期刊文献+
共找到1,066,259篇文章
< 1 2 250 >
每页显示 20 50 100
Improving nursing care protocols for diabetic patients through a systematic review and meta-analysis of recent years
1
作者 Mónica Grande-Alonso María Barbado García +2 位作者 Soledad Cristóbal-Aguado Soledad Aguado-Henche Rafael Moreno-Gómez-Toledano 《World Journal of Diabetes》 2025年第2期257-269,共13页
BACKGROUND Diabetes mellitus has become one of the major pandemics of the 21st century.In this scenario,nursing interventions are essential for improving self-care and quality of life in patients with type 2 diabetes ... BACKGROUND Diabetes mellitus has become one of the major pandemics of the 21st century.In this scenario,nursing interventions are essential for improving self-care and quality of life in patients with type 2 diabetes mellitus.Nursing interventions are crucial for managing the disease and preventing complications.AIM To analyse nursing interventions in recent years through a systematic review and meta-analysis and to propose improvements in care plans.METHODS This study conducted a systematic review and meta-analysis of the impact of nursing interventions on quantitative glycaemic variables,such as glycated haemoglobin and fasting plasma glucose.RESULTS After confirming that the combined effect of all studies from the past 5 years positively impacts quantitative variables,a descriptive analysis of the studies with the most significant changes was conducted.Based on this,an improvement in diabetic patient care protocols has been proposed through follow-up plans tailored to the patient’s technological skills.CONCLUSION The combined results obtained and the proposal for improvement developed in this manuscript could help to improve the quality of life of many people around the world. 展开更多
关键词 Diabetes mellitus Nursing interventions Systematic review META-analysis protocol enhancement proposal
暂未订购
Changes in border-associated macrophages after stroke: Single-cell sequencing analysis 被引量:1
2
作者 Ning Yu Yang Zhao +3 位作者 Peng Wang Fuqiang Zhang Cuili Wen Shilei Wang 《Neural Regeneration Research》 2026年第1期346-356,共11页
Border-associated macrophages are located at the interface between the brain and the periphery, including the perivascular spaces, choroid plexus, and meninges. Until recently, the functions of border-associated macro... Border-associated macrophages are located at the interface between the brain and the periphery, including the perivascular spaces, choroid plexus, and meninges. Until recently, the functions of border-associated macrophages have been poorly understood and largely overlooked. However, a recent study reported that border-associated macrophages participate in stroke-induced inflammation, although many details and the underlying mechanisms remain unclear. In this study, we performed a comprehensive single-cell analysis of mouse border-associated macrophages using sequencing data obtained from the Gene Expression Omnibus(GEO) database(GSE174574 and GSE225948). Differentially expressed genes were identified, and enrichment analysis was performed to identify the transcription profile of border-associated macrophages. CellChat analysis was conducted to determine the cell communication network of border-associated macrophages. Transcription factors were predicted using the ‘pySCENIC' tool. We found that, in response to hypoxia, borderassociated macrophages underwent dynamic transcriptional changes and participated in the regulation of inflammatory-related pathways. Notably, the tumor necrosis factor pathway was activated by border-associated macrophages following ischemic stroke. The pySCENIC analysis indicated that the activity of signal transducer and activator of transcription 3(Stat3) was obviously upregulated in stroke, suggesting that Stat3 inhibition may be a promising strategy for treating border-associated macrophages-induced neuroinflammation. Finally, we constructed an animal model to investigate the effects of border-associated macrophages depletion following a stroke. Treatment with liposomes containing clodronate significantly reduced infarct volume in the animals and improved neurological scores compared with untreated animals. Taken together, our results demonstrate comprehensive changes in border-associated macrophages following a stroke, providing a theoretical basis for targeting border-associated macrophages-induced neuroinflammation in stroke treatment. 展开更多
