WorldWideScience

Sample records for cooperative medical scheme

  1. An Energy Efficient Cooperative Hierarchical MIMO Clustering Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungyoung Lee

    2011-12-01

    Full Text Available In this work, we present an energy efficient hierarchical cooperative clustering scheme for wireless sensor networks. Communication cost is a crucial factor in depleting the energy of sensor nodes. In the proposed scheme, nodes cooperate to form clusters at each level of network hierarchy ensuring maximal coverage and minimal energy expenditure with relatively uniform distribution of load within the network. Performance is enhanced by cooperative multiple-input multiple-output (MIMO communication ensuring energy efficiency for WSN deployments over large geographical areas. We test our scheme using TOSSIM and compare the proposed scheme with cooperative multiple-input multiple-output (CMIMO clustering scheme and traditional multihop Single-Input-Single-Output (SISO routing approach. Performance is evaluated on the basis of number of clusters, number of hops, energy consumption and network lifetime. Experimental results show significant energy conservation and increase in network lifetime as compared to existing schemes.

  2. Cooperation schemes for rate enhancement in detect-and-forward relay channels

    KAUST Repository

    Benjillali, Mustapha

    2010-05-01

    To improve the spectral efficiency of "Detect-and-Forward" (DetF) half-duplex relaying in fading channels, we propose a cooperation scheme where the relay uses a modulation whose order is higher than the one at the source. In a new common framework, we show that the proposed scheme offers considerable gains - in terms of achievable information rates - compared to the conventional DetF relaying schemes for both orthogonal and non-orthogonal source/relay cooperation. This allows us to propose an adaptive cooperation scheme based on the maximization of the information rate at the destination which needs to observe only the average signal-to-noise ratios of direct and relaying links. ©2010 IEEE.

  3. Financial protection effects of modification of China's New Cooperative Medical Scheme on rural households with chronic diseases.

    Science.gov (United States)

    Wang, Jing; Chen, Lina; Ye, Ting; Zhang, Zhiguo; Ma, Jingdong

    2014-07-15

    Several years have passed since the rural New Cooperative Medical Scheme (NCMS) in China was established and policies kept continuous improvement. Its policies on chronic diseases vary by county but have certain shared characteristics. Following this modification of medical insurance policy, this study reassesses the provision of insurance against expenditure on chronic diseases in rural areas, and analyzes its effect on impoverishment. We conducted an empirical study using multi-stage stratified random sampling. We surveyed 1,661 rural households in three provinces and analyzed the responses from 1,525 households that participated in NCMS, using descriptive and logistic regression analysis. The NCMS has reduced the prevalence of poverty and catastrophic health expenditure (CHE), as measured by out-of-pocket (OOP) payments exceeding 40% of total household expenditure, by decreasing medical expenditure. It provides obvious protection to households which include someone with chronic diseases. However, these households continue to face a higher financial risk than those without anyone suffering from chronic diseases. Variables about health service utilization and OOP payment differed significantly between households with or without people suffering from chronic disease. And CHE risk is commonly associated with household income, the number of family members with chronic diseases, OOP payment of outpatient and inpatient service in all three provinces. To reduce CHE risk for these households, it is critical to decrease OOP payments for health services by enhancing the effective reimbursement level of NCMS and strictly regulating the providers' behaviors. We recommend that a combinatory changes should be made to the rural health insurance scheme in China to improve its effect. These include improving the NCMS benefit package by broadening the catalogue of drugs and treatments covered, decreasing or abolishing deductible and increasing the reimbursement ratio of outpatient

  4. [PICS: pharmaceutical inspection cooperation scheme].

    Science.gov (United States)

    Morénas, J

    2009-01-01

    The pharmaceutical inspection cooperation scheme (PICS) is a structure containing 34 participating authorities located worldwide (October 2008). It has been created in 1995 on the basis of the pharmaceutical inspection convention (PIC) settled by the European free trade association (EFTA) in1970. This scheme has different goals as to be an international recognised body in the field of good manufacturing practices (GMP), for training inspectors (by the way of an annual seminar and experts circles related notably to active pharmaceutical ingredients [API], quality risk management, computerized systems, useful for the writing of inspection's aide-memoires). PICS is also leading to high standards for GMP inspectorates (through regular crossed audits) and being a room for exchanges on technical matters between inspectors but also between inspectors and pharmaceutical industry.

  5. Experimental Investigation of Cooperative Schemes on a Real-Time DSP-Based Testbed

    Directory of Open Access Journals (Sweden)

    Mavrokefalidis Christos

    2009-01-01

    Full Text Available Experimental results on the well-known cooperating relaying schemes, amplify-and-forward (AF, detect-and-forward (DF, cooperative maximum ratio combining (CMRC, and distributed space-time coding (DSTC, are presented in this paper. A novel relaying scheme named "selection relaying" (SR, in which one of two relays are selected base on path-loss, is also tested. For all schemes except AF receive antenna diversity is as an option which can be switched on or off. For DF and DSTC a feature "selective" where the relay only forwards frames with a receive SNR above 6 dB is introduced. In our measurements, all cooperative relaying schemes above increase the coverage area as compared with direct transmission. The features "antenna diversity" and "selective" improve the performance. Good performance is obtained with CMRC, DSTC, and SR.

  6. A spectrally efficient detect-and-forward scheme with two-tier adaptive cooperation

    KAUST Repository

    Benjillali, Mustapha

    2011-09-01

    We propose a simple relay-based adaptive cooperation scheme to improve the spectral efficiency of "Detect-and-Forward" (DetF) half-duplex relaying in fading channels. In a new common framework, we show that the proposed scheme offers considerable gainsin terms of the achievable information ratescompared to conventional DetF relaying schemes for both orthogonal and non-orthogonal source/relay transmissions. The analysis leads on to a general adaptive cooperation strategy based on the maximization of information rates at the destination which needs to observe only the average signal-to-noise ratios of the links. © 2006 IEEE.

  7. On a User-Centric Base Station Cooperation Scheme for Reliable Communications

    DEFF Research Database (Denmark)

    Kim, Dong Min; Thomsen, Henning; Popovski, Petar

    2017-01-01

    In this paper, we describe CoMP2flex, a user-centric base station (BS) cooperation scheme that provides improvements in reliability of both uplink (UL) and downlink (DL) communications of wireless cellular networks. CoMP2flex supports not only cooperation of two BSs with same direction of traffic...

  8. QoE Guarantee Scheme Based on Cooperative Cognitive Cloud and Opportunistic Weight Particle Swarm

    Directory of Open Access Journals (Sweden)

    Weihang Shi

    2015-01-01

    Full Text Available It is well known that the Internet application of cloud services may be affected by the inefficiency of cloud computing and inaccurate evaluation of quality of experience (QoE seriously. In our paper, based on construction algorithms of cooperative cognitive cloud platform and optimization algorithm of opportunities weight particle swarm clustering, the QoE guarantee mechanism was proposed. The mechanism, through the sending users of requests and the cognitive neighbor users’ cooperation, combined the cooperation of subcloud platforms and constructed the optimal cloud platform with the different service. At the same time, the particle swarm optimization algorithm could be enhanced dynamically according to all kinds of opportunity request weight, which could optimize the cooperative cognitive cloud platform. Finally, the QoE guarantee scheme was proposed with the opportunity weight particle swarm optimization algorithm and collaborative cognitive cloud platform. The experimental results show that the proposed mechanism compared is superior to the QoE guarantee scheme based on cooperative cloud and QoE guarantee scheme based on particle swarm optimization, compared with optimization fitness and high cloud computing service execution efficiency and high throughput performance advantages.

  9. A questionnaire survey of medical cooperation by the Iwaki medical association

    International Nuclear Information System (INIS)

    Midorikawa, Yasuhiko

    2013-01-01

    It has been pointed out that currently, Iwaki City faces an insufficiency of doctors working at hospitals, compared with before. Such an insufficiency became more remarkable after the 2011 Tohoku Earthquake and Fukushima Nuclear Disaster, as about 30,000 people relocated to Iwaki City from the evacuation areas. In this regard, the Iwaki Medical Association conducted a questionnaire survey to investigate the problems of medical cooperation and utilize the data to improve medical cooperation within hospitals and clinics. A total of 159 doctors answered the questionnaires: 64% were community physicians, 36% were doctors working at hospitals, and 42% were physicians. About 60% of the doctors were satisfied with the present medical cooperation. Home health care was performed by 25% of the doctors working at hospitals and 45% of the community physicians. Approximately 80% of the doctors felt the need for additional physicians to perform home health care, although more than half of the doctors answered that they do not perform it. Various problems exist in the context of medical cooperation, but many doctors still hope for its improvement, according to the answers in the questionnaires. Efforts have to be exerted further in order to enhance medical cooperation among the health care team. (author)

  10. [A questionnaire survey of medical cooperation by the Iwaki Medical Association].

    Science.gov (United States)

    Midorikawa, Yasuhiko

    2013-12-01

    It has been pointed out that currently, Iwaki City faces an insufficiency of doctors working at hospitals, compared with before. Such an insufficiency became more remarkable after the 2011 Tohoku Earthquake and Fukushima Nuclear Disaster, as about 30,000 people relocated to Iwaki City from the evacuation areas. In this regard, the Iwaki Medical Association conducted a questionnaire survey to investigate the problems of medical cooperation and utilize the data to improve medical cooperation within hospitals and clinics. A total of 159 doctors answered the questionnaires: 64% were community physicians, 36% were doctors working at hospitals, and 42% were physicians. About 60% of the doctors were satisfied with the present medical cooperation. Home health care was performed by 25% of the doctors working at hospitals and 45% of the community physicians. Approximately 80% of the doctors felt the need for additional physicians to perform home health care, although more than half of the doctors answered that they do not perform it. Various problems exist in the context of medical cooperation, but many doctors still hope for its improvement, according to the answers in the questionnaires. Efforts have to be exerted further in order to enhance medical cooperation among the health care team.

  11. Non-evidence-based policy: how effective is China's new cooperative medical scheme in reducing medical impoverishment?

    Science.gov (United States)

    Yip, Winnie; Hsiao, William C

    2009-01-01

    In recent years, many lower to middle income countries have looked to insurance as a means to protect their populations from medical impoverishment. In 2003, the Chinese government initiated the New Cooperative Medical System (NCMS), a government-run voluntary insurance program for its rural population. The prevailing model of NCMS combines medical savings accounts with high-deductible catastrophic hospital insurance (MSA/Catastrophic). To assess the effectiveness of this approach in reducing medical impoverishment, we used household survey data from 2006 linked to claims records of health expenditures to simulate the effect of MSA/Catastrophic on reducing the share of individuals falling below the poverty line (headcount), and the amount by which household resources fall short of the poverty line (poverty gap) due to medical expenses. We compared the effects of MSA/Catastrophic to Rural Mutual Health Care (RMHC), an experimental model that provides first dollar coverage for primary care, hospital services and drugs with a similar premium but a lower ceiling. Our results show that RMHC is more effective at reducing medical impoverishment than NCMS. Under the internationally accepted poverty line of US$1.08 per person per day, the MSA/Catastrophic models would reduce the poverty headcount by 3.5-3.9% and the average poverty gap by 11.8-16.4%, compared with reductions of 6.1-6.8% and 15-18.5% under the RMHC model. The primary reason for this is that NCMS does not address a major cause of medical impoverishment: expensive outpatient services for chronic conditions. As such, health policymakers need first to examine the disease profile and health expenditure pattern of a population before they can direct resources to where they will be most effective. As chronic diseases impose a growing share of the burden on the population in developing countries, it is not necessarily true that insurance coverage focusing on expensive hospital care alone is the most effective at

  12. Cooperative HARQ Assisted NOMA Scheme in Large-scale D2D Networks

    KAUST Repository

    Shi, Zheng; Ma, Shaodan; Elsawy, Hesham; Yang, Guanghua; Alouini, Mohamed-Slim

    2017-01-01

    spatial and temporal correlation in interference, highly overestimates the NOMA performance and produces misleading design insights. An interference oblivious selection for the power and/or transmission rates leads to violating the network outage constraints. To this end, the results demonstrate the effectiveness of NOMA transmission and manifest the importance of the cooperative HARQ to combat the negative effect of the network aggregate interference. For instance, comparing to the non-cooperative HARQ assisted NOMA, the proposed scheme can yield an outage probability reduction by $32$%. Furthermore, an interference aware optimal design that maximizes the LTAT given outage constraints leads to $47$% throughput improvement over HARQ-assisted orthogonal multiple access (OMA) scheme.

  13. Cooperation schemes for rate enhancement in detect-and-forward relay channels

    KAUST Repository

    Benjillali, Mustapha; Szczeciński, Leszek L.; Alouini, Mohamed-Slim

    2010-01-01

    an adaptive cooperation scheme based on the maximization of the information rate at the destination which needs to observe only the average signal-to-noise ratios of direct and relaying links. ©2010 IEEE.

  14. Cooperative HARQ Assisted NOMA Scheme in Large-scale D2D Networks

    KAUST Repository

    Shi, Zheng

    2017-07-13

    This paper develops an interference aware design for cooperative hybrid automatic repeat request (HARQ) assisted non-orthogonal multiple access (NOMA) scheme for large-scale device-to-device (D2D) networks. Specifically, interference aware rate selection and power allocation are considered to maximize long term average throughput (LTAT) and area spectral efficiency (ASE). The design framework is based on stochastic geometry that jointly accounts for the spatial interference correlation at the NOMA receivers as well as the temporal interference correlation across HARQ transmissions. It is found that ignoring the effect of the aggregate interference, or overlooking the spatial and temporal correlation in interference, highly overestimates the NOMA performance and produces misleading design insights. An interference oblivious selection for the power and/or transmission rates leads to violating the network outage constraints. To this end, the results demonstrate the effectiveness of NOMA transmission and manifest the importance of the cooperative HARQ to combat the negative effect of the network aggregate interference. For instance, comparing to the non-cooperative HARQ assisted NOMA, the proposed scheme can yield an outage probability reduction by $32$%. Furthermore, an interference aware optimal design that maximizes the LTAT given outage constraints leads to $47$% throughput improvement over HARQ-assisted orthogonal multiple access (OMA) scheme.

  15. Understanding the types of fraud in claims to South African medical schemes.

    Science.gov (United States)

    Legotlo, T G; Mutezo, A

    2018-03-28

    Medical schemes play a significant role in funding private healthcare in South Africa (SA). However, the sector is negatively affected by the high rate of fraudulent claims. To identify the types of fraudulent activities committed in SA medical scheme claims. A cross-sectional qualitative study was conducted, adopting a case study strategy. A sample of 15 employees was purposively selected from a single medical scheme administration company in SA. Semi-structured interviews were conducted to collect data from study participants. A thematic analysis of the data was done using ATLAS.ti software (ATLAS.ti Scientific Software Development, Germany). The study population comprised the 17 companies that administer medical schemes in SA. Data were collected from 15 study participants, who were selected from the medical scheme administrator chosen as a case study. The study found that medical schemes were defrauded in numerous ways. The perpetrators of this type of fraud include healthcare service providers, medical scheme members, employees, brokers and syndicates. Medical schemes are mostly defrauded by the submission of false claims by service providers and syndicates. Fraud committed by medical scheme members encompasses the sharing of medical scheme benefits with non-members (card farming) and non-disclosure of pre-existing conditions at the application stage. The study concluded that perpetrators of fraud have found several ways of defrauding SA medical schemes regarding claims. Understanding and identifying the types of fraud events facing medical schemes is the initial step towards establishing methods to mitigate this risk. Future studies should examine strategies to manage fraudulent medical scheme claims.

  16. Outage Performance Analysis of Relay Selection Schemes in Wireless Energy Harvesting Cooperative Networks over Non-Identical Rayleigh Fading Channels.

    Science.gov (United States)

    Do, Nhu Tri; Bao, Vo Nguyen Quoc; An, Beongku

    2016-02-26

    In this paper, we study relay selection in decode-and-forward wireless energy harvesting cooperative networks. In contrast to conventional cooperative networks, the relays harvest energy from the source's radio-frequency radiation and then use that energy to forward the source information. Considering power splitting receiver architecture used at relays to harvest energy, we are concerned with the performance of two popular relay selection schemes, namely, partial relay selection (PRS) scheme and optimal relay selection (ORS) scheme. In particular, we analyze the system performance in terms of outage probability (OP) over independent and non-identical (i.n.i.d.) Rayleigh fading channels. We derive the closed-form approximations for the system outage probabilities of both schemes and validate the analysis by the Monte-Carlo simulation. The numerical results provide comprehensive performance comparison between the PRS and ORS schemes and reveal the effect of wireless energy harvesting on the outage performances of both schemes. Additionally, we also show the advantages and drawbacks of the wireless energy harvesting cooperative networks and compare to the conventional cooperative networks.

  17. PERFORMANCE ANALYSIS OF COOPERATION SCHEMES IN EAVESDROPPER ASSISTED RELAY CHANNEL

    Directory of Open Access Journals (Sweden)

    Vaibhav Kumar Gupta

    2014-06-01

    Full Text Available The prominence of the wireless communication has been urging the monotonically increasing demand of security and privacy. In wireless systems, the notion of perfect secrecy of information with respect to illegitimate nodes can be ensured via physical layer security (PLS techniques. Unfortunately, they can be made less effective if source- eavesdropper wiretap channel is better than the main source-receiver channel. The various node cooperation schemes can be employed to combat this limitation where a relay node assists the communication to improve the performance significantly. In this paper, a four node wireless communication system consisting of a source, a destination, a relay and an eavesdropper as wire-tapper has been considered. The performance of the traditional cooperation schemes in terms of secrecy rate has been investigated with a different scenario where relay node helps the eavesdropper to deteriorate the secrecy rate. In addition, since legitimate receiver can overhear the transmission of relay, it favours the achievable secrecy rate. We formulate an analytical expression of conditional secrecy outage probability for the investigated system. From the obtained simulation results, it has been observed that secrecy rate is monotonically increases with path loss index. Furthermore, the proper selection of the system parameters leads to enhance the secrecy performance of the system even if relay pertains to degrade the performance. Amplify-and-forward, cooperation, decode-and-Forward, secrecy rate, relay.

  18. Determinants of enrollment of informal sector workers in cooperative based health scheme in Bangladesh

    Science.gov (United States)

    Sarker, Abdur Razzaque; Sultana, Marufa; Mahumud, Rashidul Alam; Ahmed, Sayem; Islam, Ziaul; Morton, Alec; Khan, Jahangir A. M.

    2017-01-01

    Background Providing access to affordable health care for the informal sector remains a considerable challenge for low income countries striving to make progress towards universal health coverage. The objective of the study is to identify the factors shaping the decision to enroll in a cooperative based health scheme for informal workers in Bangladesh and also help to identify the features of informal workers without health schemes and their likelihood of being insured. Methods Data were derived from a cross-sectional in-house survey within the catchment area of a cooperative based health scheme in Bangladesh during April–June 2014, covering a total of 784 households (458 members and 326 non-members). Multivariate logistic regression model was used to identify factors associated with cooperative based health scheme and explanatory variables. Findings This study found that a number of factors were significant determinants of health scheme participation including sex of household head, household composition, occupational category as well as involvement social financial safety net programs. Conclusion Findings from this study can be suggestive for policy-makers interested in scaling up health insurance for informal workers in Bangladesh. Shared funding from this large informal sector can generate new resources for healthcare, which is in line with the healthcare financing strategy of Bangladesh as well as the recommendation of the World Health Organization for developing social health insurance as part of the path to Universal Health Coverage. PMID:28750052

  19. Determinants of enrollment of informal sector workers in cooperative based health scheme in Bangladesh.

    Directory of Open Access Journals (Sweden)

    Abdur Razzaque Sarker

    Full Text Available Providing access to affordable health care for the informal sector remains a considerable challenge for low income countries striving to make progress towards universal health coverage. The objective of the study is to identify the factors shaping the decision to enroll in a cooperative based health scheme for informal workers in Bangladesh and also help to identify the features of informal workers without health schemes and their likelihood of being insured.Data were derived from a cross-sectional in-house survey within the catchment area of a cooperative based health scheme in Bangladesh during April-June 2014, covering a total of 784 households (458 members and 326 non-members. Multivariate logistic regression model was used to identify factors associated with cooperative based health scheme and explanatory variables.This study found that a number of factors were significant determinants of health scheme participation including sex of household head, household composition, occupational category as well as involvement social financial safety net programs.Findings from this study can be suggestive for policy-makers interested in scaling up health insurance for informal workers in Bangladesh. Shared funding from this large informal sector can generate new resources for healthcare, which is in line with the healthcare financing strategy of Bangladesh as well as the recommendation of the World Health Organization for developing social health insurance as part of the path to Universal Health Coverage.

  20. HiCoDG: a hierarchical data-gathering scheme using cooperative multiple mobile elements.

    Science.gov (United States)

    Van Le, Duc; Oh, Hoon; Yoon, Seokhoon

    2014-12-17

    In this paper, we study mobile element (ME)-based data-gathering schemes in wireless sensor networks. Due to the physical speed limits of mobile elements, the existing data-gathering schemes that use mobile elements can suffer from high data-gathering latency. In order to address this problem, this paper proposes a new hierarchical and cooperative data-gathering (HiCoDG) scheme that enables multiple mobile elements to cooperate with each other to collect and relay data. In HiCoDG, two types of mobile elements are used: the mobile collector (MC) and the mobile relay (MR). MCs collect data from sensors and forward them to the MR, which will deliver them to the sink. In this work, we also formulated an integer linear programming (ILP) optimization problem to find the optimal trajectories for MCs and the MR, such that the traveling distance of MEs is minimized. Two variants of HiCoDG, intermediate station (IS)-based and cooperative movement scheduling (CMS)-based, are proposed to facilitate cooperative data forwarding from MCs to the MR. An analytical model for estimating the average data-gathering latency in HiCoDG was also designed. Simulations were performed to compare the performance of the IS and CMS variants, as well as a multiple traveling salesman problem (mTSP)-based approach. The simulation results show that HiCoDG outperforms mTSP in terms of latency. The results also show that CMS can achieve the lowest latency with low energy consumption.

  1. HiCoDG: A Hierarchical Data-Gathering Scheme Using Cooperative Multiple Mobile Elements

    Directory of Open Access Journals (Sweden)

    Duc Van Le

    2014-12-01

    Full Text Available In this paper, we study mobile element (ME-based data-gathering schemes in wireless sensor networks. Due to the physical speed limits of mobile elements, the existing data-gathering schemes that usemobile elements can suffer from high data-gathering latency. In order to address this problem, this paper proposes a new hierarchical and cooperative data-gathering (HiCoDG scheme that enables multiple mobile elements to cooperate with each other to collect and relay data. In HiCoDG, two types of mobile elements are used: the mobile collector (MC and the mobile relay (MR. MCs collect data from sensors and forward them to the MR, which will deliver them to the sink. In this work, we also formulated an integer linear programming (ILP optimization problem to find the optimal trajectories for MCs and the MR, such that the traveling distance of MEs is minimized. Two variants of HiCoDG, intermediate station (IS-based and cooperative movement scheduling (CMS-based, are proposed to facilitate cooperative data forwarding from MCs to theMR. An analytical model for estimating the average data-gathering latency in HiCoDG was also designed. Simulations were performed to compare the performance of the IS and CMS variants, as well as a multiple traveling salesman problem (mTSP-based approach. The simulation results show that HiCoDG outperformsmTSP in terms of latency. The results also show that CMS can achieve the lowest latency with low energy consumption.

  2. A spectrally efficient detect-and-forward scheme with two-tier adaptive cooperation

    KAUST Repository

    Benjillali, Mustapha; Szczeciński, Leszek L.; Alouini, Mohamed-Slim

    2011-01-01

    gainsin terms of the achievable information ratescompared to conventional DetF relaying schemes for both orthogonal and non-orthogonal source/relay transmissions. The analysis leads on to a general adaptive cooperation strategy based on the maximization

  3. An Energy-Efficient Scheme for Multirelay Cooperative Networks with Energy Harvesting

    Directory of Open Access Journals (Sweden)

    Dingcheng Yang

    2016-01-01

    Full Text Available This study investigates an energy-efficient scheme in multirelay cooperative networks with energy harvesting where multiple sessions need to communicate with each other via the relay node. A two-step optimal method is proposed which maximizes the system energy efficiency, while taking into account the receiver circuit energy consumption. Firstly, the optimal power allocation for relay nodes is determined to maximize the system throughput; this is based on directional water-filling algorithm. Secondly, using quantum particle swarm optimization (QPSO, a joint relay node selection and session grouping optimization is proposed. With this algorithm, sessions can be classified into multiple groups that are assisted by the specific relay node with the maximum energy efficiency. This approach leads to a better global optimization in searching ability and efficiency. Simulation results show that the proposed scheme can improve the energy efficiency effectively compared with direct transmission and opportunistic relay-selected cooperative transmission.

  4. Persistent RCSMA: A MAC Protocol for a Distributed Cooperative ARQ Scheme in Wireless Networks

    Directory of Open Access Journals (Sweden)

    J. Alonso-Zárate

    2008-05-01

    Full Text Available The persistent relay carrier sensing multiple access (PRCSMA protocol is presented in this paper as a novel medium access control (MAC protocol that allows for the execution of a distributed cooperative automatic retransmission request (ARQ scheme in IEEE 802.11 wireless networks. The underlying idea of the PRCSMA protocol is to modify the basic rules of the IEEE 802.11 MAC protocol to execute a distributed cooperative ARQ scheme in wireless networks in order to enhance their performance and to extend coverage. A closed formulation of the distributed cooperative ARQ average packet transmission delay in a saturated network is derived in the paper. The analytical equations are then used to evaluate the performance of the protocol under different network configurations. Both the accuracy of the analysis and the performance evaluation of the protocol are supported and validated through computer simulations.

  5. Outage Performance Analysis of Relay Selection Schemes in Wireless Energy Harvesting Cooperative Networks over Non-Identical Rayleigh Fading Channels †

    Science.gov (United States)

    Do, Nhu Tri; Bao, Vo Nguyen Quoc; An, Beongku

    2016-01-01

    In this paper, we study relay selection in decode-and-forward wireless energy harvesting cooperative networks. In contrast to conventional cooperative networks, the relays harvest energy from the source’s radio-frequency radiation and then use that energy to forward the source information. Considering power splitting receiver architecture used at relays to harvest energy, we are concerned with the performance of two popular relay selection schemes, namely, partial relay selection (PRS) scheme and optimal relay selection (ORS) scheme. In particular, we analyze the system performance in terms of outage probability (OP) over independent and non-identical (i.n.i.d.) Rayleigh fading channels. We derive the closed-form approximations for the system outage probabilities of both schemes and validate the analysis by the Monte-Carlo simulation. The numerical results provide comprehensive performance comparison between the PRS and ORS schemes and reveal the effect of wireless energy harvesting on the outage performances of both schemes. Additionally, we also show the advantages and drawbacks of the wireless energy harvesting cooperative networks and compare to the conventional cooperative networks. PMID:26927119

  6. A privacy authentication scheme based on cloud for medical environment.

    Science.gov (United States)

    Chen, Chin-Ling; Yang, Tsai-Tung; Chiang, Mao-Lun; Shih, Tzay-Farn

    2014-11-01

    With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a privacy authentication scheme based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples to use medical resources on the cloud environment to find medical advice conveniently. The digital signature is used to ensure the security of the medical information that is certified by the medical department in our proposed scheme.

  7. Health-seeking behavior and hospital choice in China's New Cooperative Medical System.

    Science.gov (United States)

    Brown, Philip H; Theoharides, Caroline

    2009-07-01

    Since the dissolution of the Rural Cooperative Medical System at the end of the commune period, illness has emerged as a leading cause of poverty in rural China. To address the poor state of health care, the Chinese government unveiled the New Cooperative Medical System in 2002. Because local governments have been given significant control over program design, fundamental characteristics of the program vary from one county to the next. These differences may influence the decision to seek health care as well as the choice of hospital conditional on that initial decision. In this paper, we use a nested logit model to analyze household survey data from 25 counties to analyze the determinants of such health-seeking behavior. We find that age, the share of household expenditures allocated to food consumption (a measure of relative income), and the presence of other sick people in the household negatively affect the decision to seek health care while disability has a positive influence. Further, conditional on seeking treatment, the reimbursement scheme in place in each county and the average daily expenditure associated with hospitalization strongly influence hospital choice.

  8. How does the New Cooperative Medical Scheme influence health service utilization? A study in two provinces in rural China.

    Science.gov (United States)

    Yu, Baorong; Meng, Qingyue; Collins, Charles; Tolhurst, Rachel; Tang, Shenglan; Yan, Fei; Bogg, Lennart; Liu, Xiaoyun

    2010-05-10

    Many countries are developing health financing mechanisms to pursue the goal of universal coverage. In China, a rural health insurance system entitled New Cooperative Medical Scheme (NCMS) is being developed since 2003. Although there is concern about whether the NCMS will influence the serious situation of inequity in health service utilization in rural China, there is only limited evidence available. This paper aims to assess the utilisation of outpatient and inpatient services among different income groups and provinces under NCMS in rural China. Using multistage sampling processes, a cross-sectional household survey including 6,147 rural households and 22,636 individuals, was conducted in six counties in Shandong and Ningxia Provinces, China. Chi-square test, Poisson regression and log-linear regression were applied to analyze the association between NCMS and the utilization of outpatient and inpatient services and the length of stay for inpatients. Qualitative methods including individual interview and focus group discussion were applied to explain and complement the findings from the household survey. NCMS coverage was 95.9% in Shandong and 88.0% in Ningxia in 2006. NCMS membership had no significant association with outpatient service utilization regardless of income level and location.Inpatient service utilization has increased for the high income group under NCMS, but for the middle and low income, the change was not significant. Compared with non-members, NCMS members from Ningxia used inpatient services more frequently, while members from Shandong had a longer stay in hospital.High medical expenditure, low reimbursement rate and difference in NCMS policy design between regions were identified as the main reasons for the differences in health service utilization. Outpatient service utilization has not significantly changed under NCMS. Although utilization of inpatient service in general has increased under NCMS, people with high income tend to benefit

  9. An improved biometrics-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Guo, Dianli; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2015-03-01

    Telecare medical information system (TMIS) offers healthcare delivery services and patients can acquire their desired medical services conveniently through public networks. The protection of patients' privacy and data confidentiality are significant. Very recently, Mishra et al. proposed a biometrics-based authentication scheme for telecare medical information system. Their scheme can protect user privacy and is believed to resist a range of network attacks. In this paper, we analyze Mishra et al.'s scheme and identify that their scheme is insecure to against known session key attack and impersonation attack. Thereby, we present a modified biometrics-based authentication scheme for TMIS to eliminate the aforementioned faults. Besides, we demonstrate the completeness of the proposed scheme through BAN-logic. Compared to the related schemes, our protocol can provide stronger security and it is more practical.

  10. Robust anonymous authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  11. HiCoDG: A Hierarchical Data-Gathering Scheme Using Cooperative Multiple Mobile Elements †

    Science.gov (United States)

    Van Le, Duc; Oh, Hoon; Yoon, Seokhoon

    2014-01-01

    In this paper, we study mobile element (ME)-based data-gathering schemes in wireless sensor networks. Due to the physical speed limits of mobile elements, the existing data-gathering schemes that use mobile elements can suffer from high data-gathering latency. In order to address this problem, this paper proposes a new hierarchical and cooperative data-gathering (HiCoDG) scheme that enables multiple mobile elements to cooperate with each other to collect and relay data. In HiCoDG, two types of mobile elements are used: the mobile collector (MC) and the mobile relay (MR). MCs collect data from sensors and forward them to the MR, which will deliver them to the sink. In this work, we also formulated an integer linear programming (ILP) optimization problem to find the optimal trajectories for MCs and the MR, such that the traveling distance of MEs is minimized. Two variants of HiCoDG, intermediate station (IS)-based and cooperative movement scheduling (CMS)-based, are proposed to facilitate cooperative data forwarding from MCs to the MR. An analytical model for estimating the average data-gathering latency in HiCoDG was also designed. Simulations were performed to compare the performance of the IS and CMS variants, as well as a multiple traveling salesman problem (mTSP)-based approach. The simulation results show that HiCoDG outperforms mTSP in terms of latency. The results also show that CMS can achieve the lowest latency with low energy consumption. PMID:25526356

  12. Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment.

    Science.gov (United States)

    Chiou, Shin-Yan; Ying, Zhaoqin; Liu, Junqiang

    2016-04-01

    Medical systems allow patients to receive care at different hospitals. However, this entails considerable inconvenience through the need to transport patients and their medical records between hospitals. The development of Telecare Medicine Information Systems (TMIS) makes it easier for patients to seek medical treatment and to store and access medical records. However, medical data stored in TMIS is not encrypted, leaving patients' private data vulnerable to external leaks. In 2014, scholars proposed a new cloud-based medical information model and authentication scheme which would not only allow patients to remotely access medical services but also protects patient privacy. However, this scheme still fails to provide patient anonymity and message authentication. Furthermore, this scheme only stores patient medical data, without allowing patients to directly access medical advice. Therefore, we propose a new authentication scheme, which provides anonymity, unlinkability, and message authentication, and allows patients to directly and remotely consult with doctors. In addition, our proposed scheme is more efficient in terms of computation cost. The proposed system was implemented in Android system to demonstrate its workability.

  13. Cooperation among medical specialists : "pain" or "gain"?

    NARCIS (Netherlands)

    Stoffels, Antoinette Marie-Rose Renée

    2008-01-01

    This thesis investigates the cooperation among medical specialists in multidisciplinary teams as well as its antecedents and consequences. During meetings, medical specialists combine their knowledge and expertise, discuss the health problems of patients, weigh possible treatment options and decide

  14. Exact Throughput Analyses of Energy-Harvesting Cooperation Scheme with Best Relay Selections Under I/Q Imbalance

    Directory of Open Access Journals (Sweden)

    Tan Phuoc Huynh

    2017-01-01

    Full Text Available In this paper, we propose an energy-harvesting cooperation scheme in which relays suffer in-phase and quadrature-phase imbalances (IQI and harvest energy from a wireless transmit source. A best relay is selected based on end-to-end signal-to-interference-plus-noise ratios (SINRs in both Amplify-and-Forward (called an EHAF protocol and Decode-and-Forward (called an EHDF protocol cooperation methods. We analyze and evaluate the system performance in terms of exact closed-form throughputs over Rayleigh fading channels. Simulation and analysis results discover contributions as follows. Firstly, the throughput performance of the proposed protocols EHAF and EHDF is improved when comparing with that of a non-selection cooperation scheme. Secondly, the EHDF protocol is more efficient than the EHAF protocol. Finally, the theoretical analyses are validated by performing Monte Carlo simulations.

  15. How does the New Cooperative Medical Scheme influence health service utilization? A study in two provinces in rural China

    Directory of Open Access Journals (Sweden)

    Tang Shenglan

    2010-05-01

    Full Text Available Abstract Background Many countries are developing health financing mechanisms to pursue the goal of universal coverage. In China, a rural health insurance system entitled New Cooperative Medical Scheme (NCMS is being developed since 2003. Although there is concern about whether the NCMS will influence the serious situation of inequity in health service utilization in rural China, there is only limited evidence available. This paper aims to assess the utilisation of outpatient and inpatient services among different income groups and provinces under NCMS in rural China. Methods Using multistage sampling processes, a cross-sectional household survey including 6,147 rural households and 22,636 individuals, was conducted in six counties in Shandong and Ningxia Provinces, China. Chi-square test, Poisson regression and log-linear regression were applied to analyze the association between NCMS and the utilization of outpatient and inpatient services and the length of stay for inpatients. Qualitative methods including individual interview and focus group discussion were applied to explain and complement the findings from the household survey. Results NCMS coverage was 95.9% in Shandong and 88.0% in Ningxia in 2006. NCMS membership had no significant association with outpatient service utilization regardless of income level and location. Inpatient service utilization has increased for the high income group under NCMS, but for the middle and low income, the change was not significant. Compared with non-members, NCMS members from Ningxia used inpatient services more frequently, while members from Shandong had a longer stay in hospital. High medical expenditure, low reimbursement rate and difference in NCMS policy design between regions were identified as the main reasons for the differences in health service utilization. Conclusions Outpatient service utilization has not significantly changed under NCMS. Although utilization of inpatient service in general

  16. Minimum Benefits for HIV/AIDS in South African Medical Schemes ...

    African Journals Online (AJOL)

    ... to the Minister of Health in respect of the extent of prescribed minimum benefits for HIV/AIDS. Medical schemes are required to provide the PMBs to their members without limits or co-payments. Keywords: Medical schemes; HIV; AIDS; benefits; prescribed minimum benefits. South African Actuarial Journal: 2003 3: 77-112 ...

  17. Constructing an Urban Population Model for Medical Insurance Scheme Using Microsimulation Techniques

    Directory of Open Access Journals (Sweden)

    Linping Xiong

    2012-01-01

    Full Text Available China launched a pilot project of medical insurance reform in 79 cities in 2007 to cover urban nonworking residents. An urban population model was created in this paper for China’s medical insurance scheme using microsimulation model techniques. The model made it clear for the policy makers the population distributions of different groups of people, the potential urban residents entering the medical insurance scheme. The income trends of units of individuals and families were also obtained. These factors are essential in making the challenging policy decisions when considering to balance the long-term financial sustainability of the medical insurance scheme.

  18. Performance analysis of best relay selection scheme for amplify-and-forward cooperative networks in identical Nakagami-m channels

    KAUST Repository

    Hussain, Syed Imtiaz

    2010-06-01

    In cooperative communication networks, the use of multiple relays between the source and the destination was proposed to increase the diversity gain. Since the source and all the relays must transmit on orthogonal channels, multiple relay cooperation is considered inefficient in terms of channel resources and bandwidth utilization. To overcome this problem, the concept of best relay selection was recently proposed. In this paper, we analyze the performance of the best relay selection scheme for a cooperative network with multiple relays operating in amplify-and-forward (AF) mode over identical Nakagami-m channels using exact source-relay-destination signal to noise ratio (SNR) expression. We derive accurate closed form expressions for various system parameters including probability density function (pdf) of end-to-end SNR, average output SNR, average probability of bit error and average channel capacity. T he analytical results are verified through extensive simulations. It is shown that the best relay selection scheme performs better than the regular all relay cooperation.

  19. Rural-to-urban migration and its implication for new cooperative medical scheme coverage and utilization in China

    Directory of Open Access Journals (Sweden)

    Zhang Juying

    2011-06-01

    Full Text Available Abstract Background China has been experiencing the largest rural to urban migration in history. Rural-to-urban migrants are those who leave their hometown for another place in order to work or live without changing their hukou status, which is a household registration system in China, categorizing people as either rural residents or urban residents. Rural-to-urban migrants typically find better job opportunities in destination cities, and these pay higher salaries than available in their home regions. This has served to improve the enrollment rates in the New Cooperative Medical Scheme (NCMS of rural families, protecting households from falling into poverty due to diseases. However, current regulations stipulate that people who are registered in China's rural hukou can only participate in their local NCMS, which in turn poses barriers when migrants seek medical services in the health facilities of their destination cities. To examine this issue in greater depth, this study examined the associations between migration, economic status of rural households, and NCMS enrollment rate, as well as NCMS utilization of rural-to-urban migrants. Methods A multistage cluster sampling procedure was adopted. Our sample included 9,097 households and 36,720 individuals. Chi-square test and T-test were used to examine differences between the two populations of migrants and non-migrants based on age, gender, marriage status, and highest level of education. Ordinal logistic regression was used to examine the association between migration and household economic status. Binary logistic regression was used to examine the associations between household economic status, migration and enrollment in the NCMS. Results Migration was positively associated with improved household economic status. In households with no migrants, only 11.3% of the population was in the richest quintile, whereas the percentage was more than doubled in households with family members who migrated

  20. Distributed Joint Cluster Formation and Resource Allocation Scheme for Cooperative Data Collection in Virtual MIMO-Based M2M Networks

    Directory of Open Access Journals (Sweden)

    Xi Luan

    2015-01-01

    Full Text Available An efficient data collection scheme plays an important role for the real-time intelligent monitoring in many machine-to-machine (M2M networks. In this paper, a distributed joint cluster formation and resource allocation scheme for data collection in cluster-based M2M networks is proposed. Specifically, in order to utilize the advantages of cooperation, we first propose a hierarchical transmission model which contains two communication phases. In the first phase, the intracluster information sharing is carried out by all the nodes within the same cluster. Then these nodes transmit the total information to the BS cooperatively with virtual-MIMO (VMIMO protocol in the second phase. To grasp the properties and advantages of this cooperative transmission strategy, the theoretical analysis results are provided. The key issue in this system is to form the clusters and allocate resources efficiently. Since the optimization problem on this issue is an NP-hard problem, a feasible joint scheme for the cluster formation and resource allocation is proposed in this paper, which is carried out via coalition formation game with a distributed algorithm. This scheme can reduce the complexity while keeping an attractive performance. Simulation results show the properties of the proposed scheme and its advantages when comparing with the noncooperative scheme for the data collection in a practical scenario.

  1. A User-Centered Cooperative Information System for Medical Imaging Diagnosis.

    Science.gov (United States)

    Gomez, Enrique J.; Quiles, Jose A.; Sanz, Marcos F.; del Pozo, Francisco

    1998-01-01

    Presents a cooperative information system for remote medical imaging diagnosis. General computer-supported cooperative work (CSCW) problems addressed are definition of a procedure for the design of user-centered cooperative systems (conceptual level); and improvement of user feedback and optimization of the communication bandwidth in highly…

  2. Differences exist across insurance schemes in China post-consolidation.

    Directory of Open Access Journals (Sweden)

    Yang Li

    Full Text Available In China, the basic insurance system consists of three schemes: the UEBMI (Urban Employee Basic Medical Insurance, URBMI (Urban Resident Basic Medical Insurance, and NCMS (New Cooperative Medical Scheme, across which significant differences have been observed. Since 2009, the central government has been experimenting with consolidating these schemes in selected areas. This study examines whether differences still exist across schemes after the consolidation.A survey was conducted in the city of Suzhou, collecting data on subjects 45 years old and above with at least one inpatient or outpatient treatment during a period of twelve months. Analysis on 583 subjects was performed comparing subjects' characteristics across insurance schemes. A resampling-based method was applied to compute the predicted gross medical cost, OOP (out-of-pocket cost, and insurance reimbursement rate.Subjects under different insurance schemes differ in multiple aspects. For inpatient treatments, subjects under the URBMI have the highest observed and predicted gross and OOP costs, while those under the UEBMI have the lowest. For outpatient treatments, subjects under the UEBMI and URBMI have comparable costs, while those under the NCMS have much lower costs. Subjects under the NCMS also have a much lower reimbursement rate.Differences still exist across schemes in medical costs and insurance reimbursement rate post-consolidation. Further investigations are needed to identify the causes, and interventions are needed to eliminate such differences.

  3. A cooperative online learning scheme for resource allocation in 5G systems

    KAUST Repository

    Alqerm, Ismail; Shihada, Basem

    2016-01-01

    The demand on mobile Internet related services has increased the need for higher bandwidth in cellular networks. The 5G technology is envisioned as a solution to satisfy this demand as it provides high data rates and scalable bandwidth. The multi-tier heterogeneous structure of 5G with dense base station deployment, relays, and device-to-device (D2D) communications intends to serve users with different QoS requirements. However, the multi-tier structure causes severe interference among the multi-tier users which further complicates the resource allocation problem. In this paper, we propose a cooperative scheme to tackle the interference problem, including both cross-tier interference that affects macro users from other tiers and co-tier interference, which is among users belong to the same tier. The scheme employs an online learning algorithm for efficient spectrum allocation with power and modulation adaptation capability. Our evaluation results show that our online scheme outperforms others and achieves significant improvements in throughput, spectral efficiency, fairness, and outage ratio. © 2016 IEEE.

  4. A cooperative online learning scheme for resource allocation in 5G systems

    KAUST Repository

    Alqerm, Ismail

    2016-07-26

    The demand on mobile Internet related services has increased the need for higher bandwidth in cellular networks. The 5G technology is envisioned as a solution to satisfy this demand as it provides high data rates and scalable bandwidth. The multi-tier heterogeneous structure of 5G with dense base station deployment, relays, and device-to-device (D2D) communications intends to serve users with different QoS requirements. However, the multi-tier structure causes severe interference among the multi-tier users which further complicates the resource allocation problem. In this paper, we propose a cooperative scheme to tackle the interference problem, including both cross-tier interference that affects macro users from other tiers and co-tier interference, which is among users belong to the same tier. The scheme employs an online learning algorithm for efficient spectrum allocation with power and modulation adaptation capability. Our evaluation results show that our online scheme outperforms others and achieves significant improvements in throughput, spectral efficiency, fairness, and outage ratio. © 2016 IEEE.

  5. Modelling Cooperative Work at a Medical Department

    DEFF Research Database (Denmark)

    Christensen, Lars Rune; Hildebrandt, Thomas

    2017-01-01

    Based on ethnographic fieldwork, and the modelling of work processes at a medical department, this paper considers some of the opportunities and challenges involved in working with models in a complex work setting. The paper introduces a flexible modelling tool to CSCW, called the DCR Portal......, and considers how it may be used to model complex work settings collaboratively. Further, the paper discusses how models created with the DCR portal may potentially play a key role in making a cooperative work ensemble appreciate, discuss and coordinate key interdependencies inherent to their cooperative work...

  6. A Selective Group Authentication Scheme for IoT-Based Medical Information System.

    Science.gov (United States)

    Park, YoHan; Park, YoungHo

    2017-04-01

    The technology of IoT combined with medical systems is expected to support advanced medical services. However, unsolved security problems, such as misuse of medical devices, illegal access to the medical server and so on, make IoT-based medical systems not be applied widely. In addition, users have a high burden of computation to access Things for the explosive growth of IoT devices. Because medical information is critical and important, but users have a restricted computing power, IoT-based medical systems are required to provide secure and efficient authentication for users. In this paper, we propose a selective group authentication scheme using Shamir's threshold technique. The property of selectivity gives the right of choice to users to form a group which consists of things users select and access. And users can get an access authority for those Things at a time. Thus, our scheme provides an efficient user authentication for multiple Things and conditional access authority for safe IoT-based medical information system. To the best of our knowledge, our proposed scheme is the first in which selectivity is combined with group authentication in IoT environments.

  7. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  8. Security analysis and improvement of a privacy authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Wu, Fan; Xu, Lili

    2013-08-01

    Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.

  9. Assessing the Effects of the New Cooperative Medical Scheme on Alleviating the Health Payment-Induced Poverty in Shaanxi Province, China

    Science.gov (United States)

    Gao, Jianmin; Zhou, Zhongliang; Yan, Jue; Lai, Sha; Xu, Yongjian; Chen, Gang

    2016-01-01

    Background Disease has become one of the key causes of falling into poverty in rural China. The poor households are even more likely to suffer. The New Cooperative Medical Scheme (NCMS) has been implemented to provide rural residents financial protection against health risks. This study aims to assess the effect of the NCMS on alleviating health payment-induced poverty in the Shaanxi Province of China. Methods The data was drawn from the 5th National Health Service Survey of Shaanxi Province, conducted in 2013. In total, 41,037 individuals covered by NCMS were selected. Poverty headcount ratio (HCR), poverty gap and mean positive poverty gap were used for measuring the incidence, depth and intensity of poverty, respectively. The differences on poverty measures pre- and post- insurance reimbursement indicate the effectiveness of alleviating health payment-induced poverty under NCMS. Results For the general insured, 5.81% of households fell below the national poverty line owing to the health payment; this HCR dropped to 4.84% after insurance reimbursement. The poverty HCRs for the insured that had hospitalization in the past year dropped from 7.50% to 2.09% after reimbursement. With the NCMS compensation, the poverty gap declined from 42.90 Yuan to 34.49 Yuan (19.60% decreased) for the general insured and from 57.48 Yuan to 10.01 Yuan (82.59% decreased) for the hospital admission insured. The mean positive poverty gap declined 3.56% and 37.40% for two samples, respectively. Conclusion The NCMS could alleviate the health payment-induced poverty. The effectiveness of alleviating health payment-induced poverty is greater for hospital admission insured than for general insured, mainly because NCMS compensates for serious diseases. Our study suggests that a more comprehensive insurance benefit package design could further improve the effectiveness of poverty alleviation. PMID:27380417

  10. Benefit packages for chronic disease outpatients in the New Rural Cooperative Medical Scheme in 32 Chinese counties [v1; ref status: indexed, http://f1000r.es/z2

    Directory of Open Access Journals (Sweden)

    Chuangzhou Xu

    2013-06-01

    Full Text Available Introduction: Chronic disease has become a major problem affecting the health of the Chinese population. In response to this situation, the New Rural Cooperative Medical Scheme (NRCMS has begun to provide health cover for outpatients with chronic disease expenses, made possible by the increased risk pool of previous years. We compare the differences between Benefit Packages for Chronic Diseases Outpatients (BPCDO in order to produce a reference for policy makers. Methods: Information on the various BPCDO was located by searching the official NRCMS website in Chinese, using certain criteria to select the ideal BPCDO. Population coverage, service coverage and cost of coverage were chosen to form the analytical framework for this paper. The diseases were classified according to the World Health Organisation's (WHO International Classification of Diseases (ICD-10. Results: To avoid “moral hazard”, complex processes have been created. This has resulted in chronic disease patients finding it very difficult to become beneficiaries. Forty-one types of chronic diseases were listed in 32 different BPCDO. We found that different counties have different co-payment rates, deductible lines, ceilings, coverage of drugs and tests, appointed hospitals and reimbursement frequencies. Conclusion: High mortality diseases and diseases with a heavier cost burden should be the priority on the list of reimbursement. The BPCDO scheme should be introduced urgently at the national level. It should include twenty-one types of disease and eight essential factors.

  11. Medical cooperative projects. From Nagasaki to Chernobyl and Semipalatinsk

    International Nuclear Information System (INIS)

    Takamura, Noboru; Yamashita, Shunichi

    2005-01-01

    For many years, Nagasaki University, particularly the Atomic Bomb Disease Institute, has been engaged in research regarding the late health effects of radiation exposure in Nagasaki atomic bomb survivors. Since 1991, we have participated in several Chernobyl projects including the Chernobyl Sasakawa Medical Cooperation Project which demonstrated a marked increase in the incidence of childhood thyroid cancer around Chernobyl, especially in the Gomel region, Belarus. Furthermore, we have performed both fieldwork and research to clarify the late effects of radiation exposure around Semipalatinsk Nuclear Testing Site and participated in bilateral official medical assistance projects between Japan and Kazakhstan to strengthen the medical infrastructure in this area. Through these humanitarian and scientific projects, we have been collaborating closely with our counterparts in the former Union of Soviet Socialist Republics (USSR) for the past 15 years. Here, we present a brief review of our past activities and future directions of international cooperative radiation research from Nagasaki to Chernobyl and Semipalatinsk. (author)

  12. On the security of two remote user authentication schemes for telecare medical information systems.

    Science.gov (United States)

    Kim, Kee-Won; Lee, Jae-Dong

    2014-05-01

    The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.

  13. Cooperative medical insurance and the cost of care in Shandong, PR China: perspectives of patients and community members.

    Science.gov (United States)

    Mahmood, Mohammad Afzal; Raulli, Alexandra; Yan, Wang; Dong, Han; Aiguo, Zhang; Ping, Dong

    2015-03-01

    This research was conducted to identify the cost of care associated with utilization of village clinics and membership of the New Cooperative Medical Scheme (NCMS) in 2 counties of Shandong province, PR China. A total of 397 community members and 297 patients who used the village clinics were interviewed. The average cost for primary care treatment of 1 episode of illness was about 55 yuan (about US$8). Although more than 50% of people had NCMS membership, many consider the monetary reimbursements as insufficient. The low insurance reimbursement rates and inability to pay out-of-pocket expenses compromise access to care. Delays can cause more serious illnesses with potential to overburden the secondary care at the township and county hospitals. Those rural people who have not yet enjoyed the benefits of China's economic development may not benefit from recent health care reform and finance mechanisms unless schemes such as the NCMS provide more substantial subsidies. © 2010 APJPH.

  14. A Classification Scheme for Literary Characters

    Directory of Open Access Journals (Sweden)

    Matthew Berry

    2017-10-01

    Full Text Available There is no established classification scheme for literary characters in narrative theory short of generic categories like protagonist vs. antagonist or round vs. flat. This is so despite the ubiquity of stock characters that recur across media, cultures, and historical time periods. We present here a proposal of a systematic psychological scheme for classifying characters from the literary and dramatic fields based on a modification of the Thomas-Kilmann (TK Conflict Mode Instrument used in applied studies of personality. The TK scheme classifies personality along the two orthogonal dimensions of assertiveness and cooperativeness. To examine the validity of a modified version of this scheme, we had 142 participants provide personality ratings for 40 characters using two of the Big Five personality traits as well as assertiveness and cooperativeness from the TK scheme. The results showed that assertiveness and cooperativeness were orthogonal dimensions, thereby supporting the validity of using a modified version of TK’s two-dimensional scheme for classifying characters.

  15. BRAIN Journal - The Impact of Cooperative Learning on Female Medical Students' Happiness and Social Support

    OpenAIRE

    Ali Taghinezhad; Rahim Pendar; Samira Rahimi; Maryam Jamalzadeh; Mahboobeh Azadikhah

    2017-01-01

    ABSTRACT Cooperative learning has appeared as a new approach to teaching. This approach is utilized for small heterogeneous groups of students who cooperate to achieve a common goal. This study aimed at investigating the impact of cooperative learning on female medical students’ happiness and social support. To this end, 72 female students of medicine at Shiraz Medical School were selected using cluster sampling and divided into experimental and control groups. The students were administe...

  16. A new cooperative MIMO scheme based on SM for energy-efficiency improvement in wireless sensor network.

    Science.gov (United States)

    Peng, Yuyang; Choi, Jaeho

    2014-01-01

    Improving the energy efficiency in wireless sensor networks (WSN) has attracted considerable attention nowadays. The multiple-input multiple-output (MIMO) technique has been proved as a good candidate for improving the energy efficiency, but it may not be feasible in WSN which is due to the size limitation of the sensor node. As a solution, the cooperative multiple-input multiple-output (CMIMO) technique overcomes this constraint and shows a dramatically good performance. In this paper, a new CMIMO scheme based on the spatial modulation (SM) technique named CMIMO-SM is proposed for energy-efficiency improvement. We first establish the system model of CMIMO-SM. Based on this model, the transmission approach is introduced graphically. In order to evaluate the performance of the proposed scheme, a detailed analysis in terms of energy consumption per bit of the proposed scheme compared with the conventional CMIMO is presented. Later, under the guide of this new scheme we extend our proposed CMIMO-SM to a multihop clustered WSN for further achieving energy efficiency by finding an optimal hop-length. Equidistant hop as the traditional scheme will be compared in this paper. Results from the simulations and numerical experiments indicate that by the use of the proposed scheme, significant savings in terms of total energy consumption can be achieved. Combining the proposed scheme with monitoring sensor node will provide a good performance in arbitrary deployed WSN such as forest fire detection system.

  17. Cooperative Detection for Primary User in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Zhu Jia

    2009-01-01

    Full Text Available We propose two novel cooperative detection schemes based on the AF (Amplify and Forward and DF (Decode and Forward protocols to achieve spatial diversity gains for cognitive radio networks, which are referred to as the AF-CDS, (AF-based Cooperative Detection Scheme and DF-CDS (DF-based Cooperative Detection Scheme, respectively. Closed-form expressions of detection probabilities for the noncooperation scheme, AND-CDS (AND-based Cooperative Detection Scheme, AF-CDS and DF-CDS, are derived over Rayleigh fading channels. Also, we analyze the overall agility for the proposed cooperative detection schemes and show that our schemes can further reduce the detection time. In addition, we compare the DF-CDS with the AF-CDS in terms of detection probability and agility gain, depicting the advantage of DF-CDS at low SNR region and high false alarm probability region.

  18. The development and evaluation of a community attachment scheme for first-year medical students.

    Science.gov (United States)

    Hannay, David; Mitchell, Caroline; Chung, Man Cheung

    2003-03-01

    This paper describes the development over 14 years of a Community Attachment Scheme for First Year Medical Students in Sheffield, together with feedback from tutors and students. The scheme involves pairs of students visiting families expecting a baby or experiencing an illness. The families are identified by general practitioners who act as tutors together with a behavioural scientist for groups of eight to 10 students. The scheme provides first-year students with practical experience of sociology and psychology in terms of family dynamics and illness behaviour. Assessment is part of the degree examination, and involves a written assignment on the family, together with tutors' assessments. The development of the attachment scheme took place in three phases, which are described together with feedback from tutors and students, as well as changes in methods of assessment. The basis of the Community Attachment Scheme has been self-directed problem-based learning in small groups with continuous assessment, and these principles have now extended to the rest of the medical curriculum in Sheffield, of which the Community Attachment Scheme is an integral part.

  19. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  20. International medical cooperation project for State of Libya using international medical tourism system in Thailand

    OpenAIRE

    奥寺, 敬; 坂本, 美重

    2013-01-01

    International medical cooperation project for State of Libya is reported. The concept of this project is to treat Libyan injured people using international medical tourism system in Thailand. Management of patient, including evaluation, domestic and international transportation arrangement of hospital, is supported by Normeca International Co., Ltd, (Pattaya, Thailand). Treatment of Libyan patient in two international hospitals (Bangpakok 9 Hospital and Navamin 9 Hopsital) in Bangkok was succ...

  1. A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud.

    Science.gov (United States)

    Seenivasagam, V; Velumani, R

    2013-01-01

    Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT)-Singular Value Decomposition (SVD) domain for unambiguous authentication of medical images. Further, a framework is proposed for accessing patient records based on the watermarking scheme. The patient identification details and a link to patient data encoded into a Quick Response (QR) code serves as the watermark. In the proposed scheme, the medical image is not subjected to degradations due to watermarking. Patient authentication and authorized access to patient data are realized on combining a Secret Share with the Master Share constructed from invariant features of the medical image. The Hu's invariant image moments are exploited in creating the Master Share. The proposed system is evaluated with Checkmark software and is found to be robust to both geometric and non geometric attacks.

  2. A QR Code Based Zero-Watermarking Scheme for Authentication of Medical Images in Teleradiology Cloud

    Directory of Open Access Journals (Sweden)

    V. Seenivasagam

    2013-01-01

    Full Text Available Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT—Singular Value Decomposition (SVD domain for unambiguous authentication of medical images. Further, a framework is proposed for accessing patient records based on the watermarking scheme. The patient identification details and a link to patient data encoded into a Quick Response (QR code serves as the watermark. In the proposed scheme, the medical image is not subjected to degradations due to watermarking. Patient authentication and authorized access to patient data are realized on combining a Secret Share with the Master Share constructed from invariant features of the medical image. The Hu’s invariant image moments are exploited in creating the Master Share. The proposed system is evaluated with Checkmark software and is found to be robust to both geometric and non geometric attacks.

  3. The European Federation of Organisations for Medical Physics Policy Statement No. 6.1: Recommended Guidelines on National Registration Schemes for Medical Physicists.

    Science.gov (United States)

    Christofides, Stelios; Isidoro, Jorge; Pesznyak, Csilla; Bumbure, Lada; Cremers, Florian; Schmidt, Werner F O

    2016-01-01

    This EFOMP Policy Statement is an update of Policy Statement No. 6 first published in 1994. The present version takes into account the European Union Parliament and Council Directive 2013/55/EU that amends Directive 2005/36/EU on the recognition of professional qualifications and the European Union Council Directive 2013/59/EURATOM laying down the basic safety standards for protection against the dangers arising from exposure to ionising radiation. The European Commission Radiation Protection Report No. 174, Guidelines on Medical Physics Expert and the EFOMP Policy Statement No. 12.1, Recommendations on Medical Physics Education and Training in Europe 2014, are also taken into consideration. The EFOMP National Member Organisations are encouraged to update their Medical Physics registration schemes where these exist or to develop registration schemes taking into account the present version of this EFOMP Policy Statement (Policy Statement No. 6.1"Recommended Guidelines on National Registration Schemes for Medical Physicists"). Copyright © 2016. Published by Elsevier Ltd.

