WorldWideScience

Sample records for key management protocol

  1. Manet key management via Mobile Ficlke Key protocol (MFK ...

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  2. Ancestors protocol for scalable key management

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  3. Enhanced Key Management Protocols for Wireless Sensor Networks

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.

  4. Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks

    Chin-Ling Chen

    2015-01-01

    Full Text Available In recent years, wireless sensor network (WSN applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of data from cluster nodes to the base station and the direct access to cluster nodes data by mobile users via mobile devices. Due to the hardware limitations of WSNs, some low-cost operations such as symmetric cryptographic algorithms and hash functions are used to implement a dynamic key management. The session key can be updated to prevent threats of attack from each communication. With these methods, the data gathered in wireless sensor networks can be more securely communicated. Moreover, the proposed scheme is analyzed and compared with related schemes. In addition, an NS2 simulation is developed in which the experimental results show that the designed communication protocol is workable.

  5. Group key management

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  6. Quantum key management

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  7. A secure key agreement protocol based on chaotic maps

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  8. Short Review on Quantum Key Distribution Protocols.

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  9. Key Management Laboratory

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  10. Cryptographic Key Management System

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  11. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua

    2010-01-01

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  12. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua [Department of Electronic Information Engineering, Nanchang University, Nanchang 330031 (China)], E-mail: znr21@163.com, E-mail: znr21@hotmail.com

    2010-04-15

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  13. A Novel Re-keying Function Protocol (NRFP For Wireless Sensor Network Security

    Naif Alsharabi

    2008-12-01

    Full Text Available This paper describes a novel re-keying function protocol (NRFP for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs, covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  14. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-01-01

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding innetwork processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks. PMID:27873963

  15. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-12-04

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  16. An one-time-pad key communication protocol with entanglement

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  17. Key Management in Wireless Sensor Networks

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  18. Password Authenticated Key Exchange and Protected Password Change Protocols

    Ting-Yi Chang

    2017-07-01

    Full Text Available In this paper, we propose new password authenticated key exchange (PAKE and protected password change (PPC protocols without any symmetric or public-key cryptosystems. The security of the proposed protocols is based on the computational Diffie-Hellman assumption in the random oracle model. The proposed scheme can resist both forgery server and denial of service attacks.

  19. Creativity Management Key Elements

    Rosa María Fuchs Ángeles

    2015-09-01

    Full Text Available Organizations are constantly looking towards innovation. In order to reach it they must foment creativity. This paper analyzes a series of elements considered in the organizational creativity management and proposes a model with the indispensable factors that organizations should consider to reach it. These elements are: culture and organizational environment, strategy, structure, communication, relation with customers, human resources (recruiting, training, job design, compensation, promotion, and performance evaluation, long term orientation and the organizational life cycle. Having the analysis of those elements as a basis, the indispensable pillars on management creativity are identified. The proposed model is based on 5 pillars: the alignment between strategic, culture and organizational structure, called by the authors 'Holy Trinity'; intern publicity; customer’s voice; recognition and a look towards future. Finally, the case of an innovative Peruvian enterprise is presented from the model’s perspective and the study conclusions.

  20. Extended KCI attack against two-party key establishment protocols

    Tang, Qiang; Chen, Liqun

    2011-01-01

    We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishment protocols, where an adversary has access to both long-term and ephemeral secrets of a victim. Such an attack poses serious threats to both key authentication and key confirmation properties of a

  1. Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool

    Hazem A Elbaz

    2015-01-01

    The mostly cloud computing authentication mechanisms use public key infrastructure (PKI). Hierarchical Identity Based Cryptography (HIBC) has several advantages that sound well align with the demands of cloud computing. The main objectives of cloud computing authentication protocols are security and efficiency. In this paper, we clarify Hierarchical Identity Based Authentication Key Agreement (HIB-AKA) protocol, providing lightweight key management approach for cloud computing users. Then, we...

  2. Research of user key management mechanisms in the cloud

    Іван Федорович Аулов

    2016-06-01

    Full Text Available The results of comparison and recommendations on the use of existing user key management mechanisms in the cloud environment are given. New generation and installing mechanism of a private key pair between the N-means of key management in the cloud by using a modified Diffie-Hellman protocol is proposed

  3. Security for Key Management Interfaces

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  4. Analysis of the differential-phase-shift-keying protocol in the quantum-key-distribution system

    Rong-Zhen, Jiao; Chen-Xu, Feng; Hai-Qiang, Ma

    2009-01-01

    The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photon-number splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates. (general)

  5. Constant round group key agreement protocols: A comparative study

    Makri, E.; Konstantinou, Elisavet

    2011-01-01

    The scope of this paper is to review and evaluate all constant round Group Key Agreement (GKA) protocols proposed so far in the literature. We have gathered all GKA protocols that require 1,2,3,4 and 5 rounds and examined their efficiency. In particular, we calculated each protocol’s computation and

  6. Quantum-key-distribution protocol with pseudorandom bases

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  7. GENERALIZED MATRIXES OF GALOIS PROTOCOLS EXCHANGE ENCRYPTION KEYS

    Anatoly Beletsky

    2016-03-01

    Full Text Available The methods of construction of matrix formation the secret protocols legalized subscribers of public communications networks encryption keys. Based key exchange protocols laid asymmetric cryptography algorithms. The solution involves the calculation of one-way functions and is based on the use of generalized Galois arrays of isomorphism relationship with forming elements, and depending on the selected irreducible polynomial generating matrix. A simple method for constructing generalized Galois matrix by the method of filling the diagonal. In order to eliminate the isomorphism of Galois arrays and their constituent elements, limiting the possibility of building one-way functions, Galois matrix subjected to similarity transformation carried out by means of permutation matrices. The variant of the organization of the algebraic attacks on encryption keys sharing protocols and discusses options for easing the consequences of an attack.

