routing protocol categories used in VANETs, like unicast, multicast, and broadcast protocols. In unicast position-based protocols, the routing decisions are based on the geographic position of the vehicles. This does not require establishment or maintenance of routes but needs location services to determine the position of the destination. Non-delay-tolerant network protocols (non-DTN), also identified as minimum delay protocols, are aimed at minimizing the delivery time of the information. Delay-tolerant protocols (DTN) are used in a variety of operating environments, including those that are subject to failures and interruptions and those with high delay, such as VANETs. This paper discusses the comparison between non-DTN and DTN routing protocols belonging to the unicast delay-tolerant position-based category. The comparison was conducted using the NS2 simulator, and the simulations of three non-DTN routing protocols and three DTN routing protocols were recorded. Simulation results show that the DTN routing protocols outperform in delivery ratio compared to the non-DTN routing protocols, but they lead to more average delay due to buffering, the processing algorithm, and priority calculation. In conclusion, non-DTN protocols are more suitable for the city environment since the distance between nodes is relatively smaller and the variations in the network topology are slower than they are on highways. On the other hand, DTN protocols are more suitable for highways due to the buffering of packets until a clear route to destination is available. 展开更多
关键词 VANETS Position-based Routing protocols Non-DTN DTN
在线阅读 下载PDF
Twin-Field Quantum Key Distribution Protocol Based on Wavelength-Division-Multiplexing Technology
6
作者 Yanxin Han Zhongqi Sun +5 位作者 Tianqi Dou Jipeng Wang Zhenhua Li Yuqing Huang Pengyun Li Haiqiang Ma 《Chinese Physics Letters》 SCIE EI CAS CSCD 2022年第7期3-8,共6页
Quantum key distribution(QKD) generates information-theoretical secret keys between two parties based on the physical laws of quantum mechanics. Following the advancement in quantum communication networks, it becomes ... Quantum key distribution(QKD) generates information-theoretical secret keys between two parties based on the physical laws of quantum mechanics. Following the advancement in quantum communication networks, it becomes feasible and economical to combine QKD with classical optical communication through the same fiber using dense wavelength division multiplexing(DWDM) technology. This study proposes a detailed scheme of TF-QKD protocol with DWDM technology and analyzes its performance, considering the influence of quantum channel number and adjacent quantum crosstalk on the secret key rates. The simulation results show that the scheme further increases the secret key rate of TF-QKD and its variants. Therefore, this scheme provides a method for improving the secret key rate for practical quantum networks. 展开更多
关键词 Twin-Field Quantum Key Distribution protocol based on Wavelength-Division-Multiplexing Technology QKD Quantum protocol KEY
原文传递
Index-Based Cache Coherence Protocol
7
作者 Soha S. Zaghloul Najlaa A1Huwaishel Maram AlAlwan 《通讯和计算机(中英文版)》 2014年第6期479-483,共5页
关键词 一致性协议 高速缓存 索引表 多处理器 主存储器 负载均衡 工作原理 网络结构
在线阅读 下载PDF
A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography 被引量:1
8
作者 Krishnan Kumar J. Nafeesa Begum V. Sumathy 《International Journal of Communications, Network and System Sciences》 2010年第4期369-379,共11页