  4. The Effects of Cooperative Learning on Improving English Pronunciation and Comprehension of Medical Students

    Directory of Open Access Journals (Sweden)

    Zeinab Sanaee Moghadam

    2013-12-01

    Full Text Available Introduction: Acquisition of intelligible English pronunciation and comprehension of medical texts has been considered as an important need for medical students. This can be improved by employing different methods and taking into consideration various learning styles of students. This study is an attempt to reveal the effect of cooperative learning on enhancing pronunciation and reading comprehension in students of medicine in Yasuj University of Medical Sciences. Methods: All 60 students of medicine in Yasuj University of Medical Sciences who enrolled in English for specific purposes 1st Feb 2013 took part in this quasi experimental study and were divided into two groups of thirties, according to the enrollment list. Cooperative learning was implemented with the experimental group dividing them into groups of five randomly, while the control group was taught with traditional method. Phonetic transcriptions were used along with passages taken from their book for the two groups. The data collected from three reading aloud tasks, scores of pretest, and midterm and final written examinations were analyzed using SPSS software, version19. Results: The results of the study showed that the experimental group outperformed the control group significantly (P<0.05 in all areas of reading aloud tests, pronunciation, and comprehension. Conclusion: It is concluded that cooperative learning significantly improves medical students’ pronunciation and comprehension. Teaching pronunciation and comprehension through cooperative learning yields better learning results for university students.

  5. An enhanced dynamic ID-based authentication scheme for telecare medical information systems

    Directory of Open Access Journals (Sweden)

    Ankita Chaturvedi

    2017-01-01

    Full Text Available The authentication schemes for telecare medical information systems (TMIS try to ensure secure and authorized access. ID-based authentication schemes address secure communication, but privacy is not properly addressed. In recent times, dynamic ID-based remote user authentication schemes for TMIS have been presented to protect user’s privacy. The dynamic ID-based authentication schemes efficiently protect the user’s privacy. Unfortunately, most of the existing dynamic ID-based authentication schemes for TMIS ignore the input verifying condition. This makes login and password change phases inefficient. Inefficiency of the password change phase may lead to denial of service attack in the case of incorrect input in the password change phase. To overcome these weaknesses, we proposed a new dynamic ID-based authentication scheme using a smart card. The proposed scheme can quickly detect incorrect inputs which makes the login and password change phase efficient. We adopt the approach with the aim to protect privacy, and efficient login and password change phases. The proposed scheme also resists off-line password guessing attack and denial of service attack. We also demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham logic. In addition, our scheme is comparable in terms of the communication and computational overheads with relevant schemes for TMIS.

  6. Cooperative Communications for Wireless Information Assurance: Secure Cooperative Communications and Testbed Development

    National Research Council Canada - National Science Library

    Li, Xiaohua

    2007-01-01

    ..., and have invented a new cooperative OFDM transmission scheme to combat transmission asynchronism. They are helpful to the development of future physical-layer wireless information assurance techniques as well as the cooperative communication techniques...

  7. On hybrid cooperation in underlay cognitive radio networks

    KAUST Repository

    Mahmood, Nurul Huda

    2013-09-01

    Cooperative communication is a promising strategy to enhance the performance of a communication network as it helps to improve the coverage area and the outage performance. However, such enhancement comes at the expense of increased resource utilization, which is undesirable; more so in the case of opportunistic wireless systems such as cognitive radio networks. In order to balance the performance gains from cooperative communication against the possible over-utilization of resources, we propose and analyze an adaptive-cooperation technique for underlay cognitive radio networks, termed as hybrid-cooperation. Under the proposed cooperation scheme, secondary users in a cognitive radio network cooperate adaptively to enhance the spectral efficiency and the error performance of the network. The bit error rate, the spectral efficiency and the outage performance of the network under the proposed hybrid cooperation scheme with amplify-and-forward relaying are analyzed in this paper, and compared against conventional cooperation technique. Findings of the analytical performance analyses are further validated numerically through selected computer-based Monte-Carlo simulations. The proposed scheme is found to achieve significantly better performance in terms of the spectral efficiency and the bit error rate, compared to the conventional amplify-and-forward cooperation scheme. © 2013 IEEE.

  8. Cooperative Handover Management in Dense Cellular Networks

    KAUST Repository

    Arshad, Rabe; Elsawy, Hesham; Sorour, Sameh; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    Network densification has always been an important factor to cope with the ever increasing capacity demand. Deploying more base stations (BSs) improves the spatial frequency utilization, which increases the network capacity. However, such improvement comes at the expense of shrinking the BSs' footprints, which increases the handover (HO) rate and may diminish the foreseen capacity gains. In this paper, we propose a cooperative HO management scheme to mitigate the HO effect on throughput gains achieved via cellular network densification. The proposed HO scheme relies on skipping HO to the nearest BS at some instances along the user's trajectory while enabling cooperative BS service during HO execution at other instances. To this end, we develop a mathematical model, via stochastic geometry, to quantify the performance of the proposed HO scheme in terms of coverage probability and user throughput. The results show that the proposed cooperative HO scheme outperforms the always best connected based association at high mobility. Also, the value of BS cooperation along with handover skipping is quantified with respect to the HO skipping only that has recently appeared in the literature. Particularly, the proposed cooperative HO scheme shows throughput gains of 12% to 27% and 17% on average, when compared to the always best connected and HO skipping only schemes at user velocity ranging from 80 km/h to 160 Km/h, respectively.

  9. Cooperative Handover Management in Dense Cellular Networks

    KAUST Repository

    Arshad, Rabe

    2017-02-07

    Network densification has always been an important factor to cope with the ever increasing capacity demand. Deploying more base stations (BSs) improves the spatial frequency utilization, which increases the network capacity. However, such improvement comes at the expense of shrinking the BSs\\' footprints, which increases the handover (HO) rate and may diminish the foreseen capacity gains. In this paper, we propose a cooperative HO management scheme to mitigate the HO effect on throughput gains achieved via cellular network densification. The proposed HO scheme relies on skipping HO to the nearest BS at some instances along the user\\'s trajectory while enabling cooperative BS service during HO execution at other instances. To this end, we develop a mathematical model, via stochastic geometry, to quantify the performance of the proposed HO scheme in terms of coverage probability and user throughput. The results show that the proposed cooperative HO scheme outperforms the always best connected based association at high mobility. Also, the value of BS cooperation along with handover skipping is quantified with respect to the HO skipping only that has recently appeared in the literature. Particularly, the proposed cooperative HO scheme shows throughput gains of 12% to 27% and 17% on average, when compared to the always best connected and HO skipping only schemes at user velocity ranging from 80 km/h to 160 Km/h, respectively.

  10. Cooperative learning in the first year of undergraduate medical education

    Directory of Open Access Journals (Sweden)

    Kanthan Rani

    2007-11-01

    Full Text Available Abstract Background Despite extensive research data indicating that cooperative learning promotes higher achievement, the creation of positive relationships, and greater psychological health for students at all levels in their education, cooperative learning as a teaching strategy is still underutilized in undergraduate medical education. Methods A cooperative learning task was introduced as part of the mandatory first Year undergraduate Pathology course. The task was to create an 8.5" × 11" poster summary of pre-assigned content in self-chosen groups of four or five students. On the designated "Poster Day," the posters were displayed and evaluated by the students using a group product evaluation. Students also completed an individual group process reflection survey. An objective evaluation of their understanding was gauged at the midterm examination by specific content-related questions. Results Majority (91–96% of students judged the group products to be relevant, effective, easy-to-understand, and clearly communicated. The majority of the students (90–100% agreed that their group process skills of time management, task collaboration, decision-making and task execution were effective in completing this exercise. This activity created a dynamic learning environment as was reflected in the students' positive, professional discussion, and evaluation of their posters. The content-related questions on the midterm examination were answered correctly by 70–92% of the students. This was a mutually enriching experience for the instructor and students. Conclusion These findings demonstrate that cooperative learning as a teaching strategy can be effectively incorporated to address both content and interpersonal skill development in the early years of undergraduate medical education.

  11. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  12. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.

    Science.gov (United States)

    Li, Chun-Ta; Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming

    2017-06-23

    In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.

  13. Decentralized cooperative spectrum sensing for ad-hoc disaster relief network clusters

    DEFF Research Database (Denmark)

    Pratas, Nuno; Marchetti, Nicola; Prasad, Neeli R.

    2010-01-01

    cooperative schemes becomes essential. A cluster based decentralized orchestration cooperative sensing scheme is proposed, where each node in the cluster decides which spectrum it should monitor, according to the past sensing decisions of all the cluster nodes. The proposed scheme performance is evaluated...... through a framework, which allows gauging the accuracy of multi narrow-band spectrum sensing cooperative schemes as well as to gauge the error in the estimation of each of the channels un-occupancy. Through that evaluation it is shown that the proposed decentralized scheme performance reaches...... the performance of the correspondent centralized scheme while outperforming the Round Robin scheme....

  14. Medical insurance policy organized by Chinese government and the health inequity of the elderly: longitudinal comparison based on effect of New Cooperative Medical Scheme on health of rural elderly in 22 provinces and cities.

    Science.gov (United States)

    Liang, Ying; Lu, Peiyi

    2014-05-13

    The alarming progression of the aging trend in China attracts much attention in the country and abroad. In 2003, the Chinese central government launched the New Cooperative Medical Scheme (NCMS) to resolve the inequity problem of health in regions with inadequate infrastructure and relative poverty. The rural elderly are the main beneficiaries of this policy; the improvement of their health through the medical insurance policy require exploration. This study used data obtained from the Chinese Longitudinal Healthy Longevity Survey (CLHLS) conducted in 2005 and 2008. Elderly people living in rural areas and aged 60 and above were screened for the investigation. A total of 8658 and 9904 elderly people were selected from 2005 and 2008, respectively. By establishing models and employing multi-logistic analysis, stereotype logistic analysis, we examined the effect of NCMS organized by Chinese government on three domains of the health of the rural elderly. A total of 948 and 6361 elderly people participated in NCMS in 2005 (n = 8658) and 2008 (n = 9904), respectively. With regard to the independent variables, the number of participants in NCMS increased, whereas province distribution, gender, and years of education only slightly changed. As for the dependent variables, the rural elderly in 2005 had poor general health but good psychological health. Differences were found between different moods. Old people who engage in much outdoor activity can take care of themselves. After three-year promotion of NCMS, the differences between 2005 and 2008 indicate that the physical function of the rural elderly worsen, whereas the general health and psychological health improves. (1) In the 2005 data and 2008 data, result shows that NCMS participation can promote the self-rated quality and health change of the elderly. (2) After three years, the alleviation effect on anxiety and loneliness changed from insignificant to significant. Participants in NCMS have a stronger sense of

  15. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  16. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered...... to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  17. An integrated control scheme for space robot after capturing non-cooperative target

    Science.gov (United States)

    Wang, Mingming; Luo, Jianjun; Yuan, Jianping; Walter, Ulrich

    2018-06-01

    How to identify the mass properties and eliminate the unknown angular momentum of space robotic system after capturing a non-cooperative target is of great challenge. This paper focuses on designing an integrated control framework which includes detumbling strategy, coordination control and parameter identification. Firstly, inverted and forward chain approaches are synthesized for space robot to obtain dynamic equation in operational space. Secondly, a detumbling strategy is introduced using elementary functions with normalized time, while the imposed end-effector constraints are considered. Next, a coordination control scheme for stabilizing both base and end-effector based on impedance control is implemented with the target's parameter uncertainty. With the measurements of the forces and torques exerted on the target, its mass properties are estimated during the detumbling process accordingly. Simulation results are presented using a 7 degree-of-freedom kinematically redundant space manipulator, which verifies the performance and effectiveness of the proposed method.

  18. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System

    Science.gov (United States)

    Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming

    2017-01-01

    In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients’ physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu–Chung’s scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP. PMID:28644381

  19. The Function Analysis of Informationization in New Rural Cooperatives Medical Service Management

    Science.gov (United States)

    Zhou, Yuefeng; Liu, Min

    The establishment of new rural cooperative medical system is an important action for comprehensive affluent society. It is an important measure for Central Party Committee and State Council to solve "three rural" issue effectively and to overall urban and rural, regional, coordinated economic and social development, building a well-off society in the new situation. It has important role to alleviate farmers to see a doctor expensively, see a doctor difficultly, reduce the burden on farmers and improve their level of health protection and quality of life, solve the problem of poor because of illness and the problem of returning poor due to illness, promote the production and rural economic development and stability in the rural areas. This article will analyze the function of informationization in new rural cooperative medical service management selectively.

  20. A novel authentication scheme using self-certified public keys for telecare medical information systems.

    Science.gov (United States)

    Guo, Dianli; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2015-06-01

    Telecare medical information systems (TMIS), with the explosive growth of communication technology and physiological monitoring devices, are applied increasingly to enable and support healthcare delivery services. In order to safeguard patients' privacy and tackle the illegal access, authentication schemes for TMIS have been investigated and designed by many researchers. Many of them are promising for adoption in practice, nevertheless, they still have security flaws. In this paper, we propose a novel remote authentication scheme for TMIS using self-certified public keys, which is formally secure in the ID-mBJM model. Besides, the proposed scheme has better computational efficiency. Compared to the related schemes, our protocol is more practical for telemedicine system.

  1. The effects of HIV/AIDS on medical schemes in South Africa | Da ...

    African Journals Online (AJOL)

    ... not necessarily representative of the medical-scheme population. The intention is therefore to develop a methodology for producing indicative results to inform management decisions. The opportunity to lower costs related to HIV/AIDS through proactive risk management is investigated. South African Actuarial Journal Vol.

  2. The scheme and implementing of workstation configuration for medical imaging information system

    International Nuclear Information System (INIS)

    Tao Yonghao; Miao Jingtao

    2002-01-01

    Objective: To discuss the scheme and implementing for workstation configuration of medical imaging information system which would be adapted to the practice situation of China. Methods: The workstations were logically divided into PACS workstations and RIS workstations, the former applied to three kinds of diagnostic practice: the small matrix images, large matrix images, and high resolution gray scale display application, and the latter consisted of many different models which depended upon the usage and function process. Results: A dual screen configuration for image diagnostic workstation integrated the image viewing and reporting procedure physically, while the small matrix images as CT or MR were operated on 17 in (1 in = 2.54 cm) color monitors, the conventional X-ray diagnostic procedure was implemented based on 21 in color monitors or portrait format gray scale 2 K by 2.5 K monitors. All other RIS workstations not involved in image process were set up with a common PC configuration. Conclusion: The essential principle for designing a workstation scheme of medical imaging information system should satisfy the basic requirements of medical image diagnosis and fit into the available investment situation

  3. The European Federation of Organisations for Medical Physics Policy Statement No. 10.1: Recommended Guidelines on National Schemes for Continuing Professional Development of Medical Physicists.

    Science.gov (United States)

    Christofides, Stelios; Isidoro, Jorge; Pesznyak, Csilla; Cremers, Florian; Figueira, Rita; van Swol, Christiaan; Evans, Stephen; Torresin, Alberto

    2016-01-01

    Continuing Professional Development (CPD) is vital to the medical physics profession if it is to embrace the pace of change occurring in medical practice. As CPD is the planned acquisition of knowledge, experience and skills required for professional practice throughout one's working life it promotes excellence and protects the profession and public against incompetence. Furthermore, CPD is a recommended prerequisite of registration schemes (Caruana et al. 2014) and is implied in the Council Directive 2013/59/EURATOM (EU BSS) and the International Basic Safety Standards (BSS). It is to be noted that currently not all national registration schemes require CPD to maintain the registration status necessary to practise medical physics. Such schemes should consider adopting CPD as a prerequisite for renewing registration after a set period of time. This EFOMP Policy Statement, which is an amalgamation and an update of the EFOMP Policy Statements No. 8 and No. 10, presents guidelines for the establishment of national schemes for CPD and activities that should be considered for CPD. Copyright © 2016. Published by Elsevier Ltd.

  4. Co-operation of medical and chemical services to provide radiation safety in special zone during Chernobyl' accident response

    International Nuclear Information System (INIS)

    Terent'ev, V.I.

    1990-01-01

    Cooperation of medical and chemical services of the operation group in the special zone during intensive decontamination of the site and neighboring herritories at the Chernobyl NPP are considered. Responsibilities of medical and chemical services, their relations with civie and millitary organizations within the ChNPP region and 30-km zone are reviewed. Cooperation of the services mentioned above consisted in information exchange aimed at overall comprehension of the situation, cooperative activities in the commision and at elaboration of recommendations with an account of radiation safety measures

  5. [The regional cooperation of medical services and a nutritional support team].

    Science.gov (United States)

    Maruyama, Michio

    2006-12-01

    "Community NST" is a new concept, which means a cooperation system with the hospital NST and a regional medical service. "Community NST" provides home nutritional care for the patients with nutritional problems. The function of the hospital NST for inpatients has been established in recent years. Now the patients need a continuous nutritional care not only in the hospital but at home. Percutaneous endoscopic gastrostomy (PEG) has been performed on the base of cooperation with the hospital and home care. This PEG system is one of the functions of "Community NST". The author showed several measures of "Community NST", which have been tried in the hospital.

  6. Cooperation project: medical physics in cancer diagnosis and therapy in Bangladesh

    International Nuclear Information System (INIS)

    Quast, Ulrich; Zakaria, Golam Abu; Hoever, Karl-Heinz; Ahmad, Gias uddin; Akhter, Shaheen

    1999-01-01

    Bangladesh requires 200 radiotherapy facilities, 4 are in use; 400 medical physicists are needed, 3 are employed. On a private basis, a DGMP working group started in 1996, annual workshops on medical physics in cancer diagnosis and treatment, joined by many working physicists interested to become medical physicists. Basic topics were the principles, applications, acceptance, dosimetry and planning of 60 Co radiotherapy. In 1998, the Bangladesh association of physicists in medicine (BMPA) was founded, a young scientific society requiring international co-operation. The long experience in Medical Physics in India, its neighbouring country, could be very helpful in providing excellent medical physics courses. To absorb new technology and science, it is necessary to change the education policy; creativity and innovativeness must be valued more than the old knowledge, being replaced quickly by new knowledge and new technologies. (author)

  7. Towards Reliable and Energy-Efficient Incremental Cooperative Communication for Wireless Body Area Networks.

    Science.gov (United States)

    Yousaf, Sidrah; Javaid, Nadeem; Qasim, Umar; Alrajeh, Nabil; Khan, Zahoor Ali; Ahmed, Mansoor

    2016-02-24

    In this study, we analyse incremental cooperative communication for wireless body area networks (WBANs) with different numbers of relays. Energy efficiency (EE) and the packet error rate (PER) are investigated for different schemes. We propose a new cooperative communication scheme with three-stage relaying and compare it to existing schemes. Our proposed scheme provides reliable communication with less PER at the cost of surplus energy consumption. Analytical expressions for the EE of the proposed three-stage cooperative communication scheme are also derived, taking into account the effect of PER. Later on, the proposed three-stage incremental cooperation is implemented in a network layer protocol; enhanced incremental cooperative critical data transmission in emergencies for static WBANs (EInCo-CEStat). Extensive simulations are conducted to validate the proposed scheme. Results of incremental relay-based cooperative communication protocols are compared to two existing cooperative routing protocols: cooperative critical data transmission in emergencies for static WBANs (Co-CEStat) and InCo-CEStat. It is observed from the simulation results that incremental relay-based cooperation is more energy efficient than the existing conventional cooperation protocol, Co-CEStat. The results also reveal that EInCo-CEStat proves to be more reliable with less PER and higher throughput than both of the counterpart protocols. However, InCo-CEStat has less throughput with a greater stability period and network lifetime. Due to the availability of more redundant links, EInCo-CEStat achieves a reduced packet drop rate at the cost of increased energy consumption.

  8. [Cooperation, Job Satisfaction and Burn Out - Sustainability in Outpatient Mental Health Care among Medical Specialists in Germany].

    Science.gov (United States)

    Baumgardt, Johanna; Moock, Jörn; Rössler, Wulf; Kawohl, Wolfram

    2017-04-01

    Objective Cooperation, job satisfaction, and burn out risk are indicators of sustainability in mental health services. Thus they were assessed among registered medical specialists in outpatient mental health care in Germany. Method A postal survey consisting of three questionnaires about cooperation, job satisfaction, and burnout was carried out among all registered medical specialists in outpatient mental health care in Germany (n = 4,430). Results 14.1 % (n = 626) of the specialists responded to the survey. Quality and quantity of cooperation regarding mental health care services were rated diverse, job satisfaction was assessed medium to high, and burnout risk was low to medium. Higher job satisfaction correlated with good quality of cooperation, fewer years of practice, fewer patients' chronically ill, more patients who as well seek psychotherapy, and less time spent on cooperation. Low burn out risk correlated with good quality of cooperation, higher age, single practice setting and a higher amount of patients who as well seek psychotherapy. Conclusion Quality and quantity of cooperation in outpatient mental health care - especially regarding community mental health care institutions - should be fostered. Aspects to be considered to reinforce job satisfaction and minimize burn out risk are age, years of practice, quality and quantity of cooperation, practice setting, and the mixture of patients. © Georg Thieme Verlag KG Stuttgart · New York.

  9. Multi-Source Cooperative Data Collection with a Mobile Sink for the Wireless Sensor Network.

    Science.gov (United States)

    Han, Changcai; Yang, Jinsheng

    2017-10-30

    The multi-source cooperation integrating distributed low-density parity-check codes is investigated to jointly collect data from multiple sensor nodes to the mobile sink in the wireless sensor network. The one-round and two-round cooperative data collection schemes are proposed according to the moving trajectories of the sink node. Specifically, two sparse cooperation models are firstly formed based on geographical locations of sensor source nodes, the impairment of inter-node wireless channels and moving trajectories of the mobile sink. Then, distributed low-density parity-check codes are devised to match the directed graphs and cooperation matrices related with the cooperation models. In the proposed schemes, each source node has quite low complexity attributed to the sparse cooperation and the distributed processing. Simulation results reveal that the proposed cooperative data collection schemes obtain significant bit error rate performance and the two-round cooperation exhibits better performance compared with the one-round scheme. The performance can be further improved when more source nodes participate in the sparse cooperation. For the two-round data collection schemes, the performance is evaluated for the wireless sensor networks with different moving trajectories and the variant data sizes.

  10. System Capacity Limits Introduced by Data Fusion on Cooperative Spectrum Sensing under Correlated Environments

    DEFF Research Database (Denmark)

    Pratas, Nuno; Marchetti, Nicola; Prasad, Neeli R.

    2010-01-01

    on cooperative sensing schemes. The analysis is supported by evaluation metrics which accounts for the perceived capacity limits. The analysis is performed along the data fusion chain, comparing several scenarios encompassing different degrees of environment correlation between the cluster nodes, number......Spectrum sensing, the cornerstone of the Cognitive Radio paradigm, has been the focus of intensive research, from which the main conclusion was that its performance can be greatly enhanced through the use of cooperative sensing schemes. Nevertheless, if a proper design of the cooperative scheme...... is not followed, then the use of cooperative schemes will introduce some limitations in the network perceived capacity. In this paper, we analyze the performance of a cooperative spectrum sensing scheme based on Data Fusion, by measuring the perceived capacity limits introduced by the use of Data Fusion...

  11. KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks

    NARCIS (Netherlands)

    Gong, Zheng; Tang, Qiang; Law, Y.W.; Chen, Hongyang; Lai, X.; Yung, M.

    2010-01-01

    The constrained resources of sensors restrict the design of a key management scheme for wireless sensor networks (WSNs). In this work, we first formalize the security model of ALwEN, which is a gossip-based wireless medical sensor network (WMSN) for ambient assisted living. Our security model

  12. Reliability-Aware Cooperative Node Sleeping and Clustering in Duty-Cycled Sensors Networks

    Directory of Open Access Journals (Sweden)

    Jeungeun Song

    2018-01-01

    Full Text Available Duty-cycled sensor networks provide a new perspective for improvement of energy efficiency and reliability assurance of multi-hop cooperative sensor networks. In this paper, we consider the energy-efficient cooperative node sleeping and clustering problems in cooperative sensor networks where clusters of relay nodes jointly transmit sensory data to the next hop. Our key idea for guaranteeing reliability is to exploit the on-demand number of cooperative nodes, facilitating the prediction of personalized end-to-end (ETE reliability. Namely, a novel reliability-aware cooperative routing (RCR scheme is proposed to select k-cooperative nodes at every hop (RCR-selection. After selecting k cooperative nodes at every hop, all of the non-cooperative nodes will go into sleep status. In order to solve the cooperative node clustering problem, we propose the RCR-based optimal relay assignment and cooperative data delivery (RCR-delivery scheme to provide a low-communication-overhead data transmission and an optimal duty cycle for a given number of cooperative nodes when the network is dynamic, which enables part of cooperative nodes to switch into idle status for further energy saving. Through the extensive OPNET-based simulations, we show that the proposed scheme significantly outperforms the existing geographic routing schemes and beaconless geographic routings in wireless sensor networks with a highly dynamic wireless channel and controls energy consumption, while ETE reliability is effectively guaranteed.

  13. The REEME project: a cooperative model for sharing international medical education materials.

    Science.gov (United States)

    Iserson, Kenneth V

    2008-07-01

    Although the Internet has become an excellent source of medical education materials, in many specialties, including Emergency Medicine (EM), most of the information is in English. Few international EM practitioners can attend costly specialty conferences, importing foreign experts to teach at these conferences is costly and, even then, these experts are available for a limited time to relatively few people. Countries with minimal health care or medical education budgets find providing even basic materials for professional medical education difficult. An exciting international project now freely distributes Spanish language educational programs to health care professionals on topics relating to EM. The Recursos Educacionales en Español para Medicina de Emergencia (REEME; Educational Resources in Spanish for EM) Project (www.reeme.arizona.edu) was developed to overcome some of these problems by providing language-specific specialty information and widespread international availability, and by promoting international cooperation among professional health care educators. It also provides a ready source of Spanish medical vocabulary for those trying to learn the language. With computer support from the University of Arizona's Learning and Technology Center, REEME first went "live" on November 1, 2004. Three years later, as of November 1, 2007, the site had 575 programs from 411 donors representing 19 countries and the United Nations. There are currently about 645 downloads per month to users in 73 countries. The REEME Project demonstrates the power of the Internet as a means to achieve international cooperation in medical education, and can serve as a model for similar projects in other specialties and languages.

  14. Impact of alternative reimbursement strategies in the new cooperative medical scheme on caesarean delivery rates: a mixed-method study in rural China

    Directory of Open Access Journals (Sweden)

    Huang Kun

    2012-07-01

    Full Text Available Abstract Background The rate of caesarean delivery (CD in rural China has been rapidly increasing in recent decades. Due to the exorbitant costs associated with CD, paying for this expensive procedure is often a great challenge for the majority of rural families. Since 2003, the Chinese government has re-established the New Cooperative Medical Scheme (NCMS, aimed to improve the access of essential healthcare to rural residents and reduce financial burden owing to high out of pocket payments. This paper seeks to test the hypothesis that NCMS may provide service users and providers with financial incentives to select CD. It also assesses the effect of different health insurance reimbursement strategies of NCMS on CD rates in rural China. Methods Mixed quantitative and qualitative methods were adopted for data collection. Two cross-sectional household surveys were conducted with women having babies delivered in 2006 and 2009; 2326 and 1515 women, respectively, from the study sites were interviewed using structured questionnaires, to collect demographic and socio-economic data, maternal and child care characteristics and health-related expenditures. Focus group discussions (FGDs and in-depth key informant interviews (KIIs were undertaken with policy makers, health managers, providers and mothers to understand their perceptions of the influence of NCMS on the choices of delivery mode. Results The CD rates in the two study counties were 46.0 percent and 64.7 percent in 2006, increasing to 63.6 percent and 82.1 percent, respectively, in 2009. The study found that decisions on the selection of CD largely came from the pregnant women. Logistic regression analysis, after adjusting for socio-economic, maternal and fetal characteristics, did not indicate a significant effect of either proportional reimbursement or fixed amount reimbursement on the choice of CD for both study years. Interviews with stakeholders reflected that different reimbursable rates for

  15. Cooperative relay-based multicasting for energy and delay minimization

    KAUST Repository

    Atat, Rachad

    2012-08-01

    Relay-based multicasting for the purpose of cooperative content distribution is studied. Optimized relay selection is performed with the objective of minimizing the energy consumption or the content distribution delay within a cluster of cooperating mobiles. Two schemes are investigated. The first consists of the BS sending the data only to the relay, and the second scheme considers the scenario of threshold-based multicasting by the BS, where a relay is selected to transmit the data to the mobiles that were not able to receive the multicast data. Both schemes show significant superiority compared to the non-cooperative scenarios, in terms of energy consumption and delay reduction. © 2012 IEEE.

  16. Impact of the New Cooperative Medical Scheme on the trend of catastrophic health expenditure in Chinese rural households: results from nationally representative surveys from 2003 to 2013.

    Science.gov (United States)

    Xie, Biao; Huo, Minghe; Wang, Zhiqiang; Chen, Yongjie; Fu, Rong; Liu, Meina; Meng, Qun

    2018-02-08

    To evaluate the trend of catastrophic health expenses (CHE) for inpatient care in relation to the commencement of the New Cooperative Medical Scheme (NCMS) in rural China from 2003 to 2013, and the roles of NCMS in protecting affected households from CHE. We assessed the 10-year trend of the incidence and severity of CHE in rural households with hospitalised members using data from the Chinese National Health Services Survey. Generalised estimating equations were used to estimate the OR and 95% CI of the association between incidence rates of CHE ([Formula: see text]) and NCMS reimbursement. The incidence and severity of CHE after NCMS reimbursement both decreased and their changes increased rapidly from 2003 to 2013. After adjustment of the covariates, [Formula: see text] before reimbursement was significantly higher than that after reimbursement, and the OR (95% CI) was 1.50 (1.24 to 1.81), 1.79 (1.69 to 1.90) and 2.94 (2.77 to 3.11) in 2003, 2008 and 2013, respectively. The incidence and severity of CHE both reduced after NCMS reimbursements in each year. Excluding some confounding factors, [Formula: see text] was significantly associated with NCMS reimbursement. NCMS partly protected the rural households with hospitalised members from CHE. However, the inequalities between different income groups still existed. [Formula: see text] in rural households with hospitalised members was still rather high in 2003, 2008 and 2013 even though they were covered by NCMS. This study will provide suggestions for further reforms in China and guidance for other low-income/middle-income countries. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  17. A cavity-Cooper pair transistor scheme for investigating quantum optomechanics in the ultra-strong coupling regime

    International Nuclear Information System (INIS)

    Rimberg, A J; Blencowe, M P; Armour, A D; Nation, P D

    2014-01-01

    We propose a scheme involving a Cooper pair transistor (CPT) embedded in a superconducting microwave cavity, where the CPT serves as a charge tunable quantum inductor to facilitate ultra-strong coupling between photons in the cavity and a nano- to meso-scale mechanical resonator. The mechanical resonator is capacitively coupled to the CPT, such that mechanical displacements of the resonator cause a shift in the CPT inductance and hence the cavity's resonant frequency. The amplification provided by the CPT is sufficient for the zero point motion of the mechanical resonator alone to cause a significant change in the cavity resonance. Conversely, a single photon in the cavity causes a shift in the mechanical resonator position on the order of its zero point motion. As a result, the cavity-Cooper pair transistor coupled to a mechanical resonator will be able to access a regime in which single photons can affect single phonons and vice versa. Realizing this ultra-strong coupling regime will facilitate the creation of non-classical states of the mechanical resonator, as well as the means to accurately characterize such states by measuring the cavity photon field. (paper)

  18. Whether New Cooperative Mmedical Schemes reduce the economic burden of chronic disease in rural China.

    Science.gov (United States)

    Jing, Shanshan; Yin, Aitian; Shi, Lizheng; Liu, Jinan

    2013-01-01

    The New Cooperative Medical Scheme (NCMS) provides health insurance coverage for rural populations in China. This study aimed to evaluate changes in household catastrophic health expenditure (CHE) due to chronic disease before and after the reimbursement policies for services of chronic disease were implemented to provide additional financial support. The study used data from the household surveys conducted in Shandong Province and Ningxia Hui Autonomous Region in 2006 and 2008. The study sample in village-level units was divided into two groups: 36 villages which implemented the NCMS reimbursement policies for chronic diseases as the intervention group, and 72 villages which did not as the control group. Health care expenditure of more than 40% of household's non-food expenditure was defined as a household with CHE (i.e., impoverishment). The conceptual framework was established based on the Andersen socio-behavioral model of health care utilization to explore how the NCMS reimbursement policies impacted health expenditures. A difference-in-difference model was employed to compare the change in the proportion of households incurring CHE due to chronic disease between the two groups over time. The households that participated in the NCMS were less likely to become impoverished (P<0.05). In addition, the households with both male household head and higher income level were protective factors to prevent CHE (P<0.05). Young households with preschool children suffered less from CHE (P<0.05). The effect of the NCMS reimbursement policies for chronic disease on the CHE was negative, yet not statistically significant (p = 0.814). The NCMS coverage showed financial protection for households with chronic disease. However, the NCMS reimbursement policies should be strengthened in the future.

  19. On the security flaws in ID-based password authentication schemes for telecare medical information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-01-01

    Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.

  20. FRR: fair remote retrieval of outsourced private medical records in electronic health networks.

    Science.gov (United States)

    Wang, Huaqun; Wu, Qianhong; Qin, Bo; Domingo-Ferrer, Josep

    2014-08-01

    Cloud computing is emerging as the next-generation IT architecture. However, cloud computing also raises security and privacy concerns since the users have no physical control over the outsourced data. This paper focuses on fairly retrieving encrypted private medical records outsourced to remote untrusted cloud servers in the case of medical accidents and disputes. Our goal is to enable an independent committee to fairly recover the original private medical records so that medical investigation can be carried out in a convincing way. We achieve this goal with a fair remote retrieval (FRR) model in which either t investigation committee members cooperatively retrieve the original medical data or none of them can get any information on the medical records. We realize the first FRR scheme by exploiting fair multi-member key exchange and homomorphic privately verifiable tags. Based on the standard computational Diffie-Hellman (CDH) assumption, our scheme is provably secure in the random oracle model (ROM). A detailed performance analysis and experimental results show that our scheme is efficient in terms of communication and computation. Copyright © 2014 Elsevier Inc. All rights reserved.

  1. Visit to general practitioners as a proxy for accessing chronic benefits by members of medical schemes, South Africa

    Directory of Open Access Journals (Sweden)

    Mncedisi M. Willie

    2012-10-01

    Full Text Available Background: Prescribed Minimum Benefits is a list of conditions that all medical schemes need to cover in full, and includes a select of chronic conditions. Chronic conditions affect people’s lifestyles and require ongoing management over a period of years for long-term survival. Objectives: This study examined the association between prevalence of selected chronic diseases and health service use, in particular visits to general practitioners (GPs by medical scheme members. Method: This was a retrospective study on medical schemes data. The median imputation method was employed to deal with missing and unreported chronic diseases prevalence. Multivariate logistic regression analysis was employed to assess effects of chronic disease prevalence, age stratum and scheme size on GP visits per annum. Results: The study showed that prevalence of asthma was significantly associated with more than three GP visits (OR = 1.081; 95% CI = 1.008–1.159, as was prevalence of type 2 diabetes (OR = 1.087; 95% CI = 1.027–1.152, whilst prevalence of hyperlipidaemia (OR = 0.92; 95% CI = 0.875–0.97 was more likely to be associated with less than three GP visits. Prevalence of hypertension was associated with more than three GP visits per year (OR = 1.132; 95% CI = 1.017–1.26. Conclusion: This study shows that scheme size, prevalence of chronic diseases such as asthma, type 2 diabetes, hyperlipidaemia and hypertension are related to GP visits. GPs and managed care programmes employed by schemes should give special attention to certain disease states with high prevalence rates in an effort to better manage them.

  2. Nordic Energy Policy Cooperation

    DEFF Research Database (Denmark)

    Jørgensen, Birte Holst

    2016-01-01

    Brundtland Commission Report, and climate change became a common concern. Energy technology cooperation was an integral part of Nordic energy policy cooperation from the very beginning. The Nordic Energy Research Programme was established with funding from each of the Nordic countries, and was earmarked...... by a committee of senior officials and a secretariat. This was characterised by an incremental development of the cooperation based on consensus, mutual understanding and trust facilitated through exchange of experiences, work groups, seminars, educational activities and mobility schemes for energy policy...

  3. A Trust-Based Model for Security Cooperating in Vehicular Cloud Computing

    Directory of Open Access Journals (Sweden)

    Zhipeng Tang

    2016-01-01

    Full Text Available VCC is a computing paradigm which consists of vehicles cooperating with each other to realize a lot of practical applications, such as delivering packages. Security cooperation is a fundamental research topic in Vehicular Cloud Computing (VCC. Because of the existence of malicious vehicles, the security cooperation has become a challenging issue in VCC. In this paper, a trust-based model for security cooperating, named DBTEC, is proposed to promote vehicles’ security cooperation in VCC. DBTEC combines the indirect trust estimation in Public board and the direct trust estimation in Private board to compute the trust value of vehicles when choosing cooperative partners; a trustworthy cooperation path generating scheme is proposed to ensure the safety of cooperation and increase the cooperation completion rates in VCC. Extensive experiments show that our scheme improves the overall cooperation completion rates by 6~7%.

  4. Relay Selection for Cooperative Relaying in Wireless Energy Harvesting Networks

    Science.gov (United States)

    Zhu, Kaiyan; Wang, Fei; Li, Songsong; Jiang, Fengjiao; Cao, Lijie

    2018-01-01

    Energy harvesting from the surroundings is a promising solution to provide energy supply and extend the life of wireless sensor networks. Recently, energy harvesting has been shown as an attractive solution to prolong the operation of cooperative networks. In this paper, we propose a relay selection scheme to optimize the amplify-and-forward (AF) cooperative transmission in wireless energy harvesting cooperative networks. The harvesting energy and channel conditions are considered to select the optimal relay as cooperative relay to minimize the outage probability of the system. Simulation results show that our proposed relay selection scheme achieves better outage performance than other strategies.

  5. Whether New Cooperative Mmedical Schemes reduce the economic burden of chronic disease in rural China.

    Directory of Open Access Journals (Sweden)

    Shanshan Jing

    Full Text Available BACKGROUND: The New Cooperative Medical Scheme (NCMS provides health insurance coverage for rural populations in China. This study aimed to evaluate changes in household catastrophic health expenditure (CHE due to chronic disease before and after the reimbursement policies for services of chronic disease were implemented to provide additional financial support. METHODS: The study used data from the household surveys conducted in Shandong Province and Ningxia Hui Autonomous Region in 2006 and 2008. The study sample in village-level units was divided into two groups: 36 villages which implemented the NCMS reimbursement policies for chronic diseases as the intervention group, and 72 villages which did not as the control group. Health care expenditure of more than 40% of household's non-food expenditure was defined as a household with CHE (i.e., impoverishment. The conceptual framework was established based on the Andersen socio-behavioral model of health care utilization to explore how the NCMS reimbursement policies impacted health expenditures. A difference-in-difference model was employed to compare the change in the proportion of households incurring CHE due to chronic disease between the two groups over time. RESULTS: The households that participated in the NCMS were less likely to become impoverished (P<0.05. In addition, the households with both male household head and higher income level were protective factors to prevent CHE (P<0.05. Young households with preschool children suffered less from CHE (P<0.05. The effect of the NCMS reimbursement policies for chronic disease on the CHE was negative, yet not statistically significant (p = 0.814. CONCLUSIONS: The NCMS coverage showed financial protection for households with chronic disease. However, the NCMS reimbursement policies should be strengthened in the future.

  6. An evaluation of China's new rural cooperative medical system: achievements and inadequacies from policy goals.

    Science.gov (United States)

    Li, Chengyue; Hou, Yilin; Sun, Mei; Lu, Jun; Wang, Ying; Li, Xiaohong; Chang, Fengshui; Hao, Mo

    2015-10-23

    Although much public scrutiny and academic attention has focused on the evaluations of system implementation since the beginning of New Rural Cooperative Medical System (NRCMS) in China, few studies have systematically evaluated the achievements of the stated policy goals. The purpose of this study is to examine to what extent the policy goals of NRCMS have been achieved. Using multistage sampling processes, two rounds of cross-sectional household surveys including 9787 and 7921 rural households were conducted in Eastern China in year 2000 and year 2008, respectively. A pre- and post-implementation comparison was used to evaluate the achievement of policy goals in three measures: impoverishment from major health hazards, household financial risk from medical expenses, and rural income inequity. Intention surveys were also applied to find out potential obstacles in the implementation of NRCMS. The rate of re-impoverishment from health hazard was reduced from 2.69 % ex ante to 2.12 % ex post, a decrease of 21.13 %. The severity of impoverishment fell from a previous 4.66 % to 3.02 %, a decline of 35.18 %. Economic risk of medical treatment population relative to the whole population fell from 2.62 ex ante to 2.03 ex post, a 22.52 % reduction. As indication of effect on improving income equity, the Gini coefficient fell from 0.4629 to 0.4541. The effects of NRCMS were significantly better than those of RCMS. Despite the preliminary achievements, our intention survey of key respondents identified that technical difficulties in actuarial funding and more sustainable reimbursement schedules has become the most challenging barriers in achieving the goals of NRCMS, while raising the insurance premium on NRCMS was no longer as big a barrier. With NRCMS, China has established a medical security system to reduce the financial burden of healthcare on rural residents. NRCMS has achieved some positive though limited effects; but technical difficulties in the implementation of

  7. A Precoded OFDMA System with User Cooperation

    NARCIS (Netherlands)

    Yu, Yao; Yatawatta, Sarod; Petropulu, Athina P.

    2010-01-01

    A new cooperative scheme for a two-user orthogonal frequency division multiple access (OFDMA) uplink communication scenario is proposed. Each user is equipped with one transmit/receive antenna. Before transmission, inter-block linear precoding is introduced to pairs of blocks. The cooperative

  8. A robust cooperative spectrum sensing scheme based on Dempster-Shafer theory and trustworthiness degree calculation in cognitive radio networks

    Science.gov (United States)

    Wang, Jinlong; Feng, Shuo; Wu, Qihui; Zheng, Xueqiang; Xu, Yuhua; Ding, Guoru

    2014-12-01

    Cognitive radio (CR) is a promising technology that brings about remarkable improvement in spectrum utilization. To tackle the hidden terminal problem, cooperative spectrum sensing (CSS) which benefits from the spatial diversity has been studied extensively. Since CSS is vulnerable to the attacks initiated by malicious secondary users (SUs), several secure CSS schemes based on Dempster-Shafer theory have been proposed. However, the existing works only utilize the current difference of SUs, such as the difference in SNR or similarity degree, to evaluate the trustworthiness of each SU. As the current difference is only one-sided and sometimes inaccurate, the statistical information contained in each SU's historical behavior should not be overlooked. In this article, we propose a robust CSS scheme based on Dempster-Shafer theory and trustworthiness degree calculation. It is carried out in four successive steps, which are basic probability assignment (BPA), trustworthiness degree calculation, selection and adjustment of BPA, and combination by Dempster-Shafer rule, respectively. Our proposed scheme evaluates the trustworthiness degree of SUs from both current difference aspect and historical behavior aspect and exploits Dempster-Shafer theory's potential to establish a `soft update' approach for the reputation value maintenance. It can not only differentiate malicious SUs from honest ones based on their historical behaviors but also reserve the current difference for each SU to achieve a better real-time performance. Abundant simulation results have validated that the proposed scheme outperforms the existing ones under the impact of different attack patterns and different number of malicious SUs.

  9. The international cooperation for sustainable development

    International Nuclear Information System (INIS)

    Ruiz, Francisco; Soto, David

    1998-02-01

    This article notices the importance of the environmental issue for the international cooperation and the legislative progress about it in Colombia. Also, it study the changes in the cooperation system, from one based in quotas to other based in the demand, and the adjustments required in developing countries to adapt to the new scheme

  10. Effect of the new rural cooperative medical system on farmers' medical service needs and utilization in Ningbo, China.

    Science.gov (United States)

    Chen, Jianhua; Yu, Hai; Dong, Hengjin

    2016-10-20

    Many countries are developing health mechanisms to pursue the goal of universal coverage. In China, a rural health insurance system entitled New Cooperative Medical System (NCMS) has being developed since 2003. This paper aims to explore the changes in the health service needs and utilization among rural residents in Ningbo, China after the implementation of the new rural cooperative medical system (NCMS), and provide evidence to further improve the strategies of NCMS in China. Stratified multistage cluster sampling was used to randomly select 10 villages from 5 townships in Yuyao and Fenghua counties of Ningbo Municipality. Eighty families were selected from each village, and face-to-face interviews were conducted by trained investigators to collect data using questionnaires. The two-week visiting rate and prevalence of chronic diseases among the farmers included in the study was 25.40 and 22.50 %, respectively, which were higher than the levels in 2003 and 2008. The rate of not visiting the healthcare facility amongst those with illness, and the rate of non- hospitalization amongst those who required it were 32.36 and 0.60 %, respectively, which was lower than the levels in 2003 and 2008. Most of the outpatient visits were to the village clinics, while the hospitalizations were mainly to county hospitals. NCMS greatly affected the utilization of healthcare services from outpatient clinics and improved the hospitalization rate in county hospitals. Financial difficulties are not the major causes of non-hospitalization and non-visiting any longer. These findings suggest that the NCMS policies alleviated the medical burdens of farmers in a certain degree.

  11. Secure Cooperative Spectrum Sensing via a Novel User-Classification Scheme in Cognitive Radios for Future Communication Technologies

    Directory of Open Access Journals (Sweden)

    Muhammad Usman

    2015-05-01

    Full Text Available Future communication networks would be required to deliver data on a far greater scale than is known to us today, thus mandating the maximal utilization of the available radio spectrum using cognitive radios. In this paper, we have proposed a novel cooperative spectrum sensing approach for cognitive radios. In cooperative spectrum sensing, the fusion center relies on reports of the cognitive users to make a global decision. The global decision is obtained by assigning weights to the reports received from cognitive users. Computation of such weights requires prior information of the probability of detection and the probability of false alarms, which are not readily available in real scenarios. Further, the cognitive users are divided into reliable and unreliable categories based on their weighted energy by using some empirical threshold. In this paper, we propose a method to classify the cognitive users into reliable, neutral and unreliable categories without using any pre-defined or empirically-obtained threshold. Moreover, the computation of weights does not require the detection, or false alarm probabilities, or an estimate of these probabilities. Reliable cognitive users are assigned the highest weights; neutral cognitive users are assigned medium weights (less than the reliable and higher than the unreliable cognitive users’ weights; and unreliable users are assigned the least weights. We show the performance improvement of our proposed method through simulations by comparing it with the conventional cooperative spectrum sensing scheme through different metrics, like receiver operating characteristic (ROC curve and mean square error. For clarity, we also show the effect of malicious users on detection probability and false alarm probability individually through simulations.

  12. Economic burden of gastrointestinal cancer under the protection of the New Rural Cooperative Medical Scheme in a region of rural China with high incidence of oesophageal cancer: cross-sectional survey.

    Science.gov (United States)

    Li, Xiang; Cai, Hong; Wang, Chaoyi; Guo, Chuanhai; He, Zhonghu; Ke, Yang

    2016-07-01

    To evaluate the financial burden of oesophageal cancer under the protection of the new Rural Cooperative Medical Scheme (NCMS) and to provide evidence and suggestions to policymakers in a high-incidence region in China. We analysed inpatient claim data for oesophageal cancer, gastric cancer and colorectal cancer from 1 January to 31 December 2013. The data were extracted from the NCMS management system of Hua County, Henan Province, a typical high-risk region for oesophageal cancer in China. Cancer-specific health economic indicators were calculated to evaluate the financial burden under the protection of the local NCMS. The total cost of oesophageal cancer was 2.7-3.6 times higher than that of gastric cancer and colorectal cancer, respectively, due to high incidence of oesophageal cancer. For each hospitalisation to treat oesophageal cancer, the average total cost and out-of-pocket expenses after reimbursement equalled an entire year's gross domestic product per capita and per capita disposable income, respectively, for the local area. The average total cost per hospitalisation for oesophageal cancer increased monotonically with hospital level for surgical hospitalisations, and it increased more rapidly for non-surgical hospitalisations (from $301 to $2589, 860%) than for gastric cancer (from $289 to $1453, 503%) and colorectal cancer (from $359 to $1610, 448%). Vulnerable groups with less access to high-level hospitals were found in different gender and age groups. Oesophageal cancer imposes serious financial burdens on communities and patients' households in this high-incidence region, and no preferential policy from the local NCMS has been designed to address this issue. A special supportive policy should be developed on the basis of local disease profiles and population characteristics to alleviate the financial burden of populations at high risk for certain high-cost diseases. © 2016 John Wiley & Sons Ltd.

  13. Cooperation between National Defense Medical College and Fukushima Medical University in thyroid ultrasound examination after the Fukushima Daiichi nuclear power plant disaster

    International Nuclear Information System (INIS)

    Yamamoto, Yoritsuna; Fujita, Masanori; Tachibana, Shoich; Morita, Koji; Hamano, Kunihisa; Hamada, Koji; Uchida, Kosuke; Tanaka, Yuji

    2013-01-01

    Fukushima Daiichi Nuclear Power Plant was utterly destroyed by The Great East Japan Earthquake which happened on March 11, 2011, and followed by radioactive contamination to the surrounding areas. Based on the known radioactive iodine ("1"3"1I) which led to thyroid cancer in children after the Chernobyl nuclear power plant disaster in 1986, children living in Fukushima should be carefully observed for the development of thyroid cancer. Fukushima Prefecture and Fukushima Medical University started ''Fukushima Health Management Survey'' in May 2011, which includes screening for thyroid cancer by ultrasonography (Thyroid Ultrasound Examination). Thyroid Ultrasound Examination would cover roughly 360,000 residents aged 0 to 18 years of age at the time of the nuclear disaster. The initial screening is to be performed within the first three years after the accident, followed by complete thyroid examinations from 2014 onwards, and the residents will be monitored regularly thereafter. As Thyroid Ultrasound Examination is being mainly performed by medical staff at Fukushima Medical University, there is insufficient manpower to handle the large number of potential examinees. Thus, specialists of thyroid diseases from all over Japan have begun to support this examination. Six endocrinologists including the authors belonging to the National Defense Medical College are cooperating in part of this examination. This paper briefly reports the outline of Thyroid Ultrasound Examination and our cooperation. (author)

  14. Balancing the funds in the New Cooperative Medical Scheme in rural China: determinants and influencing factors in two provinces.

    Science.gov (United States)

    Zhang, Luying; Cheng, Xiaoming; Liu, Xiaoyun; Zhu, Kun; Tang, Shenglan; Bogg, Lennart; Dobberschuetz, Karin; Tolhurst, Rachel

    2010-01-01

    In recent years, the central government in China has been leading the re-establishment of its rural health insurance system, but local government institutions have considerable flexibility in the specific design and management of schemes. Maintaining a reasonable balance of funds is critical to ensure that the schemes are sustainable and effective in offering financial protection to members. This paper explores the financial management of the NCMS in China through a case study of the balance of funds and the factors influencing this, in six counties in two Chinese provinces. The main data source is NCMS management data from each county from 2003 to 2005, supplemented by: a household questionnaire survey, qualitative interviews and focus group discussions with all local stakeholders and policy document analysis. The study found that five out of six counties held a large fund surplus, whilst enrolees obtained only partial financial protection. However, in one county greater risk pooling for enrolees was accompanied by relatively high utilisation levels, resulting in a fund deficit. The opportunities to sustainably increase the financial protection offered to NCMS enrolees are limited by the financial pressures on local government, specific political incentives and low technical capacities at the county level and below. Our analysis suggests that in the short term, efforts should be made to improve the management of the current NCMS design, which should be supported through capacity building for NCMS offices. However, further medium-term initiatives may be required including changes to the design of the schemes. Copyright (c) 2009 John Wiley & Sons, Ltd.

  15. Cooperative communications hardware, channel and PHY

    CERN Document Server

    Dohler, Mischa

    2010-01-01

    Facilitating Cooperation for Wireless Systems Cooperative Communications: Hardware, Channel & PHY focuses on issues pertaining to the PHY layer of wireless communication networks, offering a rigorous taxonomy of this dispersed field, along with a range of application scenarios for cooperative and distributed schemes, demonstrating how these techniques can be employed. The authors discuss hardware, complexity and power consumption issues, which are vital for understanding what can be realized at the PHY layer, showing how wireless channel models differ from more traditional

  16. PPM-based relay communication schemes for wireless body area networks

    NARCIS (Netherlands)

    Zhang, P.; Willems, F.M.J.; Huang, Li

    2012-01-01

    This paper investigates cooperative communication schemes based on a single relay with pulse-position modulation (PPM) signaling, for enhancing energy efficiency of wireless body area networks (WBANs) in noncoherent channel settings. We explore cooperation between the source and the relay such that

  17. Multihop Capability Analysis in Wireless Information and Power Transfer Multirelay Cooperative Networks

    Directory of Open Access Journals (Sweden)

    Qilin Wu

    2018-01-01

    Full Text Available We study simultaneous wireless information and power transfer (SWIPT in multihop wireless cooperative networks, where the multihop capability that denotes the largest number of transmission hops is investigated. By utilizing the broadcast nature of multihop wireless networks, we first propose a cooperative forwarding power (CFP scheme. In CFP scheme, the multiple relays and receiver have distinctly different tasks. Specifically, multiple relays close to the transmitter harvest power from the transmitter first and then cooperatively forward the power (not the information towards the receiver. The receiver receives the information (not the power from the transmitter first, and then it harvests the power from the relays and is taken as the transmitter of the next hop. Furthermore, for performance comparison, we suggest two schemes: cooperative forwarding information and power (CFIP and direct receiving information and power (DFIP. Also, we construct an analysis model to investigate the multihop capabilities of CFP, CFIP, and DFIP schemes under the given targeted throughput requirement. Finally, simulation results validate the analysis model and show that the multihop capability of CFP is better than CFIP and DFIP, and for improving the multihop capabilities, it is best effective to increase the average number of relay nodes in cooperative set.

  18. Cooperative Position Aware Mobility Pattern of AUVs for Avoiding Void Zones in Underwater WSNs.

    Science.gov (United States)

    Javaid, Nadeem; Ejaz, Mudassir; Abdul, Wadood; Alamri, Atif; Almogren, Ahmad; Niaz, Iftikhar Azim; Guizani, Nadra

    2017-03-13

    In this paper, we propose two schemes; position-aware mobility pattern (PAMP) and cooperative PAMP (Co PAMP). The first one is an optimization scheme that avoids void hole occurrence and minimizes the uncertainty in the position estimation of glider's. The second one is a cooperative routing scheme that reduces the packet drop ratio by using the relay cooperation. Both techniques use gliders that stay at sojourn positions for a predefined time, at sojourn position self-confidence (s-confidence) and neighbor-confidence (n-confidence) regions that are estimated for balanced energy consumption. The transmission power of a glider is adjusted according to those confidence regions. Simulation results show that our proposed schemes outperform the compared existing one in terms of packet delivery ratio, void zones and energy consumption.

  19. Effect of the new rural cooperative medical system on farmers’ medical service needs and utilization in Ningbo, China

    Directory of Open Access Journals (Sweden)

    Jianhua Chen

    2016-10-01

    Full Text Available Abstract Background Many countries are developing health mechanisms to pursue the goal of universal coverage. In China, a rural health insurance system entitled New Cooperative Medical System (NCMS has being developed since 2003. This paper aims to explore the changes in the health service needs and utilization among rural residents in Ningbo, China after the implementation of the new rural cooperative medical system (NCMS, and provide evidence to further improve the strategies of NCMS in China. Methods Stratified multistage cluster sampling was used to randomly select 10 villages from 5 townships in Yuyao and Fenghua counties of Ningbo Municipality. Eighty families were selected from each village, and face-to-face interviews were conducted by trained investigators to collect data using questionnaires. Results The two-week visiting rate and prevalence of chronic diseases among the farmers included in the study was 25.40 and 22.50 %, respectively, which were higher than the levels in 2003 and 2008. The rate of not visiting the healthcare facility amongst those with illness, and the rate of non- hospitalization amongst those who required it were 32.36 and 0.60 %, respectively, which was lower than the levels in 2003 and 2008. Most of the outpatient visits were to the village clinics, while the hospitalizations were mainly to county hospitals. Conclusion NCMS greatly affected the utilization of healthcare services from outpatient clinics and improved the hospitalization rate in county hospitals. Financial difficulties are not the major causes of non-hospitalization and non-visiting any longer. These findings suggest that the NCMS policies alleviated the medical burdens of farmers in a certain degree.

  20. An active cooperation-aware spectrum allocation mechanism for body sensor networks.

    Science.gov (United States)

    Jiang, Fu; Guo, Ying; Peng, Jun; Hu, Jiankun

    2015-01-28

    A cognitive radio-based spectrum allocation scheme using an active cooperative-aware mechanism is proposed in this paper. The scheme ensures that the primary user and secondary users cooperate actively for their own benefits. The primary user releases some spectrum resources to secondary users to actively stimulate them to actively join the cooperative transmission of the primary user, and secondary users help the primary user to relay data in return, as well as its self-data transmission at the same time. The Stackelberg game is used to evenly and jointly optimize the utilities of both the primary and secondary users. Simulation results show that the proposed active cooperation-aware mechanism could improve the body sensor network performance.

  1. Overcoming barriers to development of cooperative medical decision support models.

    Science.gov (United States)

    Hudson, Donna L; Cohen, Maurice E

    2012-01-01

    Attempts to automate the medical decision making process have been underway for the at least fifty years, beginning with data-based approaches that relied chiefly on statistically-based methods. Approaches expanded to include knowledge-based systems, both linear and non-linear neural networks, agent-based systems, and hybrid methods. While some of these models produced excellent results none have been used extensively in medical practice. In order to move these methods forward into practical use, a number of obstacles must be overcome, including validation of existing systems on large data sets, development of methods for including new knowledge as it becomes available, construction of a broad range of decision models, and development of non-intrusive methods that allow the physician to use these decision aids in conjunction with, not instead of, his or her own medical knowledge. None of these four requirements will come easily. A cooperative effort among researchers, including practicing MDs, is vital, particularly as more information on diseases and their contributing factors continues to expand resulting in more parameters than the human decision maker can process effectively. In this article some of the basic structures that are necessary to facilitate the use of an automated decision support system are discussed, along with potential methods for overcoming existing barriers.

  2. A lossless multichannel bio-signal compression based on low-complexity joint coding scheme for portable medical devices.

    Science.gov (United States)

    Kim, Dong-Sun; Kwon, Jin-San

    2014-09-18

    Research on real-time health systems have received great attention during recent years and the needs of high-quality personal multichannel medical signal compression for personal medical product applications are increasing. The international MPEG-4 audio lossless coding (ALS) standard supports a joint channel-coding scheme for improving compression performance of multichannel signals and it is very efficient compression method for multi-channel biosignals. However, the computational complexity of such a multichannel coding scheme is significantly greater than that of other lossless audio encoders. In this paper, we present a multichannel hardware encoder based on a low-complexity joint-coding technique and shared multiplier scheme for portable devices. A joint-coding decision method and a reference channel selection scheme are modified for a low-complexity joint coder. The proposed joint coding decision method determines the optimized joint-coding operation based on the relationship between the cross correlation of residual signals and the compression ratio. The reference channel selection is designed to select a channel for the entropy coding of the joint coding. The hardware encoder operates at a 40 MHz clock frequency and supports two-channel parallel encoding for the multichannel monitoring system. Experimental results show that the compression ratio increases by 0.06%, whereas the computational complexity decreases by 20.72% compared to the MPEG-4 ALS reference software encoder. In addition, the compression ratio increases by about 11.92%, compared to the single channel based bio-signal lossless data compressor.

  3. Medical X-ray Image Hierarchical Classification Using a Merging and Splitting Scheme in Feature Space.

    Science.gov (United States)

    Fesharaki, Nooshin Jafari; Pourghassem, Hossein

    2013-07-01

    Due to the daily mass production and the widespread variation of medical X-ray images, it is necessary to classify these for searching and retrieving proposes, especially for content-based medical image retrieval systems. In this paper, a medical X-ray image hierarchical classification structure based on a novel merging and splitting scheme and using shape and texture features is proposed. In the first level of the proposed structure, to improve the classification performance, similar classes with regard to shape contents are grouped based on merging measures and shape features into the general overlapped classes. In the next levels of this structure, the overlapped classes split in smaller classes based on the classification performance of combination of shape and texture features or texture features only. Ultimately, in the last levels, this procedure is also continued forming all the classes, separately. Moreover, to optimize the feature vector in the proposed structure, we use orthogonal forward selection algorithm according to Mahalanobis class separability measure as a feature selection and reduction algorithm. In other words, according to the complexity and inter-class distance of each class, a sub-space of the feature space is selected in each level and then a supervised merging and splitting scheme is applied to form the hierarchical classification. The proposed structure is evaluated on a database consisting of 2158 medical X-ray images of 18 classes (IMAGECLEF 2005 database) and accuracy rate of 93.6% in the last level of the hierarchical structure for an 18-class classification problem is obtained.

  4. Smartphone-Based Patients' Activity Recognition by Using a Self-Learning Scheme for Medical Monitoring.

    Science.gov (United States)

    Guo, Junqi; Zhou, Xi; Sun, Yunchuan; Ping, Gong; Zhao, Guoxing; Li, Zhuorong

    2016-06-01

    Smartphone based activity recognition has recently received remarkable attention in various applications of mobile health such as safety monitoring, fitness tracking, and disease prediction. To achieve more accurate and simplified medical monitoring, this paper proposes a self-learning scheme for patients' activity recognition, in which a patient only needs to carry an ordinary smartphone that contains common motion sensors. After the real-time data collection though this smartphone, we preprocess the data using coordinate system transformation to eliminate phone orientation influence. A set of robust and effective features are then extracted from the preprocessed data. Because a patient may inevitably perform various unpredictable activities that have no apriori knowledge in the training dataset, we propose a self-learning activity recognition scheme. The scheme determines whether there are apriori training samples and labeled categories in training pools that well match with unpredictable activity data. If not, it automatically assembles these unpredictable samples into different clusters and gives them new category labels. These clustered samples combined with the acquired new category labels are then merged into the training dataset to reinforce recognition ability of the self-learning model. In experiments, we evaluate our scheme using the data collected from two postoperative patient volunteers, including six labeled daily activities as the initial apriori categories in the training pool. Experimental results demonstrate that the proposed self-learning scheme for activity recognition works very well for most cases. When there exist several types of unseen activities without any apriori information, the accuracy reaches above 80 % after the self-learning process converges.

  5. Cooperative Position Aware Mobility Pattern of AUVs for Avoiding Void Zones in Underwater WSNs

    Science.gov (United States)

    Javaid, Nadeem; Ejaz, Mudassir; Abdul, Wadood; Alamri, Atif; Almogren, Ahmad; Niaz, Iftikhar Azim; Guizani, Nadra

    2017-01-01

    In this paper, we propose two schemes; position-aware mobility pattern (PAMP) and cooperative PAMP (Co PAMP). The first one is an optimization scheme that avoids void hole occurrence and minimizes the uncertainty in the position estimation of glider’s. The second one is a cooperative routing scheme that reduces the packet drop ratio by using the relay cooperation. Both techniques use gliders that stay at sojourn positions for a predefined time, at sojourn position self-confidence (s-confidence) and neighbor-confidence (n-confidence) regions that are estimated for balanced energy consumption. The transmission power of a glider is adjusted according to those confidence regions. Simulation results show that our proposed schemes outperform the compared existing one in terms of packet delivery ratio, void zones and energy consumption. PMID:28335377

  6. Cooperative Position Aware Mobility Pattern of AUVs for Avoiding Void Zones in Underwater WSNs

    Directory of Open Access Journals (Sweden)

    Nadeem Javaid

    2017-03-01

    Full Text Available In this paper, we propose two schemes; position-aware mobility pattern (PAMP and cooperative PAMP (Co PAMP. The first one is an optimization scheme that avoids void hole occurrence and minimizes the uncertainty in the position estimation of glider’s. The second one is a cooperative routing scheme that reduces the packet drop ratio by using the relay cooperation. Both techniques use gliders that stay at sojourn positions for a predefined time, at sojourn position self-confidence (s-confidence and neighbor-confidence (n-confidence regions that are estimated for balanced energy consumption. The transmission power of a glider is adjusted according to those confidence regions. Simulation results show that our proposed schemes outperform the compared existing one in terms of packet delivery ratio, void zones and energy consumption.

  7. A Credit-Based Congestion-Aware Incentive Scheme for DTNs

    Directory of Open Access Journals (Sweden)

    Qingfeng Jiang

    2016-12-01

    Full Text Available In Delay-Tolerant Networks (DTNs, nodes may be selfish and reluctant to expend their precious resources on forwarding messages for others. Therefore, an incentive scheme is necessary to motivate selfish nodes to cooperatively forward messages. However, the current incentive schemes mainly focus on encouraging nodes to participate in message forwarding, without considering the node congestion problem. When many messages are forwarded to the nodes with high connection degree, these nodes will become congested and deliberately discard messages, which will seriously degrade the routing performance and reduce the benefits of other nodes. To address this problem, we propose a credit-based congestion-aware incentive scheme (CBCAIS for DTNs. In CBCAIS, a check and punishment mechanism is proposed to prevent forwarding nodes from deliberately discarding message. In addition, a message acceptance selection mechanism is proposed to allow the nodes to decide whether to accept other messages, according to self congestion degree. The experimental results show that CBCAIS can effectively stimulate selfish nodes to cooperatively forward messages, and achieve a higher message delivery ratio with lower overhead ratio, compared with other schemes.

  8. An Active Cooperation-Aware Spectrum Allocation Mechanism for Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Fu Jiang

    2015-01-01

    Full Text Available A cognitive radio-based spectrum allocation scheme using an active cooperative-aware mechanism is proposed in this paper. The scheme ensures that the primary user and secondary users cooperate actively for their own benefits. The primary user releases some spectrum resources to secondary users to actively stimulate them to actively join the cooperative transmission of the primary user, and secondary users help the primary user to relay data in return, as well as its self-data transmission at the same time. The Stackelberg game is used to evenly and jointly optimize the utilities of both the primary and secondary users. Simulation results show that the proposed active cooperation-aware mechanism could improve the body sensor network performance.

  9. Outcome-based health equity across different social health insurance schemes for the elderly in China.

    Science.gov (United States)

    Liu, Xiaoting; Wong, Hung; Liu, Kai

    2016-01-14

    Against the achievement of nearly universal coverage for social health insurance for the elderly in China, a problem of inequity among different insurance schemes on health outcomes is still a big challenge for the health care system. Whether various health insurance schemes have divergent effects on health outcome is still a puzzle. Empirical evidence will be investigated in this study. This study employs a nationally representative survey database, the National Survey of the Aged Population in Urban/Rural China, to compare the changes of health outcomes among the elderly before and after the reform. A one-way ANOVA is utilized to detect disparities in health care expenditures and health status among different health insurance schemes. Multiple Linear Regression is applied later to examine the further effects of different insurance plans on health outcomes while controlling for other social determinants. The one-way ANOVA result illustrates that although the gaps in insurance reimbursements between the Urban Employee Basic Medical Insurance (UEBMI) and the other schemes, the New Rural Cooperative Medical Scheme (NCMS) and Urban Residents Basic Medical Insurance (URBMI) decreased, out-of-pocket spending accounts for a larger proportion of total health care expenditures, and the disparities among different insurances enlarged. Results of the Multiple Linear Regression suggest that UEBMI participants have better self-reported health status, physical functions and psychological wellbeing than URBMI and NCMS participants, and those uninsured. URBMI participants report better self-reported health than NCMS ones and uninsured people, while having worse psychological wellbeing compared with their NCMS counterparts. This research contributes to a transformation in health insurance studies from an emphasis on the opportunity-oriented health equity measured by coverage and healthcare accessibility to concern with outcome-based equity composed of health expenditure and health

  10. Subgame consistent cooperation a comprehensive treatise

    CERN Document Server

    Yeung, David W K

    2016-01-01

    Strategic behavior in the human and social world has been increasingly recognized in theory and practice. It is well known that non-cooperative behavior could lead to suboptimal or even highly undesirable outcomes. Cooperation suggests the possibility of obtaining socially optimal solutions and the calls for cooperation are prevalent in real-life problems. Dynamic cooperation cannot be sustainable if there is no guarantee that the agreed upon optimality principle at the beginning is maintained throughout the cooperation duration. It is due to the lack of this kind of guarantees that cooperative schemes fail to last till its end or even fail to get started. The property of subgame consistency in cooperative dynamic games and the corresponding solution mechanism resolve this “classic” problem in game theory. This book is a comprehensive treatise on subgame consistent dynamic cooperation covering the up-to-date state of the art analyses in this important topic. It sets out to provide the theory, solution tec...

  11. The SS-SCR Scheme for Dynamic Spectrum Access

    Directory of Open Access Journals (Sweden)

    Vinay Thumar

    2012-01-01

    Full Text Available We integrate the two models of Cognitive Radio (CR, namely, the conventional Sense-and-Scavenge (SS Model and Symbiotic Cooperative Relaying (SCR. The resultant scheme, called SS-SCR, improves the efficiency of spectrum usage and reliability of the transmission links. SS-SCR is enabled by a suitable cross-layer optimization problem in a multihop multichannel CR network. Its performance is compared for different PU activity patterns with those schemes which consider SS and SCR separately and perform disjoint resource allocation. Simulation results depict the effectiveness of the proposed SS-SCR scheme. We also indicate the usefulness of cloud computing for a practical deployment of the scheme.

  12. Improving Energy Efficiency of Cooperative Femtocell Networks via Base Station Switching Off

    Directory of Open Access Journals (Sweden)

    Woongsup Lee

    2016-01-01

    Full Text Available Recently, energy efficiency (EE of cellular networks has become an important performance metric, and several techniques have been proposed to increase the EE. Among them, turning off base stations (BSs when not needed is considered as one of the most powerful techniques due to its simple operation and effectiveness. Herein, we propose a novel BS switching-off technique for cooperative femtocell networks where multiple femtocell BSs (FBSs simultaneously send packets to the same mobile station (MS. Unlike conventional schemes, cooperative operation of FBSs, also known as coordinated multipoint (CoMP transmission, is considered to determine which BSs are turned off in the proposed technique. We first formulate the optimization problem to find the optimal set of FBSs to be turned off. Then, we propose a suboptimal scheme operating in a distributed manner in order to reduce the computational complexity of the optimal scheme. The suboptimal scheme is based on throughput ratio (TR which specifies the importance of a particular FBS for the cooperative transmission. Through simulations, we show that the energy consumption can be greatly reduced with the proposed technique, compared with conventional schemes. Moreover, we show that the suboptimal scheme also achieves the near-optimal performance even without the excessive computations.

  13. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    Science.gov (United States)

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to

  14. What are key determinants of hospital admissions, readmission rate and day case rate within the South African medical schemes population?

    Directory of Open Access Journals (Sweden)

    Nondumiso Gugu Khumalo

    2012-06-01

    Full Text Available  BACKGROUND: In South Africa, private hospitals absorb a high proportion of the total health expenditure on private health care. Between 2008-2010 private hospital expenditure which includes ward fees, theatre fees, consumables, medicines and per diem arrangements consumed between 40.5% and 40.9% of the total benefits paid by medical schemes from the risk pool, whilst in-hospital managed care fees ranged between 1.8% and 2.8% for the equivalent years.OBJECTIVE: The aim of this paper is to highlight key factors contributing to utilisation of hospital services within the medical schemes population and to recommend “appropriate” and cost effective strategies on hospital utilisation management.METHODS: A cross sectional survey informed by retrospective analysis of quantitative data was used. Researchers also triangulated quantitative data with systematic review of literature.RESULTS: The results show that demographic indicators such as age profile, dependency ratio, pensioner ratio and prevalence of chronic conditions are not the only key factors influencing hospital admissions, but rather the effectiveness of each medical scheme in containing hospital admissions is also influenced by available technical capacity on utilisation review and audit as well as the managed care methodology including the philosophy underpinning benefit option design.CONCLUSION: This study highlights the importance of “value based” managed care programs linked to benefit option design in health care utilisation management. The choice of one managed care program over the other often leads to tradeoffs whereby unintended consequences emanate. Medical schemes are therefore encouraged to continuously review their managed care programs to ensure value for money as well as better access and health outcomes.http://dx.doi.org/10.7175/fe.v13i2.207

  15. Brief of the joint research with universities, etc. for 2002. Except the research by the JNC cooperative research scheme on the nuclear fuel cycle

    International Nuclear Information System (INIS)

    2003-09-01

    The Japan Nuclear Cycle Development Institute (JNC) promote the basic and fundamental research in relation to the research and development projects of JNC through collaboration with universities and other research institutes (referred to as 'universities, etc.' below). This report includes a summary of the results of the research carried out in fiscal year 2002 on 15 joint researches with universities, etc. In addition, this report removes the research by the JNC Cooperative Research Scheme on the Nuclear Fuel Cycle. (author)

  16. Energy Efficiency Analysis of a Two Dimensional Cooperative Wireless Sensor Network with Relay Selection

    Directory of Open Access Journals (Sweden)

    M. Kakitani

    2013-06-01

    Full Text Available The energy efficiency of non-cooperative and cooperative transmissions are investigated in a two-dimensional wireless sensor network, considering a target outage probability and the same end-to-end throughput for all transmission schemes. The impact of the relay selection method in the cooperative schemes is also analyzed. We show that under non line-of-sight conditions the relay selection method has a greater impact in the energy efficiency than the availability of a return channel. By its turn, under line-of-sight conditions a return channel is more valuable to the energy efficiency of cooperative transmission than the specific relay selection method. Finally, we demonstrate that the energy efficiency advantage of the cooperative over the non-cooperative transmission increases with the distance among nodes and with the nodes density.

  17. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    Science.gov (United States)

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  18. The effect of urban basic medical insurance on health service utilisation in Shaanxi Province, China: a comparison of two schemes.

    Science.gov (United States)

    Zhou, Zhongliang; Zhou, Zhiying; Gao, Jianmin; Yang, Xiaowei; Yan, Ju'e; Xue, Qinxiang; Chen, Gang

    2014-01-01

    Urban population in China is mainly covered by two medical insurance schemes: the Urban Employee Basic Medical Insurance (UEBMI) for urban employees in formal sector and the Urban Resident Basic Medical Insurance (URBMI) for the left urban residents, mainly the unemployed, the elderly and children. This paper studies the effects of UEBMI and URBMI on health services utilisation in Shaanxi Province, Western China. Cross-sectional data from the 4th National Health Services Survey - Shaanxi Province was studied. The propensity score matching and the coarsened exact matching methods have been used to estimate the average medical insurance effect on the insured. Compared to the uninsured, robust results suggest that UEBMI had significantly increased the outpatient health services utilisation in the last two weeks (pinsured was associated with higher health services utilisation, compared with the uninsured, none of the improvement was statistically significant (p>0.10). It was also found that compared with the uninsured, basic medical insurance enrollees were more likely to purchase inpatient treatments in lower levels of hospitals, consistent with the incentive of the benefit package design. Basic Medical insurance schemes have shown a positive but limited effect on increasing health services utilisation in Shaanxi Province. The benefit package design of higher reimbursement rates for lower level hospitals has induced the insured to use medical services in lower level hospitals for inpatient services.

  19. Cooperative Path-Planning for Multi-Vehicle Systems

    Directory of Open Access Journals (Sweden)

    Qichen Wang

    2014-11-01

    Full Text Available In this paper, we propose a collision avoidance algorithm for multi-vehicle systems, which is a common problem in many areas, including navigation and robotics. In dynamic environments, vehicles may become involved in potential collisions with each other, particularly when the vehicle density is high and the direction of travel is unrestricted. Cooperatively planning vehicle movement can effectively reduce and fairly distribute the detour inconvenience before subsequently returning vehicles to their intended paths. We present a novel method of cooperative path planning for multi-vehicle systems based on reinforcement learning to address this problem as a decision process. A dynamic system is described as a multi-dimensional space formed by vectors as states to represent all participating vehicles’ position and orientation, whilst considering the kinematic constraints of the vehicles. Actions are defined for the system to transit from one state to another. In order to select appropriate actions whilst satisfying the constraints of path smoothness, constant speed and complying with a minimum distance between vehicles, an approximate value function is iteratively developed to indicate the desirability of every state-action pair from the continuous state space and action space. The proposed scheme comprises two phases. The convergence of the value function takes place in the former learning phase, and it is then used as a path planning guideline in the subsequent action phase. This paper summarizes the concept and methodologies used to implement this online cooperative collision avoidance algorithm and presents results and analysis regarding how this cooperative scheme improves upon two baseline schemes where vehicles make movement decisions independently.

  20. Restraining Factors and Improving Paths for the Operation Mechanism of New Rural Cooperative Medical System in China

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    The new rural cooperative medical system has achieved periodical achievements since its establishment.Nevertheless,there are many factors hampering the development of the new system,such as the high cost,the difficulties in fund procurement,the lack of management,the narrow coverage of benefit,the ineffective constraint to the designated medical institutions,the high fund balance rate,and the poor medical facilities and services in rural areas.Countermeasures are put forward to solve these problems,including improving the system design,expanding the coverage of the system,expanding the fund sources,reducing the financing costs,strengthening the fund supervision,enhancing the supervision of designated medical institutions,and improving the capacity of health services in rural areas.

  1. Collaboration for cooperative work experience programs in biomedical engineering education.

    Science.gov (United States)

    Krishnan, Shankar

    2010-01-01

    Incorporating cooperative education modules as a segment of the undergraduate educational program is aimed to assist students in gaining real-life experience in the field of their choice. The cooperative work modules facilitate the students in exploring different realistic aspects of work processes in the field. The track records for cooperative learning modules are very positive. However, it is indeed a challenge for the faculty developing Biomedical Engineering (BME) curriculum to include cooperative work experience or internship requirements coupled with a heavy course load through the entire program. The objective of the present work is to develop a scheme for collaborative co-op work experience for the undergraduate training in the fast-growing BME programs. A few co-op/internship models are developed for the students pursuing undergraduate BME degree. The salient features of one co-op model are described. The results obtained support the proposed scheme. In conclusion, the cooperative work experience will be an invaluable segment in biomedical engineering education and an appropriate model has to be selected to blend with the overall training program.

  2. An On-Time Power-Aware Scheduling Scheme for Medical Sensor SoC-Based WBAN Systems

    Science.gov (United States)

    Hwang, Tae-Ho; Kim, Dong-Sun; Kim, Jung-Guk

    2013-01-01

    The focus of many leading technologies in the field of medical sensor systems is on low power consumption and robust data transmission. For example, the implantable cardioverter-defibrillator (ICD), which is used to maintain the heart in a healthy state, requires a reliable wireless communication scheme with an extremely low duty-cycle, high bit rate, and energy-efficient media access protocols. Because such devices must be sustained for over 5 years without access to battery replacement, they must be designed to have extremely low power consumption in sleep mode. Here, an on-time, energy-efficient scheduling scheme is proposed that performs power adjustments to minimize the sleep-mode current. The novelty of this scheduler is that it increases the determinacy of power adjustment and the predictability of scheduling by employing non-pre-emptible dual priority scheduling. This predictable scheduling also guarantees the punctuality of important periodic tasks based on their serialization, by using their worst case execution time) and the power consumption optimization. The scheduler was embedded into a system on chip (SoC) developed to support the wireless body area network—a wakeup-radio and wakeup-timer for implantable medical devices. This scheduling system is validated by the experimental results of its performance when used with life-time extensions of ICD devices. PMID:23271602

  3. An on-time power-aware scheduling scheme for medical sensor SoC-based WBAN systems.

    Science.gov (United States)

    Hwang, Tae-Ho; Kim, Dong-Sun; Kim, Jung-Guk

    2012-12-27

    The focus of many leading technologies in the field of medical sensor systems is on low power consumption and robust data transmission. For example, the implantable cardioverter-defibrillator (ICD), which is used to maintain the heart in a healthy state, requires a reliable wireless communication scheme with an extremely low duty-cycle, high bit rate, and energy-efficient media access protocols. Because such devices must be sustained for over 5 years without access to battery replacement, they must be designed to have extremely low power consumption in sleep mode. Here, an on-time, energy-efficient scheduling scheme is proposed that performs power adjustments to minimize the sleep-mode current. The novelty of this scheduler is that it increases the determinacy of power adjustment and the predictability of scheduling by employing non-pre-emptible dual priority scheduling. This predictable scheduling also guarantees the punctuality of important periodic tasks based on their serialization, by using their worst case execution time) and the power consumption optimization. The scheduler was embedded into a system on chip (SoC) developed to support the wireless body area network-a wakeup-radio and wakeup-timer for implantable medical devices. This scheduling system is validated by the experimental results of its performance when used with life-time extensions of ICD devices.

  4. Design options for cooperation mechanisms under the new European renewable energy directive

    International Nuclear Information System (INIS)

    Klessmann, Corinna; Lamers, Patrick; Ragwitz, Mario; Resch, Gustav

    2010-01-01

    In June 2009, a new EU directive on the promotion of renewable energy sources (RES) entered into effect. The directive 2009/28/EC, provides for three cooperation mechanisms that will allow member states to achieve their national RES target in cooperation with other member states: statistical transfer, joint projects, and joint support schemes. This article analyses the pros and cons of the three mechanisms and explores design options for their implementation through strategic and economic questions: How to counterbalance the major drawbacks of each mechanism? How to reflect a balance of costs and benefits between the involved member states? The analysis identifies a number of design options that respond to these questions, e.g. long term contracts to ensure sufficient flexibility for statistical transfers, a coordinated, standardised joint project approach to increase transparency in the European market, and a stepwise harmonisation of joint support schemes that is based on a cost-effective accounting approach. One conclusion is that the three cooperation mechanisms are closely interlinked. One can consider their relation to be a gradual transition from member state cooperation under fully closed national support systems in case of statistical transfers, to cooperation under fully open national support systems in a joint support scheme.

  5. Incentives and cooperation in firms: Field evidence

    OpenAIRE

    Berger, Johannes; Herbertz, Claus; Sliwka, Dirk

    2011-01-01

    We empirically investigate the impact of incentive scheme structure on the degree of cooperation in firms using a unique and representative data set. Combining employee survey data with detailed firm level information on the relative importance of individual, team, and company performance for compensation, we find a significant positive relation between the intensity of team incentives and several survey measures of cooperation. Moreover, higher powered team incentives are associated with low...

  6. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements...... classification inherited a lot of its structure from the existing system and rendered requirements that transcended the framework laid out by the existing system almost invisible. As a result, the requirements classification became a defining element of the requirements-engineering process, though its main...... effects remained largely implicit. The requirements classification contributed to constraining the requirements-engineering process by supporting the software engineers in maintaining some level of control over the process. This way, the requirements classification provided the software engineers...

  7. Medical devices and the Middle East: market, regulation, and reimbursement in Gulf Cooperation Council states

    Directory of Open Access Journals (Sweden)

    Howard JJ

    2014-11-01

    Full Text Available Jason J Howard Division of Paediatric Orthopaedics, Department of Surgery, Sidra Medical and Research Center, Doha, Qatar Abstract: With some of the richest economies in the world, the Gulf Cooperation Council (GCC is undergoing rapid growth not only in its population but also in health care expenditure. Despite the GCC's abundance of hydrocarbon-based wealth, the drivers of the medical device industry in the GCC are still in flux, with gains yet to be made in areas of infrastructure, regulation, and reimbursement. However, the regional disease burden, expanding health insurance penetration, increasing privatization, and a desire to attract skilled expatriate health care providers have led to favorable conditions for the medical device market in the GCC. The purpose of this article is to investigate the current state of the GCC medical device industry, with respect to market, regulation, and reimbursement, paying special attention to the three largest medical device markets: Saudi Arabia, the United Arab Emirates, and Qatar. The GCC would seem to represent fertile ground for the development of medical technologies, especially those in line with the regional health priorities of the respective member states. Keywords: medical devices, regulation, reimbursement, Middle East 

  8. Cooperation Mechanisms To Achieve Eu Renewable Targets

    DEFF Research Database (Denmark)

    Klinge Jacobsen, Henrik; Pade, Lise-Lotte; Schröder, Sascha Thorsten

    2014-01-01

    targets. Furthermore, countries might find themselves competing for investment in a market with limited capital available. In both cases, the cost-efficiency of the renewable support policies is reduced compared to a coordinated solution. Barriers for joint support such as network regulation regarding......There are considerable benefits from cooperating among member states on meeting the 2020 renewable energy sources (RES) targets. Today countries are supporting investments in renewable energy by many different types of support schemes and with different levels of support. The EU has opened...... for cooperation mechanisms such as joint support schemes for promoting renewable energy to meet the 2020 targets. The potential coordination benefits, with more efficient localisation and composition of renewable investment, can be achieved by creating new areas/sub-segments of renewable technologies where...

  9. Cooperative Spatial Retreat for Resilient Drone Networks.

    Science.gov (United States)

    Kang, Jin-Hyeok; Kwon, Young-Min; Park, Kyung-Joon

    2017-05-03

    Drones are broadening their scope to various applications such as networking, package delivery, agriculture, rescue, and many more. For proper operation of drones, reliable communication should be guaranteed because drones are remotely controlled. When drones experience communication failure due to bad channel condition, interference, or jamming in a certain area, one existing solution is to exploit mobility or so-called spatial retreat to evacuate them from the communication failure area. However, the conventional spatial retreat scheme moves drones in random directions, which results in inefficient movement with significant evacuation time and waste of battery lifetime. In this paper, we propose a novel spatial retreat technique that takes advantage of cooperation between drones for resilient networking, which is called cooperative spatial retreat (CSR). Our performance evaluation shows that the proposed CSR significantly outperforms existing schemes.

  10. Centralized cooperative spectrum sensing for ad-hoc disaster relief network clusters

    DEFF Research Database (Denmark)

    Pratas, Nuno; Marchetti, Nicola; Prasad, Neeli R.

    2010-01-01

    Disaster relief networks have to be highly adaptable and resilient. Cognitive radio enhanced ad-hoc architecture have been put forward as a candidate to enable such networks. Spectrum sensing is the cornerstone of the cognitive radio paradigm, and it has been the target of intensive research....... The main common conclusion was that the achievable spectrum sensing accuracy can be greatly enhanced through the use of cooperative sensing schemes. When considering applying Cognitive Radio to ad-hoc disaster relief networks, spectrum sensing cooperative schemes are paramount. A centralized cluster...

  11. Downlink Cooperative Broadcast Transmission Based on Superposition Coding in a Relaying System for Future Wireless Sensor Networks.

    Science.gov (United States)

    Liu, Yang; Han, Guangjie; Shi, Sulong; Li, Zhengquan

    2018-06-20

    This study investigates the superiority of cooperative broadcast transmission over traditional orthogonal schemes when applied in a downlink relaying broadcast channel (RBC). Two proposed cooperative broadcast transmission protocols, one with an amplify-and-forward (AF) relay, and the other with a repetition-based decode-and-forward (DF) relay, are investigated. By utilizing superposition coding (SupC), the source and the relay transmit the private user messages simultaneously instead of sequentially as in traditional orthogonal schemes, which means the channel resources are reused and an increased channel degree of freedom is available to each user, hence the half-duplex penalty of relaying is alleviated. To facilitate a performance evaluation, theoretical outage probability expressions of the two broadcast transmission schemes are developed, based on which, we investigate the minimum total power consumption of each scheme for a given traffic requirement by numerical simulation. The results provide details on the overall system performance and fruitful insights on the essential characteristics of cooperative broadcast transmission in RBCs. It is observed that better overall outage performances and considerable power gains can be obtained by utilizing cooperative broadcast transmissions compared to traditional orthogonal schemes.

  12. Delay efficient cooperation in public safety vehicular networks using LTE and IEEE 802.11p

    KAUST Repository

    Atat, Rachad

    2012-01-01

    Cooperative schemes for critical content distribution over vehicular networks are presented and analyzed. The first scheme is based on unicasting from the base station, whereas the second is based on threshold based multicasting. Long Term Evolution (LTE) is used for long range communications with the base station (BS) and 802.11p is considered for inter-vehicle collaboration on the short range. A high mobility environment with correlated shadowing is adopted. Both schemes are shown to outperform non-cooperative unicasting and multicasting, respectively, when the appropriate 802.11p power class is used. The first scheme achieves the best performance among the compared methods, and a practical approximation of that scheme is shown to be close to optimal performance. © 2012 IEEE.

  13. On Hybrid Cooperation in Underlay Cognitive Radio Networks

    DEFF Research Database (Denmark)

    Mahmood, Nurul Huda; Yilmaz, Ferkan; Øien, Geir E.

    2013-01-01

    of opportunistic wireless systems such as cognitive radio networks. In order to balance the performance gains from cooperative communication against the possible over-utilization of resources, we propose and analyze an adaptive-cooperation technique for underlay cognitive radio networks, termed as hybrid......Cooperative communication is a promising strategy to enhance the performance of a communication network as it helps to improve the coverage area and the outage performance. However, such enhancement comes at the expense of increased resource utilization, which is undesirable; more so in the case......-cooperation. Under the proposed cooperation scheme, secondary users in a cognitive radio network cooperate adaptively to enhance the spectral efficiency and the error performance of the network. The bit error rate, the spectral efficiency and the outage performance of the network under the proposed hybrid...

  14. Medical devices and the Middle East: market, regulation, and reimbursement in Gulf Cooperation Council states.

    Science.gov (United States)

    Howard, Jason J

    2014-01-01

    With some of the richest economies in the world, the Gulf Cooperation Council (GCC) is undergoing rapid growth not only in its population but also in health care expenditure. Despite the GCC's abundance of hydrocarbon-based wealth, the drivers of the medical device industry in the GCC are still in flux, with gains yet to be made in areas of infrastructure, regulation, and reimbursement. However, the regional disease burden, expanding health insurance penetration, increasing privatization, and a desire to attract skilled expatriate health care providers have led to favorable conditions for the medical device market in the GCC. The purpose of this article is to investigate the current state of the GCC medical device industry, with respect to market, regulation, and reimbursement, paying special attention to the three largest medical device markets: Saudi Arabia, the United Arab Emirates, and Qatar. The GCC would seem to represent fertile ground for the development of medical technologies, especially those in line with the regional health priorities of the respective member states.

  15. Cooperative MIMO Communication at Wireless Sensor Network: An Error Correcting Code Approach

    Science.gov (United States)

    Islam, Mohammad Rakibul; Han, Young Shin

    2011-01-01

    Cooperative communication in wireless sensor network (WSN) explores the energy efficient wireless communication schemes between multiple sensors and data gathering node (DGN) by exploiting multiple input multiple output (MIMO) and multiple input single output (MISO) configurations. In this paper, an energy efficient cooperative MIMO (C-MIMO) technique is proposed where low density parity check (LDPC) code is used as an error correcting code. The rate of LDPC code is varied by varying the length of message and parity bits. Simulation results show that the cooperative communication scheme outperforms SISO scheme in the presence of LDPC code. LDPC codes with different code rates are compared using bit error rate (BER) analysis. BER is also analyzed under different Nakagami fading scenario. Energy efficiencies are compared for different targeted probability of bit error pb. It is observed that C-MIMO performs more efficiently when the targeted pb is smaller. Also the lower encoding rate for LDPC code offers better error characteristics. PMID:22163732

  16. Cooperative MIMO communication at wireless sensor network: an error correcting code approach.

    Science.gov (United States)

    Islam, Mohammad Rakibul; Han, Young Shin

    2011-01-01

    Cooperative communication in wireless sensor network (WSN) explores the energy efficient wireless communication schemes between multiple sensors and data gathering node (DGN) by exploiting multiple input multiple output (MIMO) and multiple input single output (MISO) configurations. In this paper, an energy efficient cooperative MIMO (C-MIMO) technique is proposed where low density parity check (LDPC) code is used as an error correcting code. The rate of LDPC code is varied by varying the length of message and parity bits. Simulation results show that the cooperative communication scheme outperforms SISO scheme in the presence of LDPC code. LDPC codes with different code rates are compared using bit error rate (BER) analysis. BER is also analyzed under different Nakagami fading scenario. Energy efficiencies are compared for different targeted probability of bit error p(b). It is observed that C-MIMO performs more efficiently when the targeted p(b) is smaller. Also the lower encoding rate for LDPC code offers better error characteristics.

  17. Blind cooperative diversity using distributed space-time coding in block fading channels

    KAUST Repository

    Tourki, Kamel; Alouini, Mohamed-Slim; Deneire, Luc

    2010-01-01

    Mobile users with single antennas can still take advantage of spatial diversity through cooperative space-time encoded transmission. In this paper, we consider a scheme in which a relay chooses to cooperate only if its source-relay channel

  18. An On-Time Power-Aware Scheduling Scheme for Medical Sensor SoC-Based WBAN Systems

    OpenAIRE

    Hwang, Tae-Ho; Kim, Dong-Sun; Kim, Jung-Guk

    2012-01-01

    The focus of many leading technologies in the field of medical sensor systems is on low power consumption and robust data transmission. For example, the implantable cardioverter-defibrillator (ICD), which is used to maintain the heart in a healthy state, requires a reliable wireless communication scheme with an extremely low duty-cycle, high bit rate, and energy-efficient media access protocols. Because such devices must be sustained for over 5 years without access to battery replacement, the...

  19. Wine quality, reputation, denominations: How cooperatives and private wineries compete?

    Directory of Open Access Journals (Sweden)

    Schamel Guenter H.

    2014-01-01

    Full Text Available We analyze how cooperatives in Northern Italy (Alto Adige and Trentino compete with private wineries regarding product quality and reputation, i.e. if firm organization affects wine quality and winery reputation. Moreover, we examine if cooperatives with deep roots in their local economy specialize in specific regional denomination rules (i.e. DOC, IGT. Compared to private wineries, cooperatives face additional challenges in order to raise wine quality, among them appropriate incentives that induce individual growers to supply high quality grapes (e.g. vineyard management and grape pricing schemes to lower yields. The quality reputation of a winery with consumers depends crucially on its winemaking skills. Wine regions differ with respect to climatic conditions and quality denomination rules. Assuming similar climatic conditions within wine regions as well as winemaking skills between firms, incentive schemes to induce individual growers to supply high quality grapes and quality denomination rules remain crucial determinants of wine quality and winery reputation when comparing different regions and firm organizational forms. The data set analyzed allows differentiating local cooperatives vs. private wineries and denotes retail prices, wine quality evaluations, indicators for winery reputation, and distinct denomination rules. We employ a hedonic pricing model in order to test the following hypothesis: First, wines produced by cooperatives suffer a significant reputation and/or wine quality discount relative to wines from private producers. Second, cooperatives and/or private wineries specialize in specific wine denominations for which they receive a price premium relative the competing organizational form. Our results are mixed. However, we reject the hypothesis that cooperatives suffer a reputation/wine quality discount relative to private producers for the Alto Adige wine region. Moreover, we find that regional cooperatives and private

  20. An On-Time Power-Aware Scheduling Scheme for Medical Sensor SoC-Based WBAN Systems

    Directory of Open Access Journals (Sweden)

    Jung-Guk Kim

    2012-12-01

    Full Text Available The focus of many leading technologies in the field of medical sensor systems is on low power consumption and robust data transmission. For example, the implantable cardioverter-defibrillator (ICD, which is used to maintain the heart in a healthy state, requires a reliable wireless communication scheme with an extremely low duty-cycle, high bit rate, and energy-efficient media access protocols. Because such devices must be sustained for over 5 years without access to battery replacement, they must be designed to have extremely low power consumption in sleep mode. Here, an on-time, energy-efficient scheduling scheme is proposed that performs power adjustments to minimize the sleep-mode current. The novelty of this scheduler is that it increases the determinacy of power adjustment and the predictability of scheduling by employing non-pre-emptible dual priority scheduling. This predictable scheduling also guarantees the punctuality of important periodic tasks based on their serialization, by using their worst case execution time and the power consumption optimization. The scheduler was embedded into a system on chip (SoC developed to support the wireless body area network—a wakeup-radio and wakeup-timer for implantable medical devices. This scheduling system is validated by the experimental results of its performance when used with life-time extensions of ICD devices.

  1. Cooperative Spatial Reuse with Transmit Beamforming in Multi-rate Wireless Networks

    DEFF Research Database (Denmark)

    Lu, Chenguang; Fitzek, Frank; Eggers, Patrick Claus F.

    2009-01-01

    We present a cooperative spatial reuse (CSR) scheme as a cooperative extension of the current TDMA-based MAC to enable spatial reuse in multi-rate wireless networks. We model spatial reuse as a cooperation problem on utilizing the time slots obtained from the TDMA-based MAC. In CSR, there are two...... operation modes. One is TDMA mode while the other is spatial reuse mode in which links transmit simultaneously. Links contribute their own time slots to form a cooperative group to do spatial reuse. Each link joins the group only if it can benefit in capacity or energy efficiency. Otherwise, the link...... will leave spatial reuse mode and switch back to TDMA. In this work, we focus on the transmit beamforming techniques to enable CSR by interference cancellation on MISO (Multiple Input Single Output) links. We compare the CSR scheme using zero-forcing (ZF) transmit beamforming, namely ZF-CSR, to the TDMA...

  2. Detecting nonlocal Cooper pair entanglement by optical Bell inequality violation

    Energy Technology Data Exchange (ETDEWEB)

    Nigg, Simon E.; Tiwari, Rakesh P.; Walter, Stefan; Schmidt, Thomas L. [Department of Physics, University of Basel, Klingelbergstrasse 82, 4056 Basel (Switzerland)

    2015-07-01

    Based on the Bardeen Cooper Schrieffer (BCS) theory of superconductivity, the coherent splitting of Cooper pairs from a superconductor to two spatially separated quantum dots has been predicted to generate nonlocal pairs of entangled electrons. In order to test this hypothesis, we propose a scheme to transfer the spin state of a split Cooper pair onto the polarization state of a pair of optical photons. We show that the produced photon pairs can be used to violate a Bell inequality, unambiguously demonstrating the entanglement of the split Cooper pairs.

  3. Detecting nonlocal Cooper pair entanglement by optical Bell inequality violation

    Science.gov (United States)

    Nigg, Simon E.; Tiwari, Rakesh P.; Walter, Stefan; Schmidt, Thomas L.

    2015-03-01

    Based on the Bardeen-Cooper-Schrieffer theory of superconductivity, the coherent splitting of Cooper pairs from a superconductor to two spatially separated quantum dots has been predicted to generate nonlocal pairs of entangled electrons. In order to test this hypothesis, we propose a scheme to transfer the spin state of a split Cooper pair onto the polarization state of a pair of optical photons. We show that the photon pairs produced can be used to violate a Bell inequality, unambiguously demonstrating the entanglement of the split Cooper pairs.

  4. Stakeholders Perspectives on the Success Drivers in Ghana's National Health Insurance Scheme - Identifying Policy Translation Issues.

    Science.gov (United States)

    Fusheini, Adam; Marnoch, Gordon; Gray, Ann Marie

    2016-10-01

    Ghana's National Health Insurance Scheme (NHIS), established by an Act of Parliament (Act 650), in 2003 and since replaced by Act 852 of 2012 remains, in African terms, unprecedented in terms of growth and coverage. As a result, the scheme has received praise for its associated legal reforms, clinical audit mechanisms and for serving as a hub for knowledge sharing and learning within the context of South-South cooperation. The scheme continues to shape national health insurance thinking in Africa. While the success, especially in coverage and financial access has been highlighted by many authors, insufficient attention has been paid to critical and context-specific factors. This paper seeks to fill that gap. Based on an empirical qualitative case study of stakeholders' views on challenges and success factors in four mutual schemes (district offices) located in two regions of Ghana, the study uses the concept of policy translation to assess whether the Ghana scheme could provide useful lessons to other African and developing countries in their quest to implement social/NHISs. In the study, interviewees referred to both 'hard and soft' elements as driving the "success" of the Ghana scheme. The main 'hard elements' include bureaucratic and legal enforcement capacities; IT; financing; governance, administration and management; regulating membership of the scheme; and service provision and coverage capabilities. The 'soft' elements identified relate to: the background/context of the health insurance scheme; innovative ways of funding the NHIS, the hybrid nature of the Ghana scheme; political will, commitment by government, stakeholders and public cooperation; social structure of Ghana (solidarity); and ownership and participation. Other developing countries can expect to translate rather than re-assemble a national health insurance programme in an incomplete and highly modified form over a period of years, amounting to a process best conceived as germination as opposed

  5. Alternative vision or utopian fantasy? Cooperation, empowerment and women's cooperative development in India.

    Science.gov (United States)

    Mayoux, L

    1995-01-01

    The discussion addresses the costs and benefits of working in cooperatives in India, imposed participation, methods for increasing incomes, preconceived models, the importance of meeting the actual needs of women, and participatory options. This author evaluated 10 producer cooperatives in West Bengal, Karnataka, and Tamil Nadu during 1984-92. It is argued that more discussion is needed on how ideals of cooperation and empowerment of women can occur simultaneous with the context in which cooperatives must operate. The ten study cooperatives were all officially registered cooperatives. Cooperatives varied in size, organizational structure, and forms of support. Four were determined to be successful in economic and participatory terms. Three were successful because of the efforts of the women themselves. All three cases were based on earning goals that were higher than the women could have achieved on their own. Six failed in terms of participatory decision making and cooperative operations. Lack of sufficient support and/or excessive bureaucratic red tape were involved in the six failures, but to varying degrees. Type of support and means of implementation were important in the six failures. All women used cooperatives as a means of increasing income. Participation rules were imposed by outside agencies. Women were given "cooperative" training. Disputes occurred because women selected to power positions were powerful leaders outside the cooperative. Consensus was difficult to reach. There were conflicts of interest between different departments. Quality control was made difficult by women's inability to provide discipline. Personal conflicts from outside were carried on within the cooperative. Incomes could be improved by training women in local marketing and networking, insuring adequate resources and capital, and providing savings schemes. Gender inequalities were a key factor limiting income for women, but cooperatives did not address this issue. Gains for women

  6. Optimization of reference library used in content-based medical image retrieval scheme

    International Nuclear Information System (INIS)

    Park, Sang Cheol; Sukthankar, Rahul; Mummert, Lily; Satyanarayanan, Mahadev; Zheng Bin

    2007-01-01

    Building an optimal image reference library is a critical step in developing the interactive computer-aided detection and diagnosis (I-CAD) systems of medical images using content-based image retrieval (CBIR) schemes. In this study, the authors conducted two experiments to investigate (1) the relationship between I-CAD performance and size of reference library and (2) a new reference selection strategy to optimize the library and improve I-CAD performance. The authors assembled a reference library that includes 3153 regions of interest (ROI) depicting either malignant masses (1592) or CAD-cued false-positive regions (1561) and an independent testing data set including 200 masses and 200 false-positive regions. A CBIR scheme using a distance-weighted K-nearest neighbor algorithm is applied to retrieve references that are considered similar to the testing sample from the library. The area under receiver operating characteristic curve (A z ) is used as an index to evaluate the I-CAD performance. In the first experiment, the authors systematically increased reference library size and tested I-CAD performance. The result indicates that scheme performance improves initially from A z =0.715 to 0.874 and then plateaus when the library size reaches approximately half of its maximum capacity. In the second experiment, based on the hypothesis that a ROI should be removed if it performs poorly compared to a group of similar ROIs in a large and diverse reference library, the authors applied a new strategy to identify 'poorly effective' references. By removing 174 identified ROIs from the reference library, I-CAD performance significantly increases to A z =0.914 (p<0.01). The study demonstrates that increasing reference library size and removing poorly effective references can significantly improve I-CAD performance

  7. REGIONAL COOPERATION AND INTEGRATION IN SUB-SAHARAN AFRICA

    OpenAIRE

    Martina Metzger

    2008-01-01

    Africa has a long tradition of regional cooperation, its trade and monetary integration schemes being the oldest in the developing world. This paper analyses the state of regional integration with respect to trade and financial relations in selected regional schemes in Central, Southern and West Africa. The paper concludes that in particular regional monetary integration offers advantages in terms of monetary stability, growth, competitiveness, deepening of financial markets and ownership com...

  8. Energy-efficient power allocation of two-hop cooperative systems with imperfect channel estimation

    KAUST Repository

    Amin, Osama; Bedeer, Ebrahim; Ahmed, Mohamed H.; Dobre, Octavia A.; Alouini, Mohamed-Slim

    2015-01-01

    an accurate EE metric for cooperative two-hop systems that use the amplify-and-forward relaying scheme. Different from the existing research that assumes the availability of perfect channel state information (CSI) at the communication cooperative nodes, we

  9. Capacity limits introduced by data fusion on cooperative spectrum sensing under correlated environments

    DEFF Research Database (Denmark)

    Pratas, Nuno; Marchetti, Nicola; Rodrigues, Antonio

    2010-01-01

    spectrum sensing scheme, by measuring the perceived capacity limits introduced by the use of data fusion on cooperative sensing schemes. The analysis is supported by evaluation metrics which account for the perceived capacity limits. The analysis is performed along the data fusion chain, comparing several...... scenarios encompassing different degree of environment correlation between the cluster nodes, number of cluster nodes and sensed channel occupation statistics. Through this study we motivate that to maximize the perceived capacity by the cooperative spectrum sensing, the use of data fusion needs...

  10. Emergence of competition and cooperation in an evolutionary resource war model

    Science.gov (United States)

    Lamantia, Fabio

    2018-05-01

    In this paper we introduce a simple punishment scheme in the 'great fish war' model with many players. An imitative process regulates how a coalition of cooperators is dynamically updated over time. An intuitive effect of adding sanctions is that they could enlarge the possible sustainable coalitions. However, the evolution toward full cooperation can be sustained by a punishment scheme provided that a critical mass of agents enforces cooperation at the beginning of the game. Moreover, we show the presence of thresholds in sanctions or in the cost for punishing such that if these thresholds are trespassed then dramatic reductions in the resource level and in the agents' welfare may occur as a consequence of free riding effects. We show by some examples that these phenomena are due to the presence of tipping points in the model.

  11. On cooperative and efficient overlay network evolution based on a group selection pattern.

    Science.gov (United States)

    Nakao, Akihiro; Wang, Yufeng

    2010-04-01

    In overlay networks, the interplay between network structure and dynamics remains largely unexplored. In this paper, we study dynamic coevolution between individual rational strategies (cooperative or defect) and the overlay network structure, that is, the interaction between peer's local rational behaviors and the emergence of the whole network structure. We propose an evolutionary game theory (EGT)-based overlay topology evolution scheme to drive a given overlay into the small-world structure (high global network efficiency and average clustering coefficient). Our contributions are the following threefold: From the viewpoint of peers' local interactions, we explicitly consider the peer's rational behavior and introduce a link-formation game to characterize the social dilemma of forming links in an overlay network. Furthermore, in the evolutionary link-formation phase, we adopt a simple economic process: Each peer keeps one link to a cooperative neighbor in its neighborhood, which can slightly speed up the convergence of cooperation and increase network efficiency; from the viewpoint of the whole network structure, our simulation results show that the EGT-based scheme can drive an arbitrary overlay network into a fully cooperative and efficient small-world structure. Moreover, we compare our scheme with a search-based economic model of network formation and illustrate that our scheme can achieve the experimental and analytical results in the latter model. In addition, we also graphically illustrate the final overlay network structure; finally, based on the group selection model and evolutionary set theory, we theoretically obtain the approximate threshold of cost and draw the conclusion that the small value of the average degree and the large number of the total peers in an overlay network facilitate the evolution of cooperation.

  12. Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yi Sun

    2014-01-01

    Full Text Available With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients’ health information and doctors’ diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions.

  13. Undergraduate medical education in the Gulf Cooperation Council: a multi-countries study (Part 1).

    Science.gov (United States)

    Hamdy, H; Telmesani, A W; Al Wardy, N; Abdel-Khalek, N; Carruthers, G; Hassan, F; Kassab, S; Abu-Hijleh, M; Al-Roomi, K; O'malley, K; El Din Ahmed, M G; Raj, G A; Rao, G M; Sheikh, K

    2010-01-01

    The Gulf Cooperation Council (GCC) countries have witnessed over the last 40 years a rapid and major social, cultural, and economic transformation. The development of medical education in the region is relatively new, dating from the late 1960s. An important goal among the medical colleges in the region is to graduate national physicians who can populate the healthcare service of each country. The aim of this study is to provide understanding of undergraduate medical education in each of the six GCC countries and the challenges that each face. This is a descriptive cross-sectional study. Fourteen senior medical faculty were requested to submit information about undergraduate medical education in their own countries, focusing on its historical background, student selection, curriculum, faculty, and challenges. The information provided was about 27 medical colleges: 16 from the Kingdom of Saudi Arabia (KSA), five from the United Arab Emirates (UAE), two from the Kingdom of Bahrain, two from Sultanate of Oman, one from Kuwait, and one from the State of Qatar. It was found that older colleges are reviewing their curriculum while new colleges are developing their programs following current trends in medical education, particularly problem-based learning and integrated curricula. The programs as described 'on paper' look good but what needs to be evaluated is the curriculum 'in action'. Faculty development in medical education is taking place in most of the region's medical colleges. The challenges reported were mainly related to shortages of faculty, availability of clinical training facilities and the need to more integration with the National Health Care services. Attention to quality, standards, and accreditation is considered essential by all colleges.

  14. Undergraduate medical education in the Gulf Cooperation Council: a multi-countries study (Part 2).

    Science.gov (United States)

    Hamdy, H; Telmesani, A W; Wardy, N Al; Abdel-Khalek, N; Carruthers, G; Hassan, F; Kassab, S; Abu-Hijleh, M; Al-Roomi, K; O'Malley, K; El Din Ahmed, M G; Raj, G A; Rao, G M; Sheikh, J

    2010-01-01

    The Gulf Cooperation Council (GCC) countries have witnessed over the last 40 years a rapid and major social, cultural, and economic transformation. The development of medical education in the region is relatively new, dating from the late 1960s. An important goal among the medical colleges in the region is to graduate national physicians who can populate the healthcare service of each country. The aim of this study is to provide understanding of undergraduate medical education in each of the six GCC countries and the challenges that each face. This is a descriptive cross-sectional study. Fourteen senior medical faculty were requested to submit information about undergraduate medical education in their own countries, focusing on its historical background, student selection, curriculum, faculty, and challenges. The information provided was about 27 medical colleges: 16 from the Kingdom of Saudi Arabia (KSA), five from the United Arab Emirates, two from the Kingdom of Bahrain, two from Sultanate of Oman, one from Kuwait and one from the State of Qatar. It was found that older colleges are reviewing their curriculum while new colleges are developing their programs following current trends in medical education particularly problem-based learning and integrated curricula. The programs as described 'on paper' look good but what needs to be evaluated is the curriculum 'in action'. Faculty development in medical education is taking place in most of the region's medical colleges. The challenges reported were mainly related to shortages of faculty, availability of clinical training facilities, and the need to more integration with the National Health Care services. Attention to quality, standards, and accreditation is considered essential by all colleges.

  15. Detecting nonlocal Cooper pair entanglement by optical Bell inequality violation

    OpenAIRE

    Nigg, Simon E.; Tiwari, Rakesh P.; Walter, Stefan; Schmidt, Thomas L.

    2014-01-01

    Based on the Bardeen Cooper Schrieffer (BCS) theory of superconductivity, the coherent splitting of Cooper pairs from a superconductor to two spatially separated quantum dots has been predicted to generate nonlocal pairs of entangled electrons. In order to test this hypothesis, we propose a scheme to transfer the spin state of a split Cooper pair onto the polarization state of a pair of optical photons. We show that the produced photon pairs can be used to violate a Bell inequality, unambiguo...

  16. Game Theoretic Analysis of Pricing and Cooperative Advertising in a Reverse Supply Chain for Unwanted Medications in Households

    Directory of Open Access Journals (Sweden)

    Meina Hua

    2017-10-01

    Full Text Available Improper disposal of household unwanted medications (UMs is an emergency problem around the world that adversely affects the sustainability of the environment and human’s health. However, the current disposal practices, mainly based on advertising and collecting status, are unsatisfactory in most countries and regions. Thus, some scholars proposed an alternative disposal practice that is to provide incentives to customers. This study aims to compare a Single Model (advertising only with a Joint Model (advertising with take-back pricing in a two-echelon reverse supply chain (RSC that is composed of one disposer and one collector. In each model, four games (non-cooperative, collector as the Stackelberg leader, disposer as the Stackelberg leader, and cooperative were established in order to identify the optimal pricing and advertising strategies for both members. The results of the study indicate that there is a Pareto dominant range for Joint Model compared to Single Model, whereas Single Model has no Pareto improvement in any games. Furthermore, in non-cooperative games of Joint Model, it is better to implement the leader-follower structure rather than simultaneous movement structure. Additionally, it is verified that the cooperative game is feasible, which leads to the cooperation between the disposer and the collector, and the extra profit from the cooperation can be shared based on the Nash bargaining game. However, in Single Model, it is better for the disposer to act as a channel leader and the collector figures the follower.

  17. Modeling and Simulation of Handover Scheme in Integrated EPON-WiMAX Networks

    DEFF Research Database (Denmark)

    Yan, Ying; Dittmann, Lars

    2011-01-01

    In this paper, we tackle the seamless handover problem in integrated optical wireless networks. Our model applies for the convergence network of EPON and WiMAX and a mobilityaware signaling protocol is proposed. The proposed handover scheme, Integrated Mobility Management Scheme (IMMS), is assisted...... by enhancing the traditional MPCP signaling protocol, which cooperatively collects mobility information from the front-end wireless network and makes centralized bandwidth allocation decisions in the backhaul optical network. The integrated network architecture and the joint handover scheme are simulated using...... OPNET modeler. Results show validation of the protocol, i.e., integrated handover scheme gains better network performances....

  18. Algebraic Number Precoded OFDM Transmission for Asynchronous Cooperative Multirelay Networks

    Directory of Open Access Journals (Sweden)

    Hua Jiang

    2014-01-01

    Full Text Available This paper proposes a space-time block coding (STBC transmission scheme for asynchronous cooperative systems. By combination of rotated complex constellations and Hadamard transform, these constructed codes are capable of achieving full cooperative diversity with the analysis of the pairwise error probability (PEP. Due to the asynchronous characteristic of cooperative systems, orthogonal frequency division multiplexing (OFDM technique with cyclic prefix (CP is adopted for combating timing delays from relay nodes. The total transmit power across the entire network is fixed and appropriate power allocation can be implemented to optimize the network performance. The relay nodes do not require decoding and demodulation operation, resulting in a low complexity. Besides, there is no delay for forwarding the OFDM symbols to the destination node. At the destination node the received signals have the corresponding STBC structure on each subcarrier. In order to reduce the decoding complexity, the sphere decoder is implemented for fast data decoding. Bit error rate (BER performance demonstrates the effectiveness of the proposed scheme.

  19. Cooperative Spatial Retreat for Resilient Drone Networks †

    Science.gov (United States)

    Kang, Jin-Hyeok; Kwon, Young-Min; Park, Kyung-Joon

    2017-01-01

    Drones are broadening their scope to various applications such as networking, package delivery, agriculture, rescue, and many more. For proper operation of drones, reliable communication should be guaranteed because drones are remotely controlled. When drones experience communication failure due to bad channel condition, interference, or jamming in a certain area, one existing solution is to exploit mobility or so-called spatial retreat to evacuate them from the communication failure area. However, the conventional spatial retreat scheme moves drones in random directions, which results in inefficient movement with significant evacuation time and waste of battery lifetime. In this paper, we propose a novel spatial retreat technique that takes advantage of cooperation between drones for resilient networking, which is called cooperative spatial retreat (CSR). Our performance evaluation shows that the proposed CSR significantly outperforms existing schemes. PMID:28467390

  20. The South African traditional health practitioner as a beneficiary of and provider to medical funds and schemes through the traditional health practitioners Act (Act No 22, 2007: A present-day perspective

    Directory of Open Access Journals (Sweden)

    Gabriel Louw

    2017-01-01

    Full Text Available Background Payments to traditional health practitioners for services rendered from medical funds and schemes, as envisaged by the Traditional Health Practitioners Act (Act No 22, 2007, is controversial and a point of contention. Such policy was followed before in South Africa in the 1990s when some funds and schemes offered limited alternative healthcare benefits for members consulting traditional healers. Aims The study aimed to offer a contemporary view of the South African traditional health practitioner as a provider to and beneficiary of the medical funds and schemes through the Traditional Health Practitioners Act (No 22, 2007. Methods This is an exploratory and descriptive study that makes use of an historical approach by means of investigation and a literature review. The emphasis is on using current documentation like articles, books and newspapers as primary sources to reflect on the South African traditional health practitioner as a provider to and beneficiary of the medical schemes and funds through the Traditional Health Practitioners Act (No 22, 2007. The findings are offered in narrative form. Results It seems as if the South African authorities completely misunderstand the future implications of the Traditional Health Practitioners Act (No 22, 2007 on healthcare. This is specifically true when it comes to the right to claim from medical funds and schemes for services rendered by traditional health practitioners and the possible extra costs for these medical schemes and funds. Conclusion The implications of Section 42(2 of the Traditional Health Practitioners Act (No 22, 2007 which aims to set up a claiming process for traditional health practitioners, seems to be very problematic. The fact that Act No 22 (2007 has not been enacted properly nine years after its promulgation has put a halt on the professionalization of traditional healers until 2015. This also affected their status as a beneficiary of and service provider to the

  1. Cooperative Learning for Distributed In-Network Traffic Classification

    Science.gov (United States)

    Joseph, S. B.; Loo, H. R.; Ismail, I.; Andromeda, T.; Marsono, M. N.

    2017-04-01

    Inspired by the concept of autonomic distributed/decentralized network management schemes, we consider the issue of information exchange among distributed network nodes to network performance and promote scalability for in-network monitoring. In this paper, we propose a cooperative learning algorithm for propagation and synchronization of network information among autonomic distributed network nodes for online traffic classification. The results show that network nodes with sharing capability perform better with a higher average accuracy of 89.21% (sharing data) and 88.37% (sharing clusters) compared to 88.06% for nodes without cooperative learning capability. The overall performance indicates that cooperative learning is promising for distributed in-network traffic classification.

  2. A Novel Cooperation-Based Network Coding Scheme for Walking Scenarios in WBANs

    Directory of Open Access Journals (Sweden)

    Hongyun Zhang

    2017-01-01

    Full Text Available In Wireless Body Area Networks (WBANs, the tradeoff between network throughput and energy efficiency remains a key challenge. Most current transmission schemes try to cope with the challenge from the perspective of general Wireless Sensor Networks (WSNs, which may not take the peculiarities of WBAN channels into account. In this paper, we take advantage of the correlation of on-body channels in walking scenarios to achieve a better tradeoff between throughput and energy consumption. We first analyze the characteristics of on-body channels based on realistic channel gain datasets, which are collected by our customized wireless transceivers in walking scenarios. The analytical results confirm the rationale of our newly proposed transmission scheme A3NC, which explores the combination of the aggregative allocation (AA mechanism in MAC layer and the Analog Network Coding (ANC technique in PHY layer. Both theoretical analyses and simulation results show that the A3NC scheme achieves significant improvement in upload throughput and energy efficiency, compared to the conventional approaches.

  3. Information Infrastructure for Cooperative Research in Neuroscience

    Directory of Open Access Journals (Sweden)

    P. J. Durka

    2009-01-01

    Full Text Available The paper describes a framework for efficient sharing of knowledge between research groups, which have been working for several years without flaws. The obstacles in cooperation are connected primarily with the lack of platforms for effective exchange of experimental data, models, and algorithms. The solution to these problems is proposed by construction of the platform (EEG.pl with the semantic aware search scheme between portals. The above approach implanted in the international cooperative projects like NEUROMATH may bring the significant progress in designing efficient methods for neuroscience research.

  4. The effects of China's urban basic medical insurance schemes on the equity of health service utilisation: evidence from Shaanxi Province.