关键词 border-associated macrophages CLODRONATE hypoxia ISCHEMIA-REPERFUSION ischemic stroke liposomes neuroinflammation single-cell sequencing analysis STAT3 tumor necrosis factor
暂未订购
Fresh Arrival--Rwanda-China avocado export protocol is a milestone in growing agricultural partnership
3
作者 ALAFATI MUGABO 《ChinAfrica》 2026年第1期46-47,共2页
Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajecto... Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade. 展开更多
关键词 China trade protocol Rwanda agricultural partnership fresh avocado exports
原文传递
Comprehensive pan-cancer analysis of the receptor-interacting protein kinase family expression,genomic alterations,and functional implications
4
作者 Wan-Rong Li Xin Li Jian Wang 《Life Research》 2026年第1期35-44,共10页
Background:Receptor-interacting protein kinases(RIPKs)regulate cell death,inflammation,and immune responses,yet their roles in cancer are not fully understood.This study investigates the expression,genomic alterations... Background:Receptor-interacting protein kinases(RIPKs)regulate cell death,inflammation,and immune responses,yet their roles in cancer are not fully understood.This study investigates the expression,genomic alterations,and functional implications of RIPK family members across various cancers.Methods:We collected multi-omics data from The Cancer Genome Atlas and other public databases,including gene expression,copy number variation(CNV),mutation,methylation,tumor mutation burden(TMB),and microsatellite instability(MSI).Differential expression and survival analyses were performed using DESeq2 and Cox proportional hazards models.CNV and mutation data were analyzed with GISTIC2 and Mutect2,and methylation data with the ChAMP package.Correlations with TMB and MSI were assessed using Pearson coefficients,and gene set enrichment analysis was conducted with the MSigDB Hallmark gene sets.Results:RIPK family members show significant differential expression in various cancers,with RIPK1 and RIPK4 frequently altered.Survival analysis reveals heterogeneous impacts on overall survival.CNV and mutation analyses identify high alteration frequencies for RIPK2 and RIPK7,affecting gene expression.RIPK1 and RIPK7 are hypermethylated in several cancers,inversely correlating with RIPK3 expression.RIPK1,RIPK2,RIPK5,RIPK6,and RIPK7 correlate positively with TMB,while RIPK3 shows negative correlations in some cancers.MSI analysis indicates associations with DNA mismatch repair.G ene set enrichment analysis highlights immune-related pathway enrichment for RIPK1,RIPK2,RIPK3,and RIPK6,and cell proliferation and DNA repair pathways for RIPK4 and RIPK5.RIPK family members showed heterogeneous alterations across cancers:for example,RIPK7 was mutated in up to~15%of u terine c orpus e ndometrial c arcinoma and l ung s quamous c ell c arcinoma cases,and RIPK1 and RIPK7 exhibited frequent promoter hypermethylation in multiple tumor types.Several genes displayed context-dependent associations with overall survival and with TMB/MSI.Conclusion:This pan-cancer analysis of the RIPK family reveals their diverse roles and potential as biomarkers and therapeutic targets.The findings emphasize the importance of RIPK genes in tumorigenesis and suggest context-dependent functions across cancer types.Further studies are needed to explore their mechanisms in cancer development and clinical applications. 展开更多
关键词 RIPK family pan-cancer analysis tumor mutation burden microsatellite instability gene set enrichment analysis
暂未订购
Advanced isoconversional kinetic analysis of lepidolite sulfation product decomposition reactions for selectively extracting lithium
5
作者 Yubo Liu Baozhong Ma +4 位作者 Jiahui Cheng Xiang Li Hui Yang Chengyan Wang Yongqiang Chen 《International Journal of Minerals,Metallurgy and Materials》 2026年第1期217-227,共11页
