期刊文献+
共找到39,747篇文章
< 1 2 250 >
每页显示 20 50 100
基于YOLOv5-Lite的农田边界行人检测系统
1
作者 林宏宇 邱培涛 +2 位作者 刘小强 张德志 李庆 《农机化研究》 北大核心 2026年第2期225-234,共10页
在农业机械作业场景中,静态障碍物相对容易实现规避,而行人这类动态障碍物的避让却存在较大难度。基于视觉的检测方法具备成本低、时效高的优势,其中YOLO算法在检测速度与实时性方面表现突出,能够在保障精度的同时维持较高的检测速率。... 在农业机械作业场景中,静态障碍物相对容易实现规避,而行人这类动态障碍物的避让却存在较大难度。基于视觉的检测方法具备成本低、时效高的优势,其中YOLO算法在检测速度与实时性方面表现突出,能够在保障精度的同时维持较高的检测速率。为此,选取YOLOv5-Lite作为核心算法,构建农田边界行人检测系统,旨在对农田边缘实现快速识别,保障农机作业安全。系统借助摄像头采集农田区域视频数据,运用区域分割算法界定农田与非农田边界,依托YOLOv5-Lite算法识别入侵者,再通过区域判别与警报算法对行人发出警示,有效防范农作物受损,守护作业安全。数据集源于卡内基梅隆大学开源数据集和自制数据集,原模型精确率95.1%、召回率51.2%,引入Mish激活函数后,精确率提升至96.6%、召回率提升至52.0%。测试结果显示:算法运行平均帧率为8.54 f/s,树莓派CPU温度达54.53℃,在多场景下检测效果良好,具备实际应用价值。 展开更多
关键词 行人检测 YOLOv5-lite 区域分割 Mish激活函数 实时监控 农田边界
在线阅读 下载PDF
First use of nitazoxanide in Kelleni’s protocol for managing severe bronchiolitis in a 9-month-old infant:A case report and review of literature
2
作者 Mina Thabet Kelleni 《World Journal of Clinical Cases》 2025年第36期25-31,共7页
BACKGROUND Lower respiratory tract viral infections are a major cause of mortality in children under five years old,leading to hundreds of thousands of fatalities annually.The highest risk is observed in infants under... BACKGROUND Lower respiratory tract viral infections are a major cause of mortality in children under five years old,leading to hundreds of thousands of fatalities annually.The highest risk is observed in infants under one year old,underscoring the critical need for safe and effective antiviral protocols.CASE SUMMARY A 9-month-old infant suffered from severe bronchiolitis as manifested by high fever(39°C),decreased appetite,tachypnea,wheezing,and oxygen desaturation(SpO284%on room air)and was effectively managed at home using Kelleni’s protocol,which includes age-adjusted dose of nitazoxanide(60 mg twice daily),ibuprofen and azithromycin,complemented by selective antihistaminic,antitussive and mucolytic immunomodulatory treatment.The fever resolved,wheezing became more prominent but without respiratory distress,and oxygen saturation gradually increased to 92%by day 10.Nitazoxanide exerts broad antiviral and immunomodulatory effects by enhancing host interferon responses and inhibiting viral replication,potentially attenuating airway inflammation and accelerating resolution of bronchiolitis.The nitazoxanide dose(60 mg twice daily for five days)was carefully adjusted based on the developmental expression and activity of the uridine diphosphate-glucuronosyltransferase 1A1 enzyme,responsible for its metabolism,ensuring safe age-appropriate administration.The infant’s clinical status steadily improved,and by day 14 the infant achieved full recovery with normalization of oxygen saturation(96%on room air).No adverse events occurred,and follow-up at day 28 confirmed sustained recovery.CONCLUSION To the best of my knowledge,this report presents,for the first time globally,a potential of nitazoxanide within Kelleni’s protocol to early manage infants younger than one year suffering from severe lower respiratory tract viral infection at home.Selective antitussive treatment,using agents such as low dose benproperine,was employed to mitigate troublesome cough and improve patient comfort without compromising respiratory function.Additionally,alpha amylase was used to facilitate pulmonary secretion clearance.The protocol aims to reduce morbidity and mortality from viral lower respiratory tract infections in this vulnerable population. 展开更多
关键词 SARS-CoV-2 COVID-19 NITAZOXANIDE BENPROPERINE ALPHA-AMYLASE Levocetrizine AMBROXOL Kelleni’s protocol Case report
暂未订购
Fresh Arrival--Rwanda-China avocado export protocol is a milestone in growing agricultural partnership
3
作者 ALAFATI MUGABO 《ChinAfrica》 2026年第1期46-47,共2页
Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajecto... Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade. 展开更多
关键词 China trade protocol Rwanda agricultural partnership fresh avocado exports
原文传递
基于YOLOv5s-Lite的柑橘害虫识别加速器设计与实现
4
作者 宋绍剑 贾明瑞 李刚 《小型微型计算机系统》 北大核心 2025年第7期1674-1683,共10页
针对农作物害虫自动监测系统片上资源相对受限的特点,设计了一种基于FPGA+ARM的柑橘害虫自动识别系统.首先,对原YOLOv5s模型的CBS和CSP模块进行模型改进,建立了一种高并行、高吞吐量的轻量化YOLOv5s-Lite柑橘害虫识别模型;然后,为了将... 针对农作物害虫自动监测系统片上资源相对受限的特点,设计了一种基于FPGA+ARM的柑橘害虫自动识别系统.首先,对原YOLOv5s模型的CBS和CSP模块进行模型改进,建立了一种高并行、高吞吐量的轻量化YOLOv5s-Lite柑橘害虫识别模型;然后,为了将训练好的害虫识别模型部署到FPGA中,对输入像素及权重进行8位定点量化,采用RTL(Register Transfer Level)方法和Verilog HDL(Hardware Description Language)将卷积神经网络(CNN)的基本网络映射到FPGA的片上资源;接着,为了充分挖掘FPGA的硬件资源潜力,对建立的YOLOv5s-Lite模型进行了硬件算法优化;最后,在ZYNQ 7020硬件平台上实现了害虫的自动识别.结果表明:优化后的加速器对FPGA的LUT(Lookup Table)、FF(Flip Flop)、BRAM(Block RAM)、DSP(Digital Signal Processor)等主要资源的占用率更低,吞吐量和能源效率分别提升了3.06和2.4倍. 展开更多
关键词 CNN加速器 FPGA YOLOv5s-lite 柑橘害虫
在线阅读 下载PDF
Performance Analysis of MAC Protocol for LEO Satellite Networks 被引量:1
5
作者 Mingxiang GUAN Ruichun WANG 《International Journal of Communications, Network and System Sciences》 2009年第8期786-791,共6页
Considering that weak channel collision detection ability, long propagation delay and heavy load in LEO satellite communications, a valid adaptive APRMA MAC protocol was proposed. Different access probability function... Considering that weak channel collision detection ability, long propagation delay and heavy load in LEO satellite communications, a valid adaptive APRMA MAC protocol was proposed. Different access probability functions for different services were obtained and appropriate access probabilities for voice and data users were updated slot by slot based on the estimation of the voice traffic and the channel status. In the proposed MAC protocol limited wireless resource is allocated reasonably by multiple users and high capacity was achieved. Three performance parameters: voice packet loss probability, average delay of data packets and throughput of data packets were considered in simulation. Finally simulation results demonstrated that the performance of system was improved by the APRMA compared with the conventional PRMA, with an acceptable trade-off between QoS of voice and delay of data. 展开更多
关键词 LEO SATELliteS Adaptive PACKET RESERVATION Multiple Access MAC protocol
在线阅读 下载PDF
应急情景下融合改进D^(*)Lite算法和DWA算法的无人驾驶汽车路径规划
6
作者 刘连玉 巩在武 +1 位作者 张雪 吴穹 《控制与决策》 北大核心 2025年第10期2985-2994,共10页
针对传统路径规划算法在无人驾驶应急场景中存在的环境建模失真、路径搜索效率以及安全性不足等局限,提出一种基于高精度城市电子地图的“全局-局部”耦合路径规划框架.该框架通过融合改进D^(*)Lite算法和动态窗口法(DWA),能够实现全局... 针对传统路径规划算法在无人驾驶应急场景中存在的环境建模失真、路径搜索效率以及安全性不足等局限,提出一种基于高精度城市电子地图的“全局-局部”耦合路径规划框架.该框架通过融合改进D^(*)Lite算法和动态窗口法(DWA),能够实现全局路径动态优化与局部避障协同控制.在全局规划中,使用五邻域搜索策略替代八邻域搜索,可有效避免路径曲折问题;同时,结合风险系数构造多目标代价函数,能够显著降低路径累积风险值.在局部规划中,设计一种基于风险感知机制的动态评价函数,增强局部避障的实时性和安全性.仿真结果表明,与现有文献相比,所提出耦合算法在路径规划效率、路径安全性、平滑度等方面均有显著的提升.进一步地,通过交通事故规避、突发乘客需求响应等典型应急场景验证所提出算法的鲁棒性,为无人驾驶安全行驶提供了理论支持. 展开更多
关键词 无人驾驶 应急路径规划 “全局-局部”耦合算法 D^(*)lite算法 动态窗口法
原文传递
Topology and Position Aware Overlay Network Construction Protocol for Augmentation Information of Satellite Navigation System
