Artificial Immune Evaluation Model of Service Health Level on End-to-End Network

Author(s):  
Guojun Zhang ◽  
Weitao Ha
2021 ◽  
Vol 27 (spe) ◽  
pp. 83-86
Author(s):  
Youfeng Yang ◽  
Wei Liu

ABSTRACT It is particularly important to improve the quality of physical education curriculum and the overall health level of college students. It is difficult to achieve a comprehensive evaluation of the original evaluation method of students' physical health level. Therefore, this study combined the analytic hierarchy process (AHP) and physical fitness training mode to build a university physical health evaluation model. Taking X University as the experimental background, 20 students of different majors in grade 2019 were selected as experimental objects. One group (10 students) adopted the original physical education curriculum mode, and the other group (10 students) integrated physical fitness training into the physical education curriculum. Using the established health evaluation model, the evaluation scores of physical health level of two groups of college students before and after the experiment were comprehensively analyzed. The results showed that the overall score of group A students' physical health level increased; the rising rate was 2.87%. However, there was no significant change in the scores of physical health assessment of group B students. The results show that physical fitness training into the public physical education curriculum can effectively help improve the overall health level of students, and also shows that the introduction of AHP into the evaluation of College Students' physical health level can improve the comprehensiveness of health level analysis. It is hoped that this study can provide some reference for physical education teaching in Colleges and universities, so as to improve the overall teaching level of colleges and universities.


2011 ◽  
Vol 121-126 ◽  
pp. 4926-4930
Author(s):  
Rui Rui Zhang ◽  
Xin Xiao

As a new research area of network security, network security situation evaluation is significant for achieving large-scale network security monitoring. In this paper, the artificial immune technology is applied to the study of situation evaluation for network security. Mathematical expressions of immune elements such as antibodies, antigens are established, and basic immune mechanism such as self-tolerance, clone selection, immune memory are achieved. According to the relationships between concentration changes of antibodies and attack intensity of pathogens in biological immune system, a situation evaluation model for network security is proposed. In addition, this paper adopts the uncertainty reasoning method in the cloud theory to make multi-granularity analysis for network security situation. By modeling the security situation indicator, and using cloud rules generator and reverse cloud generator, we can get qualitative results of hosts and network's security situation. Theoretical analysis and experimental results show that the model is effective to evaluate situation for network security with advantages of real-time, adaptability and high accuracy.


2019 ◽  
Vol 8 (2) ◽  
pp. 2834-2841

Typically, the most significant challenge in Mobile Adhoc Network (MANET) is detecting the wormhole attacks in the network during communication that degrades the overall network performance. Many routing protocols have been developed to detect and prevent the wormhole attacks based on the requirements of hardware, synchronization clocks, etc. To avoid those requirements, Improved Secure-aware Wormhole Attack Detection (ISWAD) technique was proposed by considering the maximum end-to-end delay and path length from source to the destination node. However, it requires more parameters to further increase the detection accuracy. Therefore in this article, an Artificial Immune System (AIS) based ISWAD is proposed to detect the wormhole attacks efficiently. Initially, a scalable and distributed scheme is applied to avoid single point failures and high mobility by using the sequential probability ratio test. In this scheme, system parameters are also considered with the maximum end-to-end delay and path length. To further improve the detection rate, these parameters are learned by the AIS to detect the wormhole attacks through the network precisely. After the wormhole links/nodes are detected, an alternative path is chosen from the routing table to transmit the data from source to the destination without any packet loss. Finally, the simulation results demonstrate that the proposed technique achieves better detection rate than the other wormhole attack detection techniques


2019 ◽  
Vol 4 (5) ◽  
pp. 971-976
Author(s):  
Imran Musaji ◽  
Trisha Self ◽  
Karissa Marble-Flint ◽  
Ashwini Kanade

Purpose The purpose of this article was to propose the use of a translational model as a tool for identifying limitations of current interprofessional education (IPE) research. Translational models allow researchers to clearly define next-step research needed to translate IPE to interprofessional practice (IPP). Method Key principles, goals, and limitations of current IPE research are reviewed. A popular IPE evaluation model is examined through the lens of implementation research. The authors propose a new translational model that more clearly illustrates translational gaps that can be used to direct future research. Next steps for translating IPE to IPP are discussed. Conclusion Comprehensive reviews of the literature show that the implementation strategies adopted to date have fostered improved buy-in from key stakeholders, as evidenced by improved attitudes and perceptions toward interprofessional collaboration/practice. However, there is little evidence regarding successful implementation outcomes, such as changed clinician behaviors, changed organizational practices, or improved patient outcomes. The authors propose the use of an IPE to IPP translational model to facilitate clear identification of research gaps and to better identify future research targets.


VASA ◽  
2016 ◽  
Vol 45 (3) ◽  
pp. 223-228 ◽  
Author(s):  
Jan Paweł Skóra ◽  
Jacek Kurcz ◽  
Krzysztof Korta ◽  
Przemysław Szyber ◽  
Tadeusz Andrzej Dorobisz ◽  
...  

Abstract. Background: We present the methods and results of the surgical management of extracranial carotid artery aneurysms (ECCA). Postoperative complications including early and late neurological events were analysed. Correlation between reconstruction techniques and morphology of ECCA was assessed in this retrospective study. Patients and methods: In total, 32 reconstructions of ECCA were performed in 31 symptomatic patients with a mean age of 59.2 (range 33 - 84) years. The causes of ECCA were divided among atherosclerosis (n = 25; 78.1 %), previous carotid endarterectomy with Dacron patch (n = 4; 12.5 %), iatrogenic injury (n = 2; 6.3 %) and infection (n = 1; 3.1 %). In 23 cases, intervention consisted of carotid bypass. Aneurysmectomy with end-to-end suture was performed in 4 cases. Aneurysmal resection with patching was done in 2 cases and aneurysmorrhaphy without patching in another 2 cases. In 1 case, ligature of the internal carotid artery (ICA) was required. Results: Technical success defined as the preservation of ICA patency was achieved in 31 cases (96.9 %). There was one perioperative death due to major stroke (3.1 %). Two cases of minor stroke occurred in the 30-day observation period (6.3 %). Three patients had a transient hypoglossal nerve palsy that subsided spontaneously (9.4 %). At a mean long-term follow-up of 68 months, there were no major or minor ipsilateral strokes or surgery-related deaths reported. In all 30 surviving patients (96.9 %), long-term clinical outcomes were free from ipsilateral neurological symptoms. Conclusions: Open surgery is a relatively safe method in the therapy of ECCA. Surgical repair of ECCAs can be associated with an acceptable major stroke rate and moderate minor stroke rate. Complication-free long-term outcomes can be achieved in as many as 96.9 % of patients. Aneurysmectomy with end-to-end anastomosis or bypass surgery can be implemented during open repair of ECCA.


Author(s):  
Ahmed Mousa ◽  
Ossama M. Zakaria ◽  
Mai A. Elkalla ◽  
Lotfy A. Abdelsattar ◽  
Hamad Al-Game'a

AbstractThis study was aimed to evaluate different management modalities for peripheral vascular trauma in children, with the aid of the Mangled Extremity Severity Score (MESS). A single-center retrospective analysis took place between 2010 and 2017 at University Hospitals, having emergencies and critical care centers. Different types of vascular repair were adopted by skillful vascular experts and highly trained pediatric surgeons. Patients were divided into three different age groups. Group I included those children between 5 and 10 years; group II involved pediatrics between 11 and 15 years; while children between 16 and 21 years participated in group III. We recruited 183 children with peripheral vascular injuries. They were 87% males and 13% females, with the mean age of 14.72 ± 04. Arteriorrhaphy was performed in 32%; end-to-end anastomosis and natural vein graft were adopted in 40.5 and 49%, respectively. On the other hand, 10.5% underwent bypass surgery. The age groups I and II are highly susceptible to penetrating trauma (p = 0.001), while patients with an extreme age (i.e., group III) are more susceptible to blunt injury (p = 0.001). The MESS has a significant correlation to both age groups I and II (p = 0.001). Vein patch angioplasty and end-to-end primary repair should be adopted as the main treatment options for the repair of extremity vascular injuries in children. Moreover, other treatment modalities, such as repair with autologous vein graft/bypass surgery, may be adopted whenever possible. They are cost-effective, reliable, and simple techniques with fewer postoperative complication, especially in poor/limited resources.


Sign in / Sign up

Export Citation Format

Share Document