The sulfation and decomposition process has proven effective in selectively extracting lithium from lepidolite.It is essential to clarify the thermochemical behavior and kinetic parameters of decomposition reactions.A... The sulfation and decomposition process has proven effective in selectively extracting lithium from lepidolite.It is essential to clarify the thermochemical behavior and kinetic parameters of decomposition reactions.Accordingly,comprehensive kinetic study by employing thermalgravimetric analysis at various heating rates was presented in this paper.Two main weight loss regions were observed during heating.The initial region corresponded to the dehydration of crystal water,whereas the subsequent region with overlapping peaks involved complex decomposition reactions.The overlapping peaks were separated into two individual reaction peaks and the activation energy of each peak was calculated using isoconversional kinetics methods.The activation energy of peak 1 exhibited a continual increase as the reaction conversion progressed,while that of peak 2 steadily decreased.The optimal kinetic models,identified as belonging to the random nucleation and subsequent growth category,provided valuable insights into the mechanism of the decomposition reactions.Furthermore,the adjustment factor was introduced to reconstruct the kinetic mechanism models,and the reconstructed models described the kinetic mechanism model more accurately for the decomposition reactions.This study enhanced the understanding of the thermochemical behavior and kinetic parameters of the lepidolite sulfation product decomposition reactions,further providing theoretical basis for promoting the selective extraction of lithium. 展开更多
关键词 LITHIUM LEPIDOLITE decomposition reactions KINETICS isoconversional analysis
在线阅读 下载PDF
Combined Fault Tree Analysis and Bayesian Network for Reliability Assessment of Marine Internal Combustion Engine
6
作者 Ivana Jovanović Çağlar Karatuğ +1 位作者 Maja Perčić Nikola Vladimir 《哈尔滨工程大学学报(英文版)》 2026年第1期239-258,共20页
This paper investigates the reliability of internal marine combustion engines using an integrated approach that combines Fault Tree Analysis(FTA)and Bayesian Networks(BN).FTA provides a structured,top-down method for ... This paper investigates the reliability of internal marine combustion engines using an integrated approach that combines Fault Tree Analysis(FTA)and Bayesian Networks(BN).FTA provides a structured,top-down method for identifying critical failure modes and their root causes,while BN introduces flexibility in probabilistic reasoning,enabling dynamic updates based on new evidence.This dual methodology overcomes the limitations of static FTA models,offering a comprehensive framework for system reliability analysis.Critical failures,including External Leakage(ELU),Failure to Start(FTS),and Overheating(OHE),were identified as key risks.By incorporating redundancy into high-risk components such as pumps and batteries,the likelihood of these failures was significantly reduced.For instance,redundant pumps reduced the probability of ELU by 31.88%,while additional batteries decreased the occurrence of FTS by 36.45%.The results underscore the practical benefits of combining FTA and BN for enhancing system reliability,particularly in maritime applications where operational safety and efficiency are critical.This research provides valuable insights for maintenance planning and highlights the importance of redundancy in critical systems,especially as the industry transitions toward more autonomous vessels. 展开更多
关键词 Fault tree analysis Bayesian network RELIABILITY REDUNDANCY Internal combustion engine
在线阅读 下载PDF
Lifestyle behaviors,serum metabolites and high myopia:Mendelian randomization and mediation analysis
7
作者 Nian-En Liu Xiao-Tong Xu Xiao-Bing Yu 《International Journal of Ophthalmology(English edition)》 2026年第1期140-148,共9页
AIM:To explore the causal relationship between several possible behavioral factors and high myopia(HM)using multivariable Mendelian randomization(MVMR)approach and to find the mediators among them with mediation analy... AIM:To explore the causal relationship between several possible behavioral factors and high myopia(HM)using multivariable Mendelian randomization(MVMR)approach and to find the mediators among them with mediation analysis.METHODS:The causal effects of several behavioral factors,including screen time,education time,time spent outdoors,and physical activity,on the risk of HM using univariable Mendelian randomization(MR)and MVMR analyses were first assessed.Genome-wide association study summary statistics of serum metabolites were also used in mediation analysis to determine the extent to which serum metabolites mediate the effects of behavioral factors on HM.RESULTS:MR analyses indicated that both increased time spent outdoors and a higher frequency of moderate physical activity significantly reduced the risk of HM.Further MVMR analysis confirmed that moderate physical activity independently contributed to a lower risk of HM.Additionally,MR analyses