    Science.gov (United States)

    Zhou, Zhongliang; Zhu, Liang; Zhou, Zhiying; Li, Zhengya; Gao, Jianmin; Chen, Gang

    2014-03-09

    In order to alleviate the problem of "Kan Bing Nan, Kan Bing Gui" (medical treatment is difficult to access and expensive) and improve the equity of health service utilisation for urban residents in China, the Urban Employee Basic Medical Insurance scheme (UEBMI) and Urban Resident Basic Medical Insurance scheme (URBMI) were established in 1999 and 2007, respectively. This study aims to analyse the effects of UEBMI and URBMI on the equity of outpatient and inpatient utilisation in Shaanxi Province, China. Using the data from the fourth National Health Services Survey in Shaanxi Province, the method of Propensity Score Matching was employed to generate comparable samples between the insured and uninsured residents, through a one-to-one match algorithm. Next, based on the matched data, the method of decomposition of the concentration index was employed to compare the horizontal inequity indexes of health service utilisation between the UEBMI/URBMI insured and the matched uninsured residents. For the UEBMI insured and matched uninsured residents, the horizontal inequity indexes of outpatient visits are 0.1256 and -0.0511 respectively, and the horizontal inequity indexes of inpatient visits are 0.1222 and 0.2746 respectively. Meanwhile, the horizontal inequity indexes of outpatient visits are -0.1593 and 0.0967 for the URBMI insured and matched uninsured residents, and the horizontal inequity indexes of inpatient visits are 0.1931 and 0.3199 respectively. The implementation of UEBMI increased the pro-rich inequity of outpatient utilisation (rich people utilise outpatient facilities more than the poor people) and the implementation of URBMI increased the pro-poor inequity of outpatient utilisation. Both of these two health insurance schemes reduced the pro-rich inequity of inpatient utilisation.

  5. Performance of Cooperative Spectrum Sensing over Non-Identical Fading Environments

    KAUST Repository

    Rao, Anlei; Alouini, Mohamed-Slim

    2012-01-01

    Different from previous works in cooperative spec- trum sensing that assumed the sensing channels independent identically distributed (i.i.d.), we investigate in this paper the independent but not identically distributed (i.n.i.d.) situations. In particular, we derive the false-alarm probability and the detection probability of cooperative spectrum sensing with the scheme of energy fusion over i.n.i.d. Rayleigh, Nakagami, and Rician fading channels. From the selected numerical results, we can see that cooperative spectrum sensing still gives considerably better performance even over i.n.i.d. fading environments.

  6. Performance of Cooperative Spectrum Sensing over Non-Identical Fading Environments

    KAUST Repository

    Rao, Anlei

    2012-09-08

    Different from previous works in cooperative spec- trum sensing that assumed the sensing channels independent identically distributed (i.i.d.), we investigate in this paper the independent but not identically distributed (i.n.i.d.) situations. In particular, we derive the false-alarm probability and the detection probability of cooperative spectrum sensing with the scheme of energy fusion over i.n.i.d. Rayleigh, Nakagami, and Rician fading channels. From the selected numerical results, we can see that cooperative spectrum sensing still gives considerably better performance even over i.n.i.d. fading environments.

  7. Game Theoretic Analysis of Cooperative Message Forwarding in Opportunistic Mobile Networks.

    Science.gov (United States)

    Pal, Sujata; Saha, Barun Kumar; Misra, Sudip

    2017-12-01

    In cooperative communication, a set of players forming a coalition ensures communal behavior among themselves by helping one another in message forwarding. Opportunistic mobile networks (OMNs) require multihop communications for transferring messages from the source to the destination nodes. However, noncooperative nodes only forward their own messages to others, and drop others' messages upon receiving them. So, the message delivery overhead increases in OMN. For minimizing the overhead and maximizing the delivery rate, we propose two coalition-based cooperative schemes: 1) simple coalition formation (SCF) and 2) overlapping coalition formation (OCF) game. In SCF, we consider the presence of a central information center, whereas OCF is a fully distributed scheme. In SCF, coalitions are disjoint, whereas in OCF, a node may be the member of multiple coalitions at the same time. All nodes in a coalition help each other cooperatively by forwarding group messages to the intermediate or destination nodes. The goal of the nodes is to achieve high success rate in delivering messages. The proposed SCF scheme is cohesive, in which disjoint coalitions always combine to form grand coalition. In OCF, a node reaches a stable grand coalition when all the nodes of the OMN are members of overlapping coalition of the node. No node gains by deviating from the grand coalition in SCF and OCF. Simulation results based on synthetic mobility model and real-life traces show that the message delivery ratio of OMNs increase by up to 67%, as compared to the noncooperative scenario. Moreover, the message overhead ratio using the proposed coalition-based schemes reduces by up to about (1/3)rd of that of the noncooperative communication scheme.

  8. A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.

    Science.gov (United States)

    Chaudhry, Shehzad Ashraf; Khan, Muhammad Tawab; Khan, Muhammad Khurram; Shon, Taeshik

    2016-11-01

    Recently several authentication schemes are proposed for telecare medicine information system (TMIS). Many of such schemes are proved to have weaknesses against known attacks. Furthermore, numerous such schemes cannot be used in real time scenarios. Because they assume a single server for authentication across the globe. Very recently, Amin et al. (J. Med. Syst. 39(11):180, 2015) designed an authentication scheme for secure communication between a patient and a medical practitioner using a trusted central medical server. They claimed their scheme to extend all security requirements and emphasized the efficiency of their scheme. However, the analysis in this article proves that the scheme designed by Amin et al. is vulnerable to stolen smart card and stolen verifier attacks. Furthermore, their scheme is having scalability issues along with inefficient password change and password recovery phases. Then we propose an improved scheme. The proposed scheme is more practical, secure and lightweight than Amin et al.'s scheme. The security of proposed scheme is proved using the popular automated tool ProVerif.

  9. A Novel Two-Stage Dynamic Spectrum Sharing Scheme in Cognitive Radio Networks

    Institute of Scientific and Technical Information of China (English)

    Guodong Zhang; Wei Heng; Tian Liang; Chao Meng; Jinming Hu

    2016-01-01

    In order to enhance the efficiency of spectrum utilization and reduce communication overhead in spectrum sharing process,we propose a two-stage dynamic spectrum sharing scheme in which cooperative and noncooperative modes are analyzed in both stages.In particular,the existence and the uniqueness of Nash Equilibrium (NE) strategies for noncooperative mode are proved.In addition,a distributed iterative algorithm is proposed to obtain the optimal solutions of the scheme.Simulation studies are carried out to show the performance comparison between two modes as well as the system revenue improvement of the proposed scheme compared with a conventional scheme without a virtual price control factor.

  10. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Kumar, Neeraj

    2015-11-01

    In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System, where the patient and medical server exchange medical information using Internet. We have found that most of the schemes are not usable for practical applications due to known security weaknesses. It is also worth to note that unrestricted number of patients login to the single medical server across the globe. Therefore, the computation and maintenance overhead would be high and the server may fail to provide services. In this article, we have designed a medical system architecture and a standard mutual authentication scheme for single medical server, where the patient can securely exchange medical data with the doctor(s) via trusted central medical server over any insecure network. We then explored the security of the scheme with its resilience to attacks. Moreover, we formally validated the proposed scheme through the simulation using Automated Validation of Internet Security Schemes and Applications software whose outcomes confirm that the scheme is protected against active and passive attacks. The performance comparison demonstrated that the proposed scheme has lower communication cost than the existing schemes in literature. In addition, the computation cost of the proposed scheme is nearly equal to the exiting schemes. The proposed scheme not only efficient in terms of different security attacks, but it also provides an efficient login, mutual authentication, session key agreement and verification and password update phases along with password recovery.

  11. Cooperative Content Distribution over Wireless Networks for Energy and Delay Minimization

    KAUST Repository

    Atat, Rachad

    2012-06-01

    Content distribution with mobile-to-mobile cooperation is studied. Data is sent to mobile terminals on a long range link then the terminals exchange the content using an appropriate short range wireless technology. Unicasting and multicasting are investigated, both on the long range and short range links. Energy minimization is formulated as an optimization problem for each scenario, and the optimal solutions are determined in closed form. Moreover, the schemes are applied in public safety vehicular networks, where Long Term Evolution (LTE) network is used for the long range link, while IEEE 802.11 p is considered for inter-vehicle collaboration on the short range links. Finally, relay-based multicasting is applied in high speed trains for energy and delay minimization. Results show that cooperative schemes outperform non-cooperative ones and other previous related work in terms of energy and delay savings. Furthermore, practical implementation aspects of the proposed methods are also discussed.

  12. Prototyping a Hybrid Cooperative and Tele-robotic Surgical System for Retinal Microsurgery.

    Science.gov (United States)

    Balicki, Marcin; Xia, Tian; Jung, Min Yang; Deguet, Anton; Vagvolgyi, Balazs; Kazanzides, Peter; Taylor, Russell

    2011-06-01

    This paper presents the design of a tele-robotic microsurgical platform designed for development of cooperative and tele-operative control schemes, sensor based smart instruments, user interfaces and new surgical techniques with eye surgery as the driving application. The system is built using the distributed component-based cisst libraries and the Surgical Assistant Workstation framework. It includes a cooperatively controlled EyeRobot2, a da Vinci Master manipulator, and a remote stereo visualization system. We use constrained optimization based virtual fixture control to provide Virtual Remote-Center-of-Motion (vRCM) and haptic feedback. Such system can be used in a hybrid setup, combining local cooperative control with remote tele-operation, where an experienced surgeon can provide hand-over-hand tutoring to a novice user. In another scheme, the system can provide haptic feedback based on virtual fixtures constructed from real-time force and proximity sensor information.

  13. Several comparison result of two types of equilibrium (Pareto Schemes and Stackelberg Scheme) of game theory approach in probabilistic vendor – buyer supply chain system with imperfect quality

    Science.gov (United States)

    Setiawan, R.

    2018-05-01

    In this paper, Economic Order Quantity (EOQ) of the vendor-buyer supply-chain model under a probabilistic condition with imperfect quality items has been analysed. The analysis is delivered using two concepts in game theory approach, which is Stackelberg equilibrium and Pareto Optimal, under non-cooperative and cooperative games, respectively. Another result is getting acomparison of theoptimal result between integrated scheme and game theory approach based on analytical and numerical result using appropriate simulation data.

  14. A Low-Overhead Cooperative Retransmission Scheme for IR-UWB Networks

    Directory of Open Access Journals (Sweden)

    Ghasem Naddafzadeh Shirazi

    2008-01-01

    Full Text Available The UWB unique properties such as fine ranging and immunity to small scale fading are utilized in order to exploit the multiuser diversity in UWB networks. The optimal cooperation strategies in the absence of control packet overhead are analyzed in the proactive and reactive settings. It is shown that the proposed method achieves a considerable diversity gain while minimizing the overhead of control packet exchange that is required for coordination among the relays.

  15. Special funding schemes for innovative medical devices in French hospitals: the pros and cons of two different approaches.

    Science.gov (United States)

    Martelli, Nicolas; van den Brink, Hélène

    2014-07-01

    Financing innovative medical devices is an important challenge for national health policy makers, and a crucial issue for hospitals. However, when innovative medical devices are launched on the European market there is generally little clinical evidence regarding both efficacy and safety, both because of the flaws in the European system for regulating such devices, and because they are at an early stage of development. To manage the uncertainty surrounding the reimbursement of innovation, several European countries have set up temporary funding schemes to generate evidence about the effectiveness of devices. This article explores two different French approaches to funding innovative in-hospital devices and collecting supplementary data: the coverage with evidence development (CED) scheme introduced under Article L. 165-1-1 of the French Social Security Code; and national programs for hospital-based research. We discuss pros and cons of both approaches in the light of CED policies in Germany and the UK. The CED policies for devices share common limitations. Thus, transparency of CED processes should be enhanced and decisions need to be made in a timely way. Finally, we think that closer collaboration between manufacturers, health authorities and hospitals is essential to make CED policies more operational. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  16. Performance Analysis of Secondary Link with Cross-Layer Design and Cooperative Relay in Cognitive Radio Networks

    KAUST Repository

    Ma, Hao

    2012-06-01

    In this thesis, we investigate two different system infrastructures in underlay cognitive radio network, in which two popular techniques, cross-layer design and cooperative communication, are considered, respectively. In particular, we introduce the Aggressive Adaptive Modulation and Coding (A-AMC) into the cross-layer design and achieve the optimal boundary points in closed form to choose the AMC and A-AMC transmission modes by taking into account the Channel State Information (CSI) from the secondary transmitter to both the primary receiver and the secondary receiver. What’s more, for the cooperative communication design, we consider three different relay selection schemes: Partial Relay Selection, Opportunistic Relay Selection and Threshold Relay Selection. The Probability Density Functions (PDFs) of the Signal-to- Noise Ratio (SNR) in each hop for different selection schemes are provided, and then the exact closed-form expressions for the end-to-end packet loss rate in the secondary link considering the cooperation of the Decode-and-Forward (DF) relay for different relay selection schemes are derived.

  17. Cooperative epistemic work in medical practice

    DEFF Research Database (Denmark)

    Bansler, Jørgen P.; Havn, Erling Carl; Schmidt, Kjeld

    2016-01-01

    We examine an important part of the medical record that has not been studied extensively: physicians’ clinical notes. These notes constitute an explanatory medical narrative that documents the patient’s illness trajectory by combining each physician’s notes into a common text. Although several pr....... We conclude by discussing the implications of this research for the design of Electronic Medical Record (EMR) systems.......We examine an important part of the medical record that has not been studied extensively: physicians’ clinical notes. These notes constitute an explanatory medical narrative that documents the patient’s illness trajectory by combining each physician’s notes into a common text. Although several...... prior CSCW studies have addressed the role of the medical record in patient care, they have not dealt specifically with the role, structure, and content of these notes. In this article, we present a detailed analysis of a set of physicians’ clinical notes recording the acute hospitalization...

  18. Throughput Maximization for Cognitive Radio Networks Using Active Cooperation and Superposition Coding

    KAUST Repository

    Hamza, Doha R.

    2015-02-13

    We propose a three-message superposition coding scheme in a cognitive radio relay network exploiting active cooperation between primary and secondary users. The primary user is motivated to cooperate by substantial benefits it can reap from this access scenario. Specifically, the time resource is split into three transmission phases: The first two phases are dedicated to primary communication, while the third phase is for the secondary’s transmission. We formulate two throughput maximization problems for the secondary network subject to primary user rate constraints and per-node power constraints with respect to the time durations of primary transmission and the transmit power of the primary and the secondary users. The first throughput maximization problem assumes a partial power constraint such that the secondary power dedicated to primary cooperation, i.e. for the first two communication phases, is fixed apriori. In the second throughput maximization problem, a total power constraint is assumed over the three phases of communication. The two problems are difficult to solve analytically when the relaying channel gains are strictly greater than each other and strictly greater than the direct link channel gain. However, mathematically tractable lowerbound and upperbound solutions can be attained for the two problems. For both problems, by only using the lowerbound solution, we demonstrate significant throughput gains for both the primary and the secondary users through this active cooperation scheme. We find that most of the throughput gains come from minimizing the second phase transmission time since the secondary nodes assist the primary communication during this phase. Finally, we demonstrate the superiority of our proposed scheme compared to a number of reference schemes that include best relay selection, dual-hop routing, and an interference channel model.

  19. Throughput Maximization for Cognitive Radio Networks Using Active Cooperation and Superposition Coding

    KAUST Repository

    Hamza, Doha R.; Park, Kihong; Alouini, Mohamed-Slim; Aissa, Sonia

    2015-01-01

    We propose a three-message superposition coding scheme in a cognitive radio relay network exploiting active cooperation between primary and secondary users. The primary user is motivated to cooperate by substantial benefits it can reap from this access scenario. Specifically, the time resource is split into three transmission phases: The first two phases are dedicated to primary communication, while the third phase is for the secondary’s transmission. We formulate two throughput maximization problems for the secondary network subject to primary user rate constraints and per-node power constraints with respect to the time durations of primary transmission and the transmit power of the primary and the secondary users. The first throughput maximization problem assumes a partial power constraint such that the secondary power dedicated to primary cooperation, i.e. for the first two communication phases, is fixed apriori. In the second throughput maximization problem, a total power constraint is assumed over the three phases of communication. The two problems are difficult to solve analytically when the relaying channel gains are strictly greater than each other and strictly greater than the direct link channel gain. However, mathematically tractable lowerbound and upperbound solutions can be attained for the two problems. For both problems, by only using the lowerbound solution, we demonstrate significant throughput gains for both the primary and the secondary users through this active cooperation scheme. We find that most of the throughput gains come from minimizing the second phase transmission time since the secondary nodes assist the primary communication during this phase. Finally, we demonstrate the superiority of our proposed scheme compared to a number of reference schemes that include best relay selection, dual-hop routing, and an interference channel model.

  20. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  1. Outage analysis of blind cooperative diversity

    KAUST Repository

    Tourki, Kamel; Alouini, Mohamed-Slim

    2011-01-01

    Mobile users with single antennas can still take advantage of spatial diversity through cooperative space-time-encoded transmission. In this paper, we considered a scheme in which a relay chooses to cooperate only if its source-relay channel is of an acceptable quality, and we evaluate the usefulness of relaying when the source acts blindly and ignores the decision of the relays whether they may cooperate or not. In our study, we consider the regenerative relays in which the decisions to cooperate are based on a targeted end-to-end data rate R. We derived the end-to-end outage probability for a transmission rate R and a code rate ρ and look at a power allocation strategy between the source and the relays in order to minimize the end-to-end outage probability at the destination for high signal-to-noise ratio, by using the golden section search method. Performance results show that the computer simulations-based results coincide with our analytical results. Copyright © 2011 John Wiley & Sons, Ltd.

  2. Outage analysis of blind cooperative diversity

    KAUST Repository

    Tourki, Kamel

    2011-06-06

    Mobile users with single antennas can still take advantage of spatial diversity through cooperative space-time-encoded transmission. In this paper, we considered a scheme in which a relay chooses to cooperate only if its source-relay channel is of an acceptable quality, and we evaluate the usefulness of relaying when the source acts blindly and ignores the decision of the relays whether they may cooperate or not. In our study, we consider the regenerative relays in which the decisions to cooperate are based on a targeted end-to-end data rate R. We derived the end-to-end outage probability for a transmission rate R and a code rate ρ and look at a power allocation strategy between the source and the relays in order to minimize the end-to-end outage probability at the destination for high signal-to-noise ratio, by using the golden section search method. Performance results show that the computer simulations-based results coincide with our analytical results. Copyright © 2011 John Wiley & Sons, Ltd.

  3. Indian Kisan Credit Card Scheme: An Analytical Study

    Directory of Open Access Journals (Sweden)

    Dharmendra Mehta

    2016-03-01

    Full Text Available Kisan Credit Card (KCC has now been regarded as the only medium of short-term credit for agriculture. The Kisan Credit Card (KCC scheme was introduced by the Finance Minister in his budget speech in the year 1998-99. From the year 1998-99, the scheme was implemented by public sector commercial banks, RRBs (Regional Rural Banks and cooperative banks in the country. It has emerged as an innovative credit distribution system to meet the production credit requirements of the farmers in a timely and easy manner. The present paper is aimed to study role of Kisan Credit Card in the rural credit facilitation in India.

  4. Soft cooperative spectrum sensing performance under imperfect and non identical reporting channels

    KAUST Repository

    Ben Ghorbel, Mahdi

    2015-02-01

    Cooperation among cognitive radio users improves the spectrum sensing performance by combining local decisions measured over independent sensing channels, allowing reduction of miss-detection and false alarm probabilities. While most of the works in cooperative spectrum sensing techniques assume perfect channels between the cooperating users, this paper studies the effect of imperfect channels when local users report their sensed information to the fusion center. Cooperative detection and false-alarm probabilities are derived for a general scheme of imperfect reporting channels under non necessarily identical sensing and reporting channels. Numerical simulations show that imperfect reporting channels should be considered to optimize the cooperative sensing in terms of consumed energy and probability of error.

  5. A Computer Oriented Scheme for Coding Chemicals in the Field of Biomedicine.

    Science.gov (United States)

    Bobka, Marilyn E.; Subramaniam, J.B.

    The chemical coding scheme of the Medical Coding Scheme (MCS), developed for use in the Comparative Systems Laboratory (CSL), is outlined and evaluated in this report. The chemical coding scheme provides a classification scheme and encoding method for drugs and chemical terms. Using the scheme complicated chemical structures may be expressed…

  6. Glass fibre sensors for medical applications - fibre-optical dosimeter system. Cooperation project 1991-1994. Final report

    International Nuclear Information System (INIS)

    1996-01-01

    The final report summarizes the results of a cooperation project on the applications of fibre-optical sensors in medical technology. The FADOS dosimeter system is presented which comprises an implantable glass fibre dosimeter. It can be applied in radiotherapy for online dose metering directly at the tumour or in the surrounding healthy tissue. The dosimeter is placed in a tissue-compatible flexible catheter tube and remains inside the body during the radiotherapy treatiment. The measuring principle is based on the effect of radiation-induced damping inside a glass fibre. (DG) [de

  7. The effects of China’s urban basic medical insurance schemes on the equity of health service utilisation: evidence from Shaanxi Province

    Science.gov (United States)

    2014-01-01

    Introduction In order to alleviate the problem of “Kan Bing Nan, Kan Bing Gui” (medical treatment is difficult to access and expensive) and improve the equity of health service utilisation for urban residents in China, the Urban Employee Basic Medical Insurance scheme (UEBMI) and Urban Resident Basic Medical Insurance scheme (URBMI) were established in 1999 and 2007, respectively. This study aims to analyse the effects of UEBMI and URBMI on the equity of outpatient and inpatient utilisation in Shaanxi Province, China. Methods Using the data from the fourth National Health Services Survey in Shaanxi Province, the method of Propensity Score Matching was employed to generate comparable samples between the insured and uninsured residents, through a one-to-one match algorithm. Next, based on the matched data, the method of decomposition of the concentration index was employed to compare the horizontal inequity indexes of health service utilisation between the UEBMI/URBMI insured and the matched uninsured residents. Results For the UEBMI insured and matched uninsured residents, the horizontal inequity indexes of outpatient visits are 0.1256 and -0.0511 respectively, and the horizontal inequity indexes of inpatient visits are 0.1222 and 0.2746 respectively. Meanwhile, the horizontal inequity indexes of outpatient visits are -0.1593 and 0.0967 for the URBMI insured and matched uninsured residents, and the horizontal inequity indexes of inpatient visits are 0.1931 and 0.3199 respectively. Conclusions The implementation of UEBMI increased the pro-rich inequity of outpatient utilisation (rich people utilise outpatient facilities more than the poor people) and the implementation of URBMI increased the pro-poor inequity of outpatient utilisation. Both of these two health insurance schemes reduced the pro-rich inequity of inpatient utilisation. PMID:24606592

  8. Fostering Cooperation in Cancer Research

    Science.gov (United States)

    Thursday, June 25, 2015 Memorandum of Understanding (MoU) was signed between US National Cancer Institute and three agencies of the Indian government - the Department of Biotechnology, the Indian Council of Medical Research, and the Indian National Cancer Institute, a part of the All India Institute of Medical Sciences to foster cooperation in cancer research.

  9. Comprehension through cooperation: Medical students and physiotherapy apprentices learn in teams - Introducing interprofessional learning at the University Medical Centre Mannheim, Germany.

    Science.gov (United States)

    Mette, Mira; Dölken, Mechthild; Hinrichs, Jutta; Narciß, Elisabeth; Schüttpelz-Brauns, Katrin; Weihrauch, Ute; Fritz, Harald M

    2016-01-01

    In order to better prepare future health care professionals for interprofessional cooperation, interprofessional learning sessions for medical students and physiotherapy apprentices were developed at the University Medical Centre Mannheim, Germany. The experience gained from designing, implementing and evaluating these learning sessions is presented and discussed. A total of 265 medical students and 43 physiotherapy apprentices attended five interprofessional learning sessions. Of these, 87-100% responded to closed and open-ended questions on a self-developed questionnaire (24 items). The responses regarding self-reported learning gains, benefit, motivation and satisfaction with the sessions were analyzed separately by professions. The learning sessions were well received by both groups. More than 75% of all participants were of the opinion that they could not have learned the new material in a better way. Significant differences between the medical students and the physiotherapy apprentices were mainly found with regard to perceived learning gains, which physiotherapy apprentices reported as being lower. Positive aspects of interprofessionalism were most often emphasized in the responses to the open-ended questions. Most frequently criticized were organizational aspects and a lack of perceived learning gains. The introduction of interprofessional learning entails great effort in terms of organizational and administrative challenges. However, the project is considered worthwhile because the interprofessional aspects of the learning sessions were indeed valued by the participants. Permanently including and expanding interprofessional learning in the curricula of both professions longitudinally is therefore something to strive for.

  10. Opportunistic Energy-Aware Amplify-and-Forward Cooperative Systems with Imperfect CSI

    KAUST Repository

    Amin, Osama; Bedeer, Ebrahim; Ahmed, Mohamed Hossam; Dobre, Octavia; Alouini, Mohamed-Slim

    2015-01-01

    an energyefficient relay assisted communication system based on estimated channel state information (CSI). It employs amplify-andforward relaying and switches between different communication schemes, which are known as direct-transmission, two-hop and cooperative

  11. GAME ANALYSIS OF KYOTO AND POST-KYOTO SCHEMES

    Energy Technology Data Exchange (ETDEWEB)

    Haruo Imai [Kyoto Institute of Economic Research, Kyoto University, Sakyo, Kyoto (Japan)

    2008-09-30

    Kyoto protocol, put in force in Feb. 2005, is criticized from both sides, those demanding a stricter target for GHG (green house gas) emission reduction on the one side, and those claiming for more flexible and comprehensive controls of the emission on the other side, for its modest target and narrow coverage. Even though its value could be that of a mere precedent and experimentation, Kyoto protocol includes very special experimentation to assist the world wide cooperation for a mitigation of climate change, i.e. the introduction of three mechanisms, emissions trading, joint implementation, and clean development mechanism (CDM). Together, they are called Kyoto mechanisms. Evaluation of mechanisms is one important role of microeconomics and the game theory is a major tool for it. We shall scrutinize these mechanisms from such viewpoint. A special attention is placed on CDM, as it is the novel mechanism introduced by Kyoto protocol, and gives a unique link between Annex I nations (mostly developed countries) and non-Annex I nations (mostly developing countries). Next, we examine some of the currently proposed schemes after 2013, the post Kyoto schemes. One of the chief issues is the possibility of making a comprehensive agreement including both the USA and large developing countries with rapidly increasing emission levels of GHG like China and India. Adding to these, not only the proposed schemes themselves, but the process of negotiation itself inspired several researches in cooperative game theory and in particular, coalition formation theory. We shall touch upon this issue separately, and examine how successfully they predicted the outcome leading to Kyoto, retrospectively. Finally, we end our discussion with a brief consideration over the underlining normative argument concerning these schemes.

  12. The text of the Agreement establishing the Asian Regional Co-operative Project on Medical and Biological Applications of Nuclear Techniques

    International Nuclear Information System (INIS)

    1987-04-01

    The full text of the Agreement establishing the Asian Regional Co-operative Project on Medical and Biological Applications of Nuclear Techniques between the Agency and Member States is reproduced. The Agreement entered into force on 20 May 1986 after the Governments of Japan, Bangladesh and the Philippines had notified the Agency of their acceptance of the Agreement

  13. Effects of New Rural Cooperative Medical Scheme on Medical Service Utilization and Medical Expense Control of Inpatients: A 3-year Empirical Study of Hainan Province in China

    Directory of Open Access Journals (Sweden)

    Tao Dai

    2016-01-01

    Conclusions: With the improvement of the reimbursement ability, especially after the new health care reform in 2009, the NCMS have been playing a prominent role in alleviating the economic burden of farmers' medical treatment. Meanwhile, more patients go to primary hospitals than tertiary hospitals, and the capability of primary hospitals has been greatly improved.

  14. Securing cooperation from persons supplying statistical data.

    Science.gov (United States)

    AUBENQUE, M J; BLAIKLEY, R M; HARRIS, F F; LAL, R B; NEURDENBURG, M G; DE SHELLY HERNANDEZ, R

    1954-01-01

    Securing the co-operation of persons supplying information required for medical statistics is essentially a problem in human relations, and an understanding of the motivations, attitudes, and behaviour of the respondents is necessary.Before any new statistical survey is undertaken, it is suggested by Aubenque and Harris that a preliminary review be made so that the maximum use is made of existing information. Care should also be taken not to burden respondents with an overloaded questionnaire. Aubenque and Harris recommend simplified reporting. Complete population coverage is not necessary.Neurdenburg suggests that the co-operation and support of such organizations as medical associations and social security boards are important and that propaganda should be directed specifically to the groups whose co-operation is sought. Informal personal contacts are valuable and desirable, according to Blaikley, but may have adverse effects if the right kind of approach is not made.Financial payments as an incentive in securing co-operation are opposed by Neurdenburg, who proposes that only postage-free envelopes or similar small favours be granted. Blaikley and Harris, on the other hand, express the view that financial incentives may do much to gain the support of those required to furnish data; there are, however, other incentives, and full use should be made of the natural inclinations of respondents. Compulsion may be necessary in certain instances, but administrative rather than statutory measures should be adopted. Penalties, according to Aubenque, should be inflicted only when justified by imperative health requirements.The results of surveys should be made available as soon as possible to those who co-operated, and Aubenque and Harris point out that they should also be of practical value to the suppliers of the information.Greater co-operation can be secured from medical persons who have an understanding of the statistical principles involved; Aubenque and Neurdenburg

  15. Energy-efficient cooperative protocols for full-duplex relay channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2013-12-01

    In this work, energy-efficient cooperative protocols are studied for full-duplex relaying (FDR) with loopback interference. In these protocols, relay assistance is only sought under certain conditions on the different link outages to ensure effective cooperation. Recently, an energy-efficient selective decode-And-forward protocol was proposed for FDR, and was shown to outperform existing schemes in terms of outage. Here, we propose an incremental selective decode-And-forward protocol that offers additional power savings, while keeping the same outage performance. We compare the performance of the two protocols in terms of the end-to-end signal-to-noise ratio cumulative distribution function via closed-form expressions. Finally, we corroborate our theoretical results with simulation, and show the relative relay power savings in comparison to non-selective cooperation in which the relay cooperates regardless of channel conditions. © 2013 IEEE.

  16. Energy-efficient cooperative protocols for full-duplex relay channels

    KAUST Repository

    Khafagy, Mohammad Galal; Ismail, Amr; Alouini, Mohamed-Slim; Aï ssa, Sonia

    2013-01-01

    In this work, energy-efficient cooperative protocols are studied for full-duplex relaying (FDR) with loopback interference. In these protocols, relay assistance is only sought under certain conditions on the different link outages to ensure effective cooperation. Recently, an energy-efficient selective decode-And-forward protocol was proposed for FDR, and was shown to outperform existing schemes in terms of outage. Here, we propose an incremental selective decode-And-forward protocol that offers additional power savings, while keeping the same outage performance. We compare the performance of the two protocols in terms of the end-to-end signal-to-noise ratio cumulative distribution function via closed-form expressions. Finally, we corroborate our theoretical results with simulation, and show the relative relay power savings in comparison to non-selective cooperation in which the relay cooperates regardless of channel conditions. © 2013 IEEE.

  17. A localized cooperative wideband spectrum sensing for dynamic access of TV bands using RF sensor networks

    KAUST Repository

    Mirza, Mohammed

    2011-07-01

    In this paper we address and simulate a Radio Frequency (RF) sensor network for a cooperative spectrum sensing and localization scheme. The proposed method integrates a Wavelet based Multi-Resolution Spectrum Sensing (MRSS), an N-bit hard combination technique for cooperative decision making and a Received Signal Strength (RSS) based localization algorithm to detect the availability of frequency bands and the location of the usable base station. We develop an N-bit hard combination technique and compare its performance to a traditionally used 2-bit hard combination for cooperative sensing. The key idea is to design a novel RF sensor network based cooperative wideband spectrum sensing and localization scheme by using a wavelet based Multi-Resolution Spectrum Sensing (MRSS) and Received Signal Strength (RSS) Localization techniques which were originally proposed for cognitive radio applications. The performance evaluations are also done to show the different detection accuracies for varying parameters such as number of sensor nodes, Signal to Noise Ratios (SNR) and number of averaged Power Spectral Densities (PSD). The proposed scheme improves the problems of shadowing, fading and noise. In addition, the RSS based localization technique was shown to be an acceptable means of estimating the position of the available transmitter. © 2011 IEEE.

  18. Multi-Agent Cooperative Target Search

    Directory of Open Access Journals (Sweden)

    Jinwen Hu

    2014-05-01

    Full Text Available This paper addresses a vision-based cooperative search for multiple mobile ground targets by a group of unmanned aerial vehicles (UAVs with limited sensing and communication capabilities. The airborne camera on each UAV has a limited field of view and its target discriminability varies as a function of altitude. First, by dividing the whole surveillance region into cells, a probability map can be formed for each UAV indicating the probability of target existence within each cell. Then, we propose a distributed probability map updating model which includes the fusion of measurement information, information sharing among neighboring agents, information decay and transmission due to environmental changes such as the target movement. Furthermore, we formulate the target search problem as a multi-agent cooperative coverage control problem by optimizing the collective coverage area and the detection performance. The proposed map updating model and the cooperative control scheme are distributed, i.e., assuming that each agent only communicates with its neighbors within its communication range. Finally, the effectiveness of the proposed algorithms is illustrated by simulation.

  19. The impact of different benefit packages of Medical Financial Assistance Scheme on health service utilization of poor population in rural China.

    Science.gov (United States)

    Hao, Yanhua; Wu, Qunhong; Zhang, Zhenzhong; Gao, Lijun; Ning, Ning; Jiao, Mingli; Zakus, David

    2010-06-17

    . Therefore, there is great need to improve MFA benefit package design in the future, including extending to cover out-patient services, raising ceiling for reimbursement, removing deductibles of MFA, reducing co-payment rate, and integrating MFA with New Rural Cooperative Medical Scheme more closely so as to provide more protection to the poor families.

  20. Cooper pair splitters beyond the Coulomb blockade regime

    Energy Technology Data Exchange (ETDEWEB)

    Amitai, Ehud; Tiwari, Rakesh P.; Nigg, Simon E. [Department of Physics, University of Basel, Klingelbergstrasse 82, 4056 Basel (Switzerland); Walter, Stefan [Institute for Theoretical Physics, University Erlangen Nuernberg, Staudtstrasse 7, 91058 Erlangen (Germany); Schmidt, Thomas L. [Physics and Materials Science Research Unit, University of Luxembourg, L-1511 Luxembourg (Luxembourg)

    2016-07-01

    We consider the setup of a conventional s-wave Cooper pair splitter. However, we consider the charging energies in the quantum dots to be finite and smaller than the superconducting gap. We find analytically that at low energies the superconductor mediates an inter-dot tunneling term, the spin symmetry of which is influenced by a finite Zeeman field. This effect, together with an electrical tuning scheme of the quantum dot levels, can be used to engineer a non local triplet state on the two quantum dots, thereby extending the non-local state engineering capabilities of the Cooper pair splitter system.

  1. Heterogeneous Coupling between Interdependent Lattices Promotes the Cooperation in the Prisoner's Dilemma Game.

    Directory of Open Access Journals (Sweden)

    Cheng-Yi Xia

    Full Text Available In the research realm of game theory, interdependent networks have extended the content of spatial reciprocity, which needs the suitable coupling between networks. However, thus far, the vast majority of existing works just assume that the coupling strength between networks is symmetric. This hypothesis, to some extent, seems inconsistent with the ubiquitous observation of heterogeneity. Here, we study how the heterogeneous coupling strength, which characterizes the interdependency of utility between corresponding players of both networks, affects the evolution of cooperation in the prisoner's dilemma game with two types of coupling schemes (symmetric and asymmetric ones. Compared with the traditional case, we show that heterogeneous coupling greatly promotes the collective cooperation. The symmetric scheme seems much better than the asymmetric case. Moreover, the role of varying amplitude of coupling strength is also studied on these two interdependent ways. Current findings are helpful for us to understand the evolution of cooperation within many real-world systems, in particular for the interconnected and interrelated systems.

  2. Heterogeneous Coupling between Interdependent Lattices Promotes the Cooperation in the Prisoner's Dilemma Game.

    Science.gov (United States)

    Xia, Cheng-Yi; Meng, Xiao-Kun; Wang, Zhen

    2015-01-01

    In the research realm of game theory, interdependent networks have extended the content of spatial reciprocity, which needs the suitable coupling between networks. However, thus far, the vast majority of existing works just assume that the coupling strength between networks is symmetric. This hypothesis, to some extent, seems inconsistent with the ubiquitous observation of heterogeneity. Here, we study how the heterogeneous coupling strength, which characterizes the interdependency of utility between corresponding players of both networks, affects the evolution of cooperation in the prisoner's dilemma game with two types of coupling schemes (symmetric and asymmetric ones). Compared with the traditional case, we show that heterogeneous coupling greatly promotes the collective cooperation. The symmetric scheme seems much better than the asymmetric case. Moreover, the role of varying amplitude of coupling strength is also studied on these two interdependent ways. Current findings are helpful for us to understand the evolution of cooperation within many real-world systems, in particular for the interconnected and interrelated systems.

  3. Human-Induced Effects on RSS Ranging Measurements for Cooperative Positioning

    DEFF Research Database (Denmark)

    Della Rosa, Francescantonio; Pelosi, Mauro; Nurmi, Jari

    2012-01-01

    of human-induced perturbations for enhancing the final positioning accuracy through cooperative schemes has been assessed. It has been proved that the effect of cooperation is very limited if human factors are not taken into account when performing experimental activities.......We present experimental evaluations of human-induced perturbations on received-signal-strength-(RSS-) based ranging measurements for cooperative mobile positioning. To the best of our knowledge, this work is the first attempt to gain insight and understand the impact of both body loss and hand grip...... on the RSS for enhancing proximity measurements among neighbouring devices in cooperative scenarios. Our main contribution is represented by experimental investigations. Analysis of the errors introduced in the distance estimation using path-loss-based methods has been carried out. Moreover, the exploitation...

  4. Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems.

    Science.gov (United States)

    Yau, Wei-Chuen; Phan, Raphael C-W

    2013-12-01

    Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.

  5. Non-cooperative planning theory

    CERN Document Server

    Bogetoft, Peter

    1994-01-01

    Planning in a general sense is concerned with the design of communication and decision making mechanisms in organizations where information and choice are decentralized. Non-cooperative planning theory as it is developed in this book treats the incentive aspects hereof. It stresses how strategic behavior and opportunism may impede planning, and how this can be coped with via the organization of communication and decision making, the design of information and control systems, and the development of incentive schemes. In particular, the book contains a thorough investigation of incentive provision in information production.

  6. Reducing medical claims cost to Ghana?s National Health Insurance scheme: a cross-sectional comparative assessment of the paper- and electronic-based claims reviews

    OpenAIRE

    Nsiah-Boateng, Eric; Asenso-Boadi, Francis; Dsane-Selby, Lydia; Andoh-Adjei, Francis-Xavier; Otoo, Nathaniel; Akweongo, Patricia; Aikins, Moses

    2017-01-01

    Background A robust medical claims review system is crucial for addressing fraud and abuse and ensuring financial viability of health insurance organisations. This paper assesses claims adjustment rate of the paper- and electronic-based claims reviews of the National Health Insurance Scheme (NHIS) in Ghana. Methods The study was a cross-sectional comparative assessment of paper- and electronic-based claims reviews of the NHIS. Medical claims of subscribers for the year, 2014 were requested fr...

  7. Brief report of the JNC cooperative research (A) on the Nuclear Fuel Cycle for 2002

    International Nuclear Information System (INIS)

    2003-08-01

    The Japan Nuclear Cycle Development Institute (JNC) started the JNC Cooperative Research Scheme (A) on the Nuclear Fuel Cycle in 1995 in order to promote research collaboration with universities and other research institutes (referred to as 'universities, etc.' below), which means that the fiscal year 2002 was the eighth year of the scheme. The purpose of this scheme is to promote the basic and fundamental research that precedes the research and development projects of JNC through collaboration with universities, etc. by using mainly JNC's facilities and equipment. Under the scheme, universities, etc. propose methods and ideas, etc. to lead to the achievement of the goals of research collaboration themes which are set by JNC as research collaboration subjects. Then a screening committee consisting mainly of experts independent of JNC screens the research collaboration subjects. Research collaboration is performed by carrying out cooperative research with universities, etc. or by accepting researchers from universities, etc. as Visiting Research Fellows at JNC. The scheme allows students studying for doctorates at postgraduate schools either to participate in the cooperative research or to be accepted as trainee researchers. The report includes a summary of the results of the research carried out in fiscal year 2002 on 42 research collaboration subjects for preceding basic engineering research related to fast breeder reactors, the nuclear fuel cycle, radiation safety and geological disposal/geoscience; twelve of which ended in 2002. Of these, five were related to fast breeder reactors, three to the nuclear fuel cycle, one to radiation safety and three to geological disposal/geoscience. (author)

  8. Brief report of the JNC Cooperative Research (A) on the Nuclear Fuel Cycle for 2004

    International Nuclear Information System (INIS)

    2005-06-01

    The Japan Nuclear Cycle Development Institute (JNC) started the JNC Cooperative Research Scheme (A) on the Nuclear Fuel Cycle in 1995 in order to promote research collaboration with universities and other research institutes (referred to as 'universities, etc.' below), which means that the fiscal year 2004 was the tenth year of the scheme. The purpose of this scheme is to promote the basic and fundamental research that precedes the research and development projects of JNC through collaboration with universities, etc. by using mainly JNC's facilities and equipment. Under the scheme, universities, etc. propose methods and ideas, etc. to lead to the achievement of the goals of research collaboration themes which are set by JNC as research collaboration subjects. Then a screening committee consisting mainly of experts independent of JNC screens the research collaboration subjects. Research collaboration is performed by carrying out cooperative research with universities, etc. or by accepting researchers from universities, etc. as Visiting Research Fellows at JNC. The scheme allows students studying for doctorates at postgraduate schools either to participate in the cooperative research or to be accepted as trainee researchers. This report includes a summary of the results of the research carried out in fiscal year 2004 on 42 research collaboration subjects for preceding basic engineering research related to fast breeder reactors, the nuclear fuel cycle, radiation safety and geological disposal/geoscience; seventeen of which ended in 2004. Of these, eight were related to fast breeder reactors, eight to the nuclear fuel cycle, and one to geological disposal/geoscience. (author)

  9. Brief report of the JAEA cooperative research (A) on the nuclear fuel cycle for 2009

    International Nuclear Information System (INIS)

    2010-08-01

    The Japan Atomic Energy Agency (JAEA) started the JAEA Cooperative Research Scheme (A) on the Nuclear Fuel Cycle in 1995 in order to promote research collaboration with universities and other research institutes (referred to as 'universities, etc.' below), which means that the fiscal year 2009 was the fifteenth year of the scheme. The purpose of this scheme is to promote the basic and fundamental research that precedes the research and development projects in relation to the establishment of nuclear fuel cycle technology through collaboration with universities, etc. by using mainly JAEA's facilities and equipment. Under the scheme, universities, etc. propose methods and ideas, etc. to lead to the achievement of the goals of research collaboration themes which are set by JAEA as research collaboration subjects. Then a screening committee consisting mainly of experts independent of JAEA screens the research collaboration subjects. Research collaboration is performed by carrying out cooperative research with universities, etc. or by accepting researchers from universities, etc. as Visiting Research Fellows at JAEA. The scheme allows students studying for doctorates at postgraduate schools either to participate in the cooperative research or to be accepted as trainee researchers. This report includes a summary of the results of the research carried out in fiscal year 2009 on 32 research collaboration subjects for preceding basic engineering research related to fast breeder reactors, the nuclear fuel cycle, radiation safety and geological disposal/geoscience; eleven of which ended in 2009. Of these, six were related to fast breeder reactors, two to the nuclear fuel cycle, and three to geological disposal/geoscience. (author)

  10. Brief report of the JAEA cooperative research (A) on the nuclear fuel cycle for 2007

    International Nuclear Information System (INIS)

    2008-10-01

    The Japan Atomic Energy Agency (JAEA) started the JAEA Cooperative Research Scheme (A) of the Nuclear Fuel Cycle in 1995 in order to promote research collaboration with universities and other research institutes (referred to as 'universities, etc.' below), which means that the fiscal year 2007 was the thirteenth year of the scheme. The purpose of this scheme is to promote the basic and fundamental research that precedes the research and development projects in relation to the establishment of nuclear fuel cycle technology through collaboration with universities, etc. by using mainly JAEA's facilities and equipment. Under the scheme, universities, etc. propose methods and ideas, etc. to lead to the achievement of the goals of research collaboration themes which are set by JAEA as research collaboration subjects. Then a screening committee consisting mainly of experts independent of JAEA screens the research collaboration subjects. Research collaboration is performed by carrying out cooperative research with universities, etc. or by accepting researchers from universities, etc. as Visiting Research Fellows at JAEA. The scheme allows students studying for doctorates at postgraduate schools either to participate in the cooperative research or to be accepted as trainee researchers. This report includes a summary of the results of the research carried out in fiscal year 2007 on 32 research collaboration subjects for preceding basic engineering research related to fast breeder reactors, the nuclear fuel cycle, radiation safety and geological disposal/geoscience; twelve of which ended in 2007. Of these, six were related to fast breeder reactors, two to the nuclear fuel cycle, and two to geological disposal/geoscience. (author)

  11. Brief report of the JNC cooperative research (A) on the nuclear fuel cycle for 2003

    International Nuclear Information System (INIS)

    2004-08-01

    The Japan Nuclear Cycle Development Institute (JNC) started the JNC Cooperative Research Scheme (A) on the Nuclear fuel Cycle in 1995 in order to promote research collaboration with universities and other research institutes (referred to as 'universities, etc.' below), which means that the fiscal year 2003 was the ninth year of the scheme. The purpose of this scheme is to promote the basic and fundamental research that precedes the research and development projects of JNC through collaboration with universities, etc. by using mainly JNC's facilities and equipment. Under the scheme, universities, etc. propose methods and ideas, etc. to lead to the achievement of the goals of research collaboration themes which are set by JNC as research collaboration subjects. Then a screening committee consisting mainly of experts independent of JNC screens the research collaboration subjects. Research collaboration is performed by carrying out cooperative research with universities, etc. or by accepting researchers from universities, etc. as Visiting Research Fellows at JNC. The scheme allows students studying for doctorates at postgraduate schools either to participate in the cooperative research or to be accepted as trainee researchers. This report includes a summary of the results of the research carried out in fiscal year 2003 on 43 research collaboration subjects for preceding basic engineering research related to fast breeder reactors, the nuclear fuel cycle, radiation safety and geological disposal/geoscience; fourteen of which ended in 2003. Of these, seven were related to fast breeder reactors, five to the nuclear fuel cycle, one to radiation safety and one to geological disposal/geoscience. (author)

  12. Brief report of the JAEA cooperative research (A) on the nuclear fuel cycle for 2012

    International Nuclear Information System (INIS)

    2013-11-01

    The Japan Atomic Energy Agency (JAEA) started the JAEA Cooperative Research Scheme (A) on the Nuclear Fuel Cycle in 1995 in order to promote research collaboration with universities and other research institutes (referred to as 'universities, etc.' below), which means that the fiscal year 2012 was the eighteenth year of the scheme. The purpose of this scheme is to promote the basic and fundamental research that precedes the research and development projects in relation to the establishment of nuclear fuel cycle technology through collaboration with universities, etc. by using mainly JAEA's facilities and equipment. Under the scheme, universities, etc. propose methods and ideas, etc. to lead to the achievement of the goals of research collaboration themes which are set by JAEA as research collaboration subjects. Then a screening committee consisting mainly of experts independent of JAEA screens the research collaboration subjects. Research collaboration is performed by carrying out cooperative research with universities, etc. or by accepting researchers from universities, etc. as Visiting Research Fellows at JAEA. The scheme allows students studying for doctorates at postgraduate schools either to participate in the cooperative research or to be accepted as trainee researchers. This report includes a summary of the results of the research carried out in fiscal year 2012 on 20 research collaboration subjects for preceding basic engineering research related to fast breeder reactors, the nuclear fuel cycle, radiation safety and geological disposal/geoscience; ten of which ended in 2012. Of these, three were related to fast breeder reactors, five to the nuclear fuel cycle, and two to geological disposal/geoscience. (author)

  13. Assessment of a cooperative workstation.

    OpenAIRE

    Beuscart, R. J.; Molenda, S.; Souf, N.; Foucher, C.; Beuscart-Zephir, M. C.

    1996-01-01

    Groupware and new Information Technologies have now made it possible for people in different places to work together in synchronous cooperation. Very often, designers of this new type of software are not provided with a model of the common workspace, which is prejudicial to software development and its acceptance by potential users. The authors take the example of a task of medical co-diagnosis, using a multi-media communication workstation. Synchronous cooperative work is made possible by us...

  14. Comprehension through cooperation: Medical students and physiotherapy apprentices learn in teams – Introducing interprofessional learning at the University Medical Centre Mannheim, Germany

    Science.gov (United States)

    Mette, Mira; Dölken, Mechthild; Hinrichs, Jutta; Narciß, Elisabeth; Schüttpelz-Brauns, Katrin; Weihrauch, Ute; Fritz, Harald M.

    2016-01-01

    Aim: In order to better prepare future health care professionals for interprofessional cooperation, interprofessional learning sessions for medical students and physiotherapy apprentices were developed at the University Medical Centre Mannheim, Germany. The experience gained from designing, implementing and evaluating these learning sessions is presented and discussed. Method: A total of 265 medical students and 43 physiotherapy apprentices attended five interprofessional learning sessions. Of these, 87-100% responded to closed and open-ended questions on a self-developed questionnaire (24 items). The responses regarding self-reported learning gains, benefit, motivation and satisfaction with the sessions were analyzed separately by professions. Results: The learning sessions were well received by both groups. More than 75% of all participants were of the opinion that they could not have learned the new material in a better way. Significant differences between the medical students and the physiotherapy apprentices were mainly found with regard to perceived learning gains, which physiotherapy apprentices reported as being lower. Positive aspects of interprofessionalism were most often emphasized in the responses to the open-ended questions. Most frequently criticized were organizational aspects and a lack of perceived learning gains. Conclusion: The introduction of interprofessional learning entails great effort in terms of organizational and administrative challenges. However, the project is considered worthwhile because the interprofessional aspects of the learning sessions were indeed valued by the participants. Permanently including and expanding interprofessional learning in the curricula of both professions longitudinally is therefore something to strive for. PMID:27280142

  15. Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming

    Directory of Open Access Journals (Sweden)

    Maoqiang Yang

    2016-11-01

    Full Text Available In this paper, we investigate the secure transmission in wireless sensor networks (WSNs consisting of one multiple-antenna base station (BS, multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS is employed at the BS and cooperative jamming (CJ is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI of both the legitimate channel and the eavesdropper’s channel, it explores a zero-forcing beamforming (ZFB scheme or a null-space artificial noise (NAN scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.

  16. Co-Operative Training in the Sheffield Forging Industry

    Science.gov (United States)

    Duncan, R.

    2008-01-01

    Purpose: The purpose of this paper is to give details of an operation carried out in Sheffield to increase the recruitment of young men into the steel forging industry. Design/methodology/approach: The Sheffield Forges Co-operative Training Scheme was designed to encourage boys to enter the forging industry and to provide them with training and…

  17. Secure Cooperative Spectrum Sensing for the Cognitive Radio Network Using Nonuniform Reliability

    Directory of Open Access Journals (Sweden)

    Muhammad Usman

    2014-01-01

    Full Text Available Both reliable detection of the primary signal in a noisy and fading environment and nullifying the effect of unauthorized users are important tasks in cognitive radio networks. To address these issues, we consider a cooperative spectrum sensing approach where each user is assigned nonuniform reliability based on the sensing performance. Users with poor channel or faulty sensor are assigned low reliability. The nonuniform reliabilities serve as identification tags and are used to isolate users with malicious behavior. We consider a link layer attack similar to the Byzantine attack, which falsifies the spectrum sensing data. Three different strategies are presented in this paper to ignore unreliable and malicious users in the network. Considering only reliable users for global decision improves sensing time and decreases collisions in the control channel. The fusion center uses the degree of reliability as a weighting factor to determine the global decision in scheme I. Schemes II and III consider the unreliability of users, which makes the computations even simpler. The proposed schemes reduce the number of sensing reports and increase the inference accuracy. The advantages of our proposed schemes over conventional cooperative spectrum sensing and the Chair-Varshney optimum rule are demonstrated through simulations.

  18. A Secure Trust Establishment Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farruh Ishmanov

    2014-01-01

    Full Text Available Trust establishment is an important tool to improve cooperation and enhance security in wireless sensor networks. The core of trust establishment is trust estimation. If a trust estimation method is not robust against attack and misbehavior, the trust values produced will be meaningless, and system performance will be degraded. We present a novel trust estimation method that is robust against on-off attacks and persistent malicious behavior. Moreover, in order to aggregate recommendations securely, we propose using a modified one-step M-estimator scheme. The novelty of the proposed scheme arises from combining past misbehavior with current status in a comprehensive way. Specifically, we introduce an aggregated misbehavior component in trust estimation, which assists in detecting an on-off attack and persistent malicious behavior. In order to determine the current status of the node, we employ previous trust values and current measured misbehavior components. These components are combined to obtain a robust trust value. Theoretical analyses and evaluation results show that our scheme performs better than other trust schemes in terms of detecting an on-off attack and persistent misbehavior.

  19. [Infection control team (ICT) in cooperation with microbiology laboratories].

    Science.gov (United States)

    Okazaki, Mitsuhiro

    2012-10-01

    Infection control as a medical safety measure is an important issue in all medical facilities. In order to tackle this measure, cooperation between the infection control team (ICT) and microbiological laboratory is indispensable. Multiple drug-resistant bacteria have shifted from Gram-positive bacteria to Gram-negative bacilli within the last ten years. There are also a variety of bacilli, complicating the examination method and test results further. Therefore, cooperation between the ICT and microbiological laboratory has become important to understand examination results and to use them. In order to maintain functional cooperation, explanatory and communicative ability between the microbiological laboratory and ICT is required every day. Such positive information exchange will develop into efficient and functional ICT activity.

  20. A Provably-Secure Transmission Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Omala, Anyembe Andrew; Robert, Niyifasha; Li, Fagen

    2016-11-01

    Wireless body area network (WBANs) is composed of sensors that collect and transmit a person's physiological data to health-care providers in real-time. In order to guarantee security of this data over open networks, a secure data transmission mechanism between WBAN and application provider's servers is of necessity. Modified medical data does not provide a true reflection of an individuals state of health and its subsequent use for diagnosis could lead to an irreversible medical condition. In this paper, we propose a lightweight certificateless signcryption scheme for secure transmission of data between WBAN and servers. Our proposed scheme not only provides confidentiality of data and authentication in a single logical step, it is lightweight and resistant to key escrow attacks. We further provide security proof that our scheme provides indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model. Compared with two other Diffie-Hellman based signcryption schemes proposed by Barbosa and Farshim (BF) and another by Yin and Liang (YL), our scheme consumes 46 % and 8 % less energy during signcryption than BF and YL scheme respectively.

  1. Securing co-operation from persons supplying statistical data

    Science.gov (United States)

    Aubenque, M. J.; Blaikley, R. M.; Harris, F. Fraser; Lal, R. B.; Neurdenburg, M. G.; Hernández, R. de Shelly

    1954-01-01

    Securing the co-operation of persons supplying information required for medical statistics is essentially a problem in human relations, and an understanding of the motivations, attitudes, and behaviour of the respondents is necessary. Before any new statistical survey is undertaken, it is suggested by Aubenque and Harris that a preliminary review be made so that the maximum use is made of existing information. Care should also be taken not to burden respondents with an overloaded questionnaire. Aubenque and Harris recommend simplified reporting. Complete population coverage is not necessary. Neurdenburg suggests that the co-operation and support of such organizations as medical associations and social security boards are important and that propaganda should be directed specifically to the groups whose co-operation is sought. Informal personal contacts are valuable and desirable, according to Blaikley, but may have adverse effects if the right kind of approach is not made. Financial payments as an incentive in securing co-operation are opposed by Neurdenburg, who proposes that only postage-free envelopes or similar small favours be granted. Blaikley and Harris, on the other hand, express the view that financial incentives may do much to gain the support of those required to furnish data; there are, however, other incentives, and full use should be made of the natural inclinations of respondents. Compulsion may be necessary in certain instances, but administrative rather than statutory measures should be adopted. Penalties, according to Aubenque, should be inflicted only when justified by imperative health requirements. The results of surveys should be made available as soon as possible to those who co-operated, and Aubenque and Harris point out that they should also be of practical value to the suppliers of the information. Greater co-operation can be secured from medical persons who have an understanding of the statistical principles involved; Aubenque and

  2. Premium Collection and the Problem of Voluntary Enrolment in China’s New Rural Cooperative Medical System

    Directory of Open Access Journals (Sweden)

    Armin Müller

    2016-01-01

    Full Text Available In late 2002, the Chinese government launched an initiative to extend the coverage of health insurance in rural China with the New Rural Cooperative Medical System (NRCMS. It covered all of rural China by 2008 and is being continuously adapted and developed. This study explores two conflicting goals in the policy design: universal coverage and voluntary enrolment. Local governments often faced the problem that only insufficient numbers of villagers were enrolling voluntarily. They developed different strategies to cope with it: Complementary outpatient reimbursement via medical savings accounts (MSAs effectively transferred villagers’ premiums back to them, thus making the NRCMS more attractive. Adapting the premium-collection process to the local context or utilising collusive practices allowed them to pay premiums on behalf of the villagers from the insurance funds. These strategies undermine the effectiveness of the NRCMS as a risk-pooling mechanism, facilitate latent coverage gaps and turn it into a tax-funded service.

  3. Cooperative Control of Mobile Sensor Networks for Environmental Monitoring: An Event-Triggered Finite-Time Control Scheme.

    Science.gov (United States)

    Lu, Qiang; Han, Qing-Long; Zhang, Botao; Liu, Dongliang; Liu, Shirong

    2017-12-01

    This paper deals with the problem of environmental monitoring by developing an event-triggered finite-time control scheme for mobile sensor networks. The proposed control scheme can be executed by each sensor node independently and consists of two parts: one part is a finite-time consensus algorithm while the other part is an event-triggered rule. The consensus algorithm is employed to enable the positions and velocities of sensor nodes to quickly track the position and velocity of a virtual leader in finite time. The event-triggered rule is used to reduce the updating frequency of controllers in order to save the computational resources of sensor nodes. Some stability conditions are derived for mobile sensor networks with the proposed control scheme under both a fixed communication topology and a switching communication topology. Finally, simulation results illustrate the effectiveness of the proposed control scheme for the problem of environmental monitoring.

  4. FY 2000 Report on the survey results. Survey on international cooperation for medical treatment/welfare equipment; 2000 nendo iryo fukushi kiki kokusai kyodo kenkyu jigyo chosa hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-03-01

    The NEDO's representatives visited Europe and China with the objectives of, e.g., international cooperation and information exchanges for medical treatment/welfare equipment. For the welfare equipment technologies, they visited the research institutes and facilities in UK and Germany, among others, to find that the European countries place more emphasis on researches to meet the needs than on advancing the equipment itself. For the medical treatment equipment, they visited the bio-research institutes in Europe for exchanging information on post-genome and tissue engineering. The European countries are behind USA in research fund and manpower for bio-technology and bio-medical, although making great efforts with much expectation on these areas. The China's medical treatment/welfare technologies seem to be clearly still in the stage of needing aids rather than rendering cooperation. However, China has been producing a number of new products in the areas where her traditional arts of medicine are combined with advanced techniques of the West, e.g., those for examination, as felt from a number of the equipment types presented to the China Medical Treatment Equipment Exhibition. (NEDO)

  5. Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

    Directory of Open Access Journals (Sweden)

    Ji-Jian Chin

    2014-01-01

    Full Text Available Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user’s secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  6. Efficient and provable secure pairing-free security-mediated identity-based identification schemes.

    Science.gov (United States)

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  7. Using the jigsaw cooperative learning method to teach medical students about long-term and postacute care.