7
作者 赵军 《China Communications》 SCIE CSCD 2011年第3期23-31,共9页
It is an effective method to broadcast the augmentation information of satellite navigation system using GEO technology.However,it becomes difficult to receive GEO signal in some special situation,for example in citie... It is an effective method to broadcast the augmentation information of satellite navigation system using GEO technology.However,it becomes difficult to receive GEO signal in some special situation,for example in cities or canyons,in which the signal will be sheltered by big buildings or mountains.In order to solve this problem,an Internet-based broadcast network has been proposed to utilize the infrastructure of the Internet to broadcast the augmentation information of satellite navigation system,which is based on application-layer multicast protocols.In this paper,a topology and position aware overlay network construction protocol is proposed to build the network for augmentation information of satellite navigation system.Simulation results show that the new algorithm is able to achieve better performance in terms of delay,depth and degree utilization. 展开更多
关键词 augmentation information of satellite navigation system BROADCAST Internet-based application-layer multicast protocol topology and position aware
在线阅读 下载PDF
基于YOLOv5-Lite与RK3566的图像识别系统研究 被引量:1
8
作者 陈棹熙 郑培煜 +5 位作者 陈洁琳 丁必伟 魏依婷 梅德华 刘子扬 罗平 《科技创新与应用》 2025年第22期6-10,15,共6页
目前图像识别是计算机领域的重要任务,其目标是自动定位和识别图像中特定目标的位置。但目前主流的基于深度学习的目标检测算法计算量较大、模型参数量较高,导致在资源受限的嵌入式平台上部署过程繁琐、检测速度较低。该文针对以上问题... 目前图像识别是计算机领域的重要任务,其目标是自动定位和识别图像中特定目标的位置。但目前主流的基于深度学习的目标检测算法计算量较大、模型参数量较高,导致在资源受限的嵌入式平台上部署过程繁琐、检测速度较低。该文针对以上问题,提出基于YOLOv5-Lite搭建图像识别系统,该算法是基于YOLOv5的轻量化改进。改进后的模型在保持一定检测精度的同时,体积仅为原模型的24.11%,参数量仅为原模型的22.68%,计算复杂度大幅下降,在RK3566开发板上的实时推理速度达到8.67 FPS,对嵌入式平台部署深度学习算法具有重要的研究意义。 展开更多
关键词 YOLOv5-lite RK3566 嵌入式 图像识别 模型轻量化
在线阅读 下载PDF
Novel satellite transport protocol with on-board spoofing proxy
9
作者 Liu Jiong Cao Zhigang Wang Jinglin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第3期513-520,共8页
As a result of the exponential growing rate of worldwide Internet usage, satellite systems are required to support broadband Internet applications. The transmission control protocol (TCP) which is widely used in the... As a result of the exponential growing rate of worldwide Internet usage, satellite systems are required to support broadband Internet applications. The transmission control protocol (TCP) which is widely used in the Internet, performs very well on wired networks. However, in the case of satellite channels, clue to the delay and transmission errors, TCP performance degrades significantly and bandwidth of satellite links can not be fully utilized. To improve the TCP performance, a new idea of placing a TCP spoofing proxy in the satellite is considered. A Novel Satellite Transport Protocol (NSTP) which takes advantage of the special properties of the satellite channel is also proposed. By using simulation, as compared with traditional TCPs, the on-board spoofing proxy integrated with the special transport protocol can significantly enhance throughput performance on the high BER satellite link, the time needed to transfer files and the bandwidth used in reverse path are sharply reduced. 展开更多
关键词 satellite communication on-board spoofing proxy novel satellite transport protocol (NSTP) modified SACK (M-SACK) TCP ground station (GS).