This paper addresses an interesting security problem in wireless ad hoc networks: the dynamic group key agreement key establishment. For secure group communication in an ad hoc network, a group key shared by all group... This paper addresses an interesting security problem in wireless ad hoc networks: the dynamic group key agreement key establishment. For secure group communication in an ad hoc network, a group key shared by all group members is required. This group key should be updated when there are membership changes (when the new member joins or current member leaves) in the group. In this paper, we propose a novel, secure, scalable and efficient region-based group key agreement protocol for ad hoc networks. This is implemented by a two-level structure and a new scheme of group key update. The idea is to divide the group into subgroups, each maintaining its subgroup keys using group elliptic curve diffie-hellman (GECDH) Protocol and links with other subgroups in a tree structure using tree-based group elliptic curve diffie-hellman (TGECDH) protocol. By introducing region-based approach, messages and key updates will be limited within subgroup and outer group;hence computation load is distributed to many hosts. Both theoretical analysis and experimental results show that this Region-based key agreement protocol performs well for the key establishment problem in ad hoc network in terms of memory cost, computation cost and communication cost. 展开更多
关键词 Ad HOC Network Region-based GROUP Key AGREEMENT protocol ELLIPTIC CURVE DIFFIE-HELLMAN Tree-based GROUP ELLIPTIC CURVE DIFFIE-HELLMAN
在线阅读 下载PDF
Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite
9
作者 Arif Sari 《International Journal of Communications, Network and System Sciences》 2015年第3期29-42,共14页
The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity mak... The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity make them difficult to detect and defend themselves against variety of attacks. The radio interference attacks that generate for WSN at the Physical Layer cannot be defeated through conventional security mechanisms proposed for 802.15.4 standards. The first section introduces the deployment model of two-tier hierarchical cluster topology architecture and investigates different jamming techniques proposed for WSN by creating specific classification of different types of jamming attacks. The following sections expose the mitigation techniques and possible built-in mechanisms to mitigate the link layer jamming attacks on proposed two-tier hierarchical clustered WSN topology. The two-tier hierarchical cluster based topology is investigated based on contention based protocol suite through OPNET simulation scenarios. 展开更多
关键词 802.15.4 WSN Communication Hierarchical CLUSTER TOPOLOGY Simulation Security Jamming ATTACK Contention-based protocols
在线阅读 下载PDF
A Novel Basis Splitting Eavesdropping Scheme in Quantum Cryptography Based on the BB84 Protocol
10
作者 赵楠 朱畅华 权东晓 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期22-26,共5页
We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercep... We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercept- resend strategy, our simulation results of the basis-splitting scheme under the non-ideal condition show a greater performance, especially with the increase of the length of shifted bits. Consequently our scheme can aid eaves- dropper to gather much more useful information. 展开更多
关键词 A Novel Basis Splitting Eavesdropping Scheme in Quantum Cryptography based on the BB84 protocol BB
原文传递
Tree Based Energy and Congestion Aware Routing Protocol for Wireless Sensor Networks 被引量:1
11
作者 Amir Hossein Mohajerzadeh Mohammad Hossien Yaghmaee 《Wireless Sensor Network》 2010年第2期161-167,共7页
Wireless Sensor Networks (WSNs) have inherent and unique characteristics rather than traditional networks. They have many different constraints, such as computational power, storage capacity, energy supply and etc;of ... Wireless Sensor Networks (WSNs) have inherent and unique characteristics rather than traditional networks. They have many different constraints, such as computational power, storage capacity, energy supply and etc;of course the most important issue is their energy constraint. Energy aware routing protocol is very important in WSN, but routing protocol which only considers energy has not efficient performance. Therefore considering other parameters beside energy efficiency is crucial for protocols efficiency. Depending on sensor network application, different parameters can be considered for its protocols. Congestion management can affect routing protocol performance. Congestion occurrence in network nodes leads to increasing packet loss and energy consumption. Another parameter which affects routing protocol efficiency is providing fairness in nodes energy consumption. When fairness is not considered in routing process, network will be partitioned very soon and then the network performance will be decreased. In this paper a Tree based Energy and Congestion Aware Routing Protocol (TECARP) is proposed. The proposed protocol is an energy efficient routing protocol which tries to manage congestion and to provide fairness in network. Simulation results shown in this paper imply that the TECARP has achieved its goals. 展开更多
关键词 CONGESTION Aware ENERGY Efficiency ROUTING protocol FAIRNESS TREE based ROUTING Wireless Sensor Networks
在线阅读 下载PDF
Mean Territorial Energy Based Clustering Protocol for Randomly Deployed Wireless Sensor Networks
12
作者 Rohit D. Gawade Sanjay L. Nalbalwar 《Advances in Internet of Things》 2017年第3期87-96,共10页
Clustering algorithms can balance the power consumption of energy constraint wireless sensor networks. This paper proposes a new clustering protocol called Mean Territorial Energy Based Clustering Protocol (MTEP) for ... Clustering algorithms can balance the power consumption of energy constraint wireless sensor networks. This paper proposes a new clustering protocol called Mean Territorial Energy Based Clustering Protocol (MTEP) for randomly deployed wireless sensor networks. In MTEP, cluster heads are selected according to residual energy and location information of a node in current round as well as mean territorial energy and total base station distance of node’s corresponding cluster territory in previous round. Energy consumption in conventional protocols becomes unbalanced because of clusters having different lengths. Proposed MTEP protocol addresses this problem by setting thresholds on cluster length and node to cluster head distance for producing equal length clusters. Simulation results show that MTEP protocol extends network lifetime and stability with reduction in energy dissipation compared to other clustering protocols such as LEACH and REAC. 展开更多
关键词 CLUSTER HEAD base STATION CLUSTERING protocol Energy Efficiency Network LIFETIME
在线阅读 下载PDF
Development of an assessment and intervention protocol for postpartum hemorrhage in the mainland of China: an evidence-based method and Delphi consult
13
作者 Ying Liu Ya-Jing Fan +1 位作者 Wei Zhuang Qun Huang 《Frontiers of Nursing》 CAS 2019年第4期285-291,共7页
Objective: Postpartum hemorrhage(PPH) is a leading cause of maternal death. Although guidelines have been updated, those with detailed protocols are limited for nursing practice. This study aims at establishing an ear... Objective: Postpartum hemorrhage(PPH) is a leading cause of maternal death. Although guidelines have been updated, those with detailed protocols are limited for nursing practice. This study aims at establishing an early assessment and intervention protocol as a toolkit for PPH for midwives and obstetrical nurses.Methods: Employing the evidence-based method, a systematic Internet search of guidelines was conducted and appraisal of literatures was conducted with AGREE system and Oxman-Guyatt Overview Quality Assessment Questionnaire(OQAQ), according to which a protocol draft was therefore developed. Then, a two-round modified Delphi method was utilized to reach a consensus of the protocol built on best practices. Selection criteria for each intervention measure included consensus level with a threshold of 70%, mean of importance(M) >3.5, and coefficient of variation(CV) <0.25. Reliability of experts' opinion was calculated by positive coefficient and authoritative coefficient. Items without consistency were enlisted in the second-round consult. When all items met the selection