  8. Advanced dementia pain management protocols.

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  9. Deep Random based Key Exchange protocol resisting unlimited MITM

    de Valroger, Thibault

    2018-01-01

    We present a protocol enabling two legitimate partners sharing an initial secret to mutually authenticate and to exchange an encryption session key. The opponent is an active Man In The Middle (MITM) with unlimited computation and storage capacities. The resistance to unlimited MITM is obtained through the combined use of Deep Random secrecy, formerly introduced and proved as unconditionally secure against passive opponent for key exchange, and universal hashing techniques. We prove the resis...

  10. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    Wei, Songjie; Li, Shuai; Liu, Peilong; Liu, Meilin

    2018-01-01

    LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively...

  11. A Key Establishment Protocol for RFID User in IPTV Environment

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  12. Calculation of key reduction for B92 QKD protocol

    Mehic, Miralem; Partila, Pavol; Tovarek, Jaromir; Voznak, Miroslav

    2015-05-01

    It is well known that Quantum Key Distribution (QKD) can be used with the highest level of security for distribution of the secret key, which is further used for symmetrical encryption. B92 is one of the oldest QKD protocols. It uses only two non-orthogonal states, each one coding for one bit-value. It is much faster and simpler when compared to its predecessors, but with the idealized maximum efficiencies of 25% over the quantum channel. B92 consists of several phases in which initial key is significantly reduced: secret key exchange, extraction of the raw key (sifting), error rate estimation, key reconciliation and privacy amplification. QKD communication is performed over two channels: the quantum channel and the classical public channel. In order to prevent a man-in-the-middle attack and modification of messages on the public channel, authentication of exchanged values must be performed. We used Wegman-Carter authentication because it describes an upper bound for needed symmetric authentication key. We explained the reduction of the initial key in each of QKD phases.

  13. SUPPLY CHAIN MANAGEMENTKEY FACTORS

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  14. The ultimate security bounds of quantum key distribution protocols

    Nikolopoulos, G.M.; Alber, G.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols exploit quantum correlations in order to establish a secure key between two legitimate users. Recent work on QKD has revealed a remarkable link between quantum and secret correlations. In this talk we report on recent results concerning the ultimate upper security bounds of various QKD schemes (i.e., the maximal disturbance up to which the two legitimate users share quantum correlations) under the assumption of general coherent attacks. In particular, we derive an analytic expression for the ultimate upper security bound of QKD schemes that use two mutually unbiased bases. As long as the two legitimate users focus on the sifted key and treat each pair of data independently during the post processing, our results are valid for arbitrary dimensions of the information carriers. The bound we have derived is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is also discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions, however, such equivalence is generally no longer valid. (author)

  15. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  16. SUPPLY CHAIN MANAGEMENTKEY FACTORS

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  17. Key Management Strategies for Safeguards Authentication and Encryption

    Coram, M.; Hymel, R.; McDaniel, M.; Brotz, J.

    2015-01-01

    Management of cryptographic keys for the authentication and encryption of safeguards data can be the critical weak link in the practical implementation of information security. Within the safeguards community, there is the need to validate that data has not been modified at any point since generation and that it was generated by the monitoring node and not an imposter. In addition, there is the need for that data to be transmitted securely between the monitoring node and the monitoring party such that it cannot be intercepted and read while in transit. Encryption and digital signatures support the required confidentiality and authenticity but challenges exist in managing the cryptographic keys they require. Technologies developed at Sandia National Laboratories have evolved in their use of an associated key management strategy. The first generation system utilized a shared secret key for digital signatures. While fast and efficient, it required that a list of keys be maintained and protected. If control of the key was lost, fraudulent data could be made to look authentic. The second generation changed to support public key / private key cryptography. The key pair is generated by the system, the public key shared, and the private key held internally. This approach eliminated the need to maintain the list of keys. It also allows the public key to be provided to anyone needing to authenticate the data without allowing them to spoof data. A third generation system, currently under development, improves upon the public key / private key approach to address a potential man-in-the-middle attack related to the sharing of the public key. In a planned fourth generation system, secure key exchange protocols will distribute session keys for encryption, eliminating another fixed set of keys utilized by the technology and allowing for periodic renegotiation of keys for enhanced security. (author)

  18. Cryptographic Key Management in Delay Tolerant Networks: A Survey

    Sofia Anna Menesidou

    2017-06-01

    Full Text Available Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment. Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with (a security initialization, (b key establishment, and (c key revocation. We have attempted to provide a concise but fairly complete evaluation of the proposed up-to-date methods in a generalized way with the aim of offering a central reference point for future research.

  19. 6 Keys to Identity Management

    Shoham, Idan

    2011-01-01

    An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…

  20. Key characteristics of different management styles

    AGADZHANYAN A.S.

    2015-01-01

    The article reveals main management styles practiсed by managers all over the world. The author considers key characteristics of management styles, conditions of their using. The paper analyzes cultural differences in management styles in the West and in the East.

  1. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    Songjie Wei

    2018-01-01

    Full Text Available LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively, are investigated, which further enhance the authentication reliability and efficiency in LEO constellation. Experiments on OPNET simulation platform evaluate and demonstrate the effectiveness, reliability, and fast-switching efficiency of the proposed protocol. For LEO networks, BAVP surpasses the well-known existing solutions with significant advantages in both performance and scalability which are supported by theoretical analysis and simulation results.

  2. The Key to Risk Management: Management

    Adrian E. Tschoegl

    2000-01-01

    The Barings, Daiwa Bank and Sumitomo Corp. financial debacles in the mid-1990s suggest that management failures rather than misfortune, errors, or complexity are a major source of the risk of financial debacles. These errors are systematic and are a concommittant of the structure of trading and of human nature. Risk management systems must take these facts into account.

  3. Two-party quantum key agreement protocols under collective noise channel

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  4. Eight Key Facets of Small Business Management.

    Scott, James Calvert

    1980-01-01

    Identifies eight key facets of small business management and suggests activities that may be used to assist in their development. The key facets are (1) product or service, (2) competition, (3) marketing strategies, (4) personnel needs, (5) equipment and facility needs, (6) finances, (7) planning, and (8) entrepreneurship. (JOW)

  5. Optimal grazing management strategies: evaluating key concepts ...

    Finally, overstocking will override key management initiatives, such as effective recovery periods, leading to rangeland degradation. Thus, in variable climates, stocking rate should be set conservatively to allow easier adaptation of animal numbers to rainfall variability from year to year. We suggest several key concepts that ...

  6. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  7. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  8. Multi-party quantum key agreement protocol secure against collusion attacks

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  9. Distributed protocols for digital signatures and public key encryption.

    Kuchta, Veronika

    2016-01-01

    Distributed protocols allow a cryptographic scheme to distribute its operation among a group of participants (servers). This new concept of cryptosystems was introduced by Desmedt [56]. We consider two different flavours of distributed protocols. One of them considers a distributed model with n parties where all of these parties are honest. The other allows up to t − 1 parties to be faulty. Such cryptosystems are called threshold cryptosystems. The distribution of cryptographic process is ...

  10. A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States

    Zhang Sheng; Wang Jian; Tang Chaojing; Zhang Quan

    2011-01-01

    It is established that a single quantum cryptography protocol usually cooperates with other cryptographic systems, such as an authentication system, in the real world. However, few protocols have been proposed on how to combine two or more quantum protocols. To fill this gap, we propose a composed quantum protocol, containing both quantum identity authentication and quantum key distribution, using squeezed states. Hence, not only the identity can be verified, but also a new private key can be generated by our new protocol. We also analyze the security under an optimal attack, and the efficiency, which is defined by the threshold of the tolerant error rate, using Gaussian error function. (general)

  11. Setting objectives for managing Key deer

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  12. The Internet of Things Key Applications and Protocols

    Hersent, Olivier; Elloumi, Omar

    2011-01-01

    An all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 over radio or PLC, 6LowPAN/RPL, ZigBee 1.0 and Smart Energy 2.0, Zwave, LON, BACNet, KNX, ModBus, mBus, C.12 and DLMS/COSEM, and the new ETSI M2M system level standard. In-depth coverage of Smart-grid and EV charging use cases. This book describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and ETSI M2M. The authors discuss the approach taken by service providers to interconnect the protoc

  13. The European protocol on organ transplant: key issues.

    Byk, Christian

    2009-09-01

    What is interesting in the philosophy of the European Protocol is the search of a balanced position which acknowledges the medical progress brought by organ transplants and considers the necessity to ensure that human dignity and individual freedom are respected. However, the principles adopted for such regulations at the European level leave on some major issues a great margin of appreciation to the domestic legislation. This is particularly true in areas such as defining death or consenting to organ transplants including the situation of minors and the role of the family. A last point should also be stressed regarding the European protocol: its lack of efficiency concerning a neglected but important issue: organ trafficking.

  14. Improvement of "Novel Multiparty Quantum Key Agreement Protocol with GHZ States"

    Gu, Jun; Hwang, Tzonelih

    2017-10-01

    Quantum key agreement (QKA) protocol is a method for negotiating a fair and secure key among mutually untrusted participants. Recently, Xu et al. (Quantum Inf. Process. 13:2587-2594, 2014) proposed a multi-party QKA protocol based on Greenberger-Horne-Zeilinger (GHZ) states. However, this study points out that Xu et al.'s protocol cannot provide the fairness property. That is, the last involved participant in the protocol can manipulate the final shared secret key without being detected by the other participants. Moreover, according to Yu et al.'s research (2015), Xu et al.'s protocol cannot avoid the public discussion attack too. To avoid these weaknesses, an improved QKA protocol is proposed.

  15. Talent Management: Working lines and key processes

    Alvaro Alonso

    2014-12-01

    Full Text Available Purpose: Talent management represents today a challenge for companies, since the contribution of value comes increasingly from the area of intangible capital. The current paradigm of expanding technology and competitive dynamics, makes talent management that companies realize a critical success factor in today's markets. However, there is no generally accepted theoretical framework and empirical studies sufficient to demonstrate the role of talent management in creating competitive advantage. Therefore, the first objective of this paper is to analyze the evolution of talent management, to understand more deeply their fundamental dimensions: people and key positions in the organization. From these dimensions, as a second objective of the research is proposed to classify and characterize the literature about four alternative ways of study, according to the treatment they receive such dimensions and thus improve understanding of the role of talent management in business strategyDesign/methodology: To develop this paper we have selected the major contributions to the field of talent management, with particular emphasis on certain meta-analysis very quoted by the scientific community (Lewis and Heckman, 2006; Mellahi and Collings, 2009; Tarique and Schuler, 2010. In addition we have select additional papers published in high impact journals seen in ABI/Inform, Science Direct, SCOPUS, and EBSCO (Business Source Complete, through the keywords "Gestion del talento", "Plan de Gestion del Talento" and "Modelo de Gestion de Talento" and its English equivalent "Talent Management ", "Talent Management Plans/Systems" and "Talent Management Framework/Model ".Findings: From this review, we extracted the existence of different ways of understanding and talent management apply in organizations and even different understandings of what is talent itself. For this, we describe the basic dimensions of talent management (people and key positions and four alternative

  16. An efficient three-party password-based key agreement protocol using extended chaotic maps

    Shu Jian

    2015-01-01

    Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 “An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps”, Nonlinear Dynamics 77(7): 399–411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.’s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server’s public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications. (paper)

  17. Simple Public Key Infrastructure Protocol Analysis and Design

    Vidergar, Alexander G

    2005-01-01

    ...). This thesis aims at proving the applicability of the Simple Public Key Infrastructure (SPKI) as a means of PKC. The strand space approach of Guttman and Thayer is used to provide an appropriate model for analysis...

  18. Key personality traits of sales managers.

    Lounsbury, John W; Foster, Nancy A; Levy, Jacob J; Gibson, Lucy W

    2014-01-01

    Sales managers are crucial for producing positive sales outcomes for companies. However, there has been a relative dearth of scholarly investigations into the personal attributes of sales managers. Such information could prove important in the recruitment, selection, training needs identification, career planning, counseling, and development of sales managers. Drawing on Holland's vocational theory, we sought to identify key personality traits that distinguish sales managers from other occupations and are related to their career satisfaction. The main sample was comprised of a total of 978 sales managers employed in a large number of companies across the United States (along with a comparison sample drawn from 79,512 individuals from other professional occupations). Participants completed an online version of Resource Associates' Personal Style Inventory as well a measure of career satisfaction. Our sample of 978 sales managers had higher levels of Assertiveness, Customer Service Orientation, Extraversion, Image Management, Optimism, and Visionary Style; and lower levels of Conscientiousness, Agreeableness, Intrinsic Motivation, Openness, and Tough-Mindedness than a sample of 79,512 individuals in a variety of other occupations. Nine of these traits were significantly correlated with sales managers' career satisfaction. Based on the results, a psychological profile of sales managers was presented as were implications for their recruitment, selection, training, development, and mentoring.

  19. Bayesian adaptive survey protocols for resource management

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  20. Secure Key Management in the Cloud

    Damgård, Ivan Bjerre; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus

    2013-01-01

    information such as cryptographic keys. Applications like this include many cases where secure multiparty computation is outsourced to the cloud, and in particular a number of online auctions and benchmark computations with confidential inputs. We consider fully autonomous servers that switch between online......We consider applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle. During the offline periods, we assume that the servers need to securely store sensitive...... and offline periods without communicating with anyone from outside the cloud, and semi-autonomous servers that need a limited kind of assistance from outside the cloud when doing the transition. We study the levels of security one can – and cannot – obtain in this model, propose light-weight protocols...

  1. A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP

    Zhang, Liping; Tang, Shanyu; Zhu, Shaohui

    2016-01-01

    Session Initiation Protocol (SIP) is an essential part of most Voice over Internet Protocol (VoIP) architecture. Although SIP provides attractive features, it is exposed to various security threats, and so an efficient and secure authentication scheme is sought to enhance the security of SIP. Several attempts have been made to address the tradeoff problem between security and efficiency, but designing a successful authenticated key agreement protocol for SIP is still a challenging task from t...

  2. SARS: Key factors in crisis management.

    Tseng, Hsin-Chao; Chen, Thai-Form; Chou, Shieu-Ming

    2005-03-01

    This study was conducted at a single hospital selected in Taipei during the SARS (Severe Acute Respiratory Syndrome) outbreak from March to July, 2003 in Taiwan. During this period of time, 104 SARS patients were admitted to the hospital. There were no negative reports related to the selected hospital despite its being located right in the center of an area struck by the epidemic. The purpose of this study was to identify the key factors enabling the hospital to survive SARS unscathed. Data were collected from in-depth interviews with the nursing directors and nursing managers of the SARS units, along with a review of relevant hospital documents. The five key elements identified as survival factors during this SARS crisis are as follows: 1. good control of timing for crisis management, 2. careful decision-making, 3. thorough implementation, 4. effective communication, and 5. trust between management and employees. The results of this study reconfirmed the selected hospital as a model for good crisis management during the SARS epidemic.

  3. Security of a practical semi-device-independent quantum key distribution protocol against collective attacks

    Wang Yang; Bao Wan-Su; Li Hong-Wei; Zhou Chun; Li Yuan

    2014-01-01

    Similar to device-independent quantum key distribution (DI-QKD), semi-device-independent quantum key distribution (SDI-QKD) provides secure key distribution without any assumptions about the internal workings of the QKD devices. The only assumption is that the dimension of the Hilbert space is bounded. But SDI-QKD can be implemented in a one-way prepare-and-measure configuration without entanglement compared with DI-QKD. We propose a practical SDI-QKD protocol with four preparation states and three measurement bases by considering the maximal violation of dimension witnesses and specific processes of a QKD protocol. Moreover, we prove the security of the SDI-QKD protocol against collective attacks based on the min-entropy and dimension witnesses. We also show a comparison of the secret key rate between the SDI-QKD protocol and the standard QKD. (general)

  4. Key policy choices in groundwater quality management

    Batie, S.S.; Diebel, P.L.

    1990-01-01

    The fundamental policy choice of who has the right to do what to whom is a pivotal issue of governance. Over the last few decades, the answer to that question has become more restrictive to those who own and use natural resources as inputs into production processes. Increasingly, the beneficiaries of new policy initiatives are those who desire higher protection of groundwater quality. With respect to groundwater management, policy design increasingly reflects such diverse interests as agriculturists, industrialists, homeowners, local government officials and state officials. Policy design is becoming complex, in part because of this diversity and in part because scientific uncertainty hampers informed policy design. No umbrella federal legislation exists for managing groundwater resources. EPA's role has been mainly an advisory one on groundwater issues. The difficulties and responsibilities of protecting groundwater thus remain with the states. For the near future, it is the states that will address key policy choices with respect to groundwater quality management issues

  5. Security of a single-state semi-quantum key distribution protocol

    Zhang, Wei; Qiu, Daowen; Mateus, Paulo

    2018-06-01

    Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.

  6. Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data

    Fröschle, Sibylle; Steel, Graham

    We extend Delaune, Kremer and Steel’s framework for analysis of PKCS#11-based APIs from bounded to unbounded fresh data. We achieve this by: formally defining the notion of an attribute policy; showing that a well-designed API should have a certain class of policy we call complete; showing that APIs with complete policies may be safely abstracted to APIs where the attributes are fixed; and proving that these static APIs can be analysed in a small bounded model such that security properties will hold for the unbounded case. We automate analysis in our framework using the SAT-based security protocol model checker SATMC. We show that a symmetric key management subset of the Eracom PKCS#11 API, used in their ProtectServer product, preserves the secrecy of sensitive keys for unbounded numbers of fresh keys and handles, i.e. pointers to keys. We also show that this API is not robust: if an encryption key is lost to the intruder, SATMC finds an attack whereby all the keys may be compromised.

  7. Shor-Preskill-type security proof for concatenated Bennett-Brassard 1984 quantum-key-distribution protocol

    Hwang, Won-Young; Matsumoto, Keiji; Imai, Hiroshi; Kim, Jaewan; Lee, Hai-Woong

    2003-01-01

    We discuss a long code problem in the Bennett-Brassard 1984 (BB84) quantum-key-distribution protocol and describe how it can be overcome by concatenation of the protocol. Observing that concatenated modified Lo-Chau protocol finally reduces to the concatenated BB84 protocol, we give the unconditional security of the concatenated BB84 protocol

  8. Perforated Sigmoid Diverticular Disease: a Management Protocol

    Moin, Thajammul

    2008-01-01

    Background: To develop an evidence-based protocol for the management of perforated sigmoid diverticular disease. Methods: A search of the literature was undertaken. All publications pertaining to perforated sigmoid diverticular disease were analyzed and then categorized according to their level of evidence. Recommendations were then made on the basis of this. Results: Multiple case reports suggest that primary closure of perforation of sigmoid diverticula is safe in the absence of peritoneal contamination. Conclusions: A 2-stage laparoscopic approach incorporating the principles of damage limitation surgery may be a safe strategy in the management of perforated diverticular disease. PMID:18435896

  9. Cryptographic Key Management and Critical Risk Assessment

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  10. Transboundary Movements of Genetically Modified Organisms and the Cartagena Protocol: Key Issues and Concerns

    Odile J Lim Tung

    2014-12-01

    Full Text Available Biotechnology or the engineering of the genetic material of species can give way to avenues of possibilities for the benefit of people, fauna and flora but also has the potential of posing untold and undiscovered threats to human beings and other living organisms. One of the first attempts to legislate on international rules on biotechnology can be traced back to article 19 of the Convention on Biological Diversity (CBD in 1992. The CBD is indeed the first international legal instrument apart from the then European Community’s relevant directives to suggest that biotechnology is a matter of concern for the international community while providing a basis upon which more detailed procedures would be elaborated in the field of biosafety. While the CBD includes international rules on access to genetic resources, access to and the transfer of technology, the handling of biotechnology and the distribution of its benefits, it does not include a detailed regulation on genetically modified organisms (GMOs and their possible adverse effects on the environment, human and animal health. It was only with the coming into existence of the Cartagena Protocol on Biosafety (Cartagena Protocol to the CBD in 2000 that the safe transfer, handling and use of living modified organisms (LMOs such as genetically engineered plants, animals, and microbes were at last being catered for, albeit leaving aside the broader categories of GMOs. Due to the need for the negotiators of this protocol to make compromises, there were still key issues on the international biosafety framework pertaining mainly to the scope of the GMOs to be covered by this protocol and by the Advanced Informed Agreement procedure; identification and traceability issues; and liability and redress issues. Nine years after the entry into force of the Cartagena Protocol the transboundary movements of GMOs have clearly increased with new categories of GMOs and genetically modified products to regulate. The

  11. Two-party quantum key agreement protocol with four-particle entangled states

    He, Yefeng; Ma, Wenping

    2016-09-01

    Based on four-particle entangled states and the delayed measurement technique, a two-party quantum key agreement protocol is proposed in this paper. In the protocol, two participants can deduce the measurement results of each other’s initial quantum states in terms of the measurement correlation property of four-particle entangled states. According to the corresponding initial quantum states deduced by themselves, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. This guarantees the fair establishment of a shared key. Since each particle in quantum channel is transmitted only once, the protocol is congenitally free from the Trojan horse attacks. The security analysis shows that the protocol not only can resist against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.

  12. Improved two-way six-state protocol for quantum key distribution

    Shaari, J.S., E-mail: jesni_shamsul@yahoo.com [Faculty of Science, International Islamic University Malaysia (IIUM), Jalan Sultan Ahmad Shah, Bandar Indera Mahkota, 25200 Kuantan, Pahang (Malaysia); Bahari, Asma' Ahmad [Faculty of Science, International Islamic University Malaysia (IIUM), Jalan Sultan Ahmad Shah, Bandar Indera Mahkota, 25200 Kuantan, Pahang (Malaysia)

    2012-10-01

    A generalized version for a qubit based two-way quantum key distribution scheme was first proposed in the paper [Phys. Lett. A 358 (2006) 85] capitalizing on the six quantum states derived from three mutually unbiased bases. While boasting of a higher level of security, the protocol was not designed for ease of practical implementation. In this work, we propose modifications to the protocol, resulting not only in improved security but also in a more efficient and practical setup. We provide comparisons for calculated secure key rates for the protocols in noisy and lossy channels. -- Highlights: ► Modification for efficient generalized two-way QKD is proposed. ► Calculations include secure key rates in noisy and lossy channels for selected attack scenario. ► Resulting proposal provides for higher secure key rate in selected attack scheme.

  13. Improved two-way six-state protocol for quantum key distribution

    Shaari, J.S.; Bahari, Asma' Ahmad

    2012-01-01

    A generalized version for a qubit based two-way quantum key distribution scheme was first proposed in the paper [Phys. Lett. A 358 (2006) 85] capitalizing on the six quantum states derived from three mutually unbiased bases. While boasting of a higher level of security, the protocol was not designed for ease of practical implementation. In this work, we propose modifications to the protocol, resulting not only in improved security but also in a more efficient and practical setup. We provide comparisons for calculated secure key rates for the protocols in noisy and lossy channels. -- Highlights: ► Modification for efficient generalized two-way QKD is proposed. ► Calculations include secure key rates in noisy and lossy channels for selected attack scenario. ► Resulting proposal provides for higher secure key rate in selected attack scheme.

  14. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

  15. On the security of a novel key agreement protocol based on chaotic maps

    Xiang Tao; Wong, K.-W.; Liao Xiaofeng

    2009-01-01

    Recently, Xiao et al. proposed a novel key agreement protocol based on Chebyshev chaotic map. In this paper, the security of the protocol is analyzed, and two attack methods can be found in different scenarios. The essential principle of Xiao et al.'s scheme is summarized. It is also pointed out with proof that any attempt along this line to improve the security of Chebyshev map is redundant.

  16. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  17. Attacks on quantum key distribution protocols that employ non-ITS authentication

    Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.

    2016-01-01

    We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

  18. Uniformity: The key to better inventory management

    Boshears, G.

    1993-01-01

    The objective of this paper is to show how uniformity in describing parts and materials can be the key ingredient to more effective inventory management. Although most nuclear utilities have some type of computer system for maintenance management as well as materials tracking, few have a system to provide the various users with complete information about parts and material in stock. One of the industry's most perplexing problems is How do you know, and find, the item you need to repair a particular piece of equipment or component? In many instances it is easier to order a new one from the manufacturer rather than try to find it on-site, which can result in inaccurate usage records, over-stocking, frustration, and strain on cash flow. What is needed is a higher degree of uniformity within a station, and a utility, of catalog descriptions for parts and material that will satisfy all users-planners, craftsmen, warehouse personnel, and buyers. The results of attaining this uniformity are improved performance through searchability, duplicate stock avoidance, interchangeability, substitutability, and more accurate bills of material; economic benefits will also be noted

  19. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key

    Jungho Kang

    2015-08-01

    Full Text Available Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

  20. Influence of experimental parameters inherent to optical fibers on Quantum Key Distribution, the protocol BB84

    L. Bouchoucha

    2018-03-01

    Full Text Available In this work, we represent the principle of quantum cryptography (QC that is based on fundamental laws of quantum physics. QC or Quantum Key Distribution (QKD uses various protocols to exchange a secret key between two communicating parties. This research paper focuses and examines the quantum key distribution by using the protocol BB84 in the case of encoding on the single-photon polarization and shows the influence of optical components parameters on the quantum key distribution. We also introduce Quantum Bit Error Rate (QBER to better interpret our results and show its relationship with the intrusion of the eavesdropper called Eve on the optical channel to exploit these vulnerabilities.

  1. Information-theoretic security proof for quantum-key-distribution protocols

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-01-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel

  2. Information-theoretic security proof for quantum-key-distribution protocols

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-07-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel.

  3. Outreach: Key to Sustainable Nuclear Knowledge Management

    Segovia, V.

    2016-01-01

    Full text: With the numerous nuclear power plants being built globally and the prospects for many more, the challenge of the timely availability of a well-prepared, qualified, knowledgeable workforce is a key element in the “critical path” to commissioning these plants. All of these individuals will need quality education and training that is rooted in safety and established in experience. In addition, because many of these new plants are typically being built in developing countries, education, training, recruiting and retaining operations staff can be a significant challenge. Attracting sources of qualified employees for these nuclear power plants in local communities is paramount which implies a strong focus on the science and math education outreach programmes at all levels. This paper will highlight the Nuclear Power Institute’s integration of human resource development outreach strategies, education and training systems, and international cooperation to demonstrate how working in particular with the education sector can not only create interest in future careers in nuclear technology and capture valuable knowledge, but can also build community based support for nuclear power programmes with an emphasis of developing competent workers through education and training, mentoring and apprenticeships. Outreach has also become an important element of all nuclear knowledge management endeavours. (author

  4. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A. Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2016-12-01

    Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable.

  5. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2009-01-01

    ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4’s physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist....... In particular we show that the End-to-End Application Key Establishment Protocol is flawed and we propose a secure protocol instead. We do so by using formal verification techniques based on static program analysis and process algebras. We present a way of using formal methods in wireless network security......, and propose a secure key establishment protocol for ZigBee networks....

  6. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    Bacco, Davide; Christensen, Jesper Bjerge; Usuga Castaneda, Mario A.

    2016-01-01

    10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak......Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last...... coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable....

  7. Simple proof of the unconditional security of the Bennett 1992 quantum key distribution protocol

    Zhang Quan; Tang Chaojing

    2002-01-01

    It is generally accepted that quantum key distribution (QKD) could supply legitimate users with unconditional security during their communication. Quite a lot of satisfactory efforts have been achieved on experimentations with quantum cryptography. However, when the eavesdropper has extra-powerful computational ability, has access to a quantum computer, for example, and can carry into execution any eavesdropping measurement that is allowed by the laws of physics, the security against such attacks has not been widely studied and rigorously proved for most QKD protocols. Quite recently, Shor and Preskill proved concisely the unconditional security of the Bennett-Brassard 1984 (BB84) protocol. Their method is highly valued for its clarity of concept and concision of form. In order to take advantage of the Shor-Preskill technique in their proof of the unconditional security of the BB84 QKD protocol, we introduced in this paper a transformation that can translate the Bennett 1992 (B92) protocol into the BB84 protocol. By proving that the transformation leaks no more information to the eavesdropper, we proved the unconditional security of the B92 protocol. We also settled the problem proposed by Lo about how to prove the unconditional security of the B92 protocol with the Shor-Preskill method

  8. Heisenberg Groups as Platform for the AAG key-exchange protocol

    Kahrobaei, Delaram; Lam, Ha T.

    2014-01-01

    Garber, Kahrobaei, and Lam studied polycyclic groups generated by number field as platform for the AAG key-exchange protocol. In this paper, we discuss the use of a different kind of polycyclic groups, Heisenberg groups, as a platform group for AAG by submitting Heisenberg groups to one of AAG's major attacks, the length-based attack.

  9. An SSH key management system: easing the pain of managing key/user/account associations

    Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.

    2008-07-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.

  10. An SSH key management system: easing the pain of managing key/user/account associations

    Arkhipkin, D; Shiryaev, A; Betts, W; Lauret, J

    2008-01-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins

  11. Perceptions of food risk management among key stakeholders

    van Kleef, Ellen; Frewer, Lynn J.; Chryssochoidis, George M.

    2006-01-01

    In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management.......In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management....

  12. Water management as a key component of integrated weed management

    Antonio Berti

    2010-09-01

    Full Text Available Water management within the cropping system is a key factor for an integrated weed management. Soil moisture affects seed persistence and seed dormancy, thus influencing their germination, the establishment of seedlings as well as the competition at adult stage and the number, vitality and dormancy of the new seeds produced by the weeds. The interactions among water availability and competition are very complex and still not fully understood. A research effort in this sector should the be very relevant for the development of new approaches of weed management, such as “Ecological weed management”, aiming to reduce weed density and competitiveness and, in the medium term, to prevent undesired modifications of the weed flora.

  13. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  14. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  15. Backup key generation model for one-time password security protocol

    Jeyanthi, N.; Kundu, Sourav

    2017-11-01

    The use of one-time password (OTP) has ushered new life into the existing authentication protocols used by the software industry. It introduced a second layer of security to the traditional username-password authentication, thus coining the term, two-factor authentication. One of the drawbacks of this protocol is the unreliability of the hardware token at the time of authentication. This paper proposes a simple backup key model that can be associated with the real world applications’user database, which would allow a user to circumvent the second authentication stage, in the event of unavailability of the hardware token.

  16. Comparative Analysis of Different Protocols to Manage Large Scale Networks

    Anil Rao Pimplapure; Dr Jayant Dubey; Prashant Sen

    2013-01-01

    In recent year the numbers, complexity and size is increased in Large Scale Network. The best example of Large Scale Network is Internet, and recently once are Data-centers in Cloud Environment. In this process, involvement of several management tasks such as traffic monitoring, security and performance optimization is big task for Network Administrator. This research reports study the different protocols i.e. conventional protocols like Simple Network Management Protocol and newly Gossip bas...

  17. Developing a protocol for managing the biophysical condition of a ...

    Their function will focus on the overall management of water resources on a ... for the integrated management of the biophysical component of a catchment, with ... and implement a protocol which will combine and integrate the knowledge of ...

  18. A Key Management Method for Cryptographically Enforced Access Control

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  19. Efficient key management for cryptographically enforced access control

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  20. Determinants of Key Account Management Effectiveness: The Case ...

    Dires Abebe Fenta

    maintaining enhanced relationships with strategic business customers named as. 'key accounts'. ... Key account management is one mechanism of treating strategic ..... Considering this report, correlation statistics was undergone to check the.

  1. Nonverbal Cues: The Key to Classroom Management.

    Petrie, Garth; Lindauer, Patricia; Bennett, Brenda; Gibson, Sherri

    1998-01-01

    Principals should familiarize teachers with the benefits of nonverbal procedures for classroom management and discipline enforcement. A behavior-management checklist of nonverbal techniques (eye contact, touching, smiling, and frowning) can be used in a series of short visits. At least 75% of control techniques should be nonverbal. Relying on…

  2. Key Intersections between HRD and Management

    Egan, Toby M.

    2011-01-01

    This article is in part inspired by an HRD director's insight that his HRD staff should view themselves as HRD Family Doctors, suggesting that a doctor-patient relationship was similar in many respects to the HRD-manager consulting relationship. Although that is possible in some organizations, the author's interviews with corporate managers and…

  3. Performance of Differential-Phase-Shift Keying Protocol Applying 1310 nm Up-Conversion Single-Photon Detector

    Chen-Xu, Feng; Rong-Zhen, Jiao; Wen-Han, Zhang

    2008-01-01

    The performance of the differential-phase-shift keying (DPSK) protocol applying a 1310 nm up-conversion single-photon detector is analysed. The error rate and the communication rate as a function of distance for three quantum key distribution protocols, the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the DPSK, are presented. Then we compare the performance of these three protocols using the 1310nm up-conversion detector. We draw the conclusion that the DPSK protocol applying the detector has significant advantage over the other two protocols. Longer transmission distance and lower error rate can be achieved. (general)

  4. An improved authenticated key agreement protocol for telecare medicine information system.

    Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin

    2016-01-01

    In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.

  5. Two-party secret key distribution via a modified quantum secret sharing protocol.

    Grice, W P; Evans, P G; Lawrie, B; Legré, M; Lougovski, P; Ray, W; Williams, B P; Qi, B; Smith, A M

    2015-03-23

    We present and demonstrate a novel protocol for distributing secret keys between two and only two parties based on N-party single-qubit Quantum Secret Sharing (QSS). We demonstrate our new protocol with N = 3 parties using phase-encoded photons. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N - 2 parties. Our implementation allows for an accessible transition between N-party QSS and arbitrary two party QKD without modification of hardware. In addition, our approach significantly reduces the number of resources such as single photon detectors, lasers and dark fiber connections needed to implement QKD.

  6. Cryptanalysis of Wang et al.’s lattice-based key exchange protocol

    Daya Sagar Gupta

    2016-09-01

    Full Text Available Wang et al. proposed a new hard problem on lattices which is an extension of the small integer solution (SIS on lattices. This new generated hard problem is named to be bilateral in-homogeneous small integer solution (Bi-ISIS. Using the hardness of Bi-ISIS, Wang et al. proposed a new key exchange protocol, which is based on the lattice-based cryptography. In this paper, we signalize that Wang et al.’s lattice-based key exchange protocol is vulnerable to an attack, namely, man-in-the-middle (MITM attack. Through this attack, Eavesdropper can intercept the authenticated messages and communicate the unauthentic messages among the communicating parties.

  7. Socialization as key process in knowledge management

    Francisco José GARCÍA-PEÑALVO

    2016-07-01

    Full Text Available The editorial of this second issue of volume 17,corresponding to 2016, is devoted to socialization process in the knowledge management in order to complement the special section about Social Networks and Education.

  8. Environmental conflicts: Key issues and management implications ...

    Environmental crises and problems throughout the world are widespread and increasing rapidly. In relation to these concerns, the article discusses the following aspects: people and the environment, environmental conflicts, climate change and environmental conflicts, and management implications. The section on people ...

  9. Careful assessment key in managing prostatitis.

    Gujadhur, Rahul; Aning, Jonathan

    2015-04-01

    Prostatitis is a common condition estimated to affect up to 30% of men in their lifetime, it is most prevalent in men aged between 35 and 50. Prostatitis is subclassified into: acute bacterial prostatitis, chronic bacterial prostatitis, chronic pelvic pain and asymptomatic inflammatory prostatitis. Acute bacterial prostatitis presents with acute onset pelvic pain which may or may not be related to voiding, lower urinary tract symptoms, sometimes haematuria or haematospermia and systemic symptoms such as fever and rigors. A documented history of recurrent urinary tract infections is the key feature of chronic bacterial prostatitis. Duration of symptoms > 3 months defines chronicity. The key symptom of chronic pelvic pain syndrome is pain. Patients may describe pain during or after ejaculation as their predominant symptom. Clinical assessment includes a thorough history and examination. A digital rectal examination should be performed after a midstream urine (MSU) sample has been collected for urine dipstick, microscopy and culture. The prostate should be checked for nodules. In acute bacterial prostatitis the MSU is the only laboratory investigation required. Chronic pelvic pain syndrome may be multifactorial and part of a more generalised pain disorder. Pