期刊文献+
共找到1,695篇文章
< 1 2 85 >
每页显示 20 50 100
Tuning the Coefficients of Thermal Expansion of the Crystallized Cordierite Glasses by Thermal Treatment Protocols
1
作者 DUAN Qiang KE Xuefei +1 位作者 QIAO Ang TAO Haizheng 《Journal of Wuhan University of Technology(Materials Science)》 2025年第5期1239-1243,共5页
Focusing on the ultralow expansion functionality of the crystalized glass containing the cordierite crystal phase with the molar composition 20.7MgO·20.7Al_(2)O_(3)·51.6SiO_(2)·7.0TiO_(2),we systematica... Focusing on the ultralow expansion functionality of the crystalized glass containing the cordierite crystal phase with the molar composition 20.7MgO·20.7Al_(2)O_(3)·51.6SiO_(2)·7.0TiO_(2),we systematically investigated impacts of thermal treatment protocols on T dependence of coefficients of thermal expansion(CTE).Except for the phase compositions,morphology is identified as another important factor to control the T dependence of CTE.By using X-ray diffraction and scanning electron microscope,various modes of T dependence of CTE for crystallized glasses are ascribed to their different phase compositions and microstructure with finely dispersed nanoparticles.These understanding contributes to the further modification of CTE of the crystalized glass by altering their thermal treatment scenarios. 展开更多
关键词 coefficients of thermal expansion crystalized glass CORDIERITE thermal treatment protocols
原文传递
Improving nursing care protocols for diabetic patients through a systematic review and meta-analysis of recent years
2
作者 Mónica Grande-Alonso María Barbado García +2 位作者 Soledad Cristóbal-Aguado Soledad Aguado-Henche Rafael Moreno-Gómez-Toledano 《World Journal of Diabetes》 2025年第2期257-269,共13页
BACKGROUND Diabetes mellitus has become one of the major pandemics of the 21st century.In this scenario,nursing interventions are essential for improving self-care and quality of life in patients with type 2 diabetes ... BACKGROUND Diabetes mellitus has become one of the major pandemics of the 21st century.In this scenario,nursing interventions are essential for improving self-care and quality of life in patients with type 2 diabetes mellitus.Nursing interventions are crucial for managing the disease and preventing complications.AIM To analyse nursing interventions in recent years through a systematic review and meta-analysis and to propose improvements in care plans.METHODS This study conducted a systematic review and meta-analysis of the impact of nursing interventions on quantitative glycaemic variables,such as glycated haemoglobin and fasting plasma glucose.RESULTS After confirming that the combined effect of all studies from the past 5 years positively impacts quantitative variables,a descriptive analysis of the studies with the most significant changes was conducted.Based on this,an improvement in diabetic patient care protocols has been proposed through follow-up plans tailored to the patient’s technological skills.CONCLUSION The combined results obtained and the proposal for improvement developed in this manuscript could help to improve the quality of life of many people around the world. 展开更多
关键词 Diabetes mellitus Nursing interventions Systematic review META-ANALYSIS Protocol enhancement proposal
暂未订购
Enhancing Network Design through Statistical Evaluation of MANET Routing Protocols
3
作者 Ibrahim Alameri Tawfik Al-Hadhrami +2 位作者 Anjum Nazir Abdulsamad Ebrahim Yahya Atef Gharbi 《Computers, Materials & Continua》 SCIE EI 2024年第7期319-339,共21页
This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network(MANET)routing protocols:Destination Sequenced Distance Vector(DSDV),Ad hoc... This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network(MANET)routing protocols:Destination Sequenced Distance Vector(DSDV),Ad hoc On-Demand Distance Vector(AODV),Dynamic Source Routing(DSR),and Zone Routing Protocol(ZRP).In this paper,the evaluation will be carried out using complete sets of statistical tests such as Kruskal-Wallis,Mann-Whitney,and Friedman.It articulates a systematic evaluation of how the performance of the previous protocols varies with the number of nodes and the mobility patterns.The study is premised upon the Quality of Service(QoS)metrics of throughput,packet delivery ratio,and end-to-end delay to gain an adequate understanding of the operational efficiency of each protocol under different network scenarios.The findings explained significant differences in the performance of different routing protocols;as a result,decisions for the selection and optimization of routing protocols can be taken effectively according to different network requirements.This paper is a step forward in the general understanding of the routing dynamics of MANETs and contributes significantly to the strategic deployment of robust and efficient network infrastructures. 展开更多
关键词 Routing protocols statistical approach friedman MANET
在线阅读 下载PDF
A Formal Model for Analyzing Fair Exchange Protocols Based on Event Logic
4
作者 Ke Yang Meihua Xiao Zehuan Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2641-2663,共23页
Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and elec... Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and electronic contract signing,ensuring the reliability and security of network transactions.In order to address the limitations of current research methods and enhance the analytical capabilities for fair exchange protocols,this paper proposes a formal model for analyzing such protocols.The proposed model begins with a thorough analysis of fair exchange protocols,followed by the formal definition of fairness.This definition accurately captures the inherent requirements of fair exchange protocols.Building upon event logic,the model incorporates the time factor into predicates and introduces knowledge set axioms.This enhancement empowers the improved logic to effectively describe the state and knowledge of protocol participants at different time points,facilitating reasoning about their acquired knowledge.To maximize the intruder’s capabilities,channel errors are translated into the behaviors of the intruder.The participants are further categorized into honest participants and malicious participants,enabling a comprehensive evaluation of the intruder’s potential impact.By employing a typical fair exchange protocol as an illustrative example,this paper demonstrates the detailed steps of utilizing the proposed model for protocol analysis.The entire process of protocol execution under attack scenarios is presented,shedding light on the underlying reasons for the attacks and proposing corresponding countermeasures.The developedmodel enhances the ability to reason about and evaluate the security properties of fair exchange protocols,thereby contributing to the advancement of secure network transactions. 展开更多
关键词 Fair exchange protocols FAIRNESS formal analysis logic reasoning
在线阅读 下载PDF
Perspectives on the extracellular matrix in inflammatory bowel disease and bowel decellularization protocols
5
作者 Caroline Bures de Paulo Maria Angelica Miglino Patricia Castelucci 《World Journal of Experimental Medicine》 2024年第4期86-95,共10页
The extracellular matrix(ECM)is a non-cellular three-dimensional structure present in all tissues that is essential for the intestinal maintenance,function and structure,as well as for providing physical support for t... The extracellular matrix(ECM)is a non-cellular three-dimensional structure present in all tissues that is essential for the intestinal maintenance,function and structure,as well as for providing physical support for tissue integrity and elasticity.ECM enables the regulation of various processes involved in tissue homeostasis,being vital for healing,growth,migration and cell differentiation.Structurally,ECM is composed of water,polysaccharides and proteins,such as collagen fibers and proteoglycans,which are specifically arranged for each tissue.In pathological scenarios,such as inflammatory bowel disease(IBD),the deposition and remodeling of the ECM can be altered in relation to the homeostatic composition.IBD,such as Ulcerative colitis and Crohn’s disease,can be differentiated according to ECM alterations,such as circulating levels of collagen,laminin and vimentin neoepitopes.In this context,ECM presents parti-cularities in both physiological and pathological processes,however,exploring methods of tissue decellularization is emerging as a promising frontier for new therapeutic interventions and clinical protocols,promoting the development of new approaches to intestinal diseases. 展开更多
关键词 Extracellular matrix Inflammatory bowel disease Decellularization protocols Regenerative medicine INTESTINE
暂未订购
Hyperbolic Tangent Function-Based Protocols for Global/Semi-Global Finite-Time Consensus of Multi-Agent Systems 被引量:1
6
作者 Zongyu Zuo Jingchuan Tang +1 位作者 Ruiqi Ke Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第6期1381-1397,共17页
This paper investigates the problem of global/semi-global finite-time consensus for integrator-type multi-agent sys-tems.New hyperbolic tangent function-based protocols are pro-posed to achieve global and semi-global ... This paper investigates the problem of global/semi-global finite-time consensus for integrator-type multi-agent sys-tems.New hyperbolic tangent function-based protocols are pro-posed to achieve global and semi-global finite-time consensus for both single-integrator and double-integrator multi-agent systems with leaderless undirected and leader-following directed commu-nication topologies.These new protocols not only provide an explicit upper-bound estimate for the settling time,but also have a user-prescribed bounded control level.In addition,compared to some existing results based on the saturation function,the pro-posed approach considerably simplifies the protocol design and the stability analysis.Illustrative examples and an application demonstrate the effectiveness of the proposed protocols. 展开更多
关键词 Consensus protocol finite-time consensus hyper-bolic tangent function multi-agent systems.
在线阅读 下载PDF
Cell replacement with stem cell-derived retinal ganglion cells from different protocols 被引量:1
7
作者 Ziming Luo Kun-Che Chang 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第4期807-810,共4页
Glaucoma,characterized by a degenerative loss of retinal ganglion cells,is the second leading cause of blindness worldwide.There is currently no cure for vision loss in glaucoma because retinal ganglion cells do not r... Glaucoma,characterized by a degenerative loss of retinal ganglion cells,is the second leading cause of blindness worldwide.There is currently no cure for vision loss in glaucoma because retinal ganglion cells do not regenerate and are not replaced after injury.Human stem cell-derived retinal ganglion cell transplant is a potential therapeutic strategy for retinal ganglion cell degenerative diseases.In this review,we first discuss a 2D protocol for retinal ganglion cell differentiation from human stem cell culture,including a rapid protocol that can generate retinal ganglion cells in less than two weeks and focus on their transplantation outcomes.Next,we discuss using 3D retinal organoids for retinal ganglion cell transplantation,comparing cell suspensions and clusters.This review provides insight into current knowledge on human stem cell-derived retinal ganglion cell differentiation and transplantation,with an impact on the field of regenerative medicine and especially retinal ganglion cell degenerative diseases such as glaucoma and other optic neuropathies. 展开更多
关键词 cell clumps cell suspension cell transplantation DIFFERENTIATION direct-induced protocol GLAUCOMA optic neuropathy regenerative medicine retinal ganglion cell retinal organoids stem cells
暂未订购
Home Monitoring of Estrone-3-Glucuronide (E1-3G) Levels in Two Different Ovarian Stimulation Protocols: A Pilot Study 被引量:1
8
作者 Iavor K. Vladimirov Desislava Tacheva +2 位作者 Evan Gatev Magdalena Rangelova Martin Vladimirov 《Open Journal of Obstetrics and Gynecology》 2024年第10期1640-1656,共17页
Background: Studies have shown a strong correlation between the growth of E2 in serum and estrone-3-glucuronide (E1-3G) in urine during ovarian stimulation. Thus, we developed theoretical models for using urinary E1-3... Background: Studies have shown a strong correlation between the growth of E2 in serum and estrone-3-glucuronide (E1-3G) in urine during ovarian stimulation. Thus, we developed theoretical models for using urinary E1-3G in ovarian stimulation and focused on their experimental verification and analysis. Methods: A prospective, observational pilot study was conducted involving 54 patients who underwent 54 cycles of ovarian stimulation. The goal was to establish the growth rate of urinary E1-3G during the course of stimulation and to determine the daily upper and lower limits of growth rates at which stimulation is appropriate and safe. Controlled ovarian stimulation was performed using two different stimulation protocols—an antagonist protocol in 25 cases and a progestin-primed ovarian stimulation protocol (PPOS) in 29 cases, with fixed doses of gonadotropins. From the second day of stimulation, patients self-measured their daily urine E1-3G levels at home using a portable analyzer. In parallel, a standard ultrasound follow-up protocol accompanied by a determination of E2, LH, and P levels was applied to optimally control stimulation. Results: The average daily growth rates in both groups were about 50%. The daily increase in E1-3G for the antagonist protocol ranged from 14% to 79%, while they were 28% to 79% for the PPOS protocol. Conclusion: This is the first study to analyze the dynamics of E1-3G in two different protocols and to estimate the limits of its increase during the entire course of the stimulation. The results confirm our theoretical model for the viability of using urinary E1-3G for monitoring ovarian stimulation. 展开更多
关键词 Ovarian Stimulation Monitoring E1-3G Antagonist Protocol PPOS Protocol IVF ART
在线阅读 下载PDF
Designing Proportional-Integral Consensus Protocols for Second-Order Multi-Agent Systems Using Delayed and Memorized State Information
9
作者 Honghai Wang Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期878-892,共15页