criteria, the protocol would be finally formulated.Results: A 122-measure protocol was established, including prevention, assessment, and intervention of PPH. With a panel of 14 experts participated in the consult, the positivity coefficient was 0.93 and 1.00 for two rounds, respectively, and the authority coefficient was 0.88. After a two-round consult and revision of the draft, the final program was formulated, containing 5 first-level indexes and 14 second-level indexes with a total item of 120.Conclusions: The PPH protocol, based on high-quality evidences, was formulated with a two-round Delphi method, which can provide insight for midwives and obstetrical nurses to effectively deal with PPH. 展开更多
关键词 postpartum hemorrhage ASSESSMENT INTERVENTION protocol evidence-based method modified Delphi technique
在线阅读 下载PDF
Contention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks
14
作者 Chao Huang Guoli Wang 《Wireless Sensor Network》 2010年第7期528-537,共10页
This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at ... This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks. 展开更多
关键词 Wireless Sensor Network REAL-TIME Routing protocol Contention-based Scheme Beaconless
在线阅读 下载PDF
Ad Hoc Network Hybrid Management Protocol Based on Genetic Classifiers
15
作者 Fabio Garzia Cristina Perna Roberto Cusani 《Wireless Engineering and Technology》 2010年第2期69-80,共12页
The purpose of this paper is to solve the problem of Ad Hoc network routing protocol using a Genetic Algorithm based approach. In particular, the greater reliability and efficiency, in term of duration of communicatio... The purpose of this paper is to solve the problem of Ad Hoc network routing protocol using a Genetic Algorithm based approach. In particular, the greater reliability and efficiency, in term of duration of communication paths, due to the introduction of Genetic Classifier is demonstrated. 展开更多
关键词 Ad HOC Networks GENETIC Algorithms GENETIC CLASSIFIER Systems Routing protocols RULE-baseD Processing
在线阅读 下载PDF
预防卒中相关性肺炎循证管理方案的构建与实践研究 被引量:1
16
作者 周月琴 李慧 +5 位作者 徐玉 王艺璇 胡少华 付红 霍佳佳 刘慧丽 《护理管理杂志》 2026年第1期30-35,共6页
目的基于最佳证据制订预防卒中相关性肺炎循证管理方案,评价其临床应用有效性和安全性。方法组建循证项目小组,循证获取最佳证据并应用,在证据应用前后,通过查看病历和现场查看收集资料,对两组患者及医护人员进行基线调查和审查,分析证... 目的基于最佳证据制订预防卒中相关性肺炎循证管理方案,评价其临床应用有效性和安全性。方法组建循证项目小组,循证获取最佳证据并应用,在证据应用前后,通过查看病历和现场查看收集资料,对两组患者及医护人员进行基线调查和审查,分析证据应用障碍因素并制订改进措施。结果形成16条质量审查指标,试验组卒中相关性肺炎发生率低于对照组(P<0.05),护士的预防卒中相关性肺炎循证管理方案知识和执行得分提高(P<0.01)。结论预防卒中相关性肺炎循证管理方案可降低卒中患者相关性肺炎发生率,提高医护人员证据执行率。 展开更多
关键词 预防 脑卒中 相关性肺炎 风险分级 方案构建 循证实践 护理
暂未订购
基于循证医学的干眼中医护理方案的优化研究
17
作者 李珊珊 杨剑英 +4 位作者 李晓宇 耿丽娜 任泽鹏 江颖 李鹏斐 《中国中医眼科杂志》 2026年第4期395-400,共6页
目的基于循证医学构建干眼的中医护理方案。方法成立由医护人员组成的研究小组。第一轮首先形成专家函询内容的初稿和专家函询问卷,对遴选出的函询专家实施专家函询及整改。第二轮对专家进行论证,并对专家的积极系数、权威程度、协调程... 目的基于循证医学构建干眼的中医护理方案。方法成立由医护人员组成的研究小组。第一轮首先形成专家函询内容的初稿和专家函询问卷,对遴选出的函询专家实施专家函询及整改。第二轮对专家进行论证,并对专家的积极系数、权威程度、协调程度、论证条目和推荐强度进行统计分析,最终形成优化方案终稿。结果(1)专家积极性与权威程度:问卷回收率均为100%,表明专家积极性较高。两轮专家函询的权威系数分别为(0.84±0.01)(0.89±0.01),表明专家的权威程度均较高。(2)专家意见的协调程度:两轮函询Kendall's W均低于0.5,差异均有统计学意义(均P<0.05)。变异系数(CV)均低于0.25,专家意见的一致性较高。(3)专家论证的条目和推荐强度:最终确定包含了5个一级条目、17个二级条目和56个三级条目的干眼中医护理方案。其中,一级条目5条,包括“常见证候要点”“常见症状/证候施护”“中医特色治疗护理”“健康指导”“护理效果评价”,分别对应的二级条目和三级条目数为5/5、4/21、2/9、4/16、2/5条,赋值均值均在4分以上,CV均低于0.25,离散程度较小。结论基于循证医学构建的干眼中医护理方案结构合理,前期调查充分,函询结果具有可靠性,可为临床上干眼的中医护理实践提供参考。 展开更多
关键词 干眼 中医护理 方案优化 循证医学
暂未订购
基于循证护理的急诊科血液肿瘤患者感染预防护理方案构建及效果评价
18
作者 王超 张梦颖 +2 位作者 凌张宾 孙盼盼 陈玙 《延边大学医学学报》 2026年第1期144-146,149,共4页
目的:构建基于循证护理的急诊科血液肿瘤患者感染预防护理方案并评价其应用效果。方法:选取2024年6月至2025年1月皖南医学院第一附属医院收治的100例血液肿瘤患者,采用随机数字表法分为对照组和观察组,每组各50例。对照组给予常规护理,... 目的:构建基于循证护理的急诊科血液肿瘤患者感染预防护理方案并评价其应用效果。方法:选取2024年6月至2025年1月皖南医学院第一附属医院收治的100例血液肿瘤患者,采用随机数字表法分为对照组和观察组,每组各50例。对照组给予常规护理,观察组在常规护理基础上实施基于循证护理的感染预防护理方案。比较两组患者感染发生率、住院时间、护理满意度及生活质量评分。结果:与对照组相比,观察组感染发生率明显更低(P<0.05)。两组住院时间均有所缩短,且观察组住院时间明显短于对照组(P<0.05)。观察组护理态度、护理技能、健康教育、环境管理满意度评分均显著高于对照组(P<0.05)。观察组生活质量中各维度评分均显著高于对照组(P<0.05)。结论:基于循证护理的感染预防护理方案能有效降低急诊科血液肿瘤患者感染发生率,改善其预后,提高护理质量,值得临床推广应用。 展开更多
关键词 血液肿瘤 循证护理 感染预防护理方案 感染发生率 生活质量
原文传递