identified 13 serum metabolites significantly associated with HM,of which 12 were lipids and one was an amino acid derivative.Mediation analysis revealed that six lipid metabolites mediated the protective effects of moderate physical activity on HM,with the highest mediation proportion observed for 1-(1-enyl-palmitoyl)-GPC(p-16:0;30.83%).CONCLUSION:This study suggests that in addition to outdoor time,moderate physical activity habits may have an independent protective effect against HM and pointed to lipid metabolites as priority targets for the prevention due to low physical activity.These results emphasize the importance of physical activity and metabolic health in HM and underscore the need for further study of these complex associations. 展开更多
关键词 high myopia physical activity serum metabolites multivariable Mendelian randomization mediation analysis
原文传递
A bibliometric analysis of publication trends in strabismus over the past 30y
8
作者 Yi-Han Zhang Ying Guo +1 位作者 Shu-Jie Zhang Chen Zhao 《International Journal of Ophthalmology(English edition)》 2026年第1期149-159,共11页
AIM:To summarize publication trends in the field of strabismus over the past 30y and predict future research hotspots.METHODS:A total of 2915 English-language articles and reviews on strabismus,published between 1993 ... AIM:To summarize publication trends in the field of strabismus over the past 30y and predict future research hotspots.METHODS:A total of 2915 English-language articles and reviews on strabismus,published between 1993 and 2022,were retrieved from the Web of Science Core Collection.Bibliometric analyses were performed using VOSviewer and CiteSpace software to explore publication trends,as well as the contributions and collaborative networks of countries/regions,authors,institutions,and journals.RESULTS:The annual number of publications on strabismus showed a consistent upward trend.The United States(USA)maintained a leading position in this research field while Republic of Korea and China emerged as rapidly advancing contributors over the last decade.The University of California,Los Angeles ranked as the most productive institution,and Jonathan M.Holmes from USA was the most productive author.Journal of AAPOS was the leading journal with the most strabismus publications,whereas the two most highly cited articles were both published in Ophthalmology.Co-occurrence analysis identified pivotal keywords and burst terms,including intermittent exotropia(IXT),acute acquired comitant esotropia(AACE),functional magnetic resonance imaging(fMRI),and surgical treatment,which were confirmed as predominant and frontier topics.CONCLUSION:This study provides a comprehensive bibliometric analysis of strabismus research,revealing the evolution of research hotspots over the past 30y and outlining several cutting-edge directions for future investigation. 展开更多
关键词 bibliometric analysis STRABISMUS intermittent exotropia strabismus surgery functional magnetic resonance imaging research trends
原文传递
Improved Security Detection Strategy for Quantum "Ping-Pong" Protocol and Its Security Analysis 被引量:5
9
作者 李剑 金海菲 景博 《China Communications》 SCIE CSCD 2011年第3期170-179,共10页
In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But ... In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But the protocol was proved to have many vulnerabilities,and can be attacked by eavesdroppers.To overcome the problem,an improved security detection strategy which inserts the | 0〉,| 1〉,|+〉and |-〉particles into the messages as the decoy particles randomly in the"Ping-pong"protocol is presented.During the security analysis,the method of the entropy theory is introduced,and three detection strategies are compared quantitatively by using the constraint between the information which eavesdroppers can obtain and the interference introduced.Because of the presence of the trap particles |+〉and |-〉,the detection rate will be no less than 25% when Eve attacks the communication.The security analysis result shows that the efficiency of eavesdropping detection in the presented protocol is higher than the other two,so the detection strategy in the protocol can ensure that the "Ping-pong"protocol is more secure. 展开更多
关键词 secure quantum direct communication "Ping-pong " protocol protocol security eavesdropping detection
在线阅读 下载PDF
The Security Analysis of Two-Step Quantum Direct Communication Protocol in Collective-Rotation Noise Channel 被引量:2
10