    Science.gov (United States)

    Buhr, Gwendolen T; Heflin, Mitchell T; White, Heidi K; Pinheiro, Sandro O

    2014-06-01

    Since many of the frailest and most vulnerable Americans reside in nursing homes, medical students need focused education and training pertaining to this setting. A unique cooperative learning experience utilizing the jigsaw method was developed to engage and expose students to the institutional long-term and postacute care (LTPAC) setting and the roles of personnel there. To accomplish these goals, small groups of medical students interviewed LTPAC personnel about their role, generally, and in relation to a specific patient case. These groups were then rearranged into new groups containing 1 student from each of the original groups plus a faculty facilitator. Each student in the new groups taught about the role of the LTPAC professional they interviewed. To assess the effectiveness of this learning experience, students and LTPAC personnel provided written feedback and rated the activity using a 5-point Likert scale (1 = worst; 5 = best). Students also took a knowledge test. The activity received ratings from students of 3.65 to 4.12 (mean = 3.91). The knowledge test results indicated that students understood the roles of the LTPAC personnel. In general, the jigsaw exercise was well-received by participants and provided an effective means of introducing medical students to the nursing home environment. Copyright © 2014 American Medical Directors Association, Inc. Published by Elsevier Inc. All rights reserved.

  8. Robust Nash Dynamic Game Strategy for User Cooperation Energy Efficiency in Wireless Cellular Networks

    Directory of Open Access Journals (Sweden)

    Shuhuan Wen

    2012-01-01

    Full Text Available Recently, there is an emerging trend of addressing “energy efficiency” aspect of wireless communications. It has been shown that cooperating users relay each other's information to improve data rates. The energy is limited in the wireless cellular network, but the mobile users refuse to relay. This paper presents an approach that encourages user cooperation in order to improve the energy efficiency. The game theory is an efficient method to solve such conflicts. We present a cellular framework in which two mobile users, who desire to communicate with a common base station, may cooperate via decode-and-forward relaying. In the case of imperfect information assumption, cooperative Nash dynamic game is used between the two users' cooperation to tackle the decision making problems: whether to cooperate and how to cooperate in wireless networks. The scheme based on “cooperative game theory” can achieve general pareto-optimal performance for cooperative games, and thus, maximize the entire system payoff while maintaining fairness.

  9. Brief report of the JAEA cooperative research (A) on the nuclear fuel cycle for 2011

    International Nuclear Information System (INIS)

    2012-08-01

    The Japan Atomic Energy Agency (JAEA) started the JAEA Cooperative Research Scheme (A) on the Nuclear Fuel Cycle in 1995 in order to promote research collaboration with universities and other research institutes (referred to as “universities, etc.” below), which means that the fiscal year 2011 was the seventeenth year of the scheme. The purpose of this scheme is to promote the basic and fundamental research that precedes the research and development projects in relation to the establishment of nuclear fuel cycle technology through collaboration with universities, etc. by using mainly JAEA's facilities and equipment. Under the scheme, universities, etc. propose methods and ideas, etc. to lead to the achievement of the goals of research collaboration themes which are set by JAEA as research collaboration subjects. Then a screening committee consisting mainly of experts independent of JAEA screens the research collaboration subjects. Research collaboration is performed by carrying out cooperative research with universities, etc. or by accepting researchers from universities, etc. as Visiting Research Fellows at JAEA. The scheme allows students studying for doctorates at postgraduate schools either to participate in the cooperative research or to be accepted as trainee researchers. This report includes a summary of the results of the research carried out in fiscal year 2011 on 27 research collaboration subjects for preceding basic engineering research related to fast breeder reactors, the nuclear fuel cycle, radiation safety and geological disposal/geoscience; thirteen of which ended in 2011. Of these, seven were related to fast breeder reactors, two to the nuclear fuel cycle, one to radiation safety, and three to geological disposal/geoscience. (author)

  10. Brief report of the JAEA cooperative research (A) on the nuclear fuel cycle for 2008

    International Nuclear Information System (INIS)

    2009-09-01

    The Japan Atomic Energy Agency (JAEA) started the JAEA Cooperative Research Scheme (A) on the Nuclear Fuel Cycle in 1995 in order to promote research collaboration with universities and other research institutes (referred to as 'universities, etc.' below), which means that the fiscal year 2008 was the fourteenth year of the scheme. The purpose of this scheme is to promote the basic and fundamental research that precedes the research and development projects in relation to the establishment of nuclear fuel cycle technology through collaboration with universities, etc. by using mainly JAEA's facilities and equipment. Under the scheme, universities, etc. propose methods and ideas, etc. to lead to the achievement of the goals of research collaboration themes which are set by JAEA as research collaboration subjects. Then a screening committee consisting mainly of experts independent of JAEA screens the research collaboration subjects. Research collaboration is performed by carrying out cooperative research with universities, etc. or by accepting researchers from universities, etc. as Visiting Research Fellows at JAEA. The scheme allows students studying for doctorates at postgraduate schools either to participate in the cooperative research or to be accepted as trainee researchers. This report includes a summary of the results of the research carried out in fiscal year 2008 on 32 research collaboration subjects for preceding basic engineering research related to fast breeder reactors, the nuclear fuel cycle, radiation safety and geological disposal/geoscience; twelve of which ended in 2008. Of these, six were related to fast breeder reactors, one to the nuclear fuel cycle, one to radiation safety, and four to geological disposal/geoscience. (author)

  11. A Distributed Intrusion Detection Scheme about Communication Optimization in Smart Grid

    Directory of Open Access Journals (Sweden)

    Yunfa Li

    2013-01-01

    Full Text Available We first propose an efficient communication optimization algorithm in smart grid. Based on the optimization algorithm, we propose an intrusion detection algorithm to detect malicious data and possible cyberattacks. In this scheme, each node acts independently when it processes communication flows or cybersecurity threats. And neither special hardware nor nodes cooperation is needed. In order to justify the feasibility and the availability of this scheme, a series of experiments have been done. The results show that it is feasible and efficient to detect malicious data and possible cyberattacks with less computation and communication cost.

  12. A study on the Nuclear Cooperation between the Republic of Korea and Japan

    International Nuclear Information System (INIS)

    Lee, Hanmyung; Lee, K. S.; Lee, B. W.; Ryu, J. S.; Jeon, E. J.; Yeo, J. W.; Yun, S. W.

    2010-09-01

    As the nuclear cooperation including nuclear trade between Korea and Japan grows, the necessity for the conclusion of bilateral nuclear cooperation agreement is emerging. As nuclear cooperation agreement affects future nuclear development and utilization, the establishment of optimized scheme for both countries is essential. The nuclear cooperation between Korea and Japan is expected to be established based on the understanding that both countries are major suppliers in world nuclear industries. As the nuclear export control regimes of both countries are based on the NSG Guidelines, the nuclear agreement between two countries are expected to be built based on the mutual respects of each other's national nuclear policy and the recognition on the optimized export control

  13. A Cross-Layer Optimization Approach for Energy Efficient Wireless Sensor Networks: Coalition-Aided Data Aggregation, Cooperative Communication, and Energy Balancing

    Directory of Open Access Journals (Sweden)

    Qinghai Gao

    2007-01-01

    Full Text Available We take a cross-layer optimization approach to study energy efficient data transport in coalition-based wireless sensor networks, where neighboring nodes are organized into groups to form coalitions and sensor nodes within one coalition carry out cooperative communications. In particular, we investigate two network models: (1 many-to-one sensor networks where data from one coalition are transmitted to the sink directly, and (2 multihop sensor networks where data are transported by intermediate nodes to reach the sink. For the many-to-one network model, we propose three schemes for data transmission from a coalition to the sink. In scheme 1, one node in the coalition is selected randomly to transmit the data; in scheme 2, the node with the best channel condition in the coalition transmits the data; and in scheme 3, all the nodes in the coalition transmit in a cooperative manner. Next, we investigate energy balancing with cooperative data transport in multihop sensor networks. Built on the above coalition-aided data transmission schemes, the optimal coalition planning is then carried out in multihop networks, in the sense that unequal coalition sizes are applied to minimize the difference of energy consumption among sensor nodes. Numerical analysis reveals that energy efficiency can be improved significantly by the coalition-aided transmission schemes, and that energy balancing across the sensor nodes can be achieved with the proposed coalition structures.

  14. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

    Science.gov (United States)

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Li, Fagen

    2016-01-01

    Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients' prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems.

  15. Protocol design and analysis for cooperative wireless networks

    CERN Document Server

    Song, Wei; Jin, A-Long

    2017-01-01

    This book focuses on the design and analysis of protocols for cooperative wireless networks, especially at the medium access control (MAC) layer and for crosslayer design between the MAC layer and the physical layer. It highlights two main points that are often neglected in other books: energy-efficiency and spatial random distribution of wireless devices. Effective methods in stochastic geometry for the design and analysis of wireless networks are also explored. After providing a comprehensive review of existing studies in the literature, the authors point out the challenges that are worth further investigation. Then, they introduce several novel solutions for cooperative wireless network protocols that reduce energy consumption and address spatial random distribution of wireless nodes. For each solution, the book offers a clear system model and problem formulation, details of the proposed cooperative schemes, comprehensive performance analysis, and extensive numerical and simulation results that validate th...

  16. A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.

    Science.gov (United States)

    Shen, Limin; Ma, Jianfeng; Liu, Ximeng; Miao, Meixia

    2016-11-01

    Wireless sensor networks (WSNs) are being used in a wide range of applications for healthcare monitoring, like heart rate monitors and blood pressure monitors, which can minimize the need for healthcare professionals. In medical system, sensors on or in patients produce medical data which can be easily compromised by a vast of attacks. Although signature schemes can protect data authenticity and data integrity, when the number of users involved in the medical system becomes huge, the bandwidth and storage cost will rise sharply so that existing signature schemes are inapplicability for WSNs. In this paper, we propose an efficient aggregate signature scheme for healthcare WSNs according to an improved security model, which can combine multiple signatures into a single aggregate signature. The length of such an aggregate signature may be as long as that of an individual one, which can greatly decrease the bandwidth and storage cost for networks.

  17. An integrated 2-year clinical skills peer tutoring scheme in a UK-based medical school: perceptions of tutees and peer tutors

    Science.gov (United States)

    2018-01-01

    Background Several benefits of peer tutoring in medical school teaching have been described. However, there is a lack of research on the perceptions of peer tutoring, particularly from tutees who partake in a long-term clinical skills scheme integrated into the medical school curriculum. This study evaluates the opinions of preclinical tutees at the end of a 2-year peer-tutored clinical skills program and peer tutors themselves. Methods A cross-sectional study was conducted in a UK-based medical school that primarily utilizes peer tutoring for clinical skills teaching. A questionnaire was designed to assess the views of preclinical tutees and peer tutors. Likert scales were used to grade responses and comment boxes to collect qualitative data. Results Sixty-five questionnaires were collected (52 tutees, 13 peer tutors). Seventy-nine percent of students felt satisfied with their teaching, and 70% felt adequately prepared for clinical placements. Furthermore, 79% believed that peer tutoring is the most effective method for clinical skills teaching. When compared to faculty teaching, tutees preferred being taught by peer tutors (63%), felt more confident (73%), and were more willing to engage (77%). All peer tutors felt that teaching made them more confident in their Objective Structured Clinical Examination performance, and 91% agreed that being a tutor made them consider pursuing teaching in the future. Thematic analysis of qualitative data identified 3 themes regarding peer tutoring: a more comfortable environment (69%), a more personalized teaching approach (34%), and variation in content taught (14%). Conclusion Preclinical tutees prefer being taught clinical skills by peer tutors compared to faculty, with the peer tutors also benefitting. Studies such as this, looking at long-term schemes, further validate peer tutoring and may encourage more medical schools to adopt this method as an effective way of clinical skills teaching. PMID:29922105

  18. Optimal Contract Design for Cooperative Relay Incentive Mechanism under Moral Hazard

    Directory of Open Access Journals (Sweden)

    Nan Zhao

    2015-01-01

    Full Text Available Cooperative relay can effectively improve spectrum efficiency by exploiting the spatial diversity in the wireless networks. However, wireless nodes may acquire different network information with various users’ location and mobility, channels’ conditions, and other factors, which results in asymmetric information between the source and the relay nodes (RNs. In this paper, the relay incentive mechanism between relay nodes and the source is investigated under the asymmetric information. By modelling multiuser cooperative relay as a labour market, a contract model with moral hazard for relay incentive is proposed. To effectively incentivize the potential RNs to participate in cooperative relay, the optimization problems are formulated to maximize the source’s utility while meeting the feasible conditions under both symmetric and asymmetric information scenarios. Numerical simulation results demonstrate the effectiveness of the proposed contract design scheme for cooperative relay.

  19. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.

    Science.gov (United States)

    Li, Zhen; Jing, Tao; Ma, Liran; Huo, Yan; Qian, Jin

    2016-03-07

    The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric cryptography and asymmetric cryptography) may be compromised in CIoT networks, since these types of networks are heterogeneous. In this paper, we address the security issue in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative networks, we propose to employ cooperative jamming to achieve secrecy transmission. In the cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the signal to interference plus noise ratio (SINR) at the eavesdropper subject to the quality of service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the considered minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper. By using semi-definite programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme

  20. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks

    Directory of Open Access Journals (Sweden)

    Zhen Li

    2016-03-01

    Full Text Available The Internet of Things (IoT is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely occupied, and thus, the increasing demands of radio access from IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as cellular telephones. Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric and asymmetric ciphers may not be suitable for CIoT networks since these networks are composed of low-profile devices. In this paper, we address the security issues in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative in nature, we propose to employ cooperative jamming to achieve secure transmission. In our proposed cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the Signal to Interference plus Noise Ratio (SINR at the eavesdropper subject to the Quality of Service (QoS constraints of the primary traffic and the secondary traffic. We formulate the minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper (ECSI. By using Semi-Definite Programming (SDP, the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the

  1. Who benefits from cooperation? A numerical analysis of redistribution effects resulting from cooperation in European RES-E support

    Energy Technology Data Exchange (ETDEWEB)

    Unteutsch, Michaela

    2014-01-15

    This paper numerically analyzes redistribution effects resulting from cooperation among European countries in achieving the 2020 targets for electricity generation from renewable energy sources (RES-E). The quanti cation of redistribution effects builds on the theoretical analysis by Unteutsch (2014), who shows that cooperation in RES-E support increases overall welfare but is not beneficial for all groups. In this paper, we use a dynamic investment and dispatch optimization model of the European electricity system to investigate which groups potentially benefit from cooperation and which groups would be worse off compared to a situation in which national RES-E targets are reached solely by domestic RES-E production. In the analysis, cooperation in RES-E support is implemented as a European-wide green certificate trading scheme. Main findings of the analysis include that in the European electricity system, effects of the change in the certificate price in most countries would overcompensate for the effects of the change in the wholesale electricity price. Thus, in most countries with comparatively high (low) generation costs for renewable energies, consumer rents increase (decrease) due to cooperation and producers yield lower (higher) profits. In addition, it is found that the magnitude of redistribution effects between the individual groups is quite large: In some countries, the change in consumer rents or producer profits resulting from cooperation is nearly twice as high as the overall welfare effect of cooperation in the whole European electricity system. Moreover, we find that the sign, but not always the magnitude, of redistribution effects is quite robust to different developments of interconnector extensions, the CO{sub 2} price and RES-E investment costs.

  2. Who benefits from cooperation? A numerical analysis of redistribution effects resulting from cooperation in European RES-E support

    International Nuclear Information System (INIS)

    Unteutsch, Michaela

    2014-01-01

    This paper numerically analyzes redistribution effects resulting from cooperation among European countries in achieving the 2020 targets for electricity generation from renewable energy sources (RES-E). The quanti cation of redistribution effects builds on the theoretical analysis by Unteutsch (2014), who shows that cooperation in RES-E support increases overall welfare but is not beneficial for all groups. In this paper, we use a dynamic investment and dispatch optimization model of the European electricity system to investigate which groups potentially benefit from cooperation and which groups would be worse off compared to a situation in which national RES-E targets are reached solely by domestic RES-E production. In the analysis, cooperation in RES-E support is implemented as a European-wide green certificate trading scheme. Main findings of the analysis include that in the European electricity system, effects of the change in the certificate price in most countries would overcompensate for the effects of the change in the wholesale electricity price. Thus, in most countries with comparatively high (low) generation costs for renewable energies, consumer rents increase (decrease) due to cooperation and producers yield lower (higher) profits. In addition, it is found that the magnitude of redistribution effects between the individual groups is quite large: In some countries, the change in consumer rents or producer profits resulting from cooperation is nearly twice as high as the overall welfare effect of cooperation in the whole European electricity system. Moreover, we find that the sign, but not always the magnitude, of redistribution effects is quite robust to different developments of interconnector extensions, the CO 2 price and RES-E investment costs.

  3. Public vs private administration of rural health insurance schemes: a comparative study in Zhejiang of China.

    Science.gov (United States)

    Zhou, Xiaoyuan; Mao, Zhengzhong; Rechel, Bernd; Liu, Chaojie; Jiang, Jialin; Zhang, Yinying

    2013-07-01

    Since 2003, China has experimented in some of the country's counties with the private administration of the New Cooperative Medical Scheme (NCMS), a publicly subsidized health insurance scheme for rural populations. Our study compared the effectiveness and efficiency of private vs public administration in four counties in one of China's most affluent provinces in the initial stage of the NCMS's implementation. The study was undertaken in Ningbo city of Zhejiang province. Out of 10 counties in Ningbo, two counties with private administration for the NCMS (Beilun and Ninghai) were compared with two others counties with public administration (Zhenhai and Fenghua), using the following indicators: (1) proportion of enrollees who were compensated for inpatient care; (2) average reimbursement-expense ratio per episode of inpatient care; (3) overall administration cost; (4) enrollee satisfaction. Data from 2004 to 2006 were collected from the local health authorities, hospitals and the contracted insurance companies, supplemented by a randomized household questionnaire survey covering 176 households and 479 household members. In our sample counties, private administration of the NCMS neither reduced transaction costs, nor improved the benefits of enrollees. Enrollees covered by the publicly administered NCMS were more likely to be satisfied with the insurance scheme than those covered by the privately administered NCMS. Experience in the selected counties suggests that private administration of the NCMS did not deliver the hoped-for results. We conclude that caution needs to be exercised in extending private administration of the NCMS.

  4. A new seniority scheme for non-degenerate single particle orbits

    International Nuclear Information System (INIS)

    Otsuka, T.; Arima, A.

    1978-01-01

    A new method is proposed in the treatment of the seniority scheme. The method enables one to evaluate analytically the contribution from J = 0 Cooper pairs in non-degenerate single-particle orbits to many-body matrix elements. It includes the SU(2) quasi-spin and the BCS approximation as two extreme limits. The effect of particle number conservation is properly taken into account. (Auth.)

  5. Optimal distribution of incentives for public cooperation in heterogeneous interaction environments

    Directory of Open Access Journals (Sweden)

    Xiaojie eChen

    2014-07-01

    Full Text Available In the framework of evolutionary games with institutional reciprocity, limited incentives are at disposal for rewarding cooperators and punishing defectors. In the simplest case, it can be assumed that, depending on their strategies, all players receive equal incentives from the common pool. The question arises, however, what is the optimal distribution of institutional incentives? How should we best reward and punish individuals for cooperation to thrive? We study this problem for the public goods game on a scale-free network. We show that if the synergetic effects of group interactions are weak, the level of cooperation in the population can be maximized simply by adopting the simplest ''equal distribution'' scheme. If synergetic effects are strong, however, it is best to reward high-degree nodes more than low-degree nodes. These distribution schemes for institutional rewards are independent of payoff normalization. For institutional punishment, however, the same optimization problem is more complex, and its solution depends on whether absolute or degree-normalized payoffs are used. We find that degree-normalized payoffs require high-degree nodes be punished more lenient than low-degree nodes. Conversely, if absolute payoffs count, then high-degree nodes should be punished stronger than low-degree nodes.

  6. Proportional fair scheduling with superposition coding in a cellular cooperative relay system

    DEFF Research Database (Denmark)

    Kaneko, Megumi; Hayashi, Kazunori; Popovski, Petar

    2013-01-01

    Many works have tackled on the problem of throughput and fairness optimization in cellular cooperative relaying systems. Considering firstly a two-user relay broadcast channel, we design a scheme based on superposition coding (SC) which maximizes the achievable sum-rate under a proportional...... fairness constraint. Unlike most relaying schemes where users are allocated orthogonally, our scheme serves the two users simultaneously on the same time-frequency resource unit by superposing their messages into three SC layers. The optimal power allocation parameters of each SC layer are derived...... by analysis. Next, we consider the general multi-user case in a cellular relay system, for which we design resource allocation algorithms based on proportional fair scheduling exploiting the proposed SC-based scheme. Numerical results show that the proposed algorithms allowing simultaneous user allocation...

  7. Multiagent cooperation and competition with deep reinforcement learning.

    Directory of Open Access Journals (Sweden)

    Ardi Tampuu

    Full Text Available Evolution of cooperation and competition can appear when multiple adaptive agents share a biological, social, or technological niche. In the present work we study how cooperation and competition emerge between autonomous agents that learn by reinforcement while using only their raw visual input as the state representation. In particular, we extend the Deep Q-Learning framework to multiagent environments to investigate the interaction between two learning agents in the well-known video game Pong. By manipulating the classical rewarding scheme of Pong we show how competitive and collaborative behaviors emerge. We also describe the progression from competitive to collaborative behavior when the incentive to cooperate is increased. Finally we show how learning by playing against another adaptive agent, instead of against a hard-wired algorithm, results in more robust strategies. The present work shows that Deep Q-Networks can become a useful tool for studying decentralized learning of multiagent systems coping with high-dimensional environments.

  8. Multiagent cooperation and competition with deep reinforcement learning

    Science.gov (United States)

    Kodelja, Dorian; Kuzovkin, Ilya; Korjus, Kristjan; Aru, Juhan; Aru, Jaan; Vicente, Raul

    2017-01-01

    Evolution of cooperation and competition can appear when multiple adaptive agents share a biological, social, or technological niche. In the present work we study how cooperation and competition emerge between autonomous agents that learn by reinforcement while using only their raw visual input as the state representation. In particular, we extend the Deep Q-Learning framework to multiagent environments to investigate the interaction between two learning agents in the well-known video game Pong. By manipulating the classical rewarding scheme of Pong we show how competitive and collaborative behaviors emerge. We also describe the progression from competitive to collaborative behavior when the incentive to cooperate is increased. Finally we show how learning by playing against another adaptive agent, instead of against a hard-wired algorithm, results in more robust strategies. The present work shows that Deep Q-Networks can become a useful tool for studying decentralized learning of multiagent systems coping with high-dimensional environments. PMID:28380078

  9. Multiagent cooperation and competition with deep reinforcement learning.

    Science.gov (United States)

    Tampuu, Ardi; Matiisen, Tambet; Kodelja, Dorian; Kuzovkin, Ilya; Korjus, Kristjan; Aru, Juhan; Aru, Jaan; Vicente, Raul

    2017-01-01

    Evolution of cooperation and competition can appear when multiple adaptive agents share a biological, social, or technological niche. In the present work we study how cooperation and competition emerge between autonomous agents that learn by reinforcement while using only their raw visual input as the state representation. In particular, we extend the Deep Q-Learning framework to multiagent environments to investigate the interaction between two learning agents in the well-known video game Pong. By manipulating the classical rewarding scheme of Pong we show how competitive and collaborative behaviors emerge. We also describe the progression from competitive to collaborative behavior when the incentive to cooperate is increased. Finally we show how learning by playing against another adaptive agent, instead of against a hard-wired algorithm, results in more robust strategies. The present work shows that Deep Q-Networks can become a useful tool for studying decentralized learning of multiagent systems coping with high-dimensional environments.

  10. The State of Human Anatomy Teaching in the Medical Schools of Gulf Cooperation Council Countries: Present and future perspectives.

    Science.gov (United States)

    Habbal, Omar

    2009-04-01

    Available literature on medical education charts an emerging trend in the field of anatomy. In the past decade, assisted by innovations in informatics and the paradigm shift in medical education, the hands-on experience of cadaver dissection has progressively become a relic of the past. Within the context of the situation in Gulf Cooperation Council countries, this paper compares the traditional teaching approach with the modern one that tends to emphasise technical gadgetry, virtual reality and plastic models rather than hands-on-experience to impart knowledge and skill. However, cadaver-based learning is an important building block for the future physician and surgeon since clinical astuteness is likely to rely on skills gained from hands-on experience rather than the tendency to learning through virtual reality found in modern curricula.

  11. Interference-Based Decode and Forward Scheme Using Relay Nodes in Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Kentaro Nishimori

    2012-01-01

    Full Text Available This paper proposes interference-based decode and forward scheme that utilizes relay stations (RSs. In Long-Term-Evolution (LTE- Advanced, heterogeneous networks in which femto- and picocells are overlaid onto macrocells are extensively discussed. However, interference between macro- and pico(femtocells arises due to their different transmit power levels. Unlike conventional cooperative transmission schemes, the RS decodes interference in the first transmit timing period and forwards it to the user equipment (UE in the second period. Moreover, cooperative transmission can be achieved without stopping the transmission from the base station (BS to UE when forwarding the interference from the RS to the UE by utilizing the fact that signal-to-noise power ratio (SNR between the RS and UE is much greater than that between the BS and UE. The basic performance of the proposed method is shown based on computer simulation. Moreover, the interference temperature and shadowing effect are measured when considering the coexistence between macro- and femtocells, and the performance of the proposed method is verified using measured shadowing effect.

  12. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.

    Science.gov (United States)

    Li, Xiong; Niu, Jianwei; Karuppiah, Marimuthu; Kumari, Saru; Wu, Fan

    2016-12-01

    Benefited from the development of network and communication technologies, E-health care systems and telemedicine have got the fast development. By using the E-health care systems, patient can enjoy the remote medical service provided by the medical server. Medical data are important privacy information for patient, so it is an important issue to ensure the secure of transmitted medical data through public network. Authentication scheme can thwart unauthorized users from accessing services via insecure network environments, so user authentication with privacy protection is an important mechanism for the security of E-health care systems. Recently, based on three factors (password, biometric and smart card), an user authentication scheme for E-health care systems was been proposed by Amin et al., and they claimed that their scheme can withstand most of common attacks. Unfortunate, we find that their scheme cannot achieve the untraceability feature of the patient. Besides, their scheme lacks a password check mechanism such that it is inefficient to find the unauthorized login by the mistake of input a wrong password. Due to the same reason, their scheme is vulnerable to Denial of Service (DoS) attack if the patient updates the password mistakenly by using a wrong password. In order improve the security level of authentication scheme for E-health care application, a robust user authentication scheme with privacy protection is proposed for E-health care systems. Then, security prove of our scheme are analysed. Security and performance analyses show that our scheme is more powerful and secure for E-health care systems when compared with other related schemes.

  13. Eco-evolutionary feedback and the invasion of cooperation in prisoner's dilemma games.

    Directory of Open Access Journals (Sweden)

    Feng Zhang

    Full Text Available Unveiling the origin and forms of cooperation in nature poses profound challenges in evolutionary ecology. The prisoner's dilemma game is an important metaphor for studying the evolution of cooperation. We here classified potential mechanisms for cooperation evolution into schemes of frequency- and density-dependent selection, and focused on the density-dependent selection in the ecological prisoner's dilemma games. We found that, although assortative encounter is still the necessary condition in ecological games for cooperation evolution, a harsh environment, indicated by a high mortality, can foster the invasion of cooperation. The Hamilton rule provides a fundamental condition for the evolution of cooperation by ensuring an enhanced relatedness between players in low-density populations. Incorporating ecological dynamics into evolutionary games opens up a much wider window for the evolution of cooperation, and exhibits a variety of complex behaviors of dynamics, such as limit and heteroclinic cycles. An alternative evolutionary, or rather succession, sequence was proposed that cooperation first appears in harsh environments, followed by the invasion of defection, which leads to a common catastrophe. The rise of cooperation (and altruism, thus, could be much easier in the density-dependent ecological games than in the classic frequency-dependent evolutionary games.

  14. Assessment of cooperation mechanism options: Cost-efficient and sustainable deployment of renewable energy sources towards the 20% target by 2020, and beyond. D3.2

    Energy Technology Data Exchange (ETDEWEB)

    Pade Hansen, L.-L.; Klinge Jacobsen, H.; Skovsgaard Nielsen, L.

    2012-12-15

    The RES Directive 2009/28/EC (European Commission 2009) set legally binding targets for EU Member States on energy consumption from renewable sources - the 2020 RES targets. A part of this can be achieved through the use of cooperation mechanisms: statistical transfer, joint project and joint support schemes. The intention of the cooperation mechanisms is to provide the flexibility needed to achieve Europe's renewable energy targets in a more cost-efficient way. In Task 3 of the RES4Less project we analyse the benefits and challenges of using the two cooperation mechanisms: joint project and joint support schemes. This report is the outcome of the work in Task 3.2 where we analyse how the barriers can be overcome and how different design options can be used under varying conditions and time horizons. Cooperation mechanisms have the potential to reduce the compliance costs of reaching the 2020 RES targets for EU member states. The largest benefits can be achieved under full harmonisation and one joints support scheme. However, the different national objectives along with uneven distribution of benefits and costs make this unrealistic in the near future. Cooperation between pairs or groups of countries with large net benefits that can be relatively easy estimated and shared is attractive and realisable in a shorter time horizon. Joint project cooperation is the most flexible instrument to use as it preserves the national legislation and support schemes (national objectives) and can be easily scaled in size. The drawback is the high transaction costs and some uncertainty regarding which party should carry the project implementation risk and guaranty the support for the projects for the entire lifetime. The joint projects can be realised in a short term horizon and as such pave the way for further cooperation. Large projects has a considerable advantage in the reduced transaction cost relative to project size and governments can be expected to be more willing to

  15. Cognitive Medical Multiagent Systems

    OpenAIRE

    Barna Iantovics

    2010-01-01

    The development of efficient and flexible agent-based medical diagnosis systems represents a recent research direction. Medical multiagent systems may improve the efficiency of traditionally developed medical computational systems, like the medical expert systems. In our previous researches, a novel cooperative medical diagnosis multiagent system called CMDS (Contract Net Based Medical Diagnosis System) was proposed. CMDS system can solve flexibly a large variety of medical diagnosis problems...

  16. Errors in the administration of intravenous medications in patients undergoing anesthesia in the operating room

    Directory of Open Access Journals (Sweden)

    Juan David Miranda

    2013-03-01

    Full Text Available Errors in medication administration have affected the anesthetic practice over the time and have become a major cause of perioperative morbidity and mortality. Among different medical specialties, anesthesiology is perhaps the most likely to make mistakes in this procedure. This is because in many places around the world, a single professional "anesthesiologist" orders, prepares and administers a drug at one time and setting. For thirty years, Cooper disclosed the first reports of critical incidents and perioperative safety scheme, and in the 90s', Chopra performed a retrospective analysis, found that medication errors are the fourth most common that results in disability in 17% and death in 8%, these being preventable errors in 51% of cases. It’s essential for the safe practice of anesthesia to establish interventions for improving prevention programs, education, research and development, enabling break traditional paradigms, with the aim of making recommendations and standardize the safe administration of drugs in this field.

  17. Performance analysis of selective cooperation in underlay cognitive networks over Rayleigh channels

    KAUST Repository

    Hussain, Syed Imtiaz

    2011-06-01

    Underlay cognitive networks should follow strict interference thresholds to operate in parallel with primary networks. This constraint limits their transmission power and eventually the area of coverage. Therefore, it is very likely that the underlay networks will make use of relays to transmit signals to the distant secondary users. In this paper, we propose a secondary relay selection scheme which maximizes the end-to-end signal to noise ratio (SNR) for the secondary link while keeping the interference levels to the primary network below a certain threshold. We derive closed form expressions for the probability density function (PDF) of the SNR at the secondary destination, average bit error probability and outage probability. Analytical results are verified through simulations which also give insight about the benefits and tradeoffs of the selective cooperation in underlay cognitive networks. It is shown that, in contrast to non-cognitive selective cooperation, this scheme performs better in low SNR region for cognitive networks. © 2011 IEEE.

  18. Public goods and voting on formal sanction schemes

    DEFF Research Database (Denmark)

    Putterman, Louis; Tyran, Jean-Robert Karl; Kamei, Kenju

    2011-01-01

    The burgeoning literature on the use of sanctions to support the provision of public goods has largely neglected the use of formal or centralized sanctions. We let subjects playing a linear public goods game vote on the parameters of a formal sanction scheme capable of either resolving...... or exacerbating the free-rider problem, depending on parameter settings. Most groups quickly learned to choose parameters inducing efficient outcomes. We find that cooperative orientation, political attitude, gender and intelligence have a small but sometimes significant influence on voting....

  19. Public Goods and Voting on Formal Sanction Schemes

    DEFF Research Database (Denmark)

    Putterman, Louis; Tyran, Jean-Robert; Kamei, Kenju

    The burgeoning literature on the use of sanctions to support public goods provision has largely neglected the use of formal or centralized sanctions. We let subjects playing a linear public goods game vote on the parameters of a formal sanction scheme capable both of resolving and of exacerbating...... the free-rider problem, depending on parameter settings. Most groups quickly learned to choose parameters inducing efficient outcomes. But despite uniform money payoffs implying common interest in those parameters, voting patterns suggest significant influence of cooperative orientation, political...

  20. Performance analysis of selective cooperation in amplify-and-forward relay networks over identical Nakagami-m channels

    KAUST Repository

    Hussain, Syed Imtiaz; Alouini, Mohamed-Slim; Hasna, Mazen Omar

    2011-01-01

    In cooperative communications, multiple relays between a source and a destination can increase the diversity gain. Because all the nodes must use orthogonal channels, multiple-relay cooperation becomes spectrally inefficient. Therefore, a bestrelay selection scheme was recently proposed. In this paper, we analyzed the performance of this scheme for a system with the relays operating in amplify-and-forward mode over identical Nakagami-m channels using an exact source-relay-destination signal-to-noise ratio (SNR).We derived accurate closed-form expressions for various system parameters including the probability density function of end-to-end SNR, the average output SNR, the bit error probability, and the channel capacity. The analytical results were verified through Monte Carlo simulations. Copyright © 2011 John Wiley & Sons, Ltd.

  1. Performance analysis of selective cooperation in amplify-and-forward relay networks over identical Nakagami-m channels

    KAUST Repository

    Hussain, Syed Imtiaz

    2011-05-02

    In cooperative communications, multiple relays between a source and a destination can increase the diversity gain. Because all the nodes must use orthogonal channels, multiple-relay cooperation becomes spectrally inefficient. Therefore, a bestrelay selection scheme was recently proposed. In this paper, we analyzed the performance of this scheme for a system with the relays operating in amplify-and-forward mode over identical Nakagami-m channels using an exact source-relay-destination signal-to-noise ratio (SNR).We derived accurate closed-form expressions for various system parameters including the probability density function of end-to-end SNR, the average output SNR, the bit error probability, and the channel capacity. The analytical results were verified through Monte Carlo simulations. Copyright © 2011 John Wiley & Sons, Ltd.

  2. QIM blind video watermarking scheme based on Wavelet transform and principal component analysis

    Directory of Open Access Journals (Sweden)

    Nisreen I. Yassin

    2014-12-01

    Full Text Available In this paper, a blind scheme for digital video watermarking is proposed. The security of the scheme is established by using one secret key in the retrieval of the watermark. Discrete Wavelet Transform (DWT is applied on each video frame decomposing it into a number of sub-bands. Maximum entropy blocks are selected and transformed using Principal Component Analysis (PCA. Quantization Index Modulation (QIM is used to quantize the maximum coefficient of the PCA blocks of each sub-band. Then, the watermark is embedded into the selected suitable quantizer values. The proposed scheme is tested using a number of video sequences. Experimental results show high imperceptibility. The computed average PSNR exceeds 45 dB. Finally, the scheme is applied on two medical videos. The proposed scheme shows high robustness against several attacks such as JPEG coding, Gaussian noise addition, histogram equalization, gamma correction, and contrast adjustment in both cases of regular videos and medical videos.

  3. What do general practitioners think of the new professional competence scheme?

    LENUS (Irish Health Repository)

    Daly, E

    2012-04-01

    The Irish Medical Practitioners Act 2007 places a statutory obligation on all registered Medical Practitioners to maintain their professional competence by participating in a recognised Professional Competence Scheme. A questionnaire survey was conducted among 48 GPs attending educational meetings to see if doctors had concerns about the Professional Competence Scheme and to ask if they felt they had the necessary time, skills and knowledge to carry out an audit. Twenty-eight GPs (58%) had concerns regarding their participation in the Professional Competence Scheme; 75% were concerned about the time required, and 67% felt they needed further education about the scheme. Although 73% of doctors reported that they understand how to undertake a clinical audit and 50% reported they have carried out an audit in practice, 60% have never had any teaching on audit and 85% would like teaching in this area. Only 48% of the group surveyed felt that audit was practical in their current practice. Doctors have some concerns about the new Professional Competence Scheme, including the audit component. In particular, they report a requirement for more teaching in this area, and are concerned about the time involved.

  4. Transformative State Capacity in Post-Collective China: The Introduction of the New Rural Cooperative Medical System in Two Counties of Western China, 2006-2008.

    Science.gov (United States)

    Klotzbücher, Sascha; Lässig, Peter

    2009-06-01

    In 2002, the Chinese leadership announced a turnaround in national welfare policy: Local insurance at county level, called the New Rural Cooperative Medical System (NRCMS), was to cover all counties by 2010. This paper addresses the main characteristics of NRCMS as an example of 'transformative state capacity' in decentralised policy fields and its feature 'responsiveness' as a market-based means of its introduction.Reviewing the modes of governance and comparing the introduction of local schemes based on two case studies of western China since 2006, this paper argues that the flexibility shown by local administrators in considering structural and procedural adjustments is the result not only of central directives but also of local initiatives. Forms of locally embedded responsiveness to the needs and perceptions of health care recipients are crucial in enhancing the accountability and responsiveness of local cadres. These new modes of 'responsiveness' or responsive regulation are important in understanding and conceptualising the transformative state capacity. Responsive settings using centrally defined local feedback loops are different from hierarchical control and the formal institutionalised representation of the interests of the local population, and are a rough but effective means of enhancing both flexibility and the efficiency of control and financing by the central state. These feedback loops, which are based on voluntary enrolment and on central state subsidies made dependent on contributions received from participants and local government, are complementary forms of governance at grassroots level.

  5. Highland Medical Research Journal

    African Journals Online (AJOL)

    The aim of the Highland Medical Research Journal is to publish scientific research in various fields of medical science and to communicate such research findings to the larger world community. It aims to promote cooperation and understanding amoungst workers in various fields of medical science.

  6. Improvement of a uniqueness-and-anonymity-preserving user authentication scheme for connected health care.

    Science.gov (United States)

    Xie, Qi; Liu, Wenhao; Wang, Shengbao; Han, Lidong; Hu, Bin; Wu, Ting

    2014-09-01

    Patient's privacy-preserving, security and mutual authentication between patient and the medical server are the important mechanism in connected health care applications, such as telecare medical information systems and personally controlled health records systems. In 2013, Wen showed that Das et al.'s scheme is vulnerable to the replay attack, user impersonation attacks and off-line guessing attacks, and then proposed an improved scheme using biometrics, password and smart card to overcome these weaknesses. However, we show that Wen's scheme is still vulnerable to off-line password guessing attacks, does not provide user's anonymity and perfect forward secrecy. Further, we propose an improved scheme to fix these weaknesses, and use the applied pi calculus based formal verification tool ProVerif to prove the security and authentication.

  7. An authentication scheme for secure access to healthcare services.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  8. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  9. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    Science.gov (United States)

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.

  10. The Sharing of Benefits from a Logistics Alliance Based on a Hub-Spoke Network: A Cooperative Game Theoretic Approach

    Directory of Open Access Journals (Sweden)

    Minyoung Yea

    2018-06-01

    Full Text Available This study investigates a strategic alliance as a horizontal cooperation in the logistics and transportation industries by considering various sharing rules with a cooperative game approach. Through forging a strategic alliance, carriers gain extra benefits from resource sharing and high efficiency resource utilization. In particular, our research focuses on the cost savings from using larger vehicles utilizing collective market demand and regarding them as benefits of cooperation. The model conceptualizes the characteristic function of cost savings by coalitions that take into account the hub-spoke network which is common in transportation services. To share the improved profits fairly between members, we use different allocation schemes: the Shapley value, the core center, the τ -value, and the nucleolus. By analyzing those cooperative game theoretic solutions employing an alliance composed of three carriers, we investigate whether satisfaction in this specific coalition provides an incentive for carriers to join such a coalition. Our results from the analysis, with respect to fair allocation schemes, provide a practical and academic foundation for further research.

  11. Reliability Improved Cooperative Communication over Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhuangbin Chen

    2017-10-01

    Full Text Available With the development of smart devices and connection technologies, Wireless Sensor Networks (WSNs are becoming increasingly intelligent. New or special functions can be obtained by receiving new versions of program codes to upgrade their software systems, forming the so-called smart Internet of Things (IoT. Due to the lossy property of wireless channels, data collection in WSNs still suffers from a long delay, high energy consumption, and many retransmissions. Thanks to wireless software-defined networks (WSDNs, software in sensors can now be updated to help them transmit data cooperatively, thereby achieving more reliable communication. In this paper, a Reliability Improved Cooperative Communication (RICC data collection scheme is proposed to improve the reliability of random-network-coding-based cooperative communications in multi-hop relay WSNs without reducing the network lifetime. In WSNs, sensors in different positions can have different numbers of packets to handle, resulting in the unbalanced energy consumption of the network. In particular, nodes in non-hotspot areas have up to 90% of their original energy remaining when the network dies. To efficiently use the residual energy, in RICC, high data transmission power is adopted in non-hotspot areas to achieve a higher reliability at the cost of large energy consumption, and relatively low transmission power is adopted in hotspot areas to maintain the long network lifetime. Therefore, high reliability and a long network lifetime can be obtained simultaneously. The simulation results show that compared with other scheme, RICC can reduce the end-to-end Message Fail delivering Ratio (MFR by 59.4%–62.8% under the same lifetime with a more balanced energy utilization.

  12. Distributed cooperative H∞ optimal tracking control of MIMO nonlinear multi-agent systems in strict-feedback form via adaptive dynamic programming

    Science.gov (United States)

    Luy, N. T.

    2018-04-01

    The design of distributed cooperative H∞ optimal controllers for multi-agent systems is a major challenge when the agents' models are uncertain multi-input and multi-output nonlinear systems in strict-feedback form in the presence of external disturbances. In this paper, first, the distributed cooperative H∞ optimal tracking problem is transformed into controlling the cooperative tracking error dynamics in affine form. Second, control schemes and online algorithms are proposed via adaptive dynamic programming (ADP) and the theory of zero-sum differential graphical games. The schemes use only one neural network (NN) for each agent instead of three from ADP to reduce computational complexity as well as avoid choosing initial NN weights for stabilising controllers. It is shown that despite not using knowledge of cooperative internal dynamics, the proposed algorithms not only approximate values to Nash equilibrium but also guarantee all signals, such as the NN weight approximation errors and the cooperative tracking errors in the closed-loop system, to be uniformly ultimately bounded. Finally, the effectiveness of the proposed method is shown by simulation results of an application to wheeled mobile multi-robot systems.

  13. International cooperation and guarantee of nuclear safety in the implementation of national nuclear law

    International Nuclear Information System (INIS)

    Schneider, Horst

    2011-01-01

    The provisions against damage to be made in accordance with the state of the art as a precondition for licensing under Sec.7, Para.2, No.3 of the German Atomic Energy Act more than ever relate to international findings and practice in science as well as technology. In view of the peaceful use of nuclear power worldwide, together with the manifold institutionalized international and European schemes for cooperation within IAEA (International Atomic Energy Agency), OECD/NEA (Organisation for Economic Cooperation and Development Nuclear Energy Agency), and within the framework of EURATOM, these can be gleaned only from the global state of the art. In addition, there are informal associations and bilateral cooperation schemes of countries within which knowledge is exchanged and, in part, even specific measures ensuring nuclear safety are agreed upon. Also existing international rules and regulations are important. It is for the national enforcement authorities in the nuclear field to determine and assess the bandwidths of scientific opinions and theoretical as well as practical technical availabilities with regard to all tenable scientific findings and technical developments known on the international horizon. (orig.)

  14. Cooperation between the occupational health insurance and physicians practicing occupational dermatology: optimization potential in quality assurance.

    Science.gov (United States)

    Elsner, Peter; Aberer, Werner; Bauer, Andrea; Diepgen, Thomas Ludwig; Drexler, Hans; Fartasch, Manigé; John, Swen Malte; Schuhmacher-Stock, Uta; Wehrmann, Wolfgang; Weisshaar, Elke

    2014-05-01

    Quality assurance is a task of the medical profession, but it is also a duty of the occupational health insurance (OHI). Data on the interaction quality between physicians practicing occupational dermatology and the OHI are limited. An online survey was performed in 854 German members of the Working Group on Occupational and Environmental Dermatology in October 2013. Items included demographic data, a judgment on the cooperation between the dermatologists and OHI companies, an economic grading of the current compensation scheme, and prioritization of optimization tasks. 182 members (21.3 % of the invited population) participated in the survey. The cooperation with the OHI companies was judged as "very good" by 10.8 %, as "good" by 56.7  %, as "satisfactory" by 24.2 %, as "sufficient" by 7.0 % and as "inadequate" by 1.3 %. 93.4 % of the interviewed mentioned problems and improvement potentials in the cooperation of their practice or clinic with OHI companies. Main points of criticisms were reimbursement (44.7 %), followed by impairments of the treatment options (36.5 %) and the delay or scope of the treatment in the dermatologist's procedure (29.4 %). While most physicians practicing occupational dermatology give a positive judgment of their cooperation with OHI companies, quality optimization potentials exist regarding the reimbursement of dermatological services, especially regarding time-intensive counselling in the prevention of occupational skin diseases, in the enablement of diagnostic and therapeutic procedures according to current guidelines and in a timely preventive intervention to use the therapeutic window before chronification of skin diseases may occur. © 2014 Deutsche Dermatologische Gesellschaft (DDG). Published by John Wiley & Sons Ltd.

  15. Verifier-based three-party authentication schemes using extended chaotic maps for data exchange in telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu

    2014-12-01

    Telecare medicine information systems provide a communicating platform for accessing remote medical resources through public networks, and help health care workers and medical personnel to rapidly making correct clinical decisions and treatments. An authentication scheme for data exchange in telecare medicine information systems enables legal users in hospitals and medical institutes to establish a secure channel and exchange electronic medical records or electronic health records securely and efficiently. This investigation develops an efficient and secure verified-based three-party authentication scheme by using extended chaotic maps for data exchange in telecare medicine information systems. The proposed scheme does not require server's public keys and avoids time-consuming modular exponential computations and scalar multiplications on elliptic curve used in previous related approaches. Additionally, the proposed scheme is proven secure in the random oracle model, and realizes the lower bounds of messages and rounds in communications. Compared to related verified-based approaches, the proposed scheme not only possesses higher security, but also has lower computational cost and fewer transmissions. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  16. Network Coding for Backhaul Offloading in D2D Cooperative Fog Data Networks

    Directory of Open Access Journals (Sweden)

    Ben Quinton

    2018-01-01

    Full Text Available Future distributed data networks are expected to be assisted by users cooperation and coding schemes. Given the explosive increase in the end-users’ demand for download of the content from the servers, in this paper, the implementation of instantly decodable network coding (IDNC is considered in full-duplex device-to-device (D2D cooperative fog data networks. In particular, this paper is concerned with designing efficient transmission schemes to offload traffic from the expensive backhaul of network servers by employing IDNC and users cooperation. The generalized framework where users send request for multiple packets and the transmissions are subject to erasure is considered. The optimal problem formulation is presented using the stochastic shortest path (SSP technique over the IDNC graph with induced subgraphs. However, as the optimal solution suffers from the intractability of being NP-hard, it is not suitable for real-time communications. The complexity of the problem is addressed by presenting a greedy heuristic algorithm used over the proposed graph model. The paper shows that by implementing IDNC in a full-duplex cooperative D2D network model significant reduction in the number of downloads required from the servers can be achieved, which will result in offloading of the backhaul servers and thus saving valuable servers’ resources. It is also shown that the performance of the proposed heuristic algorithm is very close to the optimal solution with much lower computational complexity.

  17. [Current status of "hospital-clinic" and "hospital-pharmacy" cooperation for inhalation therapy -based on hospital surveys throughout Japan].

    Science.gov (United States)

    Yoshimura, Chie; Momose, Yasuyuki; Horie, Takeo; Komase, Yuko; Niimi, Akio; Dobashi, Kunio; Fujimoto, Keisaku; Tohda, Yuuji; Ohta, Ken; Adachi, Mitsuru

    2014-02-01

    The "zero death from asthma strategy" in the medical treatment for bronchial asthma has been promoted by the Ministry of Health, Labour, and Welfare from 2006, and it indicates that medical and non-medical specialists, as well as pharmacists, should cooperate, and strives to build cooperation which is suited the actual conditions of an area. It is also important for COPD. Although hospitals in some areas cooperate with clinics and pharmacies, the overall concept of cooperation appears to be absent in most Japanese hospitals. A questionnaire was administered in early March, 2012 to 477 allergology institutions, and was authorized by an educational establishment. Among 246 replies from the institutions, cooperation between hospitals and clinics was carried out by 98 institutions (39.8%) specializing in bronchial asthma, and in 64 institutions (37.2%) specializing in COPD. However, cooperation tools were used in only 37 of these institutions (15.0%). The ability to fill prescriptions outside the hospital was available in 209 institutions (85.0%). One-hundred and seventeen institutions (47.6%) replied that they have no tools for hospital-pharmacy cooperation. Direct indications were written in prescriptions by 82 institutions (33.3). In order to build inter-regional association and to equalize medical treatment, we suggest that developing tools and organization for cooperation between health professionals who treat patients with bronchial asthma and COPD is necessary.

  18. Dynamic aggregation evolution of competitive societies of cooperative and noncooperative agents

    International Nuclear Information System (INIS)

    Lin Zhen-Quan; Ye Gao-Xiang

    2013-01-01

    We propose an evolution model of cooperative agent and noncooperative agent aggregates to investigate the dynamic evolution behaviors of the system and the effects of the competing microscopic reactions on the dynamic evolution. In this model, each cooperative agent and noncooperative agent are endowed with integer values of cooperative spirits and noncooperative spirits, respectively. The cooperative spirits of a cooperative agent aggregate and the noncooperative spirits of a noncooperative agent aggregate change via four competing microscopic reaction schemes: the win-win reaction between two cooperative agents, the lose-lose reaction between two noncooperative agents, the win-lose reaction between a cooperative agent and a noncooperative agent (equivalent to the migration of spirits from cooperative agents to noncooperative agents), and the cooperative agent catalyzed decline of noncooperative spirits. Based on the generalized Smoluchowski's rate equation approach, we investigate the dynamic evolution behaviors such as the total cooperative spirits of all cooperative agents and the total noncooperative spirits of all noncooperative agents. The effects of the three main groups of competition on the dynamic evolution are revealed. These include: (i) the competition between the lose-lose reaction and the win-lose reaction, which gives rise to respectively the decrease and increase in the noncooperative agent spirits; (ii) the competition between the win-win reaction and the win-lose reaction, which gives rise to respectively the increase and decrease in the cooperative agent spirits; (iii) the competition between the win-lose reaction and the catalyzed-decline reaction, which gives rise to respectively the increase and decrease in the noncooperative agent spirits. (interdisciplinary physics and related areas of science and technology)

  19. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  20. Regional co-operation in the nuclear field: The Nordic experience

    International Nuclear Information System (INIS)

    Marcus, F.R.

    1983-01-01

    Experience from 25 years of co-operation in the nuclear field between the Nordic countries is described. A pragmatic approach with a minimum of formalism is used. The co-operation takes place mainly through ''horizontal'' channels between corresponding bodies in the different countries - safety authorities, research institutions, electricity producers, etc. In addition, a ''vertical'' co-ordination between these different circles is accomplished through a Nordic Liaison Committee. The experience shows that valuable results can be obtained, mainly through rationalization and improved use of resources. Difficulties, which are inherent in international co-operation, can be reduced, provided that there is a strong political will, an efficient system to promote contacts, and a flexible financing scheme. Apart from the benefits obtained in each of the countries - whether or not it has its own nuclear power - particular advantages accrue when a ''Nordic group'' can present co-ordinated viewpoints on the international scene. (author)

  1. Ideological leaning and praxis of housing co-operatives in South Africa: Matters arising

    Directory of Open Access Journals (Sweden)

    Richard Jimoh

    2013-06-01

    Full Text Available Social movements came about as a result of dissatisfaction felt by society from the status quo. They present their grievances through demonstrations, strikes, riots, occupation of land, boycott of business or by the development of social and economic alternatives such as self-help schemes or saving clubs. In South Africa, people join housing co-operatives because it takes a long time to wait for the Reconstruction Development Project (RDP houses promised by the Government. The leaning of 5 housing co-operatives was examined within the context of ideology and praxis that are components of triad model. This was done through multi-case study whereby the chairpersons of the housing co-operatives were interviewed using structured interview format. Findings from the study indicated that all the housing co-operatives were not open and voluntary; also, the housing co-operatives were not administered the same way. In all, efforts were put in by the housing co-operatives in engendering the ideology of co-operatives on one hand and the government on the other hand in providing the necessary subsidy so that the gap in the housing deficit could be bridged since this fitted its policy on housing. 

  2. Ideological leaning and praxis of housing co-operatives in South Africa: Matters arising

    Directory of Open Access Journals (Sweden)

    Richard Jimoh

    2013-06-01

    Full Text Available Social movements came about as a result of dissatisfaction felt by society from the status quo. They present their grievances through demonstrations, strikes, riots, occupation of land, boycott of business or by the development of social and economic alternatives such as self-help schemes or saving clubs. In South Africa, people join housing co-operatives because it takes a long time to wait for the Reconstruction Development Project (RDP houses promised by the Government. The leaning of 5 housing co-operatives was examined within the context of ideology and praxis that are components of triad model. This was done through multi-case study whereby the chairpersons of the housing co-operatives were interviewed using structured interview format. Findings from the study indicated that all the housing co-operatives were not open and voluntary; also, the housing co-operatives were not administered the same way. In all, efforts were put in by the housing co-operatives in engendering the ideology of co-operatives on one hand and the government on the other hand in providing the necessary subsidy so that the gap in the housing deficit could be bridged since this fitted its policy on housing.

  3. Study of a Dynamic Cooperative Trading Queue Routing Control Scheme for Freeways and Facilities with Parallel Queues

    OpenAIRE

    Lloret-Batlle, Roger; Jayakrishnan, R.

    2018-01-01

    This article explores the coalitional stability of a new cooperative control policy for freeways and parallel queuing facilities with multiple servers. Based on predicted future delays per queue or lane, a VOT-heterogeneous population of agents can agree to switch lanes or queues and transfer payments to each other in order to minimize the total cost of the incoming platoon. The strategic interaction is captured by an n-level Stackelberg model with coalitions, while the cooperative structure ...

  4. Possibility of full-cooperation in curbing global warming: Procrastination tendency and new principles

    Energy Technology Data Exchange (ETDEWEB)

    Ueda, Y

    2001-07-01

    Global commons such as the global atmosphere have the characteristic, in addition to that of minimum contribution threshold, that whilst the preservation cost is immediate, the benefits belong to future generations. It is derived that, based on the ideas of present-biased preference and naive belief on future selves, full-cooperation to cut greenhouse gasses emissions is procrastinated until the game structure is fundamentally changed. Principles on the assignment of entitlement to the global common pool resources are reexamined, and a new incentive scheme for developing countries to join in cooperative actions is proposed (au)

  5. Possibility of full-cooperation in curbing global warming: Procrastination tendency and new principles

    International Nuclear Information System (INIS)

    Ueda, Y.

    2001-01-01

    Global commons such as the global atmosphere have the characteristic, in addition to that of minimum contribution threshold, that whilst the preservation cost is immediate, the benefits belong to future generations. It is derived that, based on the ideas of present-biased preference and naive belief on future selves, full-cooperation to cut greenhouse gasses emissions is procrastinated until the game structure is fundamentally changed. Principles on the assignment of entitlement to the global common pool resources are reexamined, and a new incentive scheme for developing countries to join in cooperative actions is proposed (au)

  6. Linking payment to health outcomes: a taxonomy and examination of performance-based reimbursement schemes between healthcare payers and manufacturers.

    Science.gov (United States)

    Carlson, Josh J; Sullivan, Sean D; Garrison, Louis P; Neumann, Peter J; Veenstra, David L

    2010-08-01

    To identify, categorize and examine performance-based health outcomes reimbursement schemes for medical technology. We performed a review of performance-based health outcomes reimbursement schemes over the past 10 years (7/98-010/09) using publicly available databases, web and grey literature searches, and input from healthcare reimbursement experts. We developed a taxonomy of scheme types by inductively organizing the schemes identified according to the timing, execution, and health outcomes measured in the schemes. Our search yielded 34 coverage with evidence development schemes, 10 conditional treatment continuation schemes, and 14 performance-linked reimbursement schemes. The majority of schemes are in Europe and Australia, with an increasing number in Canada and the U.S. These schemes have the potential to alter the reimbursement and pricing landscape for medical technology, but significant challenges, including high transaction costs and insufficient information systems, may limit their long-term impact. Future studies regarding experiences and outcomes of implemented schemes are necessary. Copyright 2010 Elsevier Ireland Ltd. All rights reserved.

  7. Energy Efficient Cooperative Spectrum Sensing in Cognitive Radio Networks Using Distributed Dynamic Load Balanced Clustering Scheme

    Directory of Open Access Journals (Sweden)

    Muthukkumar R.

    2017-04-01

    Full Text Available Cognitive Radio (CR is a promising and potential technique to enable secondary users (SUs or unlicenced users to exploit the unused spectrum resources effectively possessed by primary users (PUs or licenced users. The proven clustering approach is used to organize nodes in the network into the logical groups to attain energy efficiency, network scalability, and stability for improving the sensing accuracy in CR through cooperative spectrum sensing (CSS. In this paper, a distributed dynamic load balanced clustering (DDLBC algorithm is proposed. In this algorithm, each member in the cluster is to calculate the cooperative gain, residual energy, distance, and sensing cost from the neighboring clusters to perform the optimal decision. Each member in a cluster participates in selecting a cluster head (CH through cooperative gain, and residual energy that minimises network energy consumption and enhances the channel sensing. First, we form the number of clusters using the Markov decision process (MDP model to reduce the energy consumption in a network. In this algorithm, CR users effectively utilize the PUs reporting time slots of unavailability. The simulation results reveal that the clusters convergence, energy efficiency, and accuracy of channel sensing increased considerably by using the proposed algorithm.

  8. Energy Efficient Cooperative Spectrum Sensing in Cognitive Radio Networks Using Distributed Dynamic Load Balanced Clustering Scheme

    Directory of Open Access Journals (Sweden)

    Muthukkumar R.

    2016-07-01

    Full Text Available Cognitive Radio (CR is a promising and potential technique to enable secondary users (SUs or unlicenced users to exploit the unused spectrum resources effectively possessed by primary users (PUs or licenced users. The proven clustering approach is used to organize nodes in the network into the logical groups to attain energy efficiency, network scalability, and stability for improving the sensing accuracy in CR through cooperative spectrum sensing (CSS. In this paper, a distributed dynamic load balanced clustering (DDLBC algorithm is proposed. In this algorithm, each member in the cluster is to calculate the cooperative gain, residual energy, distance, and sensing cost from the neighboring clusters to perform the optimal decision. Each member in a cluster participates in selecting a cluster head (CH through cooperative gain, and residual energy that minimises network energy consumption and enhances the channel sensing. First, we form the number of clusters using the Markov decision process (MDP model to reduce the energy consumption in a network. In this algorithm, CR users effectively utilize the PUs reporting time slots of unavailability. The simulation results reveal that the clusters convergence, energy efficiency, and accuracy of channel sensing increased considerably by using the proposed algorithm.

  9. An adaptive approach to cooperative longitudinal platooning of heterogeneous vehicles with communication losses

    NARCIS (Netherlands)

    Abou Harfouch, Youssef; Yuan, S.; Baldi, S.; Dochain, Denis; Henrion, Didier; Peaucelle, Dimitri

    2017-01-01

    Despite the progresses in Cooperative Adaptive Cruise Control (CACC), a crucial limitation of the state-of-the-art of this control scheme is that the string stability of the platoon can be proven only when the vehicles in the platoon have identical driveline dynamics (homogeneous platoons). In

  10. BICM-based cooperative communication systems with relay selection: Constellation and multiplexer design

    KAUST Repository

    Malik, Muhammad Talha

    2014-09-01

    We propose a new bit-interleaved coded modulation (BICM)-based cooperative communication system where different BICM modules can be optimized jointly considering the average signal to noise ratios of the direct and the two-hop Rayleigh fading channels. As such, the full benefit of BICM can be exploited in the context of cooperative communication. Our design considers cooperative communication systems with so called max-min relay selection scheme that has no loss in performance in terms of diversity- multiplexing trade off in orthogonal cooperation. The presented numerical results for rate 1/2 convolutional code with 8-ary pulse amplitude modulation equivalently 64-ary quadrature amplitude modulation show that the proposed design can offer gains up to 1.4 dB over the traditional BICM design for a target bit error rate of 10-6. Moreover the results show that the amount of gain depends on the relays\\' positions and increases with the number of relays available for selection.

  11. Development of an electronic medical report delivery system to 3G GSM mobile (cellular) phones for a medical imaging department.

    Science.gov (United States)

    Lim, Eugene Y; Lee, Chiang; Cai, Weidong; Feng, Dagan; Fulham, Michael

    2007-01-01

    Medical practice is characterized by a high degree of heterogeneity in collaborative and cooperative patient care. Fast and effective communication between medical practitioners can improve patient care. In medical imaging, the fast delivery of medical reports to referring medical practitioners is a major component of cooperative patient care. Recently, mobile phones have been actively deployed in telemedicine applications. The mobile phone is an ideal medium to achieve faster delivery of reports to the referring medical practitioners. In this study, we developed an electronic medical report delivery system from a medical imaging department to the mobile phones of the referring doctors. The system extracts a text summary of medical report and a screen capture of diagnostic medical image in JPEG format, which are transmitted to 3G GSM mobile phones.

  12. Learning to Voice? The Evolving Roles of Family Farmers in the Coordination of Large-Scale Irrigation Schemes in Morocco

    Directory of Open Access Journals (Sweden)

    Nicolas Faysse

    2010-02-01

    Full Text Available In Morocco, large-scale irrigation schemes have evolved over the past twenty years from the centralised management of irrigation and agricultural production into more complex multi-actor systems. This study analysed whether, and how, in the context of state withdrawal, increased farmer autonomy and political liberalisation, family farmers currently participate in the coordination and negotiation of issues that affect them and involve scheme-level organisations. Issues related to water management, the sugar industry and the dairy sector were analysed in five large-scale irrigation schemes. Farmer organisations that were set up to intervene in water management and sugar production were seen to be either inactive or to have weak links with their constituency; hence, the irrigation administration and the sugar industry continue to interact directly with farmers in a centralised way. Given their inability to voice their interests, when farmers have the opportunity, many choose exit strategies, for instance by resorting to the use of groundwater. In contrast, many community-based milk collection cooperatives were seen to function as accountable intermediaries between smallholders and dairy firms. While, as in the past, family farmers are still generally not involved in decision making at scheme level, in the milk collection cooperatives studied, farmers learn to coordinate and negotiate for the development of their communities.

  13. A localized cooperative wideband spectrum sensing for dynamic access of TV bands using RF sensor networks

    KAUST Repository

    Mirza, Mohammed; Alouini, Mohamed-Slim

    2011-01-01

    In this paper we address and simulate a Radio Frequency (RF) sensor network for a cooperative spectrum sensing and localization scheme. The proposed method integrates a Wavelet based Multi-Resolution Spectrum Sensing (MRSS), an N-bit hard

  14. Effect of training and structured medication review on medication appropriateness in nursing home residents and on cooperation between health care professionals: the InTherAKT study protocol.

    Science.gov (United States)

    Mahlknecht, Angelika; Nestler, Nadja; Bauer, Ulrike; Schüßler, Nadine; Schuler, Jochen; Scharer, Sebastian; Becker, Ralf; Waltering, Isabel; Hempel, Georg; Schwalbe, Oliver; Flamm, Maria; Osterbrink, Jürgen

    2017-01-18

    Pharmacotherapy in residents of nursing homes is critical due to the special vulnerability of this population. Medical care and interprofessional communication in nursing homes are often uncoordinated. As a consequence, polypharmacy and inappropriate medication use are common and may lead to hospitalizations and health hazards. The aim of this study is to optimize communication between the involved professional groups by specific training and by establishing a structured medication review process, and to improve medication appropriateness and patient-relevant health outcomes for residents of nursing homes. The trial is designed as single-arm study. It involves 300 nursing home residents aged ≥ 65 years and the members of the different professional groups practising in nursing home care (15-20 general practitioners, nurses, pharmacists). The intervention consists of interprofessional education on safe medication use in geriatric patients, and a systematic interprofessional therapy check (recording, reviewing and adapting the medication of the participating residents by means of a specific online platform). The intervention period is divided into two phases; total project period is 3 years. Primary outcome measure is the change in medication appropriateness according to the Medication Appropriateness Index. Secondary outcomes are cognitive performance, occurrence of delirium, agitation, tendency of falls, total number of drugs, number of potentially dangerous drug-drug interactions and appropriateness of recorded analgesic therapy regimens according to the Medication Appropriateness Index. Data are collected at t 0 (before the start of the intervention), t 1 (after the first intervention period) and t 2 (after the second intervention period). Cooperation and communication between the professional groups are investigated twice by qualitative interviews. The project aims to establish a structured system for monitoring of drug therapy in nursing home residents

  15. Fault-tolerant cooperative output regulation for multi-vehicle systems with sensor faults

    Science.gov (United States)

    Qin, Liguo; He, Xiao; Zhou, D. H.

    2017-10-01

    This paper presents a unified framework of fault diagnosis and fault-tolerant cooperative output regulation (FTCOR) for a linear discrete-time multi-vehicle system with sensor faults. The FTCOR control law is designed through three steps. A cooperative output regulation (COR) controller is designed based on the internal mode principle when there are no sensor faults. A sufficient condition on the existence of the COR controller is given based on the discrete-time algebraic Riccati equation (DARE). Then, a decentralised fault diagnosis scheme is designed to cope with sensor faults occurring in followers. A residual generator is developed to detect sensor faults of each follower, and a bank of fault-matching estimators are proposed to isolate and estimate sensor faults of each follower. Unlike the current distributed fault diagnosis for multi-vehicle systems, the presented decentralised fault diagnosis scheme in each vehicle reduces the communication and computation load by only using the information of the vehicle. By combing the sensor fault estimation and the COR control law, an FTCOR controller is proposed. Finally, the simulation results demonstrate the effectiveness of the FTCOR controller.

  16. [Cooperation with the electronic medical record and accounting system of an actual dose of drug given by a radiology information system].

    Science.gov (United States)

    Yamamoto, Hideo; Yoneda, Tarou; Satou, Shuji; Ishikawa, Toru; Hara, Misako

    2009-12-20

    By input of the actual dose of a drug given into a radiology information system, the system converting with an accounting system into a cost of the drug from the actual dose in the electronic medical record was built. In the drug master, the first unit was set as the cost of the drug, and we set the second unit as the actual dose. The second unit in the radiology information system was received by the accounting system through electronic medical record. In the accounting system, the actual dose was changed into the cost of the drug using the dose of conversion to the first unit. The actual dose was recorded on a radiology information system and electronic medical record. The actual dose was indicated on the accounting system, and the cost for the drug was calculated. About the actual dose of drug, cooperation of the information in a radiology information system and electronic medical record were completed. It was possible to decide the volume of drug from the correct dose of drug at the previous inspection. If it is necessary for the patient to have another treatment of medicine, it is important to know the actual dose of drug given. Moreover, authenticity of electronic medical record based on a statute has also improved.

  17. Consensus-based distributed cooperative learning from closed-loop neural control systems.

    Science.gov (United States)

    Chen, Weisheng; Hua, Shaoyong; Zhang, Huaguang

    2015-02-01

    In this paper, the neural tracking problem is addressed for a group of uncertain nonlinear systems where the system structures are identical but the reference signals are different. This paper focuses on studying the learning capability of neural networks (NNs) during the control process. First, we propose a novel control scheme called distributed cooperative learning (DCL) control scheme, by establishing the communication topology among adaptive laws of NN weights to share their learned knowledge online. It is further proved that if the communication topology is undirected and connected, all estimated weights of NNs can converge to small neighborhoods around their optimal values over a domain consisting of the union of all state orbits. Second, as a corollary it is shown that the conclusion on the deterministic learning still holds in the decentralized adaptive neural control scheme where, however, the estimated weights of NNs just converge to small neighborhoods of the optimal values along their own state orbits. Thus, the learned controllers obtained by DCL scheme have the better generalization capability than ones obtained by decentralized learning method. A simulation example is provided to verify the effectiveness and advantages of the control schemes proposed in this paper.

  18. Novel Cooperative Spectrum Sensing Methods And Their Limitations

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno

    2012-01-01

    $-calculus, denoted as Bounded Broadcast Calculus. This analysis is done over centralized, decentralized and relay aided topologies. The outcome of this analysis is a theorem where it is stated, which properties a protocol should have so that it can be deemed correct, i.e. that it performs as intended, over each...... source. The node selection scheme is proposed in a centralized and in a decentralized version. These versions can complement each other and therefore lead to a more robust cooperative spectrum sensing mechanism....

  19. The Evolution of Cooperation in Managed Groundwater Systems: An Agent-Based Modelling Approach

    Science.gov (United States)

    Castilla Rho, J. C.; Mariethoz, G.; Rojas, R. F.; Andersen, M. S.; Kelly, B. F.; Holley, C.

    2014-12-01

    Human interactions with groundwater systems often exhibit complex features that hinder the sustainable management of the resource. This leads to costly and persistent conflicts over groundwater at the catchment scale. One possible way to address these conflicts is by gaining a better understanding of how social and groundwater dynamics coevolve using agent-based models (ABM). Such models allow exploring 'bottom-up' solutions (i.e., self-organised governance systems), where the behaviour of individual agents (e.g., farmers) results in the emergence of mutual cooperation among groundwater users. There is significant empirical evidence indicating that this kind of 'bottom-up' approach may lead to more enduring and sustainable outcomes, compared to conventional 'top-down' strategies such as centralized control and water right schemes (Ostrom 1990). New modelling tools are needed to study these concepts systematically and efficiently. Our model uses a conceptual framework to study cooperation and the emergence of social norms as initially proposed by Axelrod (1986), which we adapted to groundwater management. We developed an ABM that integrates social mechanisms and the physics of subsurface flow. The model explicitly represents feedback between groundwater conditions and social dynamics, capturing the spatial structure of these interactions and the potential effects on cooperation levels in an agricultural setting. Using this model, we investigate a series of mechanisms that may trigger norms supporting cooperative strategies, which can be sustained and become stable over time. For example, farmers in a self-monitoring community can be more efficient at achieving the objective of sustainable groundwater use than government-imposed regulation. Our coupled model thus offers a platform for testing new schemes promoting cooperation and improved resource use, which can be used as a basis for policy design. Importantly, we hope to raise awareness of agent-based modelling as

  20. Profit Allocation of Hybrid Power System Planning in Energy Internet: A Cooperative Game Study

    Directory of Open Access Journals (Sweden)

    Jicheng Liu

    2018-02-01

    Full Text Available The rapid development of Energy Internet (EI has prompted numbers of generators to participate, leading to a hybrid power system. Hence, how to plan the hybrid power system and allocate its profit becomes necessary. In this paper, the cooperative game theory is introduced to discuss this problem. We first design the basic structure of EI, and point out the object of this study—coal power plant-wind farm-photovoltaic power station-energy storage provider (CWPE alliance. Subsequently, average allocation strategy (AAS, capacity-based allocation strategy (CAS and Shapley value allocation strategy (SAS are proposed, and then the modified disruption propensity (MDP index is constructed to judge the advantages and disadvantages of the three schemes. Thirdly, taking a certain area of A Province as an example, the profits of CWPE under three strategies are calculated respectively. Finally, by analyzing individual rationality and collective rationality of cooperative game and the MDP index of the three profit allocation schemes, we find that SAS is the most stable.

  1. Unwanted pregnancy: The outer boundary of "treatment injury" in the New Zealand accident compensation scheme.

    Science.gov (United States)

    Tobin, Rosemary

    2015-09-01

    The New Zealand accident compensation scheme has undergone many changes over the years and these changes are reflected in the way unwanted pregnancy claims have been dealt with under the regime. The New Zealand Supreme Court has now confirmed that pregnancy as a result of medical misadventure can be classified as a personal injury under the scheme with the result that the woman patient is entitled to the benefits of the scheme and may not pursue a common law claim against the medical practitioner. This article analyses two recent decisions in the context of consideration of the changing fortunes of the unwanted pregnancy claims.

  2. Frequency Resource Sharing and Allocation Scheme Based on Coalition Formation Game in Hybrid D2D-Cellular Network

    Directory of Open Access Journals (Sweden)

    Qing Ou

    2015-01-01

    Full Text Available A distributed cooperation scheme on frequency resource sharing is proposed to improve the quality of service (QoS in device-to-device (D2D communications underlaying cellular networks. Specifically, we formulate the resource allocation problem as a coalition formation game with transferable utility, in which all users have the incentive to cooperate with some others and form a competitive group to maximize the probability of obtaining their favorite spectrum resources. Taking the cost for coalition formation into account, such as the path loss for data sharing, we prove that the core of the proposed game is empty, which shows the impossibility of grand coalition. Hence, we propose a distributed merge-and-split based coalition formation algorithm based on a new defined Max-Coalition order to effectively solve the coalition game. Compared with the exhaustive search, our algorithm has much lower computer complexity. In addition, we prove that stability and convergence of the proposed algorithm using the concept of a defection function. Finally, the simulation results show that the proposed scheme achieves a suboptimal performance in terms of network sum rate compared with the centralized optimal resource allocation scheme obtained via exhaustive search.

  3. Cognitive Medical Multiagent Systems

    Directory of Open Access Journals (Sweden)

    Barna Iantovics

    2010-01-01

    Full Text Available The development of efficient and flexible agent-based medical diagnosis systems represents a recent research direction. Medical multiagent systems may improve the efficiency of traditionally developed medical computational systems, like the medical expert systems. In our previous researches, a novel cooperative medical diagnosis multiagent system called CMDS (Contract Net Based Medical Diagnosis System was proposed. CMDS system can solve flexibly a large variety of medical diagnosis problems. This paper analyses the increased intelligence of the CMDS system, which motivates its use for different medical problem’s solving.

  4. Rural health prepayment schemes in China: towards a more active role for government.

    Science.gov (United States)

    Bloom, G; Shenglan, T

    1999-04-01

    A large majority of China's rural population were members of health prepayment schemes in the 1970's. Most of these schemes collapsed during the transition to a market economy. Some localities subsequently reestablished schemes. In early 1997 a new government policy identified health prepayment as a major potential source of rural health finance. This paper draws on the experience of existing schemes to explore how government can support implementation of this policy. The decision to support the establishment of health prepayment schemes is part of the government's effort to establish new sources of finance for social services. It believes that individuals are more likely to accept voluntary contributions to a prepayment scheme than tax increases. The voluntary nature of the contributions limits the possibilities for risk-sharing and redistribution between rich and poor. This underlines the need for the government to fund a substantial share of health expenditure out of general revenues, particularly in poor localities. The paper notes that many successful prepayment schemes depend on close supervision by local political leaders. It argues that the national programme will have to translate these measures into a regulatory system which defines the responsibilities of scheme management bodies and local governments. A number of prepayment schemes have collapsed because members did not feel they got value for money. Local health bureaux will have to cooperate with prepayment schemes to ensure that health facilities provide good quality services at a reasonable cost. Users' representatives can also monitor performance. The paper concludes that government needs to clarify the relationship between health prepayment schemes and other actors in rural localities in order to increase the chance that schemes will become a major source rural health finance.

  5. The Microtron MT-25 facility in Cuba. A contribution to the regional cooperation

    International Nuclear Information System (INIS)

    Perez, G.; Guibert, R.; Zuniga, J.F.; Guzman, F.; Montero, M.E.; Rizo, O.D.; Ciminos, L.

    2000-01-01

    One of the main difficulties to develop nuclear application research is the lack of nuclear facilities. Different approaches and initiatives have been raised looking for more comprehensive exchanges. However, it is still necessary to strengthen regional cooperation in nuclear applications, in particular in the common use of accelerators and other nuclear facilities, based on a cooperative scheme in which each country contributes with its own facilities. The Microtron MT-25 Project in Cuba is proposed to deal with this kind of scheme. The construction of an electron accelerator up to 25 MeV, called Microtron MT-25, was finished in 1990 for Cuba, as a result of the collaboration of Cuban and Russian physicists in the Joint Institute for Nuclear Research in Dubna, Russia. The Microtron MT-25 is an electron cycle-accelerator which allows electrons, gamma rays and neutrons to be obtained. The principal characteristics of the accelerator and radiation are described in the paper. The Microtron-Havana facility is conceived for fundamental and applied research. The fundamental research topics of interest are photonuclear reaction studies, Nuclear Astrophysics reactions and photofission reactions. The applied research program involved in the Microtron Project consists of Gamma and Neutron Activation Analysis applied in Environment, Agriculture, Geology, Minerals, as well as materials science. Production of radioactive sources and radioisotopes. Medical and biological applications.To develop the research program, interested institutions need to form a User's Club. It will be formed, among others, by Brazil (Institute of Physics, Univ. Sao Paulo, Linear Accelerator Lab.), Argentina (Tandem Accelerator, called Tandar), Mexico (Institute of Physic, UNAM, Experimental Physics Department), Cuba (ISCTN, CEADEN, Isotopes Center, and IMRE from Havana University.) The participation of the members in the program exploitation will be based on projects in which the financial matters and

  6. Factors affecting sustainability of rural water schemes in Swaziland

    Science.gov (United States)

    Peter, Graciana; Nkambule, Sizwe E.

    maintenance; existence of fund for operation and maintenance; willingness to contribute money; existence of a user’s committee; participation in the initial planning and design of the water scheme; and coordination between the local leaders and user’s committee. The main factors which made the schemes unsustainable were: long fetching time; non-involvement in decision making; lack of willingness to contribute funds; absence of users committee; and lack of cooperation between local leaders and the users committee. Water service providers should address the technical, social, financial and institutional factors identified affecting sustainability in their planning and implementation of rural water schemes.

  7. Assessment of a cooperative workstation.

    Science.gov (United States)

    Beuscart, R J; Molenda, S; Souf, N; Foucher, C; Beuscart-Zephir, M C

    1996-01-01

    Groupware and new Information Technologies have now made it possible for people in different places to work together in synchronous cooperation. Very often, designers of this new type of software are not provided with a model of the common workspace, which is prejudicial to software development and its acceptance by potential users. The authors take the example of a task of medical co-diagnosis, using a multi-media communication workstation. Synchronous cooperative work is made possible by using local ETHERNET or public ISDN Networks. A detailed ergonomic task analysis studies the cognitive functioning of the physicians involved, compares their behaviour in the normal and the mediatized situations, and leads to an interpretation of the likely causes for success or failure of CSCW tools.

  8. Cooperative peer-to-peer multiagent-based systems.

    Science.gov (United States)

    Caram, L F; Caiafa, C F; Ausloos, M; Proto, A N

    2015-08-01

    A multiagent based model for a system of cooperative agents aiming at growth is proposed. This is based on a set of generalized Verhulst-Lotka-Volterra differential equations. In this study, strong cooperation is allowed among agents having similar sizes, and weak cooperation if agents have markedly different "sizes", thus establishing a peer-to-peer modulated interaction scheme. A rigorous analysis of the stable configurations is presented first examining the fixed points of the system, next determining their stability as a function of the model parameters. It is found that the agents are self-organizing into clusters. Furthermore, it is demonstrated that, depending on parameter values, multiple stable configurations can coexist. It occurs that only one of them always emerges with probability close to one, because its associated attractor dominates over the rest. This is shown through numerical integrations and simulations, after analytic developments. In contrast to the competitive case, agents are able to increase their capacity beyond the no-interaction case limit. In other words, when some collaborative partnership among a relatively small number of partners takes place, all agents act in good faith prioritizing the common good, when receiving a mutual benefit allowing them to surpass their capacity.

  9. BRAIN Journal - Cognitive Medical Multiagent Systems

    OpenAIRE

    Barna Iantovics

    2017-01-01

    Abstract The development of efficient and flexible agent-based medical diagnosis systems represents a recent research direction. Medical multiagent systems may improve the efficiency of traditionally developed medical computational systems, like the medical expert systems. In our previous researches, a novel cooperative medical diagnosis multiagent system called CMDS (Contract Net Based Medical Diagnosis System) was proposed. CMDS system can solve flexibly a large variety of medical diagn...

  10. Geopolitics, economy and international solidarity in the new South-South cooperation: the case of Bolivarian

    Directory of Open Access Journals (Sweden)

    Daniele BENZI

    2013-06-01

    Full Text Available This article aims to show an overview of the energy cooperation scheme called PETROCARIBE, proposed in 2005 by the Bolivarian Republic of Venezuela to the Caribbean and Central American countries. It argues that the emergence of this project, like other South-South cooperation initiatives, is clearly linked to several strategic foreign policy goals, which basically refer to geopolitical, economic, security and, last but not least, international solidarity parameters. The first section outlines some general characteristics of South-South cooperation and current trends and debates. The following presents the peculiar features of the Bolivarian foreign and energy policies. The next presents a general description of the PETROCARIBE framework, working mechanisms and its most important projects. Finally, after a discussion on PETROCARIBE as a South-South cooperation initiative, by highlighting its scopes, problems and vulnerabilities, some conclusions are drawn.

  11. Sanitizing sensitive association rules using fuzzy correlation scheme

    International Nuclear Information System (INIS)

    Hameed, S.; Shahzad, F.; Asghar, S.

    2013-01-01

    Data mining is used to extract useful information hidden in the data. Sometimes this extraction of information leads to revealing sensitive information. Privacy preservation in Data Mining is a process of sanitizing sensitive information. This research focuses on sanitizing sensitive rules discovered in quantitative data. The proposed scheme, Privacy Preserving in Fuzzy Association Rules (PPFAR) is based on fuzzy correlation analysis. In this work, fuzzy set concept is integrated with fuzzy correlation analysis and Apriori algorithm to mark interesting fuzzy association rules. The identified rules are called sensitive. For sanitization, we use modification technique where we substitute maximum value of fuzzy items with zero, which occurs most frequently. Experiments demonstrate that PPFAR method hides sensitive rules with minimum modifications. The technique also maintains the modified data's quality. The PPFAR scheme has applications in various domains e.g. temperature control, medical analysis, travel time prediction, genetic behavior prediction etc. We have validated the results on medical dataset. (author)

  12. Social penalty promotes cooperation in a cooperative society.

    Science.gov (United States)

    Ito, Hiromu; Yoshimura, Jin

    2015-08-04

    Why cooperation is well developed in human society is an unsolved question in biological and human sciences. Vast studies in game theory have revealed that in non-cooperative games selfish behavior generally dominates over cooperation and cooperation can be evolved only under very limited conditions. These studies ask the origin of cooperation; whether cooperation can evolve in a group of selfish individuals. In this paper, instead of asking the origin of cooperation, we consider the enhancement of cooperation in a small already cooperative society. We ask whether cooperative behavior is further promoted in a small cooperative society in which social penalty is devised. We analyze hawk-dove game and prisoner's dilemma introducing social penalty. We then expand it for non-cooperative games in general. The results indicate that cooperation is universally favored if penalty is further imposed. We discuss the current result in terms of the moral, laws, rules and regulations in a society, e.g., criminology and traffic violation.

  13. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru

    2016-10-01

    Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security

  14. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs

    Science.gov (United States)

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-01-01

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme. PMID:28338620

  15. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs.

    Science.gov (United States)

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-03-24

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme.

  16. [Utility of conceptual schemes and mental maps on the teaching-learning process of residents in pediatrics].

    Science.gov (United States)

    Cruza, Norberto Sotelo; Fierros, Luis E

    2006-01-01

    The present study was done at the internal medicine service oft he Hospital lnfantil in the State of Sonora, Mexico. We tried to address the question of the use of conceptual schemes and mind maps and its impact on the teaching-learning-evaluation process among medical residents. Analyze the effects of conceptual schemes, and mind maps as a teaching and evaluation tool and compare them with multiple choice exams among Pediatric residents. Twenty two residents (RI, RII, RIII)on service rotation during six months were assessed initially, followed by a lecture on a medical subject. Conceptual schemes and mind maps were then introduced as a teaching-learning-evaluation instrument. Comprehension impact and comparison with a standard multiple choice evaluation was done. The statistical package (JMP version 5, SAS inst. 2004) was used. We noted that when we used conceptual schemes and mind mapping, learning improvement was noticeable among the three groups of residents (P evaluation tool when compared with multiple choice exams (P < 0.0005). Based on our experience we recommend the use of this educational technique for medical residents in training.

  17. A Cooperative Communication Model Tailored for Energy Balance in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Camila F. Rêgo

    2017-08-01

    Full Text Available Wireless Sensor Networks (WSN are characterized by their capacity of monitoring the environment, gathering and sharing information. Nodes in a WSN usually cooperate in the task of forwarding the sensed data to a sink node for later retrieval and analysis. The success of this task depends on the availability of efficient routes that meet the application requirements. As topology may change overtime, alternatives to improve and maintain network connectivity are highly desired. In this context, Cooperative Communication (CC emerged as an alternative to improve network connectivity. Despite its benefits, CC-links are known to have higher energy demands as compared to traditional, direct, links. In particular, CC-links require the source node to expend more power than others nodes, shortening their life span. The main contribution of this paper is to propose a new Cooperative Communication model, capable of increasing the energy balance of the CC-links while improving network connectivity. Simulation results show that, compared to other CC schemes, the source node of a Cooperative Communication reduces the amount of expended energy by 68% in the evaluated settings.

  18. Blind cooperative diversity using distributed space-time coding in block fading channels

    KAUST Repository

    Tourki, Kamel

    2010-08-01

    Mobile users with single antennas can still take advantage of spatial diversity through cooperative space-time encoded transmission. In this paper, we consider a scheme in which a relay chooses to cooperate only if its source-relay channel is of an acceptable quality and we evaluate the usefulness of relaying when the source acts blindly and ignores the decision of the relays whether they may cooperate or not. In our study, we consider the regenerative relays in which the decisions to cooperate are based on a signal-to-noise ratio (SNR) threshold and consider the impact of the possible erroneously detected and transmitted data at the relays. We derive the end-to-end bit-error rate (BER) expression and its approximation for binary phase-shift keying modulation and look at two power allocation strategies between the source and the relays in order to minimize the end-to-end BER at the destination for high SNR. Some selected performance results show that computer simulations based results coincide well with our analytical results. © 2010 IEEE.

  19. The effects of cooperative learning on students enrolled in a level 1 medical-surgical nursing course.

    Science.gov (United States)

    Gumbs, J

    2001-01-01

    This study was undertaken to create an environment that the literature contends will be more conducive to learning and one that will build the necessary social skills impacting students' performance. These social skills are essential if a nurse is to be effective in her role as a competent provider of care as well as an effective member of the inter-disciplinary health care team. The concept of cooperative learning was applied to nursing theoretical content in an effort to (a) decrease attrition rates in a first level medical-surgical nursing course, (b) increase student's knowledge and (c) enhance student's patient-teaching skills. Increased knowledge was assessed by student's performance on teacher-made paper and pencil examinations. The Classroom Life Instrument questionnaire was used for feedback on the teaching strategy and the Griffin tool was the basis for the pre-test and post-test assessment and implementation of the patient teaching plan.

  20. Fast Detection Method in Cooperative Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Zhengyi Li

    2010-01-01

    Full Text Available Cognitive Radio (CR technology improves the utilization of spectrum highly via opportunistic spectrum sharing, which requests fast detection as the spectrum utilization is dynamic. Taking into consideration the characteristic of wireless channels, we propose a fast detection scheme for a cooperative cognitive radio network, which consists of multiple CRs and a central control office. Specifically, each CR makes individual detection decision using the sequential probability ratio test combined with Neyman Pearson detection with respect to a specific observation window length. The proposed method upper bounds the detection delay. In addition, a weighted K out of N fusion rule is also proposed for the central control office to reach fast global decision based on the information collected from CRs, with more weights assigned for CRs with good channel conditions. Simulation results show that the proposed scheme can achieve fast detection while maintaining the detection accuracy.

  1. Cooperative joint precoding in a downlink cellular system with shared relay: Design and performance evaluation

    KAUST Repository

    Kwon, JaeWoo; Park, Kihong; Ko, Youngchai; Yang, Hongchuan

    2012-01-01

    In this paper, we investigate a relay enhanced cellular system, where a relay station is located in the overlap area served by two base stations. We propose cooperative joint precoding schemes for the downlink transmission of such relay enhanced cellular system to maximize the system capacity while minimizing the interference at both the relay station and the mobile stations. We formulate the optimization problems to maximize the system capacity and design the multiuser precoding vectors at each base station and the relay station. We quantify the ergodic rate performance of the proposed multiuser precoding schemes through statistical analysis. The extensively derived ergodic expressions will facilitate the accurate performance evaluation of the proposed transmission schemes. Numerical results show that the proposed schemes can effectively cancel the interference and improve the sum rate and the outage performance for cell edge users. © 2002-2012 IEEE.

  2. Cooperative joint precoding in a downlink cellular system with shared relay: Design and performance evaluation

    KAUST Repository

    Kwon, JaeWoo

    2012-10-01

    In this paper, we investigate a relay enhanced cellular system, where a relay station is located in the overlap area served by two base stations. We propose cooperative joint precoding schemes for the downlink transmission of such relay enhanced cellular system to maximize the system capacity while minimizing the interference at both the relay station and the mobile stations. We formulate the optimization problems to maximize the system capacity and design the multiuser precoding vectors at each base station and the relay station. We quantify the ergodic rate performance of the proposed multiuser precoding schemes through statistical analysis. The extensively derived ergodic expressions will facilitate the accurate performance evaluation of the proposed transmission schemes. Numerical results show that the proposed schemes can effectively cancel the interference and improve the sum rate and the outage performance for cell edge users. © 2002-2012 IEEE.

  3. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

    Directory of Open Access Journals (Sweden)

    Raghav V. Sampangi

    2015-09-01

    Full Text Available Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID and Wireless Body Area Networks (WBAN that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG, and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  4. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.

    Science.gov (United States)

    Sampangi, Raghav V; Sampalli, Srinivas

    2015-09-15

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  5. Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate

    International Nuclear Information System (INIS)

    Chau, H.F.

    2002-01-01

    A secret key shared through quantum key distribution between two cooperative players is secure against any eavesdropping attack allowed by the laws of physics. Yet, such a key can be established only when the quantum channel error rate due to eavesdropping or imperfect apparatus is low. Here, a practical quantum key distribution scheme by making use of an adaptive privacy amplification procedure with two-way classical communication is reported. Then, it is proven that the scheme generates a secret key whenever the bit error rate of the quantum channel is less than 0.5-0.1√(5)≅27.6%, thereby making it the most error resistant scheme known to date

  6. An energy-efficient transmission scheme for real-time data in wireless sensor networks.

    Science.gov (United States)

    Kim, Jin-Woo; Barrado, José Ramón Ramos; Jeon, Dong-Keun

    2015-05-20

    The Internet of things (IoT) is a novel paradigm where all things or objects in daily life can communicate with other devices and provide services over the Internet. Things or objects need identifying, sensing, networking and processing capabilities to make the IoT paradigm a reality. The IEEE 802.15.4 standard is one of the main communication protocols proposed for the IoT. The IEEE 802.15.4 standard provides the guaranteed time slot (GTS) mechanism that supports the quality of service (QoS) for the real-time data transmission. In spite of some QoS features in IEEE 802.15.4 standard, the problem of end-to-end delay still remains. In order to solve this problem, we propose a cooperative medium access scheme (MAC) protocol for real-time data transmission. We also evaluate the performance of the proposed scheme through simulation. The simulation results demonstrate that the proposed scheme can improve the network performance.

  7. Stakeholders Perspectives on the Success Drivers in Ghana’s National Health Insurance Scheme – Identifying Policy Translation Issues

    Science.gov (United States)

    Fusheini, Adam; Marnoch, Gordon; Gray, Ann Marie

    2017-01-01

    Background: Ghana’s National Health Insurance Scheme (NHIS), established by an Act of Parliament (Act 650), in 2003 and since replaced by Act 852 of 2012 remains, in African terms, unprecedented in terms of growth and coverage. As a result, the scheme has received praise for its associated legal reforms, clinical audit mechanisms and for serving as a hub for knowledge sharing and learning within the context of South-South cooperation. The scheme continues to shape national health insurance thinking in Africa. While the success, especially in coverage and financial access has been highlighted by many authors, insufficient attention has been paid to critical and context-specific factors. This paper seeks to fill that gap. Methods: Based on an empirical qualitative case study of stakeholders’ views on challenges and success factors in four mutual schemes (district offices) located in two regions of Ghana, the study uses the concept of policy translation to assess whether the Ghana scheme could provide useful lessons to other African and developing countries in their quest to implement social/NHISs. Results: In the study, interviewees referred to both ‘hard and soft’ elements as driving the "success" of the Ghana scheme. The main ‘hard elements’ include bureaucratic and legal enforcement capacities; IT; financing; governance, administration and management; regulating membership of the scheme; and service provision and coverage capabilities. The ‘soft’ elements identified relate to: the background/context of the health insurance scheme; innovative ways of funding the NHIS, the hybrid nature of the Ghana scheme; political will, commitment by government, stakeholders and public cooperation; social structure of Ghana (solidarity); and ownership and participation. Conclusion: Other developing countries can expect to translate rather than re-assemble a national health insurance programme in an incomplete and highly modified form over a period of years

  8. Stakeholders Perspectives on the Success Drivers in Ghana’s National Health Insurance Scheme – Identifying Policy Translation Issues

    Directory of Open Access Journals (Sweden)

    Adam Fusheini

    2017-05-01

    Full Text Available Background Ghana’s National Health Insurance Scheme (NHIS, established by an Act of Parliament (Act 650, in 2003 and since replaced by Act 852 of 2012 remains, in African terms, unprecedented in terms of growth and coverage. As a result, the scheme has received praise for its associated legal reforms, clinical audit mechanisms and for serving as a hub for knowledge sharing and learning within the context of South-South cooperation. The scheme continues to shape national health insurance thinking in Africa. While the success, especially in coverage and financial access has been highlighted by many authors, insufficient attention has been paid to critical and context-specific factors. This paper seeks to fill that gap. Methods Based on an empirical qualitative case study of stakeholders’ views on challenges and success factors in four mutual schemes (district offices located in two regions of Ghana, the study uses the concept of policy translation to assess whether the Ghana scheme could provide useful lessons to other African and developing countries in their quest to implement social/NHISs. Results In the study, interviewees referred to both ‘hard and soft’ elements as driving the “success” of the Ghana scheme. The main ‘hard elements’ include bureaucratic and legal enforcement capacities; IT; financing; governance, administration and management; regulating membership of the scheme; and service provision and coverage capabilities. The ‘soft’ elements identified relate to: the background/context of the health insurance scheme; innovative ways of funding the NHIS, the hybrid nature of the Ghana scheme; political will, commitment by government, stakeholders and public cooperation; social structure of Ghana (solidarity; and ownership and participation. Conclusion Other developing countries can expect to translate rather than re-assemble a national health insurance programme in an incomplete and highly modified form over a period

  9. Maximum Lateness Scheduling on Two-Person Cooperative Games with Variable Processing Times and Common Due Date

    Directory of Open Access Journals (Sweden)

    Peng Liu

    2017-01-01

    Full Text Available A new maximum lateness scheduling model in which both cooperative games and variable processing times exist simultaneously is considered in this paper. The job variable processing time is described by an increasing or a decreasing function dependent on the position of a job in the sequence. Two persons have to cooperate in order to process a set of jobs. Each of them has a single machine and their processing cost is defined as the minimum value of maximum lateness. All jobs have a common due date. The objective is to maximize the multiplication of their rational positive cooperative profits. A division of those jobs should be negotiated to yield a reasonable cooperative profit allocation scheme acceptable to them. We propose the sufficient and necessary conditions for the problems to have positive integer solution.

  10. Dual-Model Reverse CKF Algorithm in Cooperative Navigation for USV

    Directory of Open Access Journals (Sweden)

    Bo Xu

    2014-01-01

    Full Text Available As one of the most promising research directions, cooperative location with high precision and low-cost IMU is becoming an emerging research topic in many positioning fields. Low-cost MEMS/DVL is a preferred solution for dead-reckoning in multi-USV cooperative network. However, large misalignment angles and large gyro drift coexist in low-cost MEMS that leads to the poor observability. Based on cubature Kalman filter (CKF algorithm that has access to high accuracy and relative small computation, dual-model filtering scheme is proposed. It divides the whole process into two subsections that cut off the coupling relations and improve the observability of MEMS errors: it first estimates large misalignment angle and then estimates the gyro drift. Furthermore, to improve the convergence speed of large misalignment angle estimated in the first subsection, “time reversion” concept is introduced. It uses a short period time to forward and backward several times to improve convergence speed effectively. Finally, simulation analysis and experimental verification is conducted. Simulation and experimental results show that the algorithm can effectively improve the cooperative navigation performance.

  11. Cooperative wireless network control based health and activity monitoring system.

    Science.gov (United States)

    Prakash, R; Ganesh, A Balaji; Girish, Siva V

    2016-10-01

    A real-time cooperative communication based wireless network is presented for monitoring health and activity of an end-user in their environment. The cooperative communication offers better energy consumption and also an opportunity to aware the current location of a user non-intrusively. The link between mobile sensor node and relay node is dynamically established by using Received Signal Strength Indicator (RSSI) and Link Quality Indicator (LQI) based on adaptive relay selection scheme. The study proposes a Linear Acceleration based Transmission Power Decision Control (LA-TPDC) algorithm to further enhance the energy efficiency of cooperative communication. Further, the occurrences of false alarms are carefully prevented by introducing three stages of sequential warning system. The real-time experiments are carried-out by using the nodes, namely mobile sensor node, relay nodes and a destination node which are indigenously developed by using a CC430 microcontroller integrated with an in-built transceiver at 868 MHz. The wireless node performance characteristics, such as energy consumption, Signal-Noise ratio (SNR), Bit Error Rate (BER), Packet Delivery Ratio (PDR) and transmission offset are evaluated for all the participated nodes. The experimental results observed that the proposed linear acceleration based transmission power decision control algorithm almost doubles the battery life time than energy efficient conventional cooperative communication.

  12. A Survey of Authentication Schemes in Telecare Medicine Information Systems.

    Science.gov (United States)

    Aslam, Muhammad Umair; Derhab, Abdelouahid; Saleem, Kashif; Abbas, Haider; Orgun, Mehmet; Iqbal, Waseem; Aslam, Baber

    2017-01-01

    E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.

  13. On the Impact of User Distribution on Cooperative Spectrum Sensing and Data Transmission with Multiuser Diversity

    KAUST Repository

    Rao, Anlei

    2011-07-01

    In this thesis, we investigate the independent but not identically distributed (i.n.i.d.) situations for spectrum sensing and data transmission. In particular, we derive the false-alarm probability and the detection probability of cooperative spectrum sensing with the scheme of energy fusion over i.n.i.d. Nakagami fading channels. Then, the performance of adaptive modulation with single-cell multiuser scheduling over i.n.i.d. Nakagami fading channels is analyzed. Closed-form expressions are derived for the average channel capacity, spectral efficiency, and bit-error-rate (BER) for both constant-power variable-rate and variable-power variable-rate uncoded M- ary quadrature amplitude modulation (M-QAM) schemes. In addition, we study the impact of time delay on the average BER of adaptive M-QAM. From the selected numerical results, we can see that cooperative spectrum sensing and multiuser diversity brings considerably better performance even over i.n.i.d. fading environments.

  14. An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System.

    Science.gov (United States)

    Wu, Yilun; Lu, Xicheng; Su, Jinshu; Chen, Peixin

    2016-12-01

    Preserving the privacy of electronic medical records (EMRs) is extremely important especially when medical systems adopt cloud services to store patients' electronic medical records. Considering both the privacy and the utilization of EMRs, some medical systems apply searchable encryption to encrypt EMRs and enable authorized users to search over these encrypted records. Since individuals would like to share their EMRs with multiple persons, how to design an efficient searchable encryption for sharable EMRs is still a very challenge work. In this paper, we propose a cost-efficient secure channel free searchable encryption (SCF-PEKS) scheme for sharable EMRs. Comparing with existing SCF-PEKS solutions, our scheme reduces the storage overhead and achieves better computation performance. Moreover, our scheme can guard against keyword guessing attack, which is neglected by most of the existing schemes. Finally, we implement both our scheme and a latest medical-based scheme to evaluate the performance. The evaluation results show that our scheme performs much better performance than the latest one for sharable EMRs.

  15. Channel and delay estimation for base-station–based cooperative communications in frequency-selective fading channels

    Directory of Open Access Journals (Sweden)

    Hongjun Xu

    2011-07-01

    Full Text Available A channel and delay estimation algorithm for both positive and negative delay, based on the distributed Alamouti scheme, has been recently discussed for base-station–based asynchronous cooperative systems in frequency-flat fading channels. This paper extends the algorithm, the maximum likelihood estimator, to work in frequency-selective fading channels. The minimum mean square error (MMSE performance of channel estimation for both packet schemes and normal schemes is discussed in this paper. The symbol error rate (SER performance of equalisation and detection for both time-reversal space-time block code (STBC and single-carrier STBC is also discussed in this paper. The MMSE simulation results demonstrated the superior performance of the packet scheme over the normal scheme with an improvement in performance of up to 6 dB when feedback was used in the frequency-selective channel at a MSE of 3 x 10–2. The SER simulation results showed that, although both the normal and packet schemes achieved similar diversity orders, the packet scheme demonstrated a 1 dB coding gain over the normal scheme at a SER of 10–5. Finally, the SER simulations showed that the frequency-selective fading system outperformed the frequency-flat fading system.

  16. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  17. A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems.

    Science.gov (United States)

    Wang, Zhiheng; Huo, Zhanqiang; Shi, Wenbo

    2015-01-01

    With rapid development of computer technology and wide use of mobile devices, the telecare medicine information system has become universal in the field of medical care. To protect patients' privacy and medial data's security, many authentication schemes for the telecare medicine information system have been proposed. Due to its better performance, chaotic maps have been used in the design of authentication schemes for the telecare medicine information system. However, most of them cannot provide user's anonymity. Recently, Lin proposed a dynamic identity based authentication scheme using chaotic maps for the telecare medicine information system and claimed that their scheme was secure against existential active attacks. In this paper, we will demonstrate that their scheme cannot provide user anonymity and is vulnerable to the impersonation attack. Further, we propose an improved scheme to fix security flaws in Lin's scheme and demonstrate the proposed scheme could withstand various attacks.

  18. Improving the secrecy rate by turning foes to allies: An auction scheme

    Science.gov (United States)

    Ma, Ya-Yan; Wang, Bao-Yun

    2015-09-01

    Security against eavesdroppers is a critical issue in cognitive radio networks (CRNs). In this paper, a scenario consisting of one primary pair and multiple secondary pairs is considered. The secondary transmitters (STs) work in half-duplex mode and they are potential eavesdroppers on the primary transmission unless they are allowed to simultaneously transmit with the primary transmitter (PT). A modified second-price sealed-bid auction scheme is employed to model the interaction between the PT and STs. With the proposed auction scheme, the hostile relationship between the PT and STs is transformed into a cooperative relationship. An iterative algorithm based on the max-min criteria is proposed to find the optimal bidding power of the STs for an access chance in the presence of multiple eavesdroppers. Numerical results show that the proposed auction scheme not only improves the PT’s security but also increases the access opportunities of the STs. Project supported by the National Natural Science Foundation of China (Grant Nos. 61271232 and 61372126) and the University Postgraduate Research and Innovation Project in Jiangsu Province, China (Grant No. CXZZ12-0472).

  19. A User Cooperation Stimulating Strategy Based on Cooperative Game Theory in Cooperative Relay Networks

    Directory of Open Access Journals (Sweden)

    Ping Zhang

    2009-01-01

    Full Text Available This paper proposes a user cooperation stimulating strategy among rational users. The strategy is based on cooperative game theory and enacted in the context of cooperative relay networks. Using the pricing-based mechanism, the system is modeled initially with two nodes and a Base Station (BS. Within this framework, each node is treated as a rational decision maker. To this end, each node can decide whether to cooperate and how to cooperate. Cooperative game theory assists in providing an optimal system utility and provides fairness among users. Under different cooperative forwarding modes, certain questions are carefully investigated, including “what is each node's best reaction to maximize its utility?” and “what is the optimal reimbursement to encourage cooperation?” Simulation results show that the nodes benefit from the proposed cooperation stimulating strategy in terms of utility and thus justify the fairness between each user.

  20. A User Cooperation Stimulating Strategy Based on Cooperative Game Theory in Cooperative Relay Networks

    Directory of Open Access Journals (Sweden)

    Jiang Fan

    2009-01-01

    Full Text Available This paper proposes a user cooperation stimulating strategy among rational users. The strategy is based on cooperative game theory and enacted in the context of cooperative relay networks. Using the pricing-based mechanism, the system is modeled initially with two nodes and a Base Station (BS. Within this framework, each node is treated as a rational decision maker. To this end, each node can decide whether to cooperate and how to cooperate. Cooperative game theory assists in providing an optimal system utility and provides fairness among users. Under different cooperative forwarding modes, certain questions are carefully investigated, including "what is each node's best reaction to maximize its utility?" and "what is the optimal reimbursement to encourage cooperation?" Simulation results show that the nodes benefit from the proposed cooperation stimulating strategy in terms of utility and thus justify the fairness between each user.

  1. FIR: An Effective Scheme for Extracting Useful Metadata from Social Media.

    Science.gov (United States)

    Chen, Long-Sheng; Lin, Zue-Cheng; Chang, Jing-Rong

    2015-11-01

    Recently, the use of social media for health information exchange is expanding among patients, physicians, and other health care professionals. In medical areas, social media allows non-experts to access, interpret, and generate medical information for their own care and the care of others. Researchers paid much attention on social media in medical educations, patient-pharmacist communications, adverse drug reactions detection, impacts of social media on medicine and healthcare, and so on. However, relatively few papers discuss how to extract useful knowledge from a huge amount of textual comments in social media effectively. Therefore, this study aims to propose a Fuzzy adaptive resonance theory network based Information Retrieval (FIR) scheme by combining Fuzzy adaptive resonance theory (ART) network, Latent Semantic Indexing (LSI), and association rules (AR) discovery to extract knowledge from social media. In our FIR scheme, Fuzzy ART network firstly has been employed to segment comments. Next, for each customer segment, we use LSI technique to retrieve important keywords. Then, in order to make the extracted keywords understandable, association rules mining is presented to organize these extracted keywords to build metadata. These extracted useful voices of customers will be transformed into design needs by using Quality Function Deployment (QFD) for further decision making. Unlike conventional information retrieval techniques which acquire too many keywords to get key points, our FIR scheme can extract understandable metadata from social media.

  2. Status of French breeder development and German-French cooperation

    International Nuclear Information System (INIS)

    Vendryes, G.

    1978-01-01

    The development of fast breeder reactors in France is at present characterized by the successful operation of the 250 MW reactor, Phenix, and the speedy progress made in construction of the 1200 MW Superphenix plant. The technical concept of Superphenix is a logical extension of the Phenix concept, i.e., the pool type sodium cooled breeder reactor. While the only change in the primary system has been an increase in capacity, the main modification over Phenix is the change from small modular steam generators to four large units. The development of the work to date does not cast any doubt upon the envisaged date of first criticality in the second half of 1982. The basis of German-French cooperation is a joint declaration by the then Ministers for Research of the two countries on February 13, 1976 in which the Ministers had expressed themselves in favor of close cooperation between both countries in the development of safe, reliable and economic fast breeder reactors. On this basis, the two governments, the research centers and the industrial partners in the two countries, including the previous partners in Belgium, the Netherlands and Italy, agreed on the general principles of this cooperation. Meanwhile, the cooperation formalized in 1977 has been activated. Both in research and development and among planning and building industries the exchange of know-how and cooperation is in full swing. The joint company, SERENA, is the pool for the know-how introduced by the partners and the sole representative of the partners in the scheme. (orig.) 891 UA [de

  3. Modeling cooperating micro-organisms in antibiotic environment.

    Science.gov (United States)

    Book, Gilad; Ingham, Colin; Ariel, Gil

    2017-01-01

    Recent experiments with the bacteria Paenibacillus vortex reveal a remarkable strategy enabling it to cope with antibiotics by cooperating with a different bacterium-Escherichia coli. While P. vortex is a highly effective swarmer, it is sensitive to the antibiotic ampicillin. On the other hand, E. coli can degrade ampicillin but is non-motile when grown on high agar percentages. The two bacterial species form a shared colony in which E. coli is transported by P. vortex and E. coli detoxifies the ampicillin. The paper presents a simplified model, consisting of coupled reaction-diffusion equations, describing the development of ring patterns in the shared colony. Our results demonstrate some of the possible cooperative movement strategies bacteria utilize in order to survive harsh conditions. In addition, we explore the behavior of mixed colonies under new conditions such as antibiotic gradients, synchronization between colonies and possible dynamics of a 3-species system including P. vortex, E. coli and a carbon producing algae that provides nutrients under illuminated, nutrient poor conditions. The derived model was able to simulate an asymmetric relationship between two or three micro-organisms where cooperation is required for survival. Computationally, in order to avoid numerical artifacts due to symmetries within the discretizing grid, the model was solved using a second order Vectorizable Random Lattices method, which is developed as a finite volume scheme on a random grid.

  4. Modeling cooperating micro-organisms in antibiotic environment.

    Directory of Open Access Journals (Sweden)

    Gilad Book

    Full Text Available Recent experiments with the bacteria Paenibacillus vortex reveal a remarkable strategy enabling it to cope with antibiotics by cooperating with a different bacterium-Escherichia coli. While P. vortex is a highly effective swarmer, it is sensitive to the antibiotic ampicillin. On the other hand, E. coli can degrade ampicillin but is non-motile when grown on high agar percentages. The two bacterial species form a shared colony in which E. coli is transported by P. vortex and E. coli detoxifies the ampicillin. The paper presents a simplified model, consisting of coupled reaction-diffusion equations, describing the development of ring patterns in the shared colony. Our results demonstrate some of the possible cooperative movement strategies bacteria utilize in order to survive harsh conditions. In addition, we explore the behavior of mixed colonies under new conditions such as antibiotic gradients, synchronization between colonies and possible dynamics of a 3-species system including P. vortex, E. coli and a carbon producing algae that provides nutrients under illuminated, nutrient poor conditions. The derived model was able to simulate an asymmetric relationship between two or three micro-organisms where cooperation is required for survival. Computationally, in order to avoid numerical artifacts due to symmetries within the discretizing grid, the model was solved using a second order Vectorizable Random Lattices method, which is developed as a finite volume scheme on a random grid.

  5. A new scheme for biomonitoring heavy metal concentrations in semi-natural wetlands.

    Science.gov (United States)

    Batzias, A F; Siontorou, C G

    2008-10-30

    This work introduces a semi-natural wetland biomonitoring framework for heavy metal concentrations based on a robust dynamic integration between biological assemblages and relevant biosensors. The cooperative/synergistic scheme developed minimizes uncertainty and monitoring costs and increases reliability of pollution control and abatement. Attention is given to establishing a fully functioning and reliable network approach for monitoring inflows and achieving dose-response relations and calibration of biomonitoring species. The biomonitoring network initially consists of both, biosensors and species, as a validation phase in each wetland of the surveillance area; once the species monitoring efficiency is verified by the biosensors, the biosensor network moves to the next wetland and so on, following a circular pattern until all area wetlands have a fully functional natural monitoring scheme. By means of species recalibration with periodic revisiting of the biosensors, the scheme progressively reaches a quasi steady-state (including seasonality), thus ensuring reliability and robustness. This framework, currently pilot-tested in Voiotia, Greece, for assessing chromium levels, has been built to cover short-, medium- and long-term monitoring requirements. The results gathered so far, support the employment of the proposed scheme in heavy metal monitoring, and, further, arise the need for volunteer involvement to achieve long-term viability.

  6. Implementing interorganizational cooperation in labour market reintegration: a case study.

    Science.gov (United States)

    Ståhl, Christian

    2012-06-01

    To bring people with complex medical, social and vocational needs back to the labour market, interorganizational cooperation is often needed. Yet, studies of processes and strategies for achieving sustainable interorganizational cooperation are sparse. The aim of this study was to analyse the implementation processes of Swedish legislation on financial coordination, with specific focus on different strategies for and perspectives on implementing interorganizational cooperation. A multiple-case study was used, where two local associations for financial coordination were studied in order to elucidate and compare the development of cooperative work in two settings. The material, collected during a 3-year period, consisted of documents, individual interviews with managers, and focus groups with officials. Two different implementation strategies were identified. In case 1, a linear strategy was used to implement cooperative projects, which led to difficulties in maintaining cooperative work forms due to a fragmented and time-limited implementation process. In case 2, an interactive strategy was used, where managers and politicians were continuously involved in developing a central cooperation team that became a central part of a developing structure for interorganizational cooperation. An interactive cooperation strategy with long-term joint financing was here shown to be successful in overcoming organizational barriers to cooperation. It is suggested that a strategy based on adaptation to local conditions, flexibility and constant evaluation is preferred for developing sustainable interorganizational cooperation when implementing policies or legislation affecting interorganizational relationships.

  7. On Development of Medical Informatics Education via European Cooperation

    Czech Academy of Sciences Publication Activity Database

    Zvárová, Jana

    1998-01-01

    Roč. 50, - (1998), s. 219-223 ISSN 1386-5056 Keywords : information technologies * education * training * medical informatics * medical statistics * epidemiology Subject RIV: BB - Applied Statistics, Operational Research Impact factor: 0.357, year: 1998

  8. System for Anonymous Data Collection Based on Group Signature Scheme

    Directory of Open Access Journals (Sweden)

    David Troják

    2016-01-01

    Full Text Available This paper deals with an anonymous data collection in the Internet of Things (IoT. the privacy and anonymity of the data source is important for many IoT applications, such as in agriculture, health, and automotive. the proposed data‑collection system provides anonymity for the data sources by applying a cooperation group scheme. the group scheme also provides a low power consumption. the system is built upon the Tor (The Onion Router anonymous network, which is a part of the Internet darknet. the proposed system was designed for the Android devices on the client side and for Java environment on the server side. We evaluated the anonymous data collection in a real‑use scenario that covers selected data acquisition (e.g. signal strength from smartphones triggered by their geographical location change. the results show that the proposed system provides the sufficient data source anonymity, an effective revocation, a low computational cost and a low overhead.

  9. Cooperative learning neural network output feedback control of uncertain nonlinear multi-agent systems under directed topologies

    Science.gov (United States)

    Wang, W.; Wang, D.; Peng, Z. H.

    2017-09-01

    Without assuming that the communication topologies among the neural network (NN) weights are to be undirected and the states of each agent are measurable, the cooperative learning NN output feedback control is addressed for uncertain nonlinear multi-agent systems with identical structures in strict-feedback form. By establishing directed communication topologies among NN weights to share their learned knowledge, NNs with cooperative learning laws are employed to identify the uncertainties. By designing NN-based κ-filter observers to estimate the unmeasurable states, a new cooperative learning output feedback control scheme is proposed to guarantee that the system outputs can track nonidentical reference signals with bounded tracking errors. A simulation example is given to demonstrate the effectiveness of the theoretical results.

  10. [Political and organizational-legal frameworks for cooperation between countries of the Asia-Pacific region in the field of military medicine].

    Science.gov (United States)

    Kholikov, I V; Dmitrakovich, D V

    2014-12-01

    A framework for cooperation in the field of military medicine in the Asia-Pacific region is considered. Expert Working Group on Military Medicine in cooperation with the Association of Southeast Asian dialogue partners (including Russia) was formed to discuss the most important issues in the field of military medicine, to share practical experience of military physicians, standardization and unification of medical equipment, medicines, levels and standards of medical services and other issues in order to enhance cooperation of military medical services of the participating countries. From 2014 to 2016, the Russian Federation and the Kingdom of Thailand are co-chairs of the expert group.

  11. Compression and Combining Based on Channel Shortening and Rank Reduction Technique for Cooperative Wireless Sensor Networks

    KAUST Repository

    Ahmed, Qasim Zeeshan

    2013-12-18

    This paper investigates and compares the performance of wireless sensor networks where sensors operate on the principles of cooperative communications. We consider a scenario where the source transmits signals to the destination with the help of L sensors. As the destination has the capacity of processing only U out of these L signals, the strongest U signals are selected while the remaining (L?U) signals are suppressed. A preprocessing block similar to channel-shortening is proposed in this contribution. However, this preprocessing block employs a rank-reduction technique instead of channel-shortening. By employing this preprocessing, we are able to decrease the computational complexity of the system without affecting the bit error rate (BER) performance. From our simulations, it can be shown that these schemes outperform the channel-shortening schemes in terms of computational complexity. In addition, the proposed schemes have a superior BER performance as compared to channel-shortening schemes when sensors employ fixed gain amplification. However, for sensors which employ variable gain amplification, a tradeoff exists in terms of BER performance between the channel-shortening and these schemes. These schemes outperform channel-shortening scheme for lower signal-to-noise ratio.

  12. Joint Preprocesser-Based Detectors for One-Way and Two-Way Cooperative Communication Networks

    KAUST Repository

    Abuzaid, Abdulrahman I.

    2014-05-01

    Efficient receiver designs for cooperative communication networks are becoming increasingly important. In previous work, cooperative networks communicated with the use of L relays. As the receiver is constrained, channel shortening and reduced-rank techniques were employed to design the preprocessing matrix that reduces the length of the received vector from L to U. In the first part of the work, a receiver structure is proposed which combines our proposed threshold selection criteria with the joint iterative optimization (JIO) algorithm that is based on the mean square error (MSE). Our receiver assists in determining the optimal U. Furthermore, this receiver provides the freedom to choose U for each frame depending on the tolerable difference allowed for MSE. Our study and simulation results show that by choosing an appropriate threshold, it is possible to gain in terms of complexity savings while having no or minimal effect on the BER performance of the system. Furthermore, the effect of channel estimation on the performance of the cooperative system is investigated. In the second part of the work, a joint preprocessor-based detector for cooperative communication networks is proposed for one-way and two-way relaying. This joint preprocessor-based detector operates on the principles of minimizing the symbol error rate (SER) instead of minimizing MSE. For a realistic assessment, pilot symbols are used to estimate the channel. From our simulations, it can be observed that our proposed detector achieves the same SER performance as that of the maximum likelihood (ML) detector with all participating relays. Additionally, our detector outperforms selection combining (SC), channel shortening (CS) scheme and reduced-rank techniques when using the same U. Finally, our proposed scheme has the lowest computational complexity.

  13. Building Trust in Emissions Reporting. Global Trends in Emissions Trading Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Kruijd, J.; Walrecht, A.; Laseur, J.; Schoolderman, H.; Gledhill, R.

    2007-02-15

    This report highlights the key characteristics of the world's main emission trading schemes, presents a new vision for compliance in emissions trading and calls for global action to develop this. Climate change is now at the top of the political and business agenda. Al Gore's 'An Inconvenient Truth', the Stern Review and the now almost daily press coverage of climate change science and impacts have engaged many of the global leaders in government and in business. Emissions trading is increasingly seen as a central plank in the response to climate change. But market mechanisms like this depend on trust and confidence. Any widespread or systemic failure, as a result of deficient monitoring and reporting, flawed compliance processes or fraud, could undermine confidence in markets and regulation and jeopardise the crucial policy goals that they are designed to address. Key to this trust are the three central criteria of transparency, accountability and integrity. The PricewaterhouseCoopers report looks at how the patchwork of trading schemes that are emerging around the globe stacks up against these criteria. Despite good intentions across the board, the general picture is one of new and immature markets, inconsistent and complex compliance frameworks and risk. PricewaterhouseCoopers make the case for urgent and coordinated action to develop a framework of generally accepted principles and practice that will underpin trust and efficiency in these new markets - in effect, a new Global Emissions Compliance Language.

  14. Building Trust in Emissions Reporting. Global Trends in Emissions Trading Schemes

    International Nuclear Information System (INIS)

    Kruijd, J.; Walrecht, A.; Laseur, J.; Schoolderman, H.; Gledhill, R.

    2007-02-01

    This report highlights the key characteristics of the world's main emission trading schemes, presents a new vision for compliance in emissions trading and calls for global action to develop this. Climate change is now at the top of the political and business agenda. Al Gore's 'An Inconvenient Truth', the Stern Review and the now almost daily press coverage of climate change science and impacts have engaged many of the global leaders in government and in business. Emissions trading is increasingly seen as a central plank in the response to climate change. But market mechanisms like this depend on trust and confidence. Any widespread or systemic failure, as a result of deficient monitoring and reporting, flawed compliance processes or fraud, could undermine confidence in markets and regulation and jeopardise the crucial policy goals that they are designed to address. Key to this trust are the three central criteria of transparency, accountability and integrity. The PricewaterhouseCoopers report looks at how the patchwork of trading schemes that are emerging around the globe stacks up against these criteria. Despite good intentions across the board, the general picture is one of new and immature markets, inconsistent and complex compliance frameworks and risk. PricewaterhouseCoopers make the case for urgent and coordinated action to develop a framework of generally accepted principles and practice that will underpin trust and efficiency in these new markets - in effect, a new Global Emissions Compliance Language

  15. Cooperative distributed architecture for mashups

    Science.gov (United States)

    Al-Haj Hassan, Osama Mohammad; Ramaswamy, Lakshmish; Hamad, Fadi; Abu Taleb, Anas

    2014-05-01

    Since the advent of Web 2.0, personalised applications such as mashups have become widely popular. Mashups enable end-users to fetch data from distributed data sources, and refine it based on their personal needs. This high degree of personalisation that mashups offer comes at the expense of performance and scalability. These scalability challenges are exacerbated by the centralised architectures of current mashup platforms. In this paper, we address the performance and scalability issues by designing CoMaP - a distributed mashup platform. CoMaP's architecture comprises of several cooperative mashup processing nodes distributed over the Internet upon which mashups can, fully or partially, be executed. CoMaP incorporates a dynamic and efficient scheme for deploying mashups on the processing nodes. Our scheme considers a number of parameters such as variations in link delays and bandwidths, and loads on mashup processing nodes. CoMaP includes effective and low-cost mechanisms for balancing loads on the processing nodes as well for handling node failures. Furthermore, we propose novel techniques that leverage keyword synonyms, ontologies and caching to enhance end-user experience. This paper reports several experiments to comprehensively study CoMaP's performance. The results demonstrate CoMaP's benefits as a scalable distributed mashup platform.

  16. Performance analysis of selective cooperation with fixed gain relays in Nakagami-m channels

    KAUST Repository

    Hussain, Syed Imtiaz; Hasna, Mazen Omar; Alouini, Mohamed-Slim

    2012-01-01

    Selecting the best relay using the maximum signal to noise ratio (SNR) among all the relays ready to cooperate saves system resources and utilizes the available bandwidth more efficiently compared to the regular all-relay cooperation. In this paper, we analyze the performance of the best relay selection scheme with fixed gain relays operating in Nakagami-. m channels. We first derive the probability density function (PDF) of upper bounded end-to-end SNR of the relay link. Using this PDF, we derive some key performance parameters for the system including average bit error probability and average channel capacity. The analytical results are verified through Monte Carlo simulations. © 2012 Elsevier B.V.

  17. Performance analysis of selective cooperation with fixed gain relays in Nakagami-m channels

    KAUST Repository

    Hussain, Syed Imtiaz

    2012-09-01

    Selecting the best relay using the maximum signal to noise ratio (SNR) among all the relays ready to cooperate saves system resources and utilizes the available bandwidth more efficiently compared to the regular all-relay cooperation. In this paper, we analyze the performance of the best relay selection scheme with fixed gain relays operating in Nakagami-. m channels. We first derive the probability density function (PDF) of upper bounded end-to-end SNR of the relay link. Using this PDF, we derive some key performance parameters for the system including average bit error probability and average channel capacity. The analytical results are verified through Monte Carlo simulations. © 2012 Elsevier B.V.

  18. Income-related inequality in health insurance coverage: analysis of China Health and Nutrition Survey of 2006 and 2009

    OpenAIRE

    Liu, Jinan; Shi, Lizheng; Meng, Qingyue; Khan, M Mahmud

    2012-01-01

    Abstract Introduction China introduced the urban resident basic medical insurance (URBMI) in 2007 to cover children and urban unemployed adults, in addition to the new cooperative medical scheme (NCMS) for rural residents in 2003 and the basic health insurance scheme (BHIS) for urban employees in 1998. This study examined whether the overall income-related inequality in health insurance coverage improved during 2006 and 2009 in China. Methods The China Health and Nutrition Survey (CHNS) data ...

  19. Boron neutron capture therapy: An interdisciplinary co-operation

    International Nuclear Information System (INIS)

    Sauerwein, W.; Hideghety, K.; Rassow, J.; Moss, R.L.; Stecher-Rasmussen, F.; Heimans, J.; Gabel, D.; Vries, M.J. de; Touw, D.J.

    2001-01-01

    The international (European) undertaking in BNCT in the Netherlands has required close scrutiny of the organisational structure required to establish BNCT facilities. The multidisciplinary co-operation and the tasks of the participants in the hospital (Radiation Oncologist, Medical Physicist, Pharmacist and other medical and paramedical staff) and those attached to the reactor) are described. The organisational structure and regulatory aspects required for the international functioning of the Petten treatment facility are provided for guidance to new projects in this field. (author)

  20. Upper bounds for Neyman-Pearson cooperative spectrum sensing

    KAUST Repository

    Zahabi, Sayed Jalal; Tadaion, Ali Akbar; Aissa, Sonia

    2011-01-01

    We consider a cooperative spectrum sensing scenario where the local sensors at the secondary users are viewed as one-level quantizers, and the quantized data are to be fused under Neyman-Pearson (N-P) criterion. We demonstrate how the N-P fusion results in a randomized test, which represents the total performance of our spectrum sensing scheme. We further introduce an upper performance bound for the overall primary user signal detection. An analytical procedure towards the upper bound and its relevant quantization setup at the local sensors are proposed and examined through simulations. © 2011 IEEE.

  1. Upper bounds for Neyman-Pearson cooperative spectrum sensing

    KAUST Repository

    Zahabi, Sayed Jalal

    2011-06-01

    We consider a cooperative spectrum sensing scenario where the local sensors at the secondary users are viewed as one-level quantizers, and the quantized data are to be fused under Neyman-Pearson (N-P) criterion. We demonstrate how the N-P fusion results in a randomized test, which represents the total performance of our spectrum sensing scheme. We further introduce an upper performance bound for the overall primary user signal detection. An analytical procedure towards the upper bound and its relevant quantization setup at the local sensors are proposed and examined through simulations. © 2011 IEEE.

  2. To cooperate or not to cooperate

    DEFF Research Database (Denmark)

    Wessels, Josepha Ivanka

    To Cooperate or not to Cooperate...? discusses results of a research project to study the rehabilitation of 1500-year old water tunnels, so called "qanats", in Syria. Communities all over the world are using traditional technologies to extract drinkingwater, irrigate their lands and feed...... their livestock. But these often sustainable and ancient ways to make use of groundwater are in rapid decline worldwide. A research project started in 1999 to study the rehabilitation of 1500-year old water tunnels called "qanats"in Syria. To Cooperate or not to Cooperate...? discusses results and outcomes...

  3. Cooperative OFDM underwater acoustic communications

    CERN Document Server

    Cheng, Xilin; Cheng, Xiang

    2016-01-01

    Following underwater acoustic channel modeling, this book investigates the relationship between coherence time and transmission distances. It considers the power allocation issues of two typical transmission scenarios, namely short-range transmission and medium-long range transmission. For the former scenario, an adaptive system is developed based on instantaneous channel state information. The primary focus is on cooperative dual-hop orthogonal frequency division multiplexing (OFDM). This book includes the decomposed fountain codes designed to enable reliable communications with higher energy efficiency. It covers the Doppler Effect, which improves packet transmission reliability for effective low-complexity mirror-mapping-based intercarrier interference cancellation schemes capable of suppressing the intercarrier interference power level. Designed for professionals and researchers in the field of underwater acoustic communications, this book is also suitable for advanced-level students in electrical enginee...

  4. Economic sustainability, water security and multi-level governance of local water schemes in Nepal

    Directory of Open Access Journals (Sweden)

    Emma Hakala

    2017-07-01

    Full Text Available This article explores the role of multi-level governance and power structures in local water security through a case study of the Nawalparasi district in Nepal. It focuses on economic sustainability as a measure to address water security, placing this thematic in the context of a complicated power structure consisting of local, district and national administration as well as external development cooperation actors. The study aims to find out whether efforts to improve the economic sustainability of water schemes have contributed to water security at the local level. In addition, it will consider the interactions between water security, power structures and local equality and justice. The research builds upon survey data from the Nepalese districts of Nawalparasi and Palpa, and a case study based on interviews and observation in Nawalparasi. The survey was performed in water schemes built within a Finnish development cooperation programme spanning from 1990 to 2004, allowing a consideration of the long-term sustainability of water management projects. This adds a crucial external influence into the intra-state power structures shaping water management in Nepal. The article thus provides an alternative perspective to cross-regional water security through a discussion combining transnational involvement with national and local points of view.

  5. Exact performance of cooperative spectrum sensing for cognitive radios with quantized information under imperfect reporting channels

    KAUST Repository

    Ben Ghorbel, Mahdi

    2013-09-01

    Spectrum sensing is the first and main step for cognitive radio systems to achieve an efficient use of the spectrum. Cooperation among cognitive radio users is a technique employed to improve the sensing performance by exploiting the diversity between the sensing channels to overcome the fading and shadowing effects which allows reduction of miss-detection and false alarm probabilities. Information can be exchanged between cooperating users in different formats from the binary hard information to the full soft information. Quantized information has shown its efficiency as a trade-off between binary hard and full soft for other cooperative schemes, in this paper, we investigate the use of quantized information between cooperating cognitive users. We derive closed-form expressions of the cooperative average false alarm and detection probabilities over fading channels for a generalized system model with not necessarily identical average sensing Signal-to-Noise Ratio (SNR) and imperfect reporting channels. Numerical simulations allow us to conclude a tradeoff between the quantization size and the reporting energy in order to achieve the optimal cooperative error probability. Copyright © 2013 by the Institute of Electrical and Electronic Engineers, Inc.

  6. A robust and novel dynamic-ID-based authentication scheme for care team collaboration with smart cards.

    Science.gov (United States)

    Chang, Ya-Fen; Chen, Chia-Chen; Chang, Pei-Yu

    2013-04-01

    Nowadays, users/patients may gain desired medical services on-line because of the rapid development of computer network technologies. Conventional healthcare services are provided by a single server. However, care team collaboration by integrating services is the key to improve financial and clinical performance. How a user/patient accesses desired medical services provided by multiple servers becomes a challenge to realize care team collaboration. User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In this paper, we first discuss the perceived security drawbacks of pervasive smart-card-based remote user authentication schemes. Then, we propose a novel dynamic-ID-based user authentication scheme based on elliptic curve cryptosystem (ECC) for multi-server environment with smart cards. The proposed scheme ensures user anonymity and computational efficiency and complies with essential requirements of a secure smart-card-based authentication scheme for multi-server environment to enable care team collaboration.

  7. South-South cooperation as a mechanism to strengthen public ...

    African Journals Online (AJOL)

    Implementation of new models of development cooperation have been on the ... as a way to enhance aid effectiveness in the health sector of developing countries. ... services delivery and socioeconomic development among African countries. ... production of medical products and essential medicines, harmonization of ...

  8. Exclusion from the Health Insurance Scheme

    CERN Multimedia

    2003-01-01

    A CERN pensioner, member of the Organization's Health Insurance Scheme (CHIS), recently provided fake documents in support of claims for medical expenses, in order to receive unjustified reimbursement from the CHIS. The Administrator of the CHIS, UNIQA, suspected a case of fraud: Accordingly, an investigation and interview of the person concerned was carried out and brought the Organization to the conclusion that fraud had actually taken place. Consequently and in accordance with Article VIII 3.12 of the CHIS Rules, it was decided to exclude this member permanently from the CHIS. The Organization takes the opportunity to remind Scheme members that any fraud or attempt to fraud established within the framework of the CHIS exposes them to: - disciplinary action, according to the Staff Rules and Regulations, for CERN members of the personnel; - definitive exclusion from the CHIS for members affiliated on a voluntary basis. Human Resources Division Tel. 73635

  9. Cooperative Cognitive Radio Systems over Nakagami-m Fading Channels

    KAUST Repository

    Hyadi, Amal

    2013-05-08

    This thesis aims to investigate the incorporation of cooperative techniques in cognitive radio networks over Nakagami-m fading channels. These last years, spectrum sharing mechanisms has gained a lot of interest in the wireless communication domain. Using cooperation in a cognitive set up make the use of spectrum much more efficient. Moreover, it helps to extend the coverage area of the cognitive network and also to reduce the transmitting power and, thus, the generated interference. In this work, we consider two particular scenarios for cooperative cognitive radio systems. The first scenario consider multihop regenerative relaying in an underlay cognitive set up. The cooperation is performed in the secondary system, in the presence of multiple primary users. Both interference power and peak power constraints are taking into account. Closed-form expressions for the statistical characteristics and multiple end- to-end performance metrics are derived. Different scenarios are presented to illustrate the obtained results and Monte Carlo simulations confirm the accuracy of our analytical derivations. In the second part of this work, we consider an overlay cognitive network with the spectrally efficient two-phase two-way relaying protocol. Two relay selection techniques, optimizing both the primary and the secondary communication, are presented. The overall outage performance is investigated and an optimal power allocation scheme, that ameliorate the outage performance of the system, is proposed. Numerical simulations are presented to illustrate and compare the obtained results.

  10. An interactive cooperation model for neighboring virtual power plants

    International Nuclear Information System (INIS)

    Shabanzadeh, Morteza; Sheikh-El-Eslami, Mohammad-Kazem; Haghifam, Mahmoud-Reza

    2017-01-01

    Highlights: •The trading strategies of a VPP in cooperation with its neighboring VPPs are addressed. •A portfolio of inter-regional contracts is considered to model this cooperation scheme. •A novel mathematical formulation for possible inadvertent transactions is provided. •A two-stage stochastic programming approach is applied to characterize the uncertainty. •Two efficient risk measures, SSD and CVaR, are implemented in the VPP decision-making problem. -- Abstract: Future distribution systems will accommodate an increasing share of distributed energy resources (DERs). Facing with this new reality, virtual power plants (VPPs) play a key role to aggregate DERs with the aim of facilitating their involvement in wholesale electricity markets. In this paper, the trading strategies of a VPP in cooperation with its neighboring VPPs are addressed. Toward this aim, a portfolio of inter-regional contracts is considered to model this cooperation and maximize the energy trade opportunities of the VPP within a medium-term horizon. To hedge against profit variability caused by market price uncertainties, two efficient risk management approaches are also implemented in the VPP decision-making problem based on the concepts of conditional value at risk (CVaR) and second-order stochastic dominance constraints (SSD). The resulting models are formulated as mixed-integer linear programming (MILP) problems that can be solved using off-the-shelf software packages. The efficiency of the proposed risk-hedging models is analyzed through a detailed case study, and thereby relevant conclusions are drawn.

  11. 75 FR 10319 - Cooper Tools-Sumter, Cooper Tools Divisions, a Subsidiary of Cooper Industries, Inc., Including...

    Science.gov (United States)

    2010-03-05

    ... DEPARTMENT OF LABOR Employment and Training Administration [TA-W-71,602] Cooper Tools--Sumter, Cooper Tools Divisions, a Subsidiary of Cooper Industries, Inc., Including On-Site Leased Workers From... January 26, 2010, applicable to workers of Cooper Tools--Sumter, Cooper Tools Division, a subsidiary of...

  12. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  13. A Novel Smart Routing Protocol for Remote Health Monitoring in Medical Wireless Networks

    Directory of Open Access Journals (Sweden)

    T. V. P. Sundararajan

    2014-01-01

    Full Text Available In a Medical Wireless Network (MWN, sensors constantly monitor patient's physiological condition and movement. Inter-MWN communications are set up between the Patient Server and one or more Centralized Coordinators. However, MWNs require protocols with little energy consumption and the self-organizing attribute perceived in ad-hoc networks. The proposed Smart Routing Protocol (SRP selects only the nodes with a higher residual energy and lower traffic density for routing. This approach enhances cooperation among the nodes of a Mobile Ad Hoc Network. Consequently, SRP produces better results than the existing protocols, namely Conditional Min-Max Battery Cost Routing, Min-Max Battery Cost Routing and AdHoc On-demand Distance Vector in terms of network parameters. The performance of the erstwhile schemes for routing protocols is evaluated using the network simulator Qualnet v 4.5.

  14. Detection and Prevention of Denial of Service (DoS Attacks in Mobile Ad Hoc Networks using Reputation-based Incentive Schemes

    Directory of Open Access Journals (Sweden)

    Mieso, K Denko

    2005-08-01

    Full Text Available Mobile ad hoc networks (MANETs are dynamic mobile networks that can be formed in the absence of any pre-existing communication infrastructure. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is that the intermediate nodes cooperate in forwarding packets. However, this assumption does not hold in commercial and emerging civilian applications. MANETs are vulnerable to Denial of Service (DoS due to their salient characteristics. There is a need to provide an incentive mechanism that can provide cooperation among nodes in the network and improve overall network performance by reducing DoS attacks. In this paper, we propose a reputation-based incentive mechanism for detecting and preventing DoS attacks. DoS attacks committed by selfish and malicious nodes were investigated. Our scheme motivates nodes to cooperate and excludes them from the network only if they fail to do so. We evaluated the performance of our scheme using the packet delivery ratio, the routing and communication overhead, and misbehaving node detection in a discrete event-simulation environment. The results indicate that a reputation-based incentive mechanism can significantly reduce the effect of DoS attacks and improve performance in MANETs.

  15. Intelligent distributed medical image management

    Science.gov (United States)

    Garcia, Hong-Mei C.; Yun, David Y.

    1995-05-01

    The rapid advancements in high performance global communication have accelerated cooperative image-based medical services to a new frontier. Traditional image-based medical services such as radiology and diagnostic consultation can now fully utilize multimedia technologies in order to provide novel services, including remote cooperative medical triage, distributed virtual simulation of operations, as well as cross-country collaborative medical research and training. Fast (efficient) and easy (flexible) retrieval of relevant images remains a critical requirement for the provision of remote medical services. This paper describes the database system requirements, identifies technological building blocks for meeting the requirements, and presents a system architecture for our target image database system, MISSION-DBS, which has been designed to fulfill the goals of Project MISSION (medical imaging support via satellite integrated optical network) -- an experimental high performance gigabit satellite communication network with access to remote supercomputing power, medical image databases, and 3D visualization capabilities in addition to medical expertise anywhere and anytime around the country. The MISSION-DBS design employs a synergistic fusion of techniques in distributed databases (DDB) and artificial intelligence (AI) for storing, migrating, accessing, and exploring images. The efficient storage and retrieval of voluminous image information is achieved by integrating DDB modeling and AI techniques for image processing while the flexible retrieval mechanisms are accomplished by combining attribute- based and content-based retrievals.

  16. An authentication scheme to healthcare security under wireless sensor networks.

    Science.gov (United States)

    Hsiao, Tsung-Chih; Liao, Yu-Ting; Huang, Jen-Yan; Chen, Tzer-Shyong; Horng, Gwo-Boa

    2012-12-01

    In recent years, Taiwan has been seeing an extension of the average life expectancy and a drop in overall fertility rate, initiating our country into an aged society. Due to this phenomenon, how to provide the elderly and patients with chronic diseases a suitable healthcare environment has become a critical issue presently. Therefore, we propose a new scheme that integrates healthcare services with wireless sensor technology in which sensor nodes are employed to measure patients' vital signs. Data collected from these sensor nodes are then transmitted to mobile devices of the medical staff and system administrator, promptly enabling them to understand the patients' condition in real time, which will significantly improve patients' healthcare quality. As per the personal data protection act, patients' vital signs can only be accessed by authorized medical staff. In order to protect patients', the system administrator will verify the medical staff's identity through the mobile device using a smart card and password mechanism. Accordingly, only the verified medical staff can obtain patients' vital signs data such as their blood pressure, pulsation, and body temperature, etc.. Besides, the scheme includes a time-bounded characteristic that allows the verified staff access to data without having to have to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrator and user.

  17. Cluster Cooperation in Wireless-Powered Sensor Networks: Modeling and Performance Analysis.

    Science.gov (United States)

    Zhang, Chao; Zhang, Pengcheng; Zhang, Weizhan

    2017-09-27

    A wireless-powered sensor network (WPSN) consisting of one hybrid access point (HAP), a near cluster and the corresponding far cluster is investigated in this paper. These sensors are wireless-powered and they transmit information by consuming the harvested energy from signal ejected by the HAP. Sensors are able to harvest energy as well as store the harvested energy. We propose that if sensors in near cluster do not have their own information to transmit, acting as relays, they can help the sensors in a far cluster to forward information to the HAP in an amplify-and-forward (AF) manner. We use a finite Markov chain to model the dynamic variation process of the relay battery, and give a general analyzing model for WPSN with cluster cooperation. Though the model, we deduce the closed-form expression for the outage probability as the metric of this network. Finally, simulation results validate the start point of designing this paper and correctness of theoretical analysis and show how parameters have an effect on system performance. Moreover, it is also known that the outage probability of sensors in far cluster can be drastically reduced without sacrificing the performance of sensors in near cluster if the transmit power of HAP is fairly high. Furthermore, in the aspect of outage performance of far cluster, the proposed scheme significantly outperforms the direct transmission scheme without cooperation.

  18. A coalition formation game for transmitter cooperation in OFDMA uplink communications

    KAUST Repository

    Chelli, Ali

    2014-12-01

    The SC-FDMA (single-carrier frequency division multiple access) is the access scheme that has been adopted by 3GPP (3rd generation partnership project) for the LTE (long term evolution) uplink. The SC-FDMA is an attractive alternative to OFDMA (orthogonal frequency-division multiple access) especially on the uplink owing to its low peak-to-average power ratio. This fact increases the power efficiency and reduces the cost of the power amplifiers at the mobile terminals. The use of SC-FDMA on the uplink implies that for highly loaded cells the base station allocates a single subcarrier to each user. This results in the limitation of the achievable rate on the uplink. In this work, we propose a coalition game between mobile terminals that allows them to improve their performance by sharing their subcarriers without creating any interference to each other. The proposed scheme allows a fair use of the subcarriers and leads to a significant capacity gain for each user. The cooperation between the nodes is modelled using coalitional game theory. In this game, each coalition tries to maximize its utility in terms of rate. In the absence of cooperation cost, it can be shown that the grand coalition is sum-rate optimal and stable, i.e., the mobile terminals have no incentive to leave the grand coalition.

  19. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    Directory of Open Access Journals (Sweden)

    Du Bing

    2010-01-01

    Full Text Available A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC model, a common compact model in hierarchical wireless sensor networks (WSNs. The scheme uses Low-Density Parity-Check (LDPC as the surrogate to build up a layered structure which encapsulates the multiple constituent LDPC codes in the source and relay nodes. Specifically, the relay node decodes the messages from two sources, which are used to generate extra parity-check bits by a random network coding procedure to fill up the rate gap between Source-Relay and Source-Destination transmissions. Then, we derived the key algebraic relationships among multidimensional LDPC constituent codes as one of the constraints for code profile optimization. These extra check bits are sent to the destination to realize a cooperative diversity as well as to approach MARC decode-and-forward (DF capacity.

  20. Medical emplotment

    DEFF Research Database (Denmark)

    Mønsted, Troels Sune

    ’. Theoretically the project departs from Computer Supported Cooperative Work and Participatory Design and is informed by Medical Informatics, Design Research and Science and Technology Studies. Methodically the project is founded on collaborative prototyping, ethnographic studies, and design interventions...... philosophy and building on theory on narrative reasoning, the dissertation offers the notions of emplotment and re-emplotment to describe how physicians marshal information from various sources, including the medical record, the patient and coSummary to form a narrative, when making sense of patients...

  1. Design and Profit Allocation in Two-Echelon Heterogeneous Cooperative Logistics Network Optimization

    Directory of Open Access Journals (Sweden)

    Yong Wang

    2018-01-01

    Full Text Available In modern supply chain, logistics companies usually operate individually and optimization researches often concentrate on solving problems related to separate networks. Consequences like the complexity of urban transportation networks and long distance deliveries or pickups and pollution are leading problems to more expenses and more complaints from environment protection organizations. A solution approach to these issues is proposed in this article and consists in the adoption of two-echelon heterogeneous cooperative logistics networks (THCLN. The optimization methodology includes the formation of cooperative coalitions, the reallocation of customers to appropriate logistics facilities, and the determination of the best profit allocation scheme. First, a mixed integer linear programing model is introduced to minimize the total operating cost of nonempty coalitions. Thus, the Genetic Algorithm (GA and the Particle Swarm Optimization (PSO algorithm are hybridized to propose GA-PSO heuristics. GA-PSO is employed to provide good solutions to customer clustering units’ reallocation problem. In addition, a negotiation process is established based on logistics centers as coordinators. The case study of Chongqing city is conducted to verify the feasibility of THCLN in practice. The grand coalition and two heterogeneous subcoalitions are designed, and the collective profit is distributed based on cooperative game theory. The Minimum Cost Remaining Savings (MCRS model is used to determine good allocation schemes and strictly monotonic path principles are considered to evaluate and decide the most appropriate coalition sequence. Comparisons proved the combination of GA-PSO and MCRS better as results are found closest to the core center. Therefore, the proposed approach can be implemented in real world environment, increase the reliability of urban logistics network, and allow decision makers to improve service efficiency.

  2. Development and evaluation of an interactive electronic laboratory manual for cooperative learning of medical histology.

    Science.gov (United States)

    Khalil, Mohammed K; Kirkley, Debbie L; Kibble, Jonathan D

    2013-01-01

    This article describes the development of an interactive computer-based laboratory manual, created to facilitate the teaching and learning of medical histology. The overarching goal of developing the manual is to facilitate self-directed group interactivities that actively engage students during laboratory sessions. The design of the manual includes guided instruction for students to navigate virtual slides, exercises for students to monitor learning, and cases to provide clinical relevance. At the end of the laboratory activities, student groups can generate a laboratory report that may be used to provide formative feedback. The instructional value of the manual was evaluated by a questionnaire containing both closed-ended and open-ended items. Closed-ended items using a five-point Likert-scale assessed the format and navigation, instructional contents, group process, and learning process. Open-ended items assessed student's perception on the effectiveness of the manual in facilitating their learning. After implementation for two consecutive years, student evaluation of the manual was highly positive and indicated that it facilitated their learning by reinforcing and clarifying classroom sessions, improved their understanding, facilitated active and cooperative learning, and supported self-monitoring of their learning. Copyright © 2013 American Association of Anatomists.

  3. How healthy is South Africa's tnedical schemes industry? | Fourie ...

    African Journals Online (AJOL)

    An analysis of the membership demographics, the financial health and especially the sustainability of the South African medical schemes industry is presented. From the financial and in particular the actuarial analyses it is obvious that the current system is unsustainable, and if a private health care sector is to survive at all it ...

  4. China’s Higher Education Engagement with Africa: A Different Partnership and Cooperation Model?

    Directory of Open Access Journals (Sweden)

    Kenneth King

    2014-11-01

    Full Text Available What is the nature of China’s educational partnerships with Africa? This chapter examines China’s investment in human resource development in Africa, especially in higher education, through several programmes including long- and short-term training of Africans in China, Confucius Institutes, stand-alone projects, and the 20+20 scheme for higher education cooperation between China and Africa. It investigates several apparent differences between China’s aid discourse and practice and those of traditional Organisation for Economic Co-operation and Development (OECD donors. It asks how the enduring continuity of China’s discourse on mutual benefit and common good in educational aid can be explained. Can what looks like a one-way partnership in terms of financing really, in fact, be symmetrical?

  5. Adverse selection in a voluntary Rural Mutual Health Care health insurance scheme in China.

    Science.gov (United States)

    Wang, Hong; Zhang, Licheng; Yip, Winnie; Hsiao, William

    2006-09-01

    This study examines adverse selection in a subsidized voluntary health insurance scheme, the Rural Mutual Health Care (RMHC) scheme, in a poor rural area of China. The study was made possible by a unique longitudinal data set: the total sample includes 3492 rural residents from 1020 households. Logistic regression was employed for the data analysis. The results show that although this subsidized scheme achieved a considerable high enrollment rate of 71% of rural residents, adverse selection still exists. In general, individuals with worse health status are more likely to enroll in RMHC than individuals with better health status. Although the household is set as the enrollment unit for the RMHC for the purpose of reducing adverse selection, nearly 1/3 of enrolled households are actually only partially enrolled. Furthermore, we found that adverse selection mainly occurs in partially enrolled households. The non-enrolled individuals in partially enrolled households have the best health status, while the enrolled individuals in partially enrolled households have the worst health status. Pre-RMHC, medical expenditure for enrolled individuals in partially enrolled households was 206.6 yuan per capita per year, which is 1.7 times as much as the pre-RMHC medical expenditure for non-enrolled individuals in partially enrolled households. The study also reveals that the pre-enrolled medical expenditure per capita per year of enrolled individuals was 9.6% higher than the pre-enrolled medical expenditure of all residents, including both enrolled and non-enrolled individuals. In conclusion, although the subsidized RMHC scheme reached a very high enrollment rate and the household is set as the enrollment unit for the purpose of reducing adverse selection, adverse selection still exists, especially within partially enrolled households. Voluntary RMHC will not be financially sustainable if the adverse selection is not fully taken into account.

  6. Proceedings of IDMP 2013: first international day of medical physics

    International Nuclear Information System (INIS)

    Marinello, Ginette; Mazal, Alejandro; Francois, P.; Fournier-Bidoz, N.; Belshi, R.; Dutreix, M.; Heinrich, S.; Wessels, C.; Fourquet, A.; Aubert, Bernard; Le Du, Dominique; Lisbona, Albert; Dedieu, Veronique; Makovicka, Libor; Taisant, Daniel; Metayer, Yann; Roue, Amelie; Besbes, Mounir; Van Dyk, Jake; Hammadi, Akli; Meghzifene, Ahmed; Nuesslin, Fridtjof; Pipman, Yakov; Keller, Marc; Cheung, Kin Yin; Meghzifene, Ahmed; ); Maria del Rosario Perez; Buvat, Irene; Rosenwald, Jean-Claude; Cosset, Jean-Marc; Dutreix, Andree

    2013-11-01

    November 7 was the birth day of Marie Curie and was chosen by the International Organisation of Medical Physics (IOMP) to celebrate his 50 years of existence at the Institut Curie, the exact place of Marie Curie's lab. The aim of this conference day was to promote medical physics and to give grounds for common reflection about international cooperation, the medical physicist profession, medical physics teaching and research. The conference was jointly organised by the French Society of Medical Physics and the Paris area medical centres specialised in cancer and in the training of medical physicists. This document brings together the presentations (slides) presented during the conference and dealing with: 1 - 26 years of French-Chinese cooperation in radiotherapy and medical radio-physics (G. Marinello); 2 - Activities conducted by Medical Physicists Without Borders (PMSF, Daniel Taisant); 3 - Cooperation in response to MAE and IAEA request (Y. Metayer); 4 - Teaching in France provided to foreigners by the National Institute for Nuclear Sciences and Technologies (INSTN, A. Roue); 5 - Radiation oncology and medical physics in Tunisia (M. Besbes); 6 - Medical physics education and training in the Global village: issues, strategies and experiences (J. Van Dyk); 7 - CEA/INSTN participation to training courses abroad (A. Hammadi); 8 - Medical physics to the benefit of patients: the role of IAEA (A. Meghzifene); 9 - Actions, results and perspectives of national and international organisations directly involved in medical physics and oncology (F. Nuesslin); 10 - The AAPM's Cooperation in Medical Physics with Low and Middle Income Countries: Actions, Achievements and Future Prospects (Y. Pipman); 11 - Alliance of African and Mediterranean French Speaking leagues against cancer (ALIAM, M.R. Keller); 12 - Opening talk for the first international day of medical physics (F. Nuesslin); 13 - IAEA support 14 - Marie Curie's contribution to medical physics (J.C. Rosenwald); 15

  7. Social Protection Schemes in Pakistan: assessment of existing programs

    Directory of Open Access Journals (Sweden)

    Yu ShuHong

    2017-07-01

    Full Text Available Social protection is regarded as a basic human right guaranteed in several International Covenants and Treaties. The Constitution of Pakistan exclusively stipulates the provision of social security for all citizens of the country. The aim of the study is to explore and evaluate the social protection schemes with regards to its coverage, scope and outreach. The country has number of social security schemes that are being carried out by provincial and federal governments for the welfare of workers like old age benefits, disablement, health and medical facilities. However, these schemes have failed to extend their benefits to home based, part-time, temporary or contract and agricultural workers. This paper attempts to highlight the shortcomings of existing social protection programs that are obstructing their benefit distribution and limiting their outreach. It underlines the challenges faced by the implementing agencies. This paper also suggests some improvements in the structural design of social security mechanism with special focus on the scope, coverage, outreach and effective delivery mechanism. Since, the proper allocation of resources and effective implementation of these schemes can ensure the assistance and welfare of the targeted population.

  8. The value of near-peer teaching in the medical curriculum: a medical student's perspective

    Directory of Open Access Journals (Sweden)

    Kalsi IA

    2018-04-01

    Full Text Available Ishar Alexander Kalsi GKT School of Medical Education, Faculty of Life Sciences and Medicine, King’s College London, London, UKIt is with both interest and sympathy that I read the research letter published by Sonagara et al1 about the numerous advantages of near-peer teaching and the recommendation that it should be part of the medical syllabus. As a medical student at King’s College London, I am a member of a near-peer learning scheme. Our peer-assisted learning (PAL scheme is designed to complement the material taught in lectures. In groups of five students, we select a lecture to revise together with our PAL tutors (senior medical students for one hour weekly. A self-made presentation, mock exam questions, and diagrams are commonly used as material in PAL sessions. It is the PAL tutors themselves who generate this material, while balancing their own study needs; thus, I find credit in the statement of how time management skills improve through peer teaching. View the original paper by Sonagara and colleagues. 

  9. Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tong Li

    2017-01-01

    Full Text Available Wireless body area networks (WBANs are widely used in telemedicine, which can be utilized for real-time patients monitoring and home health-care. The sensor nodes in WBANs collect the client’s physiological data and transmit it to the medical center. However, the clients’ personal information is sensitive and there are many security threats in the extra-body communication. Therefore, the security and privacy of client’s physiological data need to be ensured. Many authentication protocols for WBANs have been proposed in recent years. However, the existing protocols fail to consider the key update phase. In this paper, we propose an efficient authenticated key agreement scheme for WBANs and add the key update phase to enhance the security of the proposed scheme. In addition, session keys are generated during the registration phase and kept secretly, thus reducing computation cost in the authentication phase. The performance analysis demonstrates that our scheme is more efficient than the currently popular related schemes.

  10. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.

    Science.gov (United States)

    Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen

    2018-04-28

    Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.

  11. Aspects of Sustainability: Cooperation, Job Satisfaction, and Burnout among Swiss Psychiatrists.

    Science.gov (United States)

    Baumgardt, Johanna; Moock, Jörn; Rössler, Wulf; Kawohl, Wolfram

    2015-01-01

    Greater sustainability in mental health services is frequently demanded but seldom analyzed. Levels of cooperation, job satisfaction, and burnout are indicators of social sustainability in this field and are of particular importance to medical staff. Because registered psychiatrists play a central role, we assessed the status quo and interactions between these three factors among registered psychiatrists in Switzerland. A postal survey with three standardized questionnaires about cooperation, job satisfaction, and burnout was conducted among all registered psychiatrists in the German-speaking part of Switzerland (n = 1485). Addresses were provided by the Swiss Medical Association. Response rate was 23.7% (n = 352), yielding a largely male sample (62.8%; n = 218) aged 55.5 ± 8.7 years old. Quantity (47 ± 56.2 contacts over 3 months) and duration (91.1 ± 101.6 min per week) of cooperation was found to be diverse depending on the stakeholder. Quality of cooperation was greatest in general practitioners (81.5%) while it was worst in community mental health providers (54.9%). Overall job satisfaction was assessed rather high (3.7 ± 0.8), and burnout rates were below crucial values (Emotional Exhaustion, 2.9 ± 0.8; Depersonalization, 1.9 ± 0.5). Both were positively influenced by cooperation. The strongest correlation was found between job satisfaction and burnout, and both had significant inverse relationships in all dimensions. To foster sustainability in outpatient mental health care regarding cooperation, job satisfaction, and burnout, personal aspects such and age or years of registration, organizational aspects, such as networking and practice setting, as wells as supportive aspects such as psychotherapy, and self-help groups, must be considered. Quality of cooperation should be reinforced in particular. Because Integrated and Managed Care models cover several of these factors, the models should be more strongly

  12. DREAM: Classification scheme for dialog acts in clinical research query mediation.

    Science.gov (United States)

    Hoxha, Julia; Chandar, Praveen; He, Zhe; Cimino, James; Hanauer, David; Weng, Chunhua

    2016-02-01

    Clinical data access involves complex but opaque communication between medical researchers and query analysts. Understanding such communication is indispensable for designing intelligent human-machine dialog systems that automate query formulation. This study investigates email communication and proposes a novel scheme for classifying dialog acts in clinical research query mediation. We analyzed 315 email messages exchanged in the communication for 20 data requests obtained from three institutions. The messages were segmented into 1333 utterance units. Through a rigorous process, we developed a classification scheme and applied it for dialog act annotation of the extracted utterances. Evaluation results with high inter-annotator agreement demonstrate the reliability of this scheme. This dataset is used to contribute preliminary understanding of dialog acts distribution and conversation flow in this dialog space. Copyright © 2015 Elsevier Inc. All rights reserved.

  13. Performance analysis of best relay selection scheme for amplify-and-forward cooperative networks in identical Nakagami-m channels

    KAUST Repository

    Hussain, Syed Imtiaz; Alouini, Mohamed-Slim; Hasna, Mazen Omar

    2010-01-01

    for a cooperative network with multiple relays operating in amplify-and-forward (AF) mode over identical Nakagami-m channels using exact source-relay-destination signal to noise ratio (SNR) expression. We derive accurate closed form expressions

  14. International cooperation

    International Nuclear Information System (INIS)

    2008-01-01

    In this chapter international cooperation of the Division for Radiation Safety, NPP Decommissioning and Radwaste Management of the VUJE, a. s. is presented. Very important is cooperation with the International Atomic Energy Agency. This cooperation has various forms - national and regional projects of technical cooperation, coordinated research activities, participation of our experts in preparation of the IAEA documentation etc.

  15. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  16. Multiplying and detecting propagating microwave photons using inelastic Cooper-pair tunneling

    Science.gov (United States)

    Leppäkangas, Juha; Marthaler, Michael; Hazra, Dibyendu; Jebari, Salha; Albert, Romain; Blanchet, Florian; Johansson, Göran; Hofheinz, Max

    2018-01-01

    The interaction between propagating microwave fields and Cooper-pair tunneling across a DC-voltage-biased Josephson junction can be highly nonlinear. We show theoretically that this nonlinearity can be used to convert an incoming single microwave photon into an outgoing n -photon Fock state in a different mode. In this process, the electrostatic energy released in a Cooper-pair tunneling event is transferred to the outgoing Fock state, providing energy gain. The created multiphoton Fock state is frequency entangled and highly bunched. The conversion can be made reflectionless (impedance matched) so that all incoming photons are converted to n -photon states. With realistic parameters, multiplication ratios n >2 can be reached. By two consecutive multiplications, the outgoing Fock-state number can get sufficiently large to accurately discriminate it from vacuum with linear postamplification and power measurement. Therefore, this amplification scheme can be used as a single-photon detector without dead time.

  17. Process of 3D wireless decentralized sensor deployment using parsing crossover scheme

    Directory of Open Access Journals (Sweden)

    Albert H.R. Ko

    2015-07-01

    Full Text Available A Wireless Sensor Networks (WSN usually consists of numerous wireless devices deployed in a region of interest, each able to collect and process environmental information and communicate with neighboring devices. It can thus be regarded as a Multi-Agent System for territorial security, where individual agents cooperate with each other to avoid duplication of effort and to exploit other agent’s capacities. The problem of sensor deployment becomes non-trivial when we consider environmental factors, such as terrain elevations. Due to the fact that all sensors are homogeneous, the chromosomes that encode sensor positions are actually interchangeable, and conventional crossover schemes such as uniform crossover would cause some redundancy as well as over-concentration in certain specific geographical area. We propose a Parsing Crossover Scheme that intends to reduce redundancy and ease geographical concentration pattern in an effort to facilitate the search. The proposed parsing crossover method demonstrates better performances than those of uniform crossover under different terrain irregularities.

  18. IOMP - Challenges for advancing medical physic globally

    International Nuclear Information System (INIS)

    Nusslin, F.

    2010-01-01

    IOMP stands for International Organization for Medical Physics. The determinants of health care include; science, research, academia, education, technology, engineering, industry, politics, economic, society, ethics, culture and medicine. However, physics and engineering are the driving forces of progress in health care. Medical Physics is a branch of Applied Physics, pursued by medical physicists, which uses physics principles, methods and techniques in practice and research for the prevention, diagnosis and treatment of human diseases with a specific goal of improving human health and well-being. How can we achieve Health Care improvement through Medical Physics globally? By forming international alliances in the Medical Physics community to develop and implement coherent concepts of • Appropriate University / Hospital Structures • Education & Training and Certification Schemes • Research & Development Platforms • Professional Career Development • International Cooperation within the Science Community IOMP represents ca. 18.000 medical physicists worldwide, it is affiliated to 80 national member organizations, six regional organizations as Members plus Corporate Members. The mission of IOMP is to advance medical physics practice worldwide by disseminating scientific and technical information, fostering the educational and professional development of medical physics and promoting the highest quality medical services for patients. 6 Medical physicists are professionals with education and specialist training in the concepts and techniques of applying physics in medicine. They work in clinical, academic or research institutions. Challenges, Efforts and Achievements of the International Organization for Medical Physics Recognition of the Medical Physics profession by the National Health Authorities. Medical Physicists are essential to ensure adequate and safe use of radiation equipment, Radiation Protection of patients, workers and public in a clinical

  19. Peer mentoring for core medical trainees: uptake and impact.

    Science.gov (United States)

    Webb, Jessica; Brightwell, Alexandra; Sarkar, Pamela; Rabbie, Roy; Chakravorty, Indranil

    2015-04-01

    To assess the uptake and impact of a peer mentoring scheme for core medical trainees on both mentors and mentees. All second year core medical trainees in the Southwest London Training programme in September 2012 were invited to mentor a first year core medical trainee. In parallel, all first year core medical trainees were invited to be mentored. Both potential mentors and mentees were asked to submit personal statements, to attend a three-session mentoring training programme and to be matched into mentoring pairs. The impact of the mentoring scheme on trainees' behaviour and outlook was assessed through questionnaires distributed at the start and at the end of the year. 31 of 72 (43%) core medical trainees submitted personal statements and 40 of 72 (56%) attended training sessions. 42 trainees (58%) participated in the scheme (21 mentor/mentee pairs were established). Of the trainees who participated, 23 of 42 (55%) completed the end of year questionnaire. Participating trainees viewed the scheme positively. Reported benefits included changes in their behaviour and acquiring transferable skills that might help them in later career roles, such as an educational supervisor. The end of year questionnaire was sent to all trainees and 10 responded who had not participated. They were asked why they had not participated and their reasons included lack of time, lack of inclination and a desire for more senior mentors. Their suggestions for improvement included more structured sessions to allow the mentor/mentee pairs to meet. This simple peer mentoring scheme was popular despite busy workloads and benefited all concerned. It is a simple effective way of supporting doctors. More work is needed to improve training for mentors and to improve access to mentoring. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  20. On the Benefits of Cognitive Infocommunication for Mobile Communication Nodes Using Cooperative Concepts

    DEFF Research Database (Denmark)

    Blázovics, László; Forstner, Bertalan; Charaf, Hassan

    2013-01-01

    The distributed coordination of a group of mobile robots became a widely studied area in the last decades however the communication aided solutions became also popular research. In this paper we present the concept of cognitive swarm which enables to design faster and reliable cooperative groups ...... infocommuncation aided solution for that by the use of the basic behaviour set as fundamental. We show through simulation results that the proposed cognitive scheme can reduce the surrounding time by the factor of two leading to faster interception.......The distributed coordination of a group of mobile robots became a widely studied area in the last decades however the communication aided solutions became also popular research. In this paper we present the concept of cognitive swarm which enables to design faster and reliable cooperative groups...

  1. New Cooperation Modes: An Opportunity for Polish Biotechnological Clusters

    Directory of Open Access Journals (Sweden)

    Lukasz Puslecki

    2015-06-01

    Full Text Available This article reviews new cooperation forms between companies, referring to the latest data from the asap (the Association of Strategic Alliance Professionals. Potential cooperation between companies, universities and research institutes in the field of biotechnology in Poland based on a model of open innovation alliances are presented. Biopharmaceutical companies are looking for new and innovative paths of development. They try to implement new strategies to transfer their research processes to a higher level. To achieve this, biopharmaceutical companies often use open innovation model as an additional tool for developing new products. Thanks to the cooperation with universities in the framework of open innovation alliances, they can significantly reduce the risk, the cost of research, and most of all, through joint work with academic researchers on identifying disease mechanisms and on development of new drugs, they are able to create improved and appropriate medical therapy for patients.

  2. Training of Radiation Protection and Medical Physics in Latin American Through the SEPR (Griapra): Six years of Cooperation

    International Nuclear Information System (INIS)

    Pena, J. J.; Rossell, M. A.; Calvo, J. L.; Vega, J. M.

    2003-01-01

    The Ibero-American Group of Scientific Societies of Radiological Protection (GRIAPRA) was constituted on 30-September-1996 as the end of a process that the SEPR began in its V National Congress (Santiago de Compostela, 1994). In this work are presented some of the results of the experience accumulated by the SEPR (GRIAPRA) in training and professional update of latin-american radiologists,medical physicists and technician during these last six years:Cuba (La Habana 1998), Peru (Lima 1999), Mexico (Guadalajara 2000), Brazil (Recife, 2001), Peru (Lima 2002) and Cuba (La Habana 2003). They are shown the professional profiles of the american colleagues that in number superior to 300 persons have been accepted in these training courses imparted by members very qualified of the SEPR and SEFM, the theoric-practical structure of these courses, the design of their programming, documentation, the sources of financing, the general analysis of the wisdoms and mistakes and the proposal to continue with this cooperation in the future. (Author)

  3. Cluster Cooperation in Wireless-Powered Sensor Networks: Modeling and Performance Analysis

    Directory of Open Access Journals (Sweden)

    Chao Zhang

    2017-09-01

    Full Text Available A wireless-powered sensor network (WPSN consisting of one hybrid access point (HAP, a near cluster and the corresponding far cluster is investigated in this paper. These sensors are wireless-powered and they transmit information by consuming the harvested energy from signal ejected by the HAP. Sensors are able to harvest energy as well as store the harvested energy. We propose that if sensors in near cluster do not have their own information to transmit, acting as relays, they can help the sensors in a far cluster to forward information to the HAP in an amplify-and-forward (AF manner. We use a finite Markov chain to model the dynamic variation process of the relay battery, and give a general analyzing model for WPSN with cluster cooperation. Though the model, we deduce the closed-form expression for the outage probability as the metric of this network. Finally, simulation results validate the start point of designing this paper and correctness of theoretical analysis and show how parameters have an effect on system performance. Moreover, it is also known that the outage probability of sensors in far cluster can be drastically reduced without sacrificing the performance of sensors in near cluster if the transmit power of HAP is fairly high. Furthermore, in the aspect of outage performance of far cluster, the proposed scheme significantly outperforms the direct transmission scheme without cooperation.

  4. Cooperative Coding and Caching for Streaming Data in Multihop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Liu Jiangchuan

    2010-01-01

    Full Text Available This paper studies the distributed caching managements for the current flourish of the streaming applications in multihop wireless networks. Many caching managements to date use randomized network coding approach, which provides an elegant solution for ubiquitous data accesses in such systems. However, the encoding, essentially a combination operation, makes the coded data difficult to be changed. In particular, to accommodate new data, the system may have to first decode all the combined data segments, remove some unimportant ones, and then reencode the data segments again. This procedure is clearly expensive for continuously evolving data storage. As such, we introduce a novel Cooperative Coding and Caching ( scheme, which allows decoding-free data removal through a triangle-like codeword organization. Its decoding performance is very close to the conventional network coding with only a sublinear overhead. Our scheme offers a promising solution to the caching management for streaming data.

  5. Non-cooperative game theory in biology and cooperative reasoning in humans.

    Science.gov (United States)

    Kabalak, Alihan; Smirnova, Elena; Jost, Jürgen

    2015-06-01

    The readiness for spontaneous cooperation together with the assumptions that others share this cooperativity has been identified as a fundamental feature that distinguishes humans from other animals, including the great apes. At the same time, cooperativity presents an evolutionary puzzle because non-cooperators do better in a group of cooperators. We develop here an analysis of the process leading to cooperation in terms of rationality concepts, game theory and epistemic logic. We are, however, not attempting to reconstruct the actual evolutionary process. We rather want to provide the logical structure underlying cooperation in order to understand why cooperation is possible and what kind of reasoning and beliefs would lead to cooperative decision-making. Game theory depends on an underlying common belief in non-cooperative rationality of the players, and cooperativity similarly can utilize a common belief in cooperative rationality as its basis. We suggest a weaker concept of rational decision-making in games that encompasses both types of decision-making. We build this up in stages, starting from simple optimization, then using anticipation of the reaction of others, to finally arrive at reflexive and cooperative reasoning. While each stage is more difficult than the preceding, importantly, we also identify a reduction of complexity achieved by the consistent application of higher stage reasoning.

  6. Designing for cooperation - cooperating in design

    DEFF Research Database (Denmark)

    Kyng, Morten

    1991-01-01

    This article will discuss how to design computer applications that enhance the quality of work and products, and will relate the discussion to current themes in the field of Computer-Supported Cooperative Work (CSCW). Cooperation is a key element of computer use and work practice, yet here...... a specific "CSCW approach is not taken." Instead the focus is cooperation as an important aspect of work that should be integrated into most computer support efforts in order to develop successful computer support, however, other aspects such as power, conflict and control must also be considered....

  7. An 802.11k Compliant Framework for Cooperative Handoff in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Korakis Thanasis

    2009-01-01

    Full Text Available Abstract In IEEE 802.11-based wireless networks, the stations (STAs are associated with the available access points (APs and communicate through them. In traditional handoff schemes, the STAs get information about the active APs in their neighborhood by scanning the available channels and listening to transmitted beacons. This paper proposes an 802.11k compliant framework for cooperative handoff where the STAs are informed about the active APs by exchanging information with neighboring STAs. Besides, the APs share useful information that can be used by the STAs in a handoff process. In this way, we minimize the delay of the scanning procedure. We evaluate the performance of our mechanisms through OPNET simulations. We demonstrate that our scheme reduces the scanning delay up to 92%. Consequently, our system is more capable in meeting the needs of QoS-sensitive applications.

  8. Threshold-Based Relay Selection for Detect-and-Forward Relaying in Cooperative Wireless Networks

    Directory of Open Access Journals (Sweden)

    Fan Yijia

    2010-01-01

    Full Text Available This paper studies two-hop cooperative demodulate-and-forward relaying using multiple relays in wireless networks. A threshold based relay selection scheme is considered, in which the reliable relays are determined by comparing source-relay SNR to a threshold, and one of the reliable relays is selected by the destination based on relay-destination SNR. The exact bit error rate of this scheme is derived, and a simple threshold function is proposed. It is shown that the network achieves full diversity order ( under the proposed threshold, where is the number of relays in the network. Unlike some other full diversity achieving protocols in the literature, the requirement that the instantaneous/average SNRs of the source-relay links be known at the destination is eliminated using the appropriate SNR threshold.

  9. Exact analysis of Packet Reversed Packet Combining Scheme and Modified Packet Combining Scheme; and a combined scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-07-01

    Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)

  10. About positive, energy conservative and equilibrium state preserving schemes for the isotropic Fokker-Planck-Landau equation; Sur les schemas positifs, conservant l'energie et les etats d'equilibre pour l'equation de Fokker-Planck-Landau isotrope

    Energy Technology Data Exchange (ETDEWEB)

    Buet, Ch. [CEA Bruyeres-le-Chatel, Dept. des Sciences de la Simulation et de l' Information, 91 (France); Le Thanh, K.C. [CEA Bruyeres-le-Chatel, Dept. de Physique Theorique et Appliquee, 91 (France)

    2006-07-01

    The aim of this paper is to describe the discretization of the Fokker-Planck-Landau (FPL) collision term in the isotropic case which models the self collision for the electrons when they are totally isotropized by heavy particles background such as ions. The discussion focus on schemes which could preserve positivity, mass, energy and Maxwellian equilibrium. First, we analyze in detail the popular Chang and Cooper method for this non-linear collision term: derivation, conservation and positivity properties. We show that some variants of this method, based on the drift-diffusion form of the FPL operator, could not be positive or could not conserve the energy. We present a new variant of the Chang and Cooper method derived from the Landau form that is both positive and conservative. We also propose two new alternatives and simpler schemes for the FPL operator which show that the Chang and Cooper method is not the only way to construct positive, energy conservative and equilibrium state preserving schemes for this operator. For all these schemes, we explain clearly the properties of conservation of the density and the energy, the positivity of the solution and the conservation of the equilibrium states, or their lack. The case of Maxwellian and Coulombian potentials are emphasized. (authors)

  11. A Game Theoretic Approach to Minimize the Completion Time of Network Coded Cooperative Data Exchange

    KAUST Repository

    Douik, Ahmed S.

    2014-05-11

    In this paper, we introduce a game theoretic framework for studying the problem of minimizing the completion time of instantly decodable network coding (IDNC) for cooperative data exchange (CDE) in decentralized wireless network. In this configuration, clients cooperate with each other to recover the erased packets without a central controller. Game theory is employed herein as a tool for improving the distributed solution by overcoming the need for a central controller or additional signaling in the system. We model the session by self-interested players in a non-cooperative potential game. The utility function is designed such that increasing individual payoff results in a collective behavior achieving both a desirable system performance in a shared network environment and the Pareto optimal solution. Through extensive simulations, our approach is compared to the best performance that could be found in the conventional point-to-multipoint (PMP) recovery process. Numerical results show that our formulation largely outperforms the conventional PMP scheme in most practical situations and achieves a lower delay.

  12. A Game Theoretic Approach to Minimize the Completion Time of Network Coded Cooperative Data Exchange

    KAUST Repository

    Douik, Ahmed S.; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim; Sorour, Sameh; Tembine, Hamidou

    2014-01-01

    In this paper, we introduce a game theoretic framework for studying the problem of minimizing the completion time of instantly decodable network coding (IDNC) for cooperative data exchange (CDE) in decentralized wireless network. In this configuration, clients cooperate with each other to recover the erased packets without a central controller. Game theory is employed herein as a tool for improving the distributed solution by overcoming the need for a central controller or additional signaling in the system. We model the session by self-interested players in a non-cooperative potential game. The utility function is designed such that increasing individual payoff results in a collective behavior achieving both a desirable system performance in a shared network environment and the Pareto optimal solution. Through extensive simulations, our approach is compared to the best performance that could be found in the conventional point-to-multipoint (PMP) recovery process. Numerical results show that our formulation largely outperforms the conventional PMP scheme in most practical situations and achieves a lower delay.

  13. An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu

    2013-12-01

    A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.

  14. Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks

    Science.gov (United States)

    da Silva, Eduardo; Dos Santos, Aldri Luiz; Lima, Michele N.; Albini, Luiz Carlos Pessoa

    Among the key management schemes for MANETs, the Self-Organized Public-Key Management System (PGP-Like) is the main chaining-based key management scheme. It is fully self-organized and does not require any certificate authority. Two kinds of misbehavior attacks are considered to be great threats to PGP-Like: lack of cooperation and impersonation attacks. This work quantifies the impact of such attacks on the PGP-Like. Simulation results show that PGP-Like was able to maintain its effectiveness when submitted to the lack of cooperation attack, contradicting previously theoretical results. It correctly works even in the presence of more than 60% of misbehaving nodes, although the convergence time is affected with only 20% of misbehaving nodes. On the other hand, PGP-Like is completely vulnerable to the impersonation attack. Its functionality is affected with just 5% of misbehaving nodes, confirming previously theoretical results.

  15. HEALTH INSURANCE SCHEME -- announcement from the CHIS Board

    CERN Document Server

    2005-01-01

    A number of members of our Health Insurance Scheme are currently experiencing difficulties getting reimbursement for consulting an acupuncture practitioner. The CHIS Board wishes to remind you that in order to be reimbursed, you must receive your acupuncture treatment from doctors recognised by the competent authorities of the country in which they have their medical practice. In Switzerland, these are people possessing the title of doctor of medicine recognised by the Swiss Medical Association (FMH). Treatment provided by medical auxiliaries must be prescribed beforehand by a recognised doctor. As the practitioner in question is currently not recognised as a doctor in Switzerland, his services are not reimbursed. In order to avoid any inconvenience, we advise you to contact uniqa before undergoing such treatment. You will find all details concerning reimbursement of complementary medicine (acupuncture, chiropractic, osteopathy and ethiopathy) in CHISbull’ No. 18 dated November 2004, which can ...

  16. HEALTH INSURANCE SCHEME - announcement from the CHIS Board

    CERN Multimedia

    2005-01-01

    A number of members of our Health Insurance Scheme are currently experiencing difficulties getting reimbursement for consulting an acupuncture practitioner. The CHIS Board wishes to remind you that in order to be reimbursed, you must receive your acupuncture treatment from doctors recognised by the competent authorities of the country in which they have their medical practice. In Switzerland, these are people possessing the title of doctor of medicine recognised by the Swiss Medical Association (FMH). Treatment provided by medical auxiliaries must be prescribed beforehand by a recognised doctor. As the practitioner in question is currently not recognised as a doctor in Switzerland, his services are not reimbursed. In order to avoid any inconvenience, we advise you to contact uniqa before undergoing such treatment. You will find all details concerning reimbursement of complementary medicine (acupuncture, chiropractic, osteopathy and ethiopathy) in CHISbull' No. 18 dated November 2004, which can also be co...

  17. Allocation of fixed transmission cost to wheeling transactions by cooperative game theory

    International Nuclear Information System (INIS)

    Tsukamoto, Yukitoki; Iyoda, Isao

    1996-01-01

    This paper describes a methodology to allocate the cost of transmission network facilities to wheeling transactions in decentralized power systems. The authors propose that the responsibility placed on transmission facilities involved in each transaction be according to the transmission usage pattern. Their proposal incorporates MW-mile method and considers economies of scale of transmission network facilities. The authors also incorporate a nucleolus scheme in the cooperative game theory to deal with matters of conflict. The applicability of their method is demonstrated in a numerical example

  18. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2015-03-01

    The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient's privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to guarantee confidential and authorized interaction between the patient and remote server. In order to achieve the goals, numerous remote authentication schemes based on cryptography have been presented. Recently, Arshad et al. (J Med Syst 38(12): 2014) presented a secure and efficient three-factor authenticated key exchange scheme to remedy the weaknesses of Tan et al.'s scheme (J Med Syst 38(3): 2014). In this paper, we found that once a successful off-line password attack that results in an adversary could impersonate any user of the system in Arshad et al.'s scheme. In order to thwart these security attacks, an enhanced biometric and smart card based remote authentication scheme for TMISs is proposed. In addition, the BAN logic is applied to demonstrate the completeness of the enhanced scheme. Security and performance analyses show that our enhanced scheme satisfies more security properties and less computational cost compared with previously proposed schemes.

  19. Distributed Cooperative Current-Sharing Control of Parallel Chargers Using Feedback Linearization

    Directory of Open Access Journals (Sweden)

    Jiangang Liu

    2014-01-01

    Full Text Available We propose a distributed current-sharing scheme to address the output current imbalance problem for the parallel chargers in the energy storage type light rail vehicle system. By treating the parallel chargers as a group of agents with output information sharing through communication network, the current-sharing control problem is recast as the consensus tracking problem of multiagents. To facilitate the design, input-output feedback linearization is first applied to transform the nonidentical nonlinear charging system model into the first-order integrator. Then, a general saturation function is introduced to design the cooperative current-sharing control law which can guarantee the boundedness of the proposed control. The cooperative stability of the closed-loop system under fixed and dynamic communication topologies is rigorously proved with the aid of Lyapunov function and LaSalle invariant principle. Simulation using a multicharging test system further illustrates that the output currents of parallel chargers are balanced using the proposed control.

  20. Effect of exercise referral schemes in primary care on physical activity and improving health outcomes: systematic review and meta-analysis

    Science.gov (United States)

    Taylor, A H; Fox, K R; Hillsdon, M; Anokye, N; Campbell, J L; Foster, C; Green, C; Moxham, T; Mutrie, N; Searle, J; Trueman, P; Taylor, R S

    2011-01-01

    Objective To assess the impact of exercise referral schemes on physical activity and health outcomes. Design Systematic review and meta-analysis. Data sources Medline, Embase, PsycINFO, Cochrane Library, ISI Web of Science, SPORTDiscus, and ongoing trial registries up to October 2009. We also checked study references. Study selection Design: randomised controlled trials or non-randomised controlled (cluster or individual) studies published in peer review journals. Population: sedentary individuals with or without medical diagnosis. Exercise referral schemes defined as: clear referrals by primary care professionals to third party service providers to increase physical activity or exercise, physical activity or exercise programmes tailored to individuals, and initial assessment and monitoring throughout programmes. Comparators: usual care, no intervention, or alternative exercise referral schemes. Results Eight randomised controlled trials met the inclusion criteria, comparing exercise referral schemes with usual care (six trials), alternative physical activity intervention (two), and an exercise referral scheme plus a self determination theory intervention (one). Compared with usual care, follow-up data for exercise referral schemes showed an increased number of participants who achieved 90-150 minutes of physical activity of at least moderate intensity per week (pooled relative risk 1.16, 95% confidence intervals 1.03 to 1.30) and a reduced level of depression (pooled standardised mean difference −0.82, −1.28 to −0.35). Evidence of a between group difference in physical activity of moderate or vigorous intensity or in other health outcomes was inconsistent at follow-up. We did not find any difference in outcomes between exercise referral schemes and the other two comparator groups. None of the included trials separately reported outcomes in individuals with specific medical diagnoses.Substantial heterogeneity in the quality and nature of the exercise referral

  1. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  2. Teleworking through cooperation

    Directory of Open Access Journals (Sweden)

    Dario Minervini

    2006-07-01

    scheme is strictly connected to new technologies and cooperation is an important dimension of teleworking. In our study, cooperation is found performed both in social relations between employers and employees and in institutionalized relations between managers and unions. Although the two forms of cooperation, here called “social trustee cooperation” and “institutional cooperation”, are often thought as prerequisites of “best practices” of new working arrangements, our case studies demonstrate that cooperation has not always arisen that make possible to implement practices of teleworking. By focusing on cooperative relations, the results of different case studies in industry and in the service sector are discussed, thus intending to contribute to the development of sociological debate on telework.

  3. Evaluation of the medical student research programme in Norwegian medical schools. A survey of students and supervisors

    Directory of Open Access Journals (Sweden)

    Tømmerås Karin

    2009-07-01

    Full Text Available Abstract Background The Medical Student Research Programme is a national education and grant scheme for medical students who wish to carry out research in parallel with their studies. The purpose of the programme is to increase recruitment of people with a standard medical degree to medical research. The Research Programme was established in 2002 and underwent a thorough evaluation during the spring of 2007. The evaluation should investigate if the programme had fulfilled its objectives of increased recruitment to medical research, in addition to the students' and supervisors' satisfaction of the programme, and unwanted differences between the universities. Methods Data was collected from students, supervisors and administrative staff via web-based questionnaires. Information about admission, implementation, results achieved and satisfaction was analysed and compared between the four Norwegian medical schools. In addition, the position of the scheme in relation to the national Quality Reform of Higher Education was analysed. Results At the end of 2006, the Medical Student Research Programme had recruited 265 medical students to research. These consisted of 214 active students, 35 who had completed their studies and only 17 who had dropped out. Both students and supervisors were generally very satisfied with the scheme, including the curriculum, the results achieved and the administrative service. The majority of students wanted to continue their research towards a PhD and, of those who had completed the Medical Student Research Programme, practically all had published one or several scientific papers. The survey showed only small differences between the four medical schools, despite their choice of somewhat different solutions in terms of administration and organisation. The Medical Student Research Programme satisfies the majority of the demands of the Quality Reform, however as an integrated research programme aimed at a PhD it presupposes

  4. Evaluation of the medical student research programme in Norwegian medical schools. A survey of students and supervisors

    Science.gov (United States)

    Hunskaar, Steinar; Breivik, Jarle; Siebke, Maje; Tømmerås, Karin; Figenschau, Kristian; Hansen, John-Bjarne

    2009-01-01

    Background The Medical Student Research Programme is a national education and grant scheme for medical students who wish to carry out research in parallel with their studies. The purpose of the programme is to increase recruitment of people with a standard medical degree to medical research. The Research Programme was established in 2002 and underwent a thorough evaluation during the spring of 2007. The evaluation should investigate if the programme had fulfilled its objectives of increased recruitment to medical research, in addition to the students' and supervisors' satisfaction of the programme, and unwanted differences between the universities. Methods Data was collected from students, supervisors and administrative staff via web-based questionnaires. Information about admission, implementation, results achieved and satisfaction was analysed and compared between the four Norwegian medical schools. In addition, the position of the scheme in relation to the national Quality Reform of Higher Education was analysed. Results At the end of 2006, the Medical Student Research Programme had recruited 265 medical students to research. These consisted of 214 active students, 35 who had completed their studies and only 17 who had dropped out. Both students and supervisors were generally very satisfied with the scheme, including the curriculum, the results achieved and the administrative service. The majority of students wanted to continue their research towards a PhD and, of those who had completed the Medical Student Research Programme, practically all had published one or several scientific papers. The survey showed only small differences between the four medical schools, despite their choice of somewhat different solutions in terms of administration and organisation. The Medical Student Research Programme satisfies the majority of the demands of the Quality Reform, however as an integrated research programme aimed at a PhD it presupposes access to PhD courses before the

  5. A Subcarrier-Pair Based Resource Allocation Scheme Using Proportional Fairness for Cooperative OFDM-Based Cognitive Radio Networks

    Science.gov (United States)

    Ma, Yongtao; Zhou, Liuji; Liu, Kaihua

    2013-01-01

    The paper presents a joint subcarrier-pair based resource allocation algorithm in order to improve the efficiency and fairness of cooperative multiuser orthogonal frequency division multiplexing (MU-OFDM) cognitive radio (CR) systems. A communication model where one source node communicates with one destination node assisted by one half-duplex decode-and-forward (DF) relay is considered in the paper. An interference-limited environment is considered, with the constraint of transmitted sum-power over all channels and aggregate average interference towards multiple primary users (PUs). The proposed resource allocation algorithm is capable of maximizing both the system transmission efficiency and fairness among secondary users (SUs). Besides, the proposed algorithm can also keep the interference introduced to the PU bands below a threshold. A proportional fairness constraint is used to assure that each SU can achieve a required data rate, with quality of service guarantees. Moreover, we extend the analysis to the scenario where each cooperative SU has no channel state information (CSI) about non-adjacent links. We analyzed the throughput and fairness tradeoff in CR system. A detailed analysis of the performance of the proposed algorithm is presented with the simulation results. PMID:23939586

  6. Cooperative Coding and Caching for Streaming Data in Multihop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Dan Wang

    2010-01-01

    Full Text Available This paper studies the distributed caching managements for the current flourish of the streaming applications in multihop wireless networks. Many caching managements to date use randomized network coding approach, which provides an elegant solution for ubiquitous data accesses in such systems. However, the encoding, essentially a combination operation, makes the coded data difficult to be changed. In particular, to accommodate new data, the system may have to first decode all the combined data segments, remove some unimportant ones, and then reencode the data segments again. This procedure is clearly expensive for continuously evolving data storage. As such, we introduce a novel Cooperative Coding and Caching (C3 scheme, which allows decoding-free data removal through a triangle-like codeword organization. Its decoding performance is very close to the conventional network coding with only a sublinear overhead. Our scheme offers a promising solution to the caching management for streaming data.

  7. The necessity of strengthening the cooperation between tissue banks and organ transplant organizations at national, regional, and international levels.

    Science.gov (United States)

    Morales Pedraza, Jorge

    2013-12-01

    The donation of tissues and organs increases significantly when tissue banks and organ transplant organizations work together in the procurement of organs and tissues at donor sources (hospitals, coroners system, organ procurement agencies, and funeral homes, among others). To achieve this important goal, national competent health authorities should considered the establishment of a mechanism that promote the widest possible cooperation between tissue banks and organ transplant organizations with hospitals, research medical institutions, universities, and other medical institutions and facilities. One of the issues that can facilitate this cooperation is the establishment of a coding and traceability system that could identify all tissues and organs used in transplant activities carried out in any country. The promotion of national, regional, and international cooperation between tissue banks and organ transplant organizations would enable the sharing of relevant information that could be important for medical practice and scientific studies carried out by many countries, particularly for those countries with a weak health care system.

  8. Adoption of the 2006 Field Triage Decision Scheme for Injured Patients

    Directory of Open Access Journals (Sweden)

    Sasser, Scott

    2011-07-01

    Full Text Available Background: When emergency medical services (EMS providers respond to the scene of an injury, they must decide where to transport the injured patients for further evaluation and treatment. This is done through a process known as “field triage”, whereby a patient’s injuries are matched to the most appropriate hospital. In 2005-2006 the National Expert Panel on Field Triage, convened by the Centers for Disease Control and Prevention and the National Highway Traffic Safety Administration, revised the 1999 American College of Surgeons Committee on Trauma Field Triage Decision Scheme. This revision, the 2006 Field Triage Decision Scheme, was published in 2006.Methods: State Public Health departments’ and EMS’ external websites were evaluated to ascertain the current status of implementation of the 2006 Field Triage Decision Scheme.Results: Information regarding field triage was located for 41 states. In nine states no information regarding field triage was available on their websites. Of the 41 states where information was located, seven were classified as “full adopters” of the 2006 Field Triage Decision Scheme; nine were considered “partial adopters”; 17 states were found to be using a full version or modification of the 1999 Field Triage Decision Scheme; and eight states were considered to be using a different protocol or scheme for field triage.Conclusion: Many states have adopted the 2006 Decision Scheme (full or partial. Further investigation is needed to determine the reasons why some states do not adopt the guidelines. [West J Emerg Med. 2011;12(3:275-283.

  9. Reallocation of water in the state of New Mexico based on cooperative game theory

    Science.gov (United States)

    Rouhi Rad, M.

    2011-12-01

    Water allocation models often aim to maximize net benefits in the river basin based on the water rights, thus there is no motivation to use water efficiently by the users with lower marginal value for water. Water markets not only could help increase the net benefits over the basin but also will encourage the stakeholders to save the water and use it in transfer markets and increase their income. This issue can be viewed as a game in which stakeholders can play non-cooperatively and try to increase their own benefits using the amount of water assigned to them or they could cooperate and make coalitions in order to increase the total benefits in the coalition and the whole basin. The aim of this study is to reallocate the water based on cooperation among different stakeholders, namely agricultural, municipal and industrial and environmental, in the Upper Rio Grande river basin in the state of New Mexico in order to increase efficiency, sustainability and equity of water distribution in the basin using different game theory schemes such as Nucleolus and the Shapley Value.

  10. A Novel Optimal Joint Resource Allocation Method in Cooperative Multicarrier Networks: Theory and Practice

    Directory of Open Access Journals (Sweden)

    Yuan Gao

    2016-04-01

    Full Text Available With the increasing demands for better transmission speed and robust quality of service (QoS, the capacity constrained backhaul gradually becomes a bottleneck in cooperative wireless networks, e.g., in the Internet of Things (IoT scenario in joint processing mode of LTE-Advanced Pro. This paper focuses on resource allocation within capacity constrained backhaul in uplink cooperative wireless networks, where two base stations (BSs equipped with single antennae serve multiple single-antennae users via multi-carrier transmission mode. In this work, we propose a novel cooperative transmission scheme based on compress-and-forward with user pairing to solve the joint mixed integer programming problem. To maximize the system capacity under the limited backhaul, we formulate the joint optimization problem of user sorting, subcarrier mapping and backhaul resource sharing among different pairs (subcarriers for users. A novel robust and efficient centralized algorithm based on alternating optimization strategy and perfect mapping is proposed. Simulations show that our novel method can improve the system capacity significantly under the constraint of the backhaul resource compared with the blind alternatives.

  11. International cooperation

    International Nuclear Information System (INIS)

    1996-01-01

    In 1995, Nuclear Regulatory Authority of the Slovak Republic (NRA SR) ensured foreign cooperation particularly in the frame of the Slovak Republic is membership in the IAEA, as well as cooperation with the Nuclear Energy Agency of the Organization for Economic Cooperation and Development (OECD NEA), cooperation with European Union in the frame of PHARE programmes, and intergovernmental cooperation and cooperation among nuclear regulatory authorities. With respect to an international importance, prestige and a wide-scope possibilities of a technical assistance , either a direct one (expert assessments, technology supplies, work placement, scientific trips, training courses) or indirect one (participation at various conferences, seminars, technical committees, etc), the most important cooperation with the IAEA in Vienna. In 1994, the Slovak Republic, was elected to the Board Governors, the represent the group of Eastern European countries. The Slovak Government entrusted the NRA SR's Chairman with representing the Slovak Republic in the Board of Governors. Owing to a good name of Slovakia was elected to the one of two Vice-Chairmen of the Board of Governors at the 882-nd session on the Board. IAEA approved and developed 8 national projects for Slovakia in 1995. Generally, IAEA is contracting scientific contracts with research institutes, nuclear power plants and other organizations. Slovak organizations used these contracts as complementary funding of their tasks. In 1995, there were 12 scientific contracts in progress, or approved respectively. Other international activities of the NRA SR, international co-operations as well as foreign affairs are reported

  12. Canadian involvement in international nuclear cooperation

    International Nuclear Information System (INIS)

    Jennekens, Jon.

    1981-01-01

    Since 1945 Canada has been actively involved in the development of an international consensus on measures to prevent the proliferation of nuclear weapons. In parallel with this involvement, Canada has entered into cooperation agreements with several countries under which nuclear materials, equipment and facilities have been supplied in connection with the medical, industrial, agricultural and electrical power applications of nuclear energy. This paper summarizes the actions taken by Canada to encourage the peaceful uses of nuclear energy and to avoid the spread of nuclear weapons [fr

  13. Canadian involvement in international nuclear cooperation

    International Nuclear Information System (INIS)

    Jennekens, J.

    1981-01-01

    Since 1945 Canada has been actively involved in the development of an international consensus on measures to prevent the proliferation of nuclear weapons. In parallel with this involvement, Canada has entered into cooperative agreements with several countries under which nuclear materials, equipment and facilities have been supplied in connection with the medical, industrial, agricultural and electrical power applications of nuclear energy. This paper summarizes the actions taken by Canada to encourage the peaceful uses of nuclear energy and to avoid the spread of nuclear weapons. (author)

  14. Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability.

    Science.gov (United States)

    Tan, Chun Kiat; Ng, Jason Changwei; Xu, Xiaotian; Poh, Chueh Loo; Guan, Yong Liang; Sheah, Kenneth

    2011-06-01

    Teleradiology applications and universal availability of patient records using web-based technology are rapidly gaining importance. Consequently, digital medical image security has become an important issue when images and their pertinent patient information are transmitted across public networks, such as the Internet. Health mandates such as the Health Insurance Portability and Accountability Act require healthcare providers to adhere to security measures in order to protect sensitive patient information. This paper presents a fully reversible, dual-layer watermarking scheme with tamper detection capability for medical images. The scheme utilizes concepts of public-key cryptography and reversible data-hiding technique. The scheme was tested using medical images in DICOM format. The results show that the scheme is able to ensure image authenticity and integrity, and to locate tampered regions in the images.

  15. Joint preprocesser-based detector for cooperative networks with limited hardware processing capability

    KAUST Repository

    Abuzaid, Abdulrahman I.

    2015-02-01

    In this letter, a joint detector for cooperative communication networks is proposed when the destination has limited hardware processing capability. The transmitter sends its symbols with the help of L relays. As the destination has limited hardware, only U out of L signals are processed and the energy of the remaining relays is lost. To solve this problem, a joint preprocessing based detector is proposed. This joint preprocessor based detector operate on the principles of minimizing the symbol error rate (SER). For a realistic assessment, pilot symbol aided channel estimation is incorporated for this proposed detector. From our simulations, it can be observed that our proposed detector achieves the same SER performance as that of the maximum likelihood (ML) detector with all participating relays. Additionally, our detector outperforms selection combining (SC), channel shortening (CS) scheme and reduced-rank techniques when using the same U. Our proposed scheme has low computational complexity.

  16. Community wind power ownership schemes in Europe and their relevance to the United States

    Energy Technology Data Exchange (ETDEWEB)

    Bolinger, Mark

    2001-05-15

    With varying success, the United States and Europe have followed a more or less parallel path of policies to support wind development over the past twenty years. Feed-in laws and tax incentives first popularized in California in the early 1980s and greatly expanded upon in Europe during the 1990s are gradually giving way to market-based support mechanisms such as renewable portfolio standards, which are being implemented in one form or another in ten US states and at least three European nations. At the same time, electricity markets are being liberalized in both the US and Europe, and many electricity consumers are being given the choice to support the development of renewable energy through higher tariffs, both in traditionally regulated and newly competitive markets. One notable area in which wind development in Europe and United States has not evolved in common, however, is with respect to the level of community ownership of wind turbines or clusters. While community ownership of wind projects is unheard of in the United States, in Europe, local wind cooperatives or other participatory business schemes have been responsible for a large share of total wind development. In Denmark, for example, approximately 80% of all wind turbines are either individually or cooperatively owned, and a similar pattern holds in Germany, the world leader in installed wind capacity. Sweden also has a strong wind cooperative base, and the UK has recently made forays into community wind ownership. Why is it that wind development has evolved this way in Europe, but not in the United States? What incremental effect have community-owned wind schemes had on European wind development? Have community-owned wind schemes driven development in Europe, or are they merely a vehicle through which the fundamental driving institutions have been channeled? Is there value to having community wind ownership in the US? Is there reason to believe that such schemes would succeed in the US? If so, which

  17. Improvement Schemes for Indoor Mobile Location Estimation: A Survey

    Directory of Open Access Journals (Sweden)

    Jianga Shang

    2015-01-01

    Full Text Available Location estimation is significant in mobile and ubiquitous computing systems. The complexity and smaller scale of the indoor environment impose a great impact on location estimation. The key of location estimation lies in the representation and fusion of uncertain information from multiple sources. The improvement of location estimation is a complicated and comprehensive issue. A lot of research has been done to address this issue. However, existing research typically focuses on certain aspects of the problem and specific methods. This paper reviews mainstream schemes on improving indoor location estimation from multiple levels and perspectives by combining existing works and our own working experiences. Initially, we analyze the error sources of common indoor localization techniques and provide a multilayered conceptual framework of improvement schemes for location estimation. This is followed by a discussion of probabilistic methods for location estimation, including Bayes filters, Kalman filters, extended Kalman filters, sigma-point Kalman filters, particle filters, and hidden Markov models. Then, we investigate the hybrid localization methods, including multimodal fingerprinting, triangulation fusing multiple measurements, combination of wireless positioning with pedestrian dead reckoning (PDR, and cooperative localization. Next, we focus on the location determination approaches that fuse spatial contexts, namely, map matching, landmark fusion, and spatial model-aided methods. Finally, we present the directions for future research.

  18. Studies of the ultrasonic testing scheme on bonding quality in shield blanket of ITER

    International Nuclear Information System (INIS)

    Shi Sichao; Shen Jingling; He Fengqi; Jin Wanping

    2007-01-01

    International Thermonuclear Experimental Reactor (ITER) is an international cooperative item. One of its components, the First Wall (FW) functioning as neutron shielding and cooling, is an important part. According to the component materials, structural features, testing requirements of the FW, and the ultrasonic propagation characteristics, it is suggested that Broad-band ultrasonic can be used to test the bonding quality of the FW. According to the case mentioned above, the Broad-band Ultrasonic Testing scheme was presented, and the ultrasonic testing feasibility was analyzed theoretically in this paper. (authors)

  19. Cooperative Opportunistic Pressure Based Routing for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nadeem Javaid

    2017-03-01

    Full Text Available In this paper, three opportunistic pressure based routing techniques for underwater wireless sensor networks (UWSNs are proposed. The first one is the cooperative opportunistic pressure based routing protocol (Co-Hydrocast, second technique is the improved Hydrocast (improved-Hydrocast, and third one is the cooperative improved Hydrocast (Co-improved Hydrocast. In order to minimize lengthy routing paths between the source and the destination and to avoid void holes at the sparse networks, sensor nodes are deployed at different strategic locations. The deployment of sensor nodes at strategic locations assure the maximum monitoring of the network field. To conserve the energy consumption and minimize the number of hops, greedy algorithm is used to transmit data packets from the source to the destination. Moreover, the opportunistic routing is also exploited to avoid void regions by making backward transmissions to find reliable path towards the destination in the network. The relay cooperation mechanism is used for reliable data packet delivery, when signal to noise ratio (SNR of the received signal is not within the predefined threshold then the maximal ratio combining (MRC is used as a diversity technique to improve the SNR of the received signals at the destination. Extensive simulations validate that our schemes perform better in terms of packet delivery ratio and energy consumption than the existing technique; Hydrocast.

  20. Cooperative Opportunistic Pressure Based Routing for Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Javaid, Nadeem; Muhammad; Sher, Arshad; Abdul, Wadood; Niaz, Iftikhar Azim; Almogren, Ahmad; Alamri, Atif

    2017-03-19

    In this paper, three opportunistic pressure based routing techniques for underwater wireless sensor networks (UWSNs) are proposed. The first one is the cooperative opportunistic pressure based routing protocol (Co-Hydrocast), second technique is the improved Hydrocast (improved-Hydrocast), and third one is the cooperative improved Hydrocast (Co-improved Hydrocast). In order to minimize lengthy routing paths between the source and the destination and to avoid void holes at the sparse networks, sensor nodes are deployed at different strategic locations. The deployment of sensor nodes at strategic locations assure the maximum monitoring of the network field. To conserve the energy consumption and minimize the number of hops, greedy algorithm is used to transmit data packets from the source to the destination. Moreover, the opportunistic routing is also exploited to avoid void regions by making backward transmissions to find reliable path towards the destination in the network. The relay cooperation mechanism is used for reliable data packet delivery, when signal to noise ratio (SNR) of the received signal is not within the predefined threshold then the maximal ratio combining (MRC) is used as a diversity technique to improve the SNR of the received signals at the destination. Extensive simulations validate that our schemes perform better in terms of packet delivery ratio and energy consumption than the existing technique; Hydrocast.

  1. The case for international nuclear co-operation. An IAEA perspective

    International Nuclear Information System (INIS)

    Klerk, P. de

    2001-01-01

    In the light of the diminished commitment to the promotion and development of nuclear technologies by governments, and in view of the globalization of major parts of the nuclear sector, international cooperation is becoming increasingly more important. Continued strong cooperation is expected in the areas of nuclear safety and the advanced, development of nuclear power plant projects, the decommissioning of nuclear installations, and in waste management. The broad range of activities this entails for the future also add to the duties and the scope of activities of the International Atomic Energy Agency (IAEA) as one of the main coordinating international institutions. In addition to the Agency's basic duty, i.e. overseeing more than nine hundred nuclear facilities in the non-nuclear weapon states under the non-proliferation scheme, it is mainly coordinating activities which are becoming more and more important in the changing environment. In the research sector alone, 159 projects are currently handled internationally under the 'Coordinated Research Projects' heading. In the interest of making national safety standards compatible, a multi-level international safety system is being developed which is to lay the foundations for decisions about the engineered safeguards design of nuclear plants on the national level which continues to bear responsibility for deciding in matters of safety. This broad range of duties in technology, safety, and oversight will make IAEA an important organization for multilateral cooperation. (orig.) [de

  2. THE CERN HEALTH INSURANCE SCHEME AND THE EURO

    CERN Document Server

    Human Resources Division

    2002-01-01

    Since 1 January 2002, the euro is the common currency of 12 European countries and some 300 million people. Of course, such a change has some consequences on our Health Insurance Scheme. As you know, when filling in the medical expenses claim form, you are required to indicate a currency code, i.e. the currency in which you have incurred medical expenses. You may have noticed that the euro is not yet on the list of currencies which appear on the bottom left of the existing form. This will be changed very soon, once the stock of existing forms has been used up. Until then, please note that the currency code for the euro is 002 (easy to remember since the code for the Swiss franc is 001). If you forget this code, don't worry! Just indicate «euro» next to the amount of your medical bill, or simply use the euro symbol!

  3. Resource-Efficient Fusion with Pre-Compensated Transmissions for Cooperative Spectrum Sensing

    Directory of Open Access Journals (Sweden)

    Dayan Adionel Guimarães

    2015-05-01

    Full Text Available Recently, a novel fusion scheme for cooperative spectrum sensing was proposed for saving resources in the control channel. Secondary users (SUs simultaneously report their decisions using binary modulations with the same carrier frequencies. The transmitted symbols add incoherently at the fusion centre (FC, leading to a larger set of symbols in which a subset is associated with the presence of the primary user (PU signal, and another subset is associated with the absence of such a signal. The decision criterion applied for discriminating these subsets works under the assumption that the channel gains are known at the FC. In this paper, we propose a new simultaneous transmission and decision scheme in which the task of channel estimation is shifted from the FC to the SUs, without the need for feeding-back of the estimates to the FC. The estimates are used at the SUs to pre-compensate for the reporting channel phase rotations and to partially compensate for the channel gains. This partial compensation is the result of signal clipping for peak-to-average power ratio (PAPR control. We show, analytically and with simulations, that this new scheme can produce large performance improvements, yet reduces the implementation complexity when compared with the original one.

  4. West German nuclear politics: a study of international cooperative behavior

    International Nuclear Information System (INIS)

    Driscoll, R.F.

    1983-01-01

    This dissertation is an investigation of the motivations behind West German policies and behavior in the area of nuclear politics. It examines and attempts to explain this behavior using a taxonomy built around the factors of vulnerability, power, domestic support, and autonomy. These are called international cooperative behavior factors. Chapters I and II develop the taxonomy and define the factors in terms of the Federal Republic. Chapter III covers the period up through the functioning of the Nuclear Planning Group, while Chapter IV analyzes NATO's December 1979 modernization decision. The presentation is less chronological and more selective: it focuses on the four international cooperative behavior factors as explanatory concepts. Chapter V examines the utility of the taxonomy. It concludes that the factors of autonomy, domestic support and vulnerability appear to be key in understanding and predicting West German nuclear behavior. The chapter then studies the potential applicability of the taxonomy to other nations or issues. It concludes that the factors are very nation-specific, but they do in fact provide a useful classification and explanatory scheme

  5. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    Science.gov (United States)

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  6. Public attitudes toward practice by medical students: a nationwide survey in Japan.

    Science.gov (United States)

    Murata, Kyoko; Sakuma, Mio; Seki, Susumu; Morimoto, Takeshi

    2014-01-01

    It is essential for medical students to interact directly with patients. However, patients may be reluctant to be seen by medical students in settings in which they may also be seen by senior staff. To understand patients' attitudes toward practice by medical students and consider the factors involved in obtaining patients' cooperation, we conducted a nationwide cross-sectional survey. We randomly selected 2,400 adult participants from all over Japan. Trained research assistants inquired about participants' experiences and attitudes toward practice by medical students using a questionnaire. We compared differences in attitudes between participants who were accepting of practice by medical students and those who were not, as well as differences between participants who had experienced practice by a medical student versus those who had not. A total of 1,109 (46%) participants were included in the study. Eleven percent (117/1109) of the participants had experienced practice by a medical student. One fourth of participants were accepting of practice by medical students, and experienced participants were significantly more likely to be accepting of practice by medical students than inexperienced participants (45% vs. 24%, ppractice by medical students among accepting participants with previous experiences included "polite," "kind," and "hard-working." Fifty-nine percent (637/1088) of participants indicated that they would request a senior staff member's supervision when being seen by a medical student. The present nationwide survey suggests that education emphasizing bedside manner may be effective in promoting patients' cooperation of medical students. In addition, providing information to patients about medical students and efforts to increase supervision during clinical clerkship should be emphasized to foster the public's cooperation.

  7. Energy-efficient power allocation of two-hop cooperative systems with imperfect channel estimation

    KAUST Repository

    Amin, Osama

    2015-06-08

    Recently, much attention has been paid to the green design of wireless communication systems using energy efficiency (EE) metrics that should capture all energy consumption sources to deliver the required data. In this paper, we formulate an accurate EE metric for cooperative two-hop systems that use the amplify-and-forward relaying scheme. Different from the existing research that assumes the availability of perfect channel state information (CSI) at the communication cooperative nodes, we assume a practical scenario, where training pilots are used to estimate the channels. The estimated CSI can be used to adapt the available resources of the proposed system in order to maximize the EE. Two estimation strategies are assumed namely disintegrated channel estimation, which assumes the availability of channel estimator at the relay, and cascaded channel estimation, where the relay is not equipped with channel estimator and only forwards the received pilot(s) in order to let the destination estimate the cooperative link. The channel estimation cost is reflected on the EE metric by including the estimation error in the signal-to-noise term and considering the energy consumption during the estimation phase. Based on the formulated EE metric, we propose an energy-aware power allocation algorithm to maximize the EE of the cooperative system with channel estimation. Furthermore, we study the impact of the estimation parameters on the optimized EE performance via simulation examples.

  8. International cooperation

    International Nuclear Information System (INIS)

    Prieto, F.E.

    1984-01-01

    It looks doubtless that the need for an international cooperation to solve the worldwide energy problems is already a concern of individuals, institutions, and governments. This is an improvement. But there is something lacking. The author refers to the Atoms for Peace speech, the origin of the IAEA and of the subsequent spreading of the nuclear option. He also refers back to the call made by the Mexican government for a worldwide energy cooperation. He stresses the need for governments to cooperate, so that this international cooperation on energy can be put into operation for the benefit of mankind

  9. Cooperation for a competitive position: The impact of hospital cooperation behavior on organizational performance.

    Science.gov (United States)

    Büchner, Vera Antonia; Hinz, Vera; Schreyögg, Jonas

    2015-01-01

    Several public policy initiatives, particularly those involving managed care, aim to enhance cooperation between partners in the health care sector because it is expected that such cooperation will reduce costs and generate additional revenue. However, empirical evidence regarding the effects of cooperation on hospital performance is scarce, particularly with respect to creating a comprehensive measure of cooperation behavior. The aim of this study is to investigate the impact of hospital cooperation behavior on organizational performance. We differentiate between horizontal and vertical cooperation using two alternative measures-cooperation depth and cooperation breadth-and include the interaction effects between both cooperation directions. Data are derived from a survey of German hospitals and combined with objective performance information from annual financial statements. Generalized linear regression models are used. The study findings provide insight into the nature of hospitals' cooperation behavior. In particular, we show that there are negative synergies between horizontal administrative cooperation behavior and vertical cooperation behavior. Whereas the depth and breadth of horizontal administrative cooperation positively affect financial performance (when there is no vertical cooperation), vertical cooperation positively affects financial performance (when there is no horizontal administrative cooperation) only when cooperation is broad (rather than deep). Horizontal cooperation is generally more effective than vertical cooperation at improving financial performance. Hospital managers should consider the negative interaction effect when making decisions about whether to recommend a cooperative relationship in a horizontal or vertical direction. In addition, managers should be aware of the limited financial benefit of cooperation behavior.

  10. Medical image information system 2001. Development of the medical image information system to risk management- Medical exposure management

    International Nuclear Information System (INIS)

    Kuranishi, Makoto; Kumagai, Michitomo; Shintani, Mitsuo

    2000-01-01

    This paper discusses the methods and systems for optimizing the following supplements 10 and 17 for national health and medical care. The supplements 10 and 17 of DICOM (digital imaging and communications in medicine) system, which is now under progress for the purpose to keep compatibility within medical image information system as an international standard, are important for making the cooperation between HIS (hospital information system)/RIS (radiation information system) and modality (imaging instruments). Supplement 10 concerns the system to send the information of patients and their orders through HIS/RIS to modality and 17, the information of modality performed procedure step (MPPS) to HIS/RIS. The latter defines to document patients' exposure, a part of which has not been recognized in Japan. Thus the medical information system can be useful for risk-management of medical exposure in future. (K.H.)

  11. Medical image information system 2001. Development of the medical image information system to risk management- Medical exposure management

    Energy Technology Data Exchange (ETDEWEB)

    Kuranishi, Makoto; Kumagai, Michitomo; Shintani, Mitsuo [Toyama Medical and Pharmaceutical Univ. (Japan). Hospital

    2000-12-01

    This paper discusses the methods and systems for optimizing the following supplements 10 and 17 for national health and medical care. The supplements 10 and 17 of DICOM (digital imaging and communications in medicine) system, which is now under progress for the purpose to keep compatibility within medical image information system as an international standard, are important for making the cooperation between HIS (hospital information system)/RIS (radiation information system) and modality (imaging instruments). Supplement 10 concerns the system to send the information of patients and their orders through HIS/RIS to modality and 17, the information of modality performed procedure step (MPPS) to HIS/RIS. The latter defines to document patients' exposure, a part of which has not been recognized in Japan. Thus the medical information system can be useful for risk-management of medical exposure in future. (K.H.)

  12. Annual Program Progress Report under DOE/PHRI Cooperative Agreement: (July 1, 2001-June 30, 2002)

    Energy Technology Data Exchange (ETDEWEB)

    Palafox, Neal A., MD, MPH

    2002-07-31

    OAK B188 DOE/PHRI Special Medical Care Program in the Republic of the Marshall Islands (RMI)Annual Program Progress Report. The DOE Marshall Islands Medical Program continued, in this it's 48th year, to provide medical surveillance for the exposed population from Rongelap and Utrik and the additional DOE patients. The program was inaugurated in 1954 by the Atomic Energy Commission following the exposure of Marshallese to fallout from a nuclear test (Castle Bravo) at Bikini Atoll. This year marks the fourth year in which the program has been carried out by PHRI under a cooperative agreement with DOE. The DOERHRI Special Medical Care Program, awarded the cooperative agreement on August 28, 1998, commenced its health care program on January 15, 1999, on Kwajalein and January 22, 1999, on Majuro. This report details the program for the July 1, 2001, through the June 30, 2002, period. The program provides year-round, on-site medical care to the DOE patient population residing in the Republic of the Marshall Islands (RMI) and annual examinations to those patients living in Hawaii and on the Continental U.S.

  13. Emerging Security Mechanisms for Medical Cyber Physical Systems.

    Science.gov (United States)

    Kocabas, Ovunc; Soyata, Tolga; Aktas, Mehmet K

    2016-01-01

    The following decade will witness a surge in remote health-monitoring systems that are based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) will be capable of transmitting the acquired data to a private or public cloud for storage and processing. Machine learning algorithms running in the cloud and processing this data can provide decision support to healthcare professionals. There is no doubt that the security and privacy of the medical data is one of the most important concerns in designing an MCPS. In this paper, we depict the general architecture of an MCPS consisting of four layers: data acquisition, data aggregation, cloud processing, and action. Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer. We survey conventional and emerging encryption schemes based on their ability to provide secure storage, data sharing, and secure computation. Our detailed experimental evaluation of each scheme shows that while the emerging encryption schemes enable exciting new features such as secure sharing and secure computation, they introduce several orders-of-magnitude computational and storage overhead. We conclude our paper by outlining future research directions to improve the usability of the emerging encryption schemes in an MCPS.

  14. Choosing the cooperative option

    Energy Technology Data Exchange (ETDEWEB)

    English, G. (National Rural Electric Cooperative Association (United States))

    1999-06-01

    Cooperatives do not ask to be exempted from the law. They do ask that laws and regulations be designed to allow them to meet the needs of their consumer-owners in accordance with cooperative principles, at a time that the marginal consumers being abandoned by for-profit utilities may be ready to gravitate toward cooperatives. The cooperative principles are worth reviewing because they explain the focus on the consumer and the cooperative concept of service: cooperatives are voluntary organizations, open to all persons able to use their services and willing to accept the responsibilities of membership; cooperatives are democratic organizations controlled by their members, who actively participate in setting policies and making decisions, the elected representatives are accountable to the membership; members contribute equitably to, and democratically control, the capital of their cooperative; cooperatives are autonomous, self-help organizations controlled by their members, if they enter into agreements with other organizations, including governments, they do so on terms that ensure democratic control by their members and maintain their cooperative autonomy; cooperatives provide education and training for their members, elected representatives, managers, and employees so they can contribute effectively to the development of their cooperatives, they inform the general public, particularly young people and opinion leaders, about the nature and benefits of cooperation; cooperatives serve their members most effectively and strength the cooperative movement by working together through local, national, regional, and international structures; and while focusing on member needs, cooperatives work for the sustainable development of their communities through policies accepted by their members.

  15. A Cooperative Search and Coverage Algorithm with Controllable Revisit and Connectivity Maintenance for Multiple Unmanned Aerial Vehicles

    Directory of Open Access Journals (Sweden)

    Zhong Liu

    2018-05-01

    Full Text Available In this paper, we mainly study a cooperative search and coverage algorithm for a given bounded rectangle region, which contains several unknown stationary targets, by a team of unmanned aerial vehicles (UAVs with non-ideal sensors and limited communication ranges. Our goal is to minimize the search time, while gathering more information about the environment and finding more targets. For this purpose, a novel cooperative search and coverage algorithm with controllable revisit mechanism is presented. Firstly, as the representation of the environment, the cognitive maps that included the target probability map (TPM, the uncertain map (UM, and the digital pheromone map (DPM are constituted. We also design a distributed update and fusion scheme for the cognitive map. This update and fusion scheme can guarantee that each one of the cognitive maps converges to the same one, which reflects the targets’ true existence or absence in each cell of the search region. Secondly, we develop a controllable revisit mechanism based on the DPM. This mechanism can concentrate the UAVs to revisit sub-areas that have a large target probability or high uncertainty. Thirdly, in the frame of distributed receding horizon optimizing, a path planning algorithm for the multi-UAVs cooperative search and coverage is designed. In the path planning algorithm, the movement of the UAVs is restricted by the potential fields to meet the requirements of avoiding collision and maintaining connectivity constraints. Moreover, using the minimum spanning tree (MST topology optimization strategy, we can obtain a tradeoff between the search coverage enhancement and the connectivity maintenance. The feasibility of the proposed algorithm is demonstrated by comparison simulations by way of analyzing the effects of the controllable revisit mechanism and the connectivity maintenance scheme. The Monte Carlo method is employed to validate the influence of the number of UAVs, the sensing radius

  16. Importance of Pharmaceutical Training and Clinical Research at Medical Facilities.

    Science.gov (United States)

    Myotoku, Michiaki

    2017-01-01

    To respond to advancements in medical techniques, and to address the separation of medical and dispensary practices, clinical professors are required to educate human resource staff to become highly-skilled pharmacists. For this purpose, it is extremely important for these professors to learn about cutting-edge practical skills and knowledge, as well as to advance their expertise. In addition, they need to conduct clinical research in cooperation with relevant facilities. As our university does not have its own hospital or pharmacy, it is important to provide training for clinical professors in clinical facilities. Such training mainly involves medical teams' in-hospital rounds and participation in conferences (nutrition support team; NST), operation of the pharmacy department, and intervention targeting improvement in the department's duties. We have conducted collaborative studies, provided research instructions, implemented studies aimed at improving the department's work (pharmacists appointed on wards at all times to ensure medical safety) as well as studies regarding team medical care (nutritional evaluation during outpatient chemotherapy), and resolved issues regarding this work (drug solution mixability in a hand-held constant infusion pump, and a safe pump-filling methods). Thus, it has become possible to keep track of the current state of a pharmacists' work within team medical care, to access information about novel drugs, to view clinical and prescription-claim data, to cooperate with other professionals (e.g., doctors and nurses), to promote pharmacists' self-awareness of their roles in cooperative medical practice, and to effectively maintain the hospital's clinical settings.

  17. International co-operation

    International Nuclear Information System (INIS)

    1998-01-01

    In this part the are reviewed: Co-operation with IAEA; Participation of the Slovakia on the 41 st session of the General Conference; The comprehensive Nuclear-Test-Ban Treaty Organization; Co-operation with the Organization for Economic Co-operation and Development; co-operation with the European Commission; Fulfillment of obligations resulting from the international contracting documents

  18. Physician cooperation in outpatient cancer care. An amplified secondary analysis of qualitative interview data.

    Science.gov (United States)

    Engler, J; Güthlin, C; Dahlhaus, A; Kojima, E; Müller-Nordhorn, J; Weißbach, L; Holmberg, C

    2017-11-01

    The importance of outpatient cancer care services is increasing due to the growing number of patients having or having had cancer. However, little is known about cooperation among physicians in outpatient settings. To understand what inter- and multidisciplinary care means in community settings, we conducted an amplified secondary analysis that combined qualitative interview data with 42 general practitioners (GPs), 21 oncologists and 21 urologists that mainly worked in medical practices in Germany. We compared their perspectives on cooperation relationships in cancer care. Our results indicate that all participants regarded cooperation as a prerequisite for good cancer care. Oncologists and urologists mainly reported cooperating for tumour-specific treatment tasks, while GPs' reasoning for cooperation was more patient-centred. While oncologists and urologists reported experiencing reciprocal communication with other physicians, GPs had to gather the information they needed. GPs seldom reported engaging in formal cooperation structures, while for specialists, participation in formal spaces of cooperation, such as tumour boards, facilitated a more frequent and informal discussion of patients, for instance on the phone. Further research should focus on ways to foster GPs' integration in cancer care and evaluate if this can be reached by incorporating GPs in formal cooperation structures such as tumour boards. © 2017 John Wiley & Sons Ltd.

  19. Improving Smartphone Battery Life Utilizing Device-to-device Cooperative Relays Underlaying LTE Networks

    OpenAIRE

    Ta, Tuan; Baras, John S.; Zhu, Chenxi

    2014-01-01

    The utility of smartphones has been limited to a great extent by their short battery life. In this work, we propose a new approach to prolonging smartphone battery life. We introduce the notions of "valueless" and "valued battery", as being the available battery when the user does or does not have access to a power source, respectively. We propose a cooperative system where users with high battery level help carry the traffic of users with low battery level. Our scheme helps increase the amou...

  20. Third-party punishment increases cooperation in children through (misaligned) expectations and conditional cooperation.

    Science.gov (United States)

    Lergetporer, Philipp; Angerer, Silvia; Glätzle-Rützler, Daniela; Sutter, Matthias

    2014-05-13

    The human ability to establish cooperation, even in large groups of genetically unrelated strangers, depends upon the enforcement of cooperation norms. Third-party punishment is one important factor to explain high levels of cooperation among humans, although it is still somewhat disputed whether other animal species also use this mechanism for promoting cooperation. We study the effectiveness of third-party punishment to increase children's cooperative behavior in a large-scale cooperation game. Based on an experiment with 1,120 children, aged 7 to 11 y, we find that the threat of third-party punishment more than doubles cooperation rates, despite the fact that children are rarely willing to execute costly punishment. We can show that the higher cooperation levels with third-party punishment are driven by two components. First, cooperation is a rational (expected payoff-maximizing) response to incorrect beliefs about the punishment behavior of third parties. Second, cooperation is a conditionally cooperative reaction to correct beliefs that third party punishment will increase a partner's level of cooperation.

  1. Medical decision support and medical informatics education: roots, methods and applications in czechoslovakia and the czech republic.

    Science.gov (United States)

    Zvárová, Jana

    2013-01-01

    The paper describes the history of medical informatics in Czechoslovakia and the Czech Republic. It focuses on the topics of medical informatics education and decision support methods and systems. Several conferences held in Czechoslovakia and in the Czech Republic organized in cooperation with IMIA or EFMI are described. Support of European Union and Czech agencies in several European and national projects focused on medical informatics topics highly contributed to medical informatics development in Czechoslovakia and the Czech Republic and to the establishment of the European Center for Medical Informatics, Statistics and Epidemiology as the joint workplace of Charles University in Prague and Academy of Sciences of the Czech Republic in 1994.

  2. A dual adaptive watermarking scheme in contourlet domain for DICOM images

    Directory of Open Access Journals (Sweden)

    Rabbani Hossein

    2011-06-01

    Full Text Available Abstract Background Nowadays, medical imaging equipments produce digital form of medical images. In a modern health care environment, new systems such as PACS (picture archiving and communication systems, use the digital form of medical image too. The digital form of medical images has lots of advantages over its analog form such as ease in storage and transmission. Medical images in digital form must be stored in a secured environment to preserve patient privacy. It is also important to detect modifications on the image. These objectives are obtained by watermarking in medical image. Methods In this paper, we present a dual and oblivious (blind watermarking scheme in the contourlet domain. Because of importance of ROI (region of interest in interpretation by medical doctors rather than RONI (region of non-interest, we propose an adaptive dual watermarking scheme with different embedding strength in ROI and RONI. We embed watermark bits in singular value vectors of the embedded blocks within lowpass subband in contourlet domain. Results The values of PSNR (peak signal-to-noise ratio and SSIM (structural similarity measure index of ROI for proposed DICOM (digital imaging and communications in medicine images in this paper are respectively larger than 64 and 0.997. These values confirm that our algorithm has good transparency. Because of different embedding strength, BER (bit error rate values of signature watermark are less than BER values of caption watermark. Our results show that watermarked images in contourlet domain have greater robustness against attacks than wavelet domain. In addition, the qualitative analysis of our method shows it has good invisibility. Conclusions The proposed contourlet-based watermarking algorithm in this paper uses an automatically selection for ROI and embeds the watermark in the singular values of contourlet subbands that makes the algorithm more efficient, and robust against noise attacks than other transform

  3. Cost-Sharing of Ecological Construction Based on Trapezoidal Intuitionistic Fuzzy Cooperative Games

    Directory of Open Access Journals (Sweden)

    Jiacai Liu

    2016-11-01

    Full Text Available There exist some fuzziness and uncertainty in the process of ecological construction. The aim of this paper is to develop a direct and an effective simplified method for obtaining the cost-sharing scheme when some interested parties form a cooperative coalition to improve the ecological environment of Min River together. Firstly, we propose the solution concept of the least square prenucleolus of cooperative games with coalition values expressed by trapezoidal intuitionistic fuzzy numbers. Then, based on the square of the distance in the numerical value between two trapezoidal intuitionistic fuzzy numbers, we establish a corresponding quadratic programming model to obtain the least square prenucleolus, which can effectively avoid the information distortion and uncertainty enlargement brought about by the subtraction of trapezoidal intuitionistic fuzzy numbers. Finally, we give a numerical example about the cost-sharing of ecological construction in Fujian Province in China to show the validity, applicability, and advantages of the proposed model and method.

  4. Cost-Sharing of Ecological Construction Based on Trapezoidal Intuitionistic Fuzzy Cooperative Games.

    Science.gov (United States)

    Liu, Jiacai; Zhao, Wenjian

    2016-11-08

    There exist some fuzziness and uncertainty in the process of ecological construction. The aim of this paper is to develop a direct and an effective simplified method for obtaining the cost-sharing scheme when some interested parties form a cooperative coalition to improve the ecological environment of Min River together. Firstly, we propose the solution concept of the least square prenucleolus of cooperative games with coalition values expressed by trapezoidal intuitionistic fuzzy numbers. Then, based on the square of the distance in the numerical value between two trapezoidal intuitionistic fuzzy numbers, we establish a corresponding quadratic programming model to obtain the least square prenucleolus, which can effectively avoid the information distortion and uncertainty enlargement brought about by the subtraction of trapezoidal intuitionistic fuzzy numbers. Finally, we give a numerical example about the cost-sharing of ecological construction in Fujian Province in China to show the validity, applicability, and advantages of the proposed model and method.

  5. Comparison of Chinese inpatients with different types of medical insurance before and after the 2009 healthcare reform.

    Science.gov (United States)

    Wang, Shan; Liu, Lihua; Li, Lin; Liu, Jianchao

    2014-09-29

    Since 1994, China has established three major basic medical insurance (MI) schemes that aim to provide greater financial protection to members. The 2009 Chinese medical reform emphasized the enhancement of basic medical insurance. This study aims to investigate changes in hospital services costs for inpatients with different types of MI before and after the new Chinese medical reform. A total of 532,120 inpatient medical records, completed by 11 different hospitals nationwide in 2008 and 2011, were collected from the Ministry of Health retrospectively. Median and mean values were calculated to describe costs and average length of stay, respectively. A chi-square test was used to compare the distribution of patient visits. Wilcoxon rank-sum tests were conducted to compare costs. The number of patients hospitalized increased. The average cost per stay in the three basic MI schemes increased, while out-of-pocket (OOP) spending decreased (P trends. The purchase of Western medication accounted for the largest proportion of costs in all MI schemes in both years; however, these ratios decreased from 2008 to 2011, while those for other social insurance and OOP patients almost doubled. The average length of stay remained unchanged, and the average lengths of stay in the MI schemes differed before and after the healthcare reform. Healthcare reform with multipartite policies may make interactional impacts on hospitalization services for patients enrolled in MI schemes.

  6. Optimizing the Number of Cooperating Terminals for Energy Aware Task Computing in Wireless Networks

    DEFF Research Database (Denmark)

    Olsen, Anders Brødløs; Fitzek, Frank H. P.; Koch, Peter

    2005-01-01

    It is generally accepted that energy consumption is a significant design constraint for mobile handheld systems, therefore motivations for methods optimizing the energy consumption making better use of the restricted battery resources are evident. A novel concept of distributed task computing...... is previously proposed (D2VS), where the overall idea of selective distribution of tasks among terminals is made. In this paper the optimal number of terminals for cooperative task computing in a wireless network will be investigated. The paper presents an energy model for the proposed scheme. Energy...... consumption of the terminals with respect to their workload and the overhead of distributing tasks among terminals are taken into account. The paper shows, that the number of cooperating terminals is in general limited to a few, though alternating with respect to the various system parameters....

  7. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  8. Interference Information Based Power Control for Cognitive Radio with Multi-Hop Cooperative Sensing

    Science.gov (United States)

    Yu, Youngjin; Murata, Hidekazu; Yamamoto, Koji; Yoshida, Susumu

    Reliable detection of other radio systems is crucial for systems that share the same frequency band. In wireless communication channels, there is uncertainty in the received signal level due to multipath fading and shadowing. Cooperative sensing techniques in which radio stations share their sensing information can improve the detection probability of other systems. In this paper, a new cooperative sensing scheme that reduces the false detection probability while maintaining the outage probability of other systems is investigated. In the proposed system, sensing information is collected using multi-hop transmission from all sensing stations that detect other systems, and transmission decisions are based on the received sensing information. The proposed system also controls the transmit power based on the received CINRs from the sensing stations. Simulation results reveal that the proposed system can reduce the outage probability of other systems, or improve its link success probability.

  9. Perturbed cooperative-state feedback strategy for model predictive networked control of interconnected systems.

    Science.gov (United States)

    Tran, Tri; Ha, Q P

    2018-01-01

    A perturbed cooperative-state feedback (PSF) strategy is presented for the control of interconnected systems in this paper. The subsystems of an interconnected system can exchange data via the communication network that has multiple connection topologies. The PSF strategy can resolve both issues, the sensor data losses and the communication network breaks, thanks to the two components of the control including a cooperative-state feedback and a perturbation variable, e.g., u i =K ij x j +w i . The PSF is implemented in a decentralized model predictive control scheme with a stability constraint and a non-monotonic storage function (ΔV(x(k))≥0), derived from the dissipative systems theory. Numerical simulation for the automatic generation control problem in power systems is studied to illustrate the effectiveness of the presented PSF strategy. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  10. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  11. Autonomous Household Energy Management Based on a Double Cooperative Game Approach in the Smart Grid

    Directory of Open Access Journals (Sweden)

    Bingtuan Gao

    2015-07-01

    Full Text Available Taking advantage of two-way communication infrastructure and bidirectional energy trading between utility companies and customers in the future smart grid (SG, autonomous energy management programs become crucial to the demand-side management (DSM. Most of the existing autonomous energy management schemes are for the scenario with a single utility company or the scenario with one-way energy trading. In this paper, an autonomous household energy management system with multiple utility companies and multiple residential customers is studied by considering the bidirectional energy trading. To minimize the overall costs of both the utility companies and the residential customers, the energy management system is formulated as a double cooperative game. That is, the interaction among the residential users is formulated as a cooperative game, where the players are the customers and the strategies are the daily schedules of their household appliances; and the interaction among the utility companies is also formulated as a cooperative game, where the players are the suppliers and the strategies are the proportions of the daily total energy they provide for the customers. Without loss of generality, the bidirectional energy trading in the double cooperative game is formulated by allowing plug-in electric vehicles (PEVs to discharge and sell energy back. Two distributed algorithms will be provided to realize the global optimal performance in terms of minimizing the energy costs, which can be guaranteed at the Nash equilibriums of the formulated cooperative games. Finally, simulation results illustrated that the proposed double cooperative game can benefit both the utility companies and residential users significantly.

  12. Decision making and co-operation between stakeholders within the process of sick leave. A case study in a Danish municipality

    DEFF Research Database (Denmark)

    Johansen, Kristina; Andersen, John Sahl; Mikkelsen, Sigurd

    2011-01-01

    . The motivation for co-operation was low due to low status of social medical issues, lack of feedback and lack of trust. The co-operation was characterized by sequential task integration. The stakeholders encountered difficulties when reciprocal task integration was needed. The decision making was affected...

  13. Radiation therapy of malignant melanomas: an evaluation of clinically used fractionation schemes

    International Nuclear Information System (INIS)

    Strauss, A.; Dritschilo, A.; Nathanson, L.; Piro, A.J.

    1981-01-01

    To assess the importance of radiation dose fraction size in the treatment of malignant melanomas, the records of 48 patients (83 sites) treated at Tufts-New England Medical Center from 1971 to 1979 have been retrospectively reviewed. During this period, the dose fractionation schemes evolved from standard fraction size to large-dose techniques. Radiation fraction size was observed to be the major factor in the clinical response of melanoma. Fractions of 600-800 rad resulted in the best overall response (80%). The rapid fractionation scheme of 800-400-400 rad on successive days resulted in intermediate response (58%) and may be useful for the palliative treatment of selected patients

  14. Information transfer to out-of-hours co-operatives: a survey of general practitioners' views in relation to palliative patients.

    LENUS (Irish Health Repository)

    Kiely, Fiona

    2013-12-01

    In Ireland, weekend and night medical cover for community based patients is largely provided by general practice co-operatives. Doctors working in this service do not have direct access to patients\\' medical records which challenges continuity of care.

  15. COOPERATION IN THE FIELD OF ECONOMICS, OF SCIENCE AND MEDICINE IN EUROPE

    Directory of Open Access Journals (Sweden)

    Norina-Consuela FORNA

    2015-07-01

    Full Text Available The issue of medical cooperation raises many questions current and controversial, which are the focus of interest in socio-political and legal, such as debates on instruments to combat the high costs, the public health system, legislation aimed at ensuring health, tobacco consumption, alcohol, obesity and others. Public health legislation deals with the framework conditions, legal and social aspects of public health, protection and deployment the law of public health on tobacco. The aim of this study is to identify the degree to which economic freedom correlates with indicators of development, health and economic cooperation in medicine field. In this regard, we consider useful to investigate how the correlation indicators of policy Health – 2020 with global and European economic development. Research methods are located in estimating the degree of international cooperation in the medicine field through statistical methods, comparison, graphics, deduction or induction.The results allow to formulate a whole picture regarding international cooperation in the field of medicine, combating different diseases but human vices as obesity, tobacco use, alcohol etc. Facilitation of cooperation in research and innovation is the key to bridging the gap between research and demand in different countries and regions.

  16. Comparing interpolation schemes in dynamic receive ultrasound beamforming

    DEFF Research Database (Denmark)

    Kortbek, Jacob; Andresen, Henrik; Nikolov, Svetoslav

    2005-01-01

    In medical ultrasound interpolation schemes are of- ten applied in receive focusing for reconstruction of image points. This paper investigates the performance of various interpolation scheme by means of ultrasound simulations of point scatterers in Field II. The investigation includes conventional...... B-mode imaging and synthetic aperture (SA) imaging using a 192-element, 7 MHz linear array transducer with λ pitch as simulation model. The evaluation consists primarily of calculations of the side lobe to main lobe ratio, SLMLR, and the noise power of the interpolation error. When using...... conventional B-mode imaging and linear interpolation, the difference in mean SLMLR is 6.2 dB. With polynomial interpolation the ratio is in the range 6.2 dB to 0.3 dB using 2nd to 5th order polynomials, and with FIR interpolation the ratio is in the range 5.8 dB to 0.1 dB depending on the filter design...

  17. Interlibrary cooperation: from ILL to IAIMS and beyond.

    Science.gov (United States)

    Riordan, M L; Perry, G J

    1999-07-01

    A recent solicitation over the MEDLIB-L e-mail discussion list revealed over thirty diverse examples of hospital library-based interlibrary cooperative initiatives currently underway. Many are familiar and have been featured in the professional literature. Most go unreported and unrecognized however, comprising invisible resource-sharing infrastructures that hospital librarians painstakingly piece together in order to provide their clients with expanded service options. This paper, drawing from the MEDLIB-L survey as well as descriptions in the published literature, provides a broad overview of such recent interlibrary cooperative efforts. Examples include interlibrary loan networks, collective purchasing initiatives, holder-of-record or union catalog access agreements, arrangements to provide e-mail and Internet access, and consortia to share electronic resources. Examples were chosen based on the initiatives' diversity of participants, and represent a wide range of locations across the United States. Such initiatives focus on local, statewide, or regional collaboration, and several involve partnerships between academic medical center libraries and regional hospital libraries. An early example of a hospital-based interlibrary cooperative IAIMS effort is described, pointing to future possibilities involving the Internet and regional hospital system intranets.

  18. Allocation of Transportation Cost & CO2 Emission in Pooled Supply Chains Using Cooperative Game Theory

    OpenAIRE

    Xiaozhou Xu; Shenle Pan; Eric Ballot

    2012-01-01

    International audience; The sustainability of supply chain,both economical and ecological, has attracted intensive attentions of academic and industry. It is proven in former works that supply chain pooling given by horizontal cooperation among several independent supply chains create a new common supply chain network that could reduce the costs and the transport CO2 emissions. In this regard, this paper introduces a scheme to share in a fairly manner the savings. After a summary of the conce...

  19. Preclinical diagnosis and emergency medical care in case of radiation accidents

    International Nuclear Information System (INIS)

    Ohlenschlaeger, L.

    1990-01-01

    Reference is made to preclinical diagnosis and emergency medical care at the site of a potential radiation accident. Possibilities and limits, respectively, of the medical measures are shown. Cooperation between the experts of the technical and medical rescue services is described. Exposition to radiation for the emergency medical staff resulting from the medical care of contaminated persons, is negligible if the personal precautions are observed. (orig.) [de

  20. A Multiagent System-Based Protection and Control Scheme for Distribution System With Distributed-Generation Integration

    DEFF Research Database (Denmark)

    Liu, Z.; Su, Chi; Hoidalen, Hans

    2017-01-01

    In this paper, a multi agent system (MAS) based protection and control scheme is proposed to deal with diverse operation conditions in distribution system due to distributed generation (DG) integration. Based on cooperation between DG controller and relays, an adaptive protection and control...... algorithm is designed on converter based wind turbine DG to limit the influence of infeed fault current. With the consideration of DG control modes, an adaptive relay setting strategy is developed to help protective relays adapt suitable settings to different operation conditions caused by the variations...