This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consens... This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consensus protocol is designed by using delayed and memorized state information.Under the proportional-integral consensus protocol,the consensus problem of the multi-agent system is transformed into the problem of asymptotic stability of the corresponding linear time-invariant time-delay system.Note that the location of the eigenvalues of the corresponding characteristic function of the linear time-invariant time-delay system not only determines the stability of the system,but also plays a critical role in the dynamic performance of the system.In this paper,based on recent results on the distribution of roots of quasi-polynomials,several necessary conditions for Hurwitz stability for a class of quasi-polynomials are first derived.Then allowable regions of consensus protocol parameters are estimated.Some necessary and sufficient conditions for determining effective protocol parameters are provided.The designed protocol can achieve consensus and improve the dynamic performance of the second-order multi-agent system.Moreover,the effects of delays on consensus of systems of harmonic oscillators/double integrators under proportional-integral consensus protocols are investigated.Furthermore,some results on proportional-integral consensus are derived for a class of high-order linear time-invariant multi-agent systems. 展开更多
关键词 Consensus protocol Hurwitz stability multi-agent systems quasi-polynomials time delay
在线阅读 下载PDF
Distributed Fault Estimation for Nonlinear Systems With Sensor Saturation and Deception Attacks Using Stochastic Communication Protocols
10
作者 Weiwei Sun Xinci Gao +1 位作者 Lusong Ding Xiangyu Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第8期1865-1876,共12页
This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimati... This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimation structure under consideration,an estimation center is not necessary,and the estimator derives its information from itself and neighboring nodes,which fuses the state vector and the measurement vector.In an effort to cut down data conflicts in communication networks,the stochastic communication protocol(SCP)is employed so that the output signals from sensors can be selected.Additionally,a recursive security estimator scheme is created since attackers randomly inject malicious signals into the selected data.On this basis,sufficient conditions for a fault estimator with less conservatism are presented which ensure an upper bound of the estimation error covariance and the mean-square exponential boundedness of the estimating error.Finally,a numerical example is used to show the reliability and effectiveness of the considered distributed estimation algorithm. 展开更多
关键词 Actuator fault deception attacks distributed estimation sensor saturation stochastic communication protocol(SCP).
在线阅读 下载PDF
Research trends of clinical studies on acupuncture protocols over the past 20 years:a bibliometric analysis
11
作者 Zhi-Qiang Li Xue-Feng Wang +3 位作者 Heng Yin Feng Cao Yu-Tong Fei Jian-Ping Liu 《Integrative Medicine Discovery》 2024年第28期1-14,共14页
Background:Acupuncture protocols are essential as they guide study design and improve the quality of clinical trial,thus preventing avoid research waste.Given the increasing number of publications on acupuncture proto... Background:Acupuncture protocols are essential as they guide study design and improve the quality of clinical trial,thus preventing avoid research waste.Given the increasing number of publications on acupuncture protocols,this study aimed to assess the publications trends of acupuncture protocols over the past two decades and provided an overview for future research directions.Methods:Publications focusing on acupuncture protocols in clinical settings were retrieved and compiled from the Web of Science Core Collection spanning the period from 2004 to 2023.CiteSpace and Microsoft Excel software were used to analyze the relationship of publication with countries,institutions,authors,co-cited author,journals,references,keywords and other literature aspects.Results:This study analyzed 721 articles encompassing acupuncture protocols.A continuous yet fluctuating growth in publications volume were observed from 2004 to 2023.Notably,China stands at the forefront in contributing to acupuncture protocols,publishing 513 papers and demonstrating a high centrality score of 1.07 in cooperative network.Furthermore,China has fostered close collaborations with the USA and South Korea.Beijing University of Chinese Medicine(89),Zhishun Liu(36)and Trials(306)emerged as the top contributors in terms of institution,author,and journal,respectively.However,inter-institutional and author collaboration was relatively weak.Macpherson H was the most frequently cited author.High-frequency keywords included“randomized controlled trials”,“acupuncture”,“management”,“study protocol”,“quality of life”.Analysis of timeline diagram of keywords indicated that“functional dyspepsia”,“stroke”,“electroacupuncture”,and“colorectal cancer”were the research development trends and focus.Conclusion:Clinical acupuncture protocols have experienced robust development over the past two decades,with current research hotspots focusing on disease management and quality of life,which remain key research concerns.Moreover,we advocate for researchers to publish acupuncture protocols,which remain key research concerns.This approach allows for thorough pre-study planning of methodologies and objectives,enhancing scientific rigor through peer review,thereby laying the foundation for conducting high-quality research. 展开更多