作者 李剑 孙风琪 +3 位作者 潘泽世 聂金瑞 陈彦桦 袁开国 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期1-5,共5页
To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, a... To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Qo(M : (Q0, 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ~ is, the larger the error rate Q is. When the noise level ~ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q 〈 0.153. Similarly, if error rate Q〉 0.153 = Q0, eavesdropping information I 〉 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore. 展开更多
关键词 The Security analysis of Two-Step Quantum Direct Communication protocol in Collective-Rotation Noise Channel EPR
原文传递
Formal analysis of robust email protocol based on authentication tests 被引量:1
11
作者 蒋睿 胡爱群 《Journal of Southeast University(English Edition)》 EI CAS 2009年第2期147-151,共5页
Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the m... Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy. 展开更多
关键词 email protocol authentication tests formal method perfect forward secrecy strand space model
在线阅读 下载PDF
Design and analysis of MAC protocol for wireless ATM network 被引量:2
12
作者 沙学军 徐玉滨 张乃通 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2000年第4期42-46,共5页
Presents the new design of a reservation based medium access protocol,dynamic frame packet reservation multiple access (DF PRMA), for wireless ATM environments its mathematic model built, and analysis of such performa... Presents the new design of a reservation based medium access protocol,dynamic frame packet reservation multiple access (DF PRMA), for wireless ATM environments its mathematic model built, and analysis of such performance as delay and channel throughput its adaptbility to the fluctuation of traffic by controlling frame length dynamically and guarantee delay performance by forced collision and special reservarion slot. Thereby providing a limited access delay and QoS level and maintaining a resonable high channel throughput. 展开更多
关键词 MAC protocol WIRELESS ATM DELAY channel THROUGHPUT
在线阅读 下载PDF
Analysis of Multichannel ALOHA and CSMA Protocols-Normal and Slotted Versions 被引量:2
13
作者 李英涛 郝川 张乃通 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 1996年第3期44-46,共3页
The performance of ALOHA, Non-Persistent CSMA protocols and their slotted versions in Packet Radio Network is analyzed in consideration of the time of propagation delay, the time of radio transformation from receiving... The performance of ALOHA, Non-Persistent CSMA protocols and their slotted versions in Packet Radio Network is analyzed in consideration of the time of propagation delay, the time of radio transformation from receiving state to transmitting state, and the time for the radio to sense the carrier. The analysis shows that these parameters are the main factors deteriorating the performance of the protocols, especially for CSMA. The multichannel mode efficiently decreases the effects of these factors and the system capacity is changeable conveniently. Comparing curves and some simulation results are given. 展开更多
关键词 ss: Packet radio network MULTICHANNEL MULTIPLE-ACCESS protocol
在线阅读 下载PDF
Security Analysis of an Attractive Online Authentication Standard:FIDO UAF Protocol 被引量:1
14
作者 Kexin Hu Zhenfeng Zhang 《China Communications》 SCIE CSCD 2016年第12期189-198,共10页
FIDO(Fast IDentity Online) Alliance proposed a set of standard in 2014 for change the nature of online authentication. By now, it has drawn attention from many companies, including Google, VISA, Intel etc. In this pap... FIDO(Fast IDentity Online) Alliance proposed a set of standard in 2014 for change the nature of online authentication. By now, it has drawn attention from many companies, including Google, VISA, Intel etc. In this paper, we analyze the FIDO UAF(Universal Authentication Framework) Protocol, one of the two sets of specifications in the standard. We first present protocols' cryptographic abstractions for the registration and authentication protocols of the FIDO UAF. According to the abstractions, we discuss on selected security goals presented in the standard to study UAF security properties. We also propose three attacks, which the first two are based on an assumption that an attacker can corrupt the software installed on the user device, and the third is based on two users sharing a FIDO roaming authenticator. The results of the attacks are to impersonate the legitimate user to pass the online authentication. 展开更多