在线阅读 下载PDF
Robust Authentication and Session Key Agreement Protocol for Satellite Communications
10
作者 Somayeh Soltani Seyed Amin Hosseini Seno +1 位作者 Juli Rejito Rahmat Budiarto 《Computers, Materials & Continua》 SCIE EI 2022年第6期5891-5910,共20页
Satellite networks are recognized as the most essential communication infrastructures in the world today,which complement land networks and provide valuable services for their users.Extensive coverage and service stab... Satellite networks are recognized as the most essential communication infrastructures in the world today,which complement land networks and provide valuable services for their users.Extensive coverage and service stability of these networks have increased their popularity.Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks,securing satellite communications is vital.So far,several protocols have been proposed for authentication and key exchange of satellite communications,but none of them fullymeet the security requirements.In this paper,we examine one of these protocols and identify its security vulnerabilities.Moreover,we propose a robust and secure authentication and session key agreement protocol using the elliptic curve cryptography(ECC).We show that the proposed protocol meets common security requirements and is resistant to known security attacks.Moreover,we prove that the proposed scheme satisfies the security features using the Automated Validation of Internet Security Protocols and Applications(AVISPA)formal verification tool and On-the fly Model-Checker(OFMC)and ATtack SEarcher(ATSE)model checkers.We have also proved the security of the session key exchange of our protocol using theReal orRandom(RoR)model.Finally,the comparison of our scheme with similar methods shows its superiority. 展开更多
关键词 Satellite communications AUTHENTICATION session key agreement secure communication security protocols formal verification
在线阅读 下载PDF
Incorporating red blanket protocol within code crimson:Streamlining definitive trauma care amid the chaos
11
作者 Sohil Pothiawala Savitha Bhagvan Andrew MacCormick 《World Journal of Critical Care Medicine》 2025年第1期14-19,共6页
The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation... The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation of a patient in the emergency department(ED),Code Crimson activation facilitates rapid decisionmaking by multi-disciplinary specialists for definitive haemorrhage control in operating theatre(OT)and/or interventional radiology(IR)suite.Once this decision has been made,there may still be various factors that lead to delay in transporting the patient from ED to OT/IR.Red Blanket protocol identifies and addresses these factors and processes which cause delay,and aims to facilitate rapid and safe transport of the haemodynamically unstable patient from ED to OT,while minimizing delay in resuscitation during the transfer.The two processes,Code Crimson and Red Blanket,complement each other.It would be ideal to merge the two processes into a single protocol rather than having two separate workflows.Introducing these quality improvement strategies and coor-dinated processes within the trauma framework of the hospitals/healthcare systems will help in further improving the multi-disciplinary care for the complex trauma patients requiring rapid and definitive haemorrhage control. 展开更多
关键词 Red blanket protocol Code crimson HAEMORRHAGE Trauma
暂未订购
SegInfer:Binary Network Protocol Segmentation Based on Probabilistic Inference
12
作者 Guo Maohua Zhu Yuefei Fei Jinlong 《China Communications》 2025年第6期334-354,共21页
Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-len... Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results. 展开更多
关键词 binary protocol probabilistic inference protocol field segmentation protocol reverse engineering related construction
在线阅读 下载PDF
Machine Learning-Based Routing Protocol in Flying Ad Hoc Networks: A Review
13
作者 Priyanka Manjit Kaur +2 位作者 Deepak Prashar Leo Mrsic Arfat Ahmad Khan 《Computers, Materials & Continua》 2025年第2期1615-1643,共29页
“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of F... “Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research. 展开更多
关键词 FANET protocol machine learning
在线阅读 下载PDF
Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol(iSTSP)for Security-Critical Time-Sensitive WSNs
14
作者 Ramadan Abdul-Rashid Mohd Amiruddin Abd Rahman Abdulaziz Yagoub Barnawi 《Computer Modeling in Engineering & Sciences》 2025年第9期3213-3250,共38页
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade... Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols. 展开更多
关键词 Time-sensitive wireless sensor networks(TS-WSNs) secure time synchronization protocol trust-based authentication autoencoder model deep learning malicious node detection Internet of Things energyefficient communication protocols
在线阅读 下载PDF
Efficacy and safety of acupoint application for gastrointestinal function in treating post-stroke depression:Protocol for a randomized controlled trial
15
作者 Xuan Zhang Shuhui Li +2 位作者 Juntao Wang Chung Tai Lau Jacky C.P.Chan 《Journal of Traditional Chinese Medical Sciences》 2025年第4期552-558,共7页
Objective:To evaluate the efficacy and safety of acupoint application for post-stroke depression(PSD)by regulating gastrointestinal function.A secondary objective is to explore the potential mechanism underlying this ... Objective:To evaluate the efficacy and safety of acupoint application for post-stroke depression(PSD)by regulating gastrointestinal function.A secondary objective is to explore the potential mechanism underlying this approach from the perspective of gut microbiota.Methods:This multicenter,randomized,double-blind(patients and assessors),placebo-controlled trial will enroll 80 patients with PSD,and include a 1-week run-in period,a 4-week treatment phase,and a 12-week follow-up.Eligible participants will randomly be assigned in a 1:1 ratio to either the acupoint application or placebo(non-acupoint)groups.Treatments will be administered thrice weekly for 4 weeks.The primary outcome is change in the Hamilton Rating Scale for Depression(HAMD)score.Secondary outcomes include the Beck Depression Inventory(BDI),36-Item Short-Form Health Survey(SF-36),Barthel Index of Activities of Daily Living,Social Adaptation Self-Evaluation Scale(SASS),and gut microbiota profiling.All outcomes will be assessed at baseline(prior to treatment),during treatment(weeks 2 and 4),and during follow-up(weeks 8,12,and 16).The Treatment Emergent Symptom Scale(TESS)will be used for evaluation throughout the 4-week treatment phase.Discussion:The results of this study will provide important evidence supporting a novel treatment strategy for PSD that targets gastrointestinal regulation,potentially informing future clinical practice. 展开更多
关键词 Acupoint application Gut microbiota Post-stroke depression protocol Randomized controlled trial
暂未订购
Tuning the Coefficients of Thermal Expansion of the Crystallized Cordierite Glasses by Thermal Treatment Protocols
16
作者 DUAN Qiang KE Xuefei +1 位作者 QIAO Ang TAO Haizheng 《Journal of Wuhan University of Technology(Materials Science)》 2025年第5期1239-1243,共5页
Focusing on the ultralow expansion functionality of the crystalized glass containing the cordierite crystal phase with the molar composition 20.7MgO·20.7Al_(2)O_(3)·51.6SiO_(2)·7.0TiO_(2),we systematica... Focusing on the ultralow expansion functionality of the crystalized glass containing the cordierite crystal phase with the molar composition 20.7MgO·20.7Al_(2)O_(3)·51.6SiO_(2)·7.0TiO_(2),we systematically investigated impacts of thermal treatment protocols on T dependence of coefficients of thermal expansion(CTE).Except for the phase compositions,morphology is identified as another important factor to control the T dependence of CTE.By using X-ray diffraction and scanning electron microscope,various modes of T dependence of CTE for crystallized glasses are ascribed to their different phase compositions and microstructure with finely dispersed nanoparticles.These understanding contributes to the further modification of CTE of the crystalized glass by altering their thermal treatment scenarios. 展开更多
关键词 coefficients of thermal expansion crystalized glass CORDIERITE thermal treatment protocols
原文传递
Ultrasound guided femoral nerve blocks as a compulsory pain protocol in femoral neck fractures
17
作者 Yuri Klassov 《World Journal of Orthopedics》 2025年第12期82-90,共9页
BACKGROUND Femur fractures are one of the most serious injuries that occur in the older population and are associated with severe pain and increased mortality.The primary objective of this study was to find if there w... BACKGROUND Femur fractures are one of the most serious injuries that occur in the older population and are associated with severe pain and increased mortality.The primary objective of this study was to find if there was a significant difference in pain scores in patients treated with femoral nerve blocks(FNB)compared with patients treated with the standard analgesia protocol.The secondary objective was to find if there was a significant difference in morbidity between the two groups.AIM To evaluate the effectiveness of ultrasound(US)-guided FNB in managing preoperative pain and reducing morbidity in patients with neck femur fractures compared to the standard analgesia protocol.The study seeks to determine whether FNB offers superior outcomes in terms of pain control,rehospitalization rates,and mortality.METHODS This retrospective cohort study included 1577 patients suffering from neck femur fractures.387 patients were treated with a FNB for pain management upon arrival at the emergency department,the rest were treated with standard analgesia.Pain was assessed from electronic medical records using the visual analogue scale(VAS)pre surgery,12-and 24-hour post-surgery.To determine morbidity and mortality during hospitalizations and 6 months after,it was collected from electronic medical records.RESULTS In a cohort of 1577 patients,those receiving US-guided FNB had significantly lower preoperative VAS pain scores(1.46±2.49 vs 1.82±2.59,P=0.001),reduced rehospitalization rates(0.99±1.96 vs 1.46±2.34,P<0.001),and lower mortality(16%vs 32%,P<0.001)compared to standard analgesia.CONCLUSION US guided FNB is more effective for pain management compared with standard analgesia.This method was also found to significantly reduce the risk of morbidity in those patients. 展开更多
关键词 Hip fracture Femur fracture Femoral nerve block Ultrasound guided Analgesia protocol
暂未订购
Improving nursing care protocols for diabetic patients through a systematic review and meta-analysis of recent years
18
作者 Mónica Grande-Alonso María Barbado García +2 位作者 Soledad Cristóbal-Aguado Soledad Aguado-Henche Rafael Moreno-Gómez-Toledano 《World Journal of Diabetes》 2025年第2期257-269,共13页
BACKGROUND Diabetes mellitus has become one of the major pandemics of the 21st century.In this scenario,nursing interventions are essential for improving self-care and quality of life in patients with type 2 diabetes ... BACKGROUND Diabetes mellitus has become one of the major pandemics of the 21st century.In this scenario,nursing interventions are essential for improving self-care and quality of life in patients with type 2 diabetes mellitus.Nursing interventions are crucial for managing the disease and preventing complications.AIM To analyse nursing interventions in recent years through a systematic review and meta-analysis and to propose improvements in care plans.METHODS This study conducted a systematic review and meta-analysis of the impact of nursing interventions on quantitative glycaemic variables,such as glycated haemoglobin and fasting plasma glucose.RESULTS After confirming that the combined effect of all studies from the past 5 years positively impacts quantitative variables,a descriptive analysis of the studies with the most significant changes was conducted.Based on this,an improvement in diabetic patient care protocols has been proposed through follow-up plans tailored to the patient’s technological skills.CONCLUSION The combined results obtained and the proposal for improvement developed in this manuscript could help to improve the quality of life of many people around the world. 展开更多
关键词 Diabetes mellitus Nursing interventions Systematic review META-ANALYSIS protocol enhancement proposal
暂未订购
Effect of alpha-tocopherol and OTR-4131 on muscle degeneration after rotator cuff tear in rats:An experimental protocol
19
作者 Stavros Stamiris Angeliki Cheva +7 位作者 Michael Potoupnis Elissavet Anestiadou Dimitrios Stamiris Chryssa Bekiari Antonia Loukousia Papavasiliou Kyriakos Eleftherios Tsiridis Ioannis Sarris 《World Journal of Methodology》 2025年第4期287-298,共12页
BACKGROUND Massive rotator cuff tears(RCTs)result in impaired shoulder function and quality of life.These tears lead to structural changes in the rotator cuff muscles,which compromise recovery after repair and increas... BACKGROUND Massive rotator cuff tears(RCTs)result in impaired shoulder function and quality of life.These tears lead to structural changes in the rotator cuff muscles,which compromise recovery after repair and increase re-tear rates.AIM To investigate the potential inhibitory effects of alpha-tocopherol(vitamin E)and OTR-4131 on muscle atrophy,fatty infiltration,and fibrosis in rotator cuff muscles following a massive RCT using a Wistar rat model,and establish a standardized methodology for evaluating potential therapeutic agents.METHODS This protocol outlines a controlled animal study using 40 male Wistar rats,randomized into five groups.The experimental groups will receive either systemic administration of alpha-tocopherol or local administration of OTR-4131 via intramuscular injection into the supraspinatus and infraspinatus muscles.Two sham groups will receive systemic and local saline injections respectively,while a control group will undergo no intervention.The interventions will be administered after surgical transection of the supraspinatus and infraspinatus tendons.Outcomes will be assessed via wet muscle weight measurements,muscle fiber diameter,fatty infiltration percentage,and fibrosis evaluation using histological methods.RESULTS The study anticipates that alpha-tocopherol and OTR-4131 will reduce muscle atrophy,fatty infiltration,and fibrosis compared to control and sham groups,supporting their potential protective role in rotator cuff muscle degeneration.CONCLUSION The results are expected to improve the understanding on the role of alpha-tocopherol and OTR-4131 in rotator cuff muscle protection after massive RCT and may serve as a foundation for further preclinical and clinical research aimed at improving rotator cuff repair outcomes. 展开更多
关键词 Alpha-tocopherol OTR-4131 Rotator cuff tears Experimental protocol Muscle atrophy Fatty infiltration
暂未订购
LSAP-IoHT:Lightweight Secure Authentication Protocol for the Internet of Healthcare Things
20
作者 Marwa Ahmim Nour Ouafi +3 位作者 Insaf Ullah Ahmed Ahmim Djalel Chefrour Reham Almukhlifi 《Computers, Materials & Continua》 2025年第12期5093-5116,共24页
The Internet of Healthcare Things(IoHT)marks a significant breakthrough in modern medicine by enabling a new era of healthcare services.IoHT supports real-time,continuous,and personalized monitoring of patients’healt... The Internet of Healthcare Things(IoHT)marks a significant breakthrough in modern medicine by enabling a new era of healthcare services.IoHT supports real-time,continuous,and personalized monitoring of patients’health conditions.However,the security of sensitive data exchanged within IoHT remains a major concern,as the widespread connectivity and wireless nature of these systems expose them to various vulnerabilities.Potential threats include unauthorized access,device compromise,data breaches,and data alteration,all of which may compromise the confidentiality and integrity of patient information.In this paper,we provide an in-depth security analysis of LAP-IoHT,an authentication scheme designed to ensure secure communication in Internet of Healthcare Things environments.This analysis reveals several vulnerabilities in the LAP-IoHT protocol,namely its inability to resist various attacks,including user impersonation and privileged insider threats.To address these issues,we introduce LSAP-IoHT,a secure and lightweight authentication protocol for the Internet of Healthcare Things(IoHT).This protocol leverages Elliptic Curve Cryptography(ECC),Physical Unclonable Functions(PUFs),and Three-Factor Authentication(3FA).Its security is validated through both informal analysis and formal verification using the Scyther tool and the Real-Or-Random(ROR)model.The results demonstrate strong resistance against man-in-the-middle(MITM)attacks,replay attacks,identity spoofing,stolen smart device attacks,and insider threats,while maintaining low computational and communication costs. 展开更多
关键词 Internet of healthcare things(IoHT) authentication protocol CRYPTANALYSIS ATTACKS
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部