Event-based Control and Filtering of Networked Systems:A Survey 被引量:7
19
作者 Lei Zou Zi-Dong Wang Dong-Hua Zhou 《International Journal of Automation and computing》 EI CSCD 2017年第3期239-253,共15页
In recent years, theoretical and practical research on event-based communication strategies has gained considerable research attention due primarily to their irreplaceable superiority in resource-constrained systems(... In recent years, theoretical and practical research on event-based communication strategies has gained considerable research attention due primarily to their irreplaceable superiority in resource-constrained systems(especially networked systems). For networked systems, event-based transmission scheme is capable of improving the efficiency in resource utilization and prolonging the lifetime of the network components compared with the widely adopted periodic transmission scheme. As such, it would be interesting to 1) examining how the event-triggering mechanisms affect the control or filtering performance for networked systems, and 2) developing some suitable approaches for the controller and filter design problems. In this paper, a bibliographical review is presented on event-based control and filtering problems for various networked systems. First, the event-driven communication scheme is introduced in detail according to its engineering background, characteristic, and representative research frameworks. Then, different event-based control and filtering(or state estimation) problems are categorized and then discussed. Finally, we conclude the paper by outlining future research challenges for event-based networked systems. 展开更多
关键词 Event-triggered transmission networked systems event-based control event-based filtering event-triggered distributed state estimation distributed control with event-based protocol
原文传递
Formal Verification of the Merchant Registration Phase of the SET Protocol 被引量:1
20
作者 Xiao-Qi Ma Xiao-Chun Cheng 《International Journal of Automation and computing》 EI 2005年第2期155-162,共8页
This paper describes the formal verification of the Merchant Registration phase of the Secure Electronic Transactions (SET) protocol, a realistic electronic transaction security protocol which is used to protect the s... This paper describes the formal verification of the Merchant Registration phase of the Secure Electronic Transactions (SET) protocol, a realistic electronic transaction security protocol which is used to protect the secrecy of online purchases. A number of concepts, notations, functions, predicates, assumptions and rules are introduced. We describe the knowledge of all legal participants, and a malicious spy, to assess the security of the sub-protocol. Avoiding search in a large state space, the method converges very quickly. We implemented our method in the Isabelle/Isar automated reasoning environment, therefore the whole verification process can be executed mechanically and efficiently. Keywords Formal verification - electronic transaction protocol - knowledge-based system This work was supported by EC, EPSRC, the National Natural Science Foundation of China (No.60496320, 60496321), and Hong Kong K C Wang Education Foundation.Xiao-Qi Ma graduated from Nanjing University of Science and Technology, China, in 1997. He received his Master’s degree from the Institute of Software, Chinese Academy of Sciences in 2003. He is currently a PhD student at the University of Reading. His research interests include computer network security, knowledge-based systems, and operating systems.Xiao-Chun Cheng obtained his PhD in 1996. He has worked as a lecturer at the University of Reading since 2000. He is a vip professor at North East Normal University and Beijing Normal University. His research interests include theoretical and applied aspects in decision support systems, knowledge-based systems and intelligent systems. 展开更多
关键词 Formal verification electronic transaction protocol knowledge-based system
在线阅读 下载PDF
上一页 1 2 33 下一页 到第
使用帮助 返回顶部