关键词 FIDO UAF protocol online authentication impersonation attack protocol’s cryptographic abstraction
在线阅读 下载PDF
Performance Analysis of RFID Framed Slotted Aloha Anti-Collision Protocol 被引量:3
15
作者 Emad Felemban 《Journal of Computer and Communications》 2014年第1期13-18,共6页
In this paper, we develop a novel mathematical model to estimate the probability distribution function of the number of tags discovered after a certain number of interrogation rounds. In addition, the pdfs of the numb... In this paper, we develop a novel mathematical model to estimate the probability distribution function of the number of tags discovered after a certain number of interrogation rounds. In addition, the pdfs of the number of rounds needed to discover all the tags are also calculated. The estimation of such pdfs will be helpful in estimating the number of interrogation rounds and the optimal parameter configuration of the RFID system which in turn will be helpful in estimating the time needed to discover all tags. Our results show that the proposed model accurately predicts the tags detection probability. We then use the proposed model to optimally configure the reader parameters (i.e. the frame size and the number of interrogation rounds). 展开更多
关键词 Performance Modeling RFID WIRELESS NETWORKS ANTI-COLLISION protocol
暂未订购
Vulnerability Analysis of Elliptic Curve-Based RFID Protocol 被引量:1
16
作者 吕超 李晖 +1 位作者 马建峰 牛犇 《China Communications》 SCIE CSCD 2011年第4期153-158,共6页
Martínez et al.have proposed a secure RFID protocol recently which relies exclusively on the use of Elliptic Curve Cryptography(ECC)combined with a zero knowledge-based authentication scheme.In this paper,we show... Martínez et al.have proposed a secure RFID protocol recently which relies exclusively on the use of Elliptic Curve Cryptography(ECC)combined with a zero knowledge-based authentication scheme.In this paper,we show that this proposed protocol is not secure against the tracking attack.To make the attack successful,the adversary needs to execute three phases.Firstly,the attacker just eavesdrops on the messages exchanged between Reader and Tag.Secondly,the attacker impersonates the Reader to replay the message which is obtained from the first phase.Finally,the adversary acts as a man in the middle to tamper the messages exchanged between Reader and Tag.Then we propose an enhancement and prove that the revision is secure against the tracking attack while keeping other security properties. 展开更多
关键词 RFID authentication protocol ECC tracking attack
在线阅读 下载PDF
Correlation dimension based nonlinear analysis of network traffics with different application protocols 被引量:1
17
作者 王俊松 袁静 +1 位作者 李强 袁睿翕 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第5期174-178,共5页
This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols-HTTP, FTP and SMTP. First, the phase space is reconstruc... This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols-HTTP, FTP and SMTP. First, the phase space is reconstructed and the embedding parameters are obtained by the mutual information method. Secondly, the correlation dimensions of three different traffics are calculated and the results of analysis have demonstrated that the dynamics of the three different application protocol traffics is different from each other in nature, i.e. HTTP and FTP traffics are chaotic, furthermore, the former is more complex than the later; on the other hand, SMTP traffic is stochastic. It is shown that correlation dimension approach is an efficient method to understand and to characterize the nonlinear dynamics of HTTP, FTP and SMTP protocol network traffics. This analysis provided insight into and a more accurate understanding of nonlinear dynamics of internet traffics which have a complex mixture of chaotic and stochastic components. 展开更多
关键词 application protocol network traffic correlation dimension CHAOS
原文传递
Analysis and Enhancement of a Watermarking Protocol Suitable for Web Context 被引量:1
18
作者 曾鹏 曹珍富 林煌 《Journal of Shanghai Jiaotong university(Science)》 EI 2010年第4期392-396,共5页
A buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. Recently, Frattolillo proposed such a watermarking protocol suitable for web context. Frattolillo's sch... A buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. Recently, Frattolillo proposed such a watermarking protocol suitable for web context. Frattolillo's scheme has two problems which would make it hard to implement practically. Several possible solutions to the two problems are presented in this paper. 展开更多