关键词 ACUPUNCTURE PROTOCOL BIBLIOMETRIC HOTSPOTS CiteSpace
暂未订购
Survey on recent advances in IoT application layer protocols and machine learning scope for research directions 被引量:3
12
作者 Praveen Kumar Donta Satish Narayana Srirama +1 位作者 Tarachand Amgoth Chandra Sekhara Rao Annavarapu 《Digital Communications and Networks》 SCIE CSCD 2022年第5期727-744,共18页
The Internet of Things(IoT)has been growing over the past few years due to its flexibility and ease of use in real-time applications.The IoT's foremost task is ensuring that there is proper communication among dif... The Internet of Things(IoT)has been growing over the past few years due to its flexibility and ease of use in real-time applications.The IoT's foremost task is ensuring that there is proper communication among different types of applications and devices,and that the application layer protocols fulfill this necessity.However,as the number of applications grows,it is necessary to modify or enhance the application layer protocols according to specific IoT applications,allowing specific issues to be addressed,such as dynamic adaption to network conditions and interoperability.Recently,several IoT application layer protocols have been enhanced and modified according to application requirements.However,no existing survey articles focus on these protocols.In this article,we survey traditional and recent advances in IoT application layer protocols,as well as relevant real-time applications and their adapted application layer protocols for improving performance.As changing the nature of protocols for each application is unrealistic,machine learning offers means of making protocols intelligent and is able to adapt dynamically.In this context,we focus on providing open challenges to drive IoT application layer protocols in such a direction. 展开更多
关键词 Internet of things Machine learning Application layer Request-response protocols Publish-subscribe protocols
在线阅读 下载PDF
Event-Based Anomaly Detection for Non-Public Industrial Communication Protocols in SDN-Based Control Systems 被引量:4
13
作者 Ming Wan Jiangyuan Yao +1 位作者 Yuan Jing Xi Jin 《Computers, Materials & Continua》 SCIE EI 2018年第6期447-463,共17页
As the main communication mediums in industrial control networks,industrial communication protocols are always vulnerable to extreme exploitations,and it is very difficult to take protective measures due to their seri... As the main communication mediums in industrial control networks,industrial communication protocols are always vulnerable to extreme exploitations,and it is very difficult to take protective measures due to their serious privacy.Based on the SDN(Software Defined Network)technology,this paper proposes a novel event-based anomaly detection approach to identify misbehaviors using non-public industrial communication protocols,and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems.Furthermore,aiming at the unknown protocol specification and message format,this approach first restructures the industrial communication sessions and merges the payloads from industrial communication packets.After that,the feature selection and event sequence extraction can be carried out by using the N-gram model and K-means algorithm.Based on the obtained event sequences,this approach finally trains an event-based HMM(Hidden Markov Model)to identify aberrant industrial communication behaviors.Experimental results clearly show that the proposed approach has obvious advantages of classification accuracy and detection efficiency. 展开更多
关键词 Event sequence anomaly detection non-public industrial communication protocols SDN
在线阅读 下载PDF
A survey on communication protocols and performance evaluations for Internet of Things 被引量:2
14
作者 Cüneyt Bayılmış MAli Ebleme +2 位作者 ÜnalÇavuşoğlu Kerem Küçük Abdullah Sevin 《Digital Communications and Networks》 SCIE CSCD 2022年第6期1094-1104,共11页