关键词 copyright protection watermarking protocol privacy homomorphism
原文传递
Analysis of a ten step protocol to decrease postoperative spinal wound infections 被引量:1
19
作者 Hossein Elgafy Craig J Raberding +2 位作者 Megan L Mooney Kyle A Andrews Joan M Duggan 《World Journal of Orthopedics》 2018年第11期271-284,共14页
AIM To define a ten-step protocol that reduced the incidence of surgical site infection in the spine surgery practice of the senior author and evaluate the support for each step based on current literature.METHODS In ... AIM To define a ten-step protocol that reduced the incidence of surgical site infection in the spine surgery practice of the senior author and evaluate the support for each step based on current literature.METHODS In response to unexplained increased infection rates at our institution following spine surgery,a ten-step protocol was implemented:(1) preoperative glycemic management based on hemoglobin A1 c(HbA1 c);(2) skin site preoperative preparation with 2% chlorhexidine gluconate disposable cloths;(3) limit operating room traffic;(4) cut the number of personnel in the room to the minimum required;(5) absolutely no flash sterilization of equipment;(6) double-gloving with frequent changing of outer gloves;(7) local application of vancomycin powder;(8) re-dosing antibiotic every 4 h for prolonged procedures and extending postoperative coverage to 72 h for high-risk patients;(9) irrigation of subcutaneous tissue with diluted povidone-iodine solution after deep fascial closure; and(10) use of Dura Prep skin preparation at the end of a case before skin closure. Through an extensive literature review,the current data available for each of the ten steps was evaluated.RESULTS Use of vancomycin powder in surgical wounds,routine irrigation of surgical site,and frequent changing of surgical gloves are strongly supported by the literature. Preoperative skin preparation with chlorhexidine wipes is similarly supported. The majority of current literature supports control of HbA1 c preoperatively to reduce risk of infection. Limiting the use of flash sterilization is supported,but has not been evaluated in spine-specific surgery. Limiting OR traffic and number of personnel in the OR are supported although without level 1 evidence. Prolonged use of antibiotics postoperativelyis not supported by the literature. Intraoperative use of Dura Prep prior to skin closure is not yet explored.CONCLUSION The ten-step protocol defined herein has significantly helped in decreasing surgical site infection rate. Several of the steps have already been shown in the literature to have significant effect on infection rates. As several measures are required to prevent infection,instituting a standard protocol for all the described steps appears beneficial. 展开更多
关键词 Wound INFECTIONS SPINE TEN STEP protocol Surgical site INFECTIONS
暂未订购
Analysis and Improvement on Routing Protocols for Wireless Sensor Networks 被引量:1
20
作者 Yonglin Gao Xiaorong Cheng 《Journal of Computer and Communications》 2018年第9期126-131,共6页
Routing protocols are perceived to be growing hotspots and required to devote more time and work to studying it. Research on routing protocols of wireless sensor networks is significantly important to accurately guide... Routing protocols are perceived to be growing hotspots and required to devote more time and work to studying it. Research on routing protocols of wireless sensor networks is significantly important to accurately guide the application. Theoretical analysis and comparison are one of the key steps in the protocol research. Restricted by irreversible factors of power and others, lifetime of wireless sensor networks is very short. In this paper, we analyze and compare the characteristics and application fields of existing protocols. On the basis of that, this paper mainly proposes an improved directed diffusion exploring the phase of reinforcing path, which chooses the way to strengthen the path after evaluating the critical factors. It was determined by simulation that improved directed diffusion has a higher transmission rate, and it satisfies the requirements, which balancing the energy consumption and prolonging the lifetime. 展开更多
关键词 WIRELESS Sensor Networks ROUTING protocols Directed DIFFUSION protocol Energy CONSUMPTION
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部