The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols. In today's technology ecosystem, I... The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols. In today's technology ecosystem, IoT interacts with many application areas such as smart city, smart building, security, traffic, remote monitoring, health, energy, disaster, agriculture, industry. The IoT network in these scenarios comprises tiny devices, gateways, and cloud platforms. An IoT network is able to keep these fundamental components in transmission under many conditions with lightweight communication protocols taking into account the limited hardware features (memory, processor, energy, etc.) of tiny devices. These lightweight communication protocols affect the network traffic, reliability, bandwidth, and energy consumption of the IoT application. Therefore, determining the most proper communication protocol for application developers emerges as an important engineering problem. This paper presents a straightforward overview of the lightweight communication protocols, technological advancements in application layer for the IoT ecosystem. The survey then analyzes various recent lightweight communication protocols and reviews their strengths and limitations. In addition, the paper explains the experimental comparison of Constrained Applications Protocol (CoAP), Message Queuing Telemetry (MQTT), and WebSocket protocols, more convenient for tiny IoT devices. Finally, we discuss future research directions of communication protocols for IoT. 展开更多
关键词 Internet of Things IoT application layer protocols IoT communicati on pr otocols Performance evaluation
在线阅读 下载PDF
A Recovery Algorithm for Self-Stabilizing Communication Protocols 被引量:1
15
作者 Li Layuan & Li Chunlin (Department of Computer Science & Technology, Wuhan nansportation University, 430063, P. R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2000年第1期38-46,共9页
This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, pro... This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, proves its correctness and analyses its complexity. Finally, it also verifies the availability and efficiency of the algorithm by illustrating an example protocol with multi-processes. 展开更多
关键词 Computer networks Communication protocols Recovery algorithm SELF-STABILIZATION Multimedia communication networks.
在线阅读 下载PDF
Evaluation of Energy Consumption of Proactive, Reactive, and Hybrid Routing Protocols in Wireless Mesh Networks Using 802.11 Standards 被引量:2
16
作者 Sidoine D. Samo Jean Louis E. K. Fendji 《Journal of Computer and Communications》 2018年第4期1-30,共30页
This paper provides a deep evaluation of the energy consumption of routing protocols. The evaluation is done along with other metrics such as throughput and packet delivery ratio (PDR). We introduce two more metrics t... This paper provides a deep evaluation of the energy consumption of routing protocols. The evaluation is done along with other metrics such as throughput and packet delivery ratio (PDR). We introduce two more metrics to capture the efficiency of the energy consumption: e-throughput and e-PDR. Both are ratios in relation to the energy. We consider the three low layers of the stack. Three types of routing protocols are used: proactive, reactive, and hybrid. At the MAC and PHY layer, three radio types are considered: 802.11a/b/g. Finally, the number of nodes is varying in random topologies, with nodes being static or mobile. Simulations are conducted using NS3. The parameters of a real network interface card are used. From the results in mobile position scenarios, no protocol is outperforming the others;even if OLSR has the lowest energy consumption, most of the time. However, in constant position scenarios, AODV consumed a lower energy, apart from the scenarios using the 802.11a standard where HWMP energy consumption is the lowest. Regarding the energy efficiency, AODV protocols provided the best e-throughput and OLSR the best e-PDR in overall configurations. A framework for selecting energy-efficient routing protocol depending on network characteristics is proposed at the end. 展开更多
关键词 Energy CONSUMPTION Routing protocols Wireless MESH Networks e-Throughput e-PDR
在线阅读 下载PDF
Game-Based Automated Security Proofs for Cryptographic Protocols 被引量:1
17
作者 顾纯祥 光焱 祝跃飞 《China Communications》 SCIE CSCD 2011年第4期50-57,共8页
Provable security has become a popular approach for analyzing the security of cryptographic protocols.However,writing and verifying proofs by hand are prone to errors.This paper advocates the automatic security proof ... Provable security has become a popular approach for analyzing the security of cryptographic protocols.However,writing and verifying proofs by hand are prone to errors.This paper advocates the automatic security proof framework with sequences of games.We make slight modifications to Blanchet's calculus to make it easy for parsing the initial game.The main contribution of this work is that it introduces algebraic properties with observational equivalences to automatic security proofs,and thus can deal with some practical cryptographic schemes with hard problems.We illustrate the use of algebraic properties in the framework by proving the semantic security of the ElGamal encryption scheme. 展开更多
关键词 cryptographic protocols probable security automatic security proof process calculus
在线阅读 下载PDF
Diagnosis,treatment protocols,and outcomes of liver transplant recipients infected with COVID-19 被引量:1
18
作者 Mai Hashem Mohamed El-Kassas 《World Journal of Clinical Cases》 SCIE 2023年第10期2140-2159,共20页
Several cases of fatal pneumonia during November 2019 were linked initially to severe acute respiratory syndrome coronavirus 2,which the World Health Organization later designated as coronavirus disease 2019(COVID-19)... Several cases of fatal pneumonia during November 2019 were linked initially to severe acute respiratory syndrome coronavirus 2,which the World Health Organization later designated as coronavirus disease 2019(COVID-19).The World Health Organization declared COVID-19 as a pandemic on March 11,2020.In the general population,COVID-19 severity can range from asymptomatic/mild symptoms to seriously ill.Its mortality rate could be as high as 49%.The Centers for Disease Control and Prevention have acknowledged that people with specific underlying medical conditions,among those who need immunosuppression after solid organ transplantation(SOT),are at an increased risk of developing severe illness from COVID-19.Liver transplantation is the second most prevalent SOT globally.Due to their immunosuppressed state,liver transplant(LT)recipients are more susceptible to serious infections.Therefore,comorbidities and prolonged immunosuppression among SOT recipients enhance the likelihood of severe COVID-19.It is crucial to comprehend the clinical picture,immunosuppressive management,prognosis,and prophylaxis of COVID-19 infection because it may pose a danger to transplant recipients.This review described the clinical and laboratory findings of COVID-19 in LT recipients and the risk factors for severe disease in this population group.In the following sections,we discussed current COVID-19 therapy choices,reviewed standard practice in modifying immunosuppressant regimens,and outlined the safety and efficacy of currently licensed drugs for inpatient and outpatient management.Additionally,we explored the clinical outcomes of COVID-19 in LT recipients and mentioned the efficacy and safety of vaccination use. 展开更多
关键词 COVID-19 Liver transplantation RECIPIENT protocols OUTCOMES
暂未订购
An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks 被引量:1
19
作者 Munam Ali Shah Sijing Zhang Carsten Maple 《International Journal of Automation and computing》 EI CSCD 2013年第1期46-52,共7页
The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studies have s... The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum and inefficiency in its utilization has been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting their transmission characteristics. In this paper, some of the decentralized adaptive medium access control (MAC) protocols for CR networks have been critically analyzed, and a novel adaptive MAC protocol for CR networks, decentralized non-global MAC (DNG-MAC), has been proposed. The results show the DNG-MAC outperforms other CR-MAC protocols in terms of time and energy efficiency. 展开更多
关键词 Cognitive radio medium access control (MAC) protocols common control channel cooperative communication
原文传递
Model Checking Electronic CommerceSecurity Protocols Based on CTL 被引量:1
20
作者 XIAO De-qin ZHANG Huan—guo 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期333-337,共5页
We present a model based on Computational Temporal Logic(CTL)methods forverifying security requirements of electronic commerce,protocols.The model describes formally theauthentication,confidentiality integrity,non-rep... We present a model based on Computational Temporal Logic(CTL)methods forverifying security requirements of electronic commerce,protocols.The model describes formally theauthentication,confidentiality integrity,non-repudiation denial of serviee and access control ofthe e-lectronic commerce protocols.We illustrate as case study a variant of the Lu-Smolka protocolproposed by Lu-Smolka Moreover,we have discovered two attacks that allow a dishonest user topurchase a good debiting the amountto another user.And also,we compared our work with relativeresearch works and found lhat the formal way of this paper is more general to specify securityprotocols for E-Commerce. 展开更多
关键词 E-commercc security protocols formal methods computational temporal logic
在线阅读 下载PDF
上一页 1 2 85 下一页 到第
使用帮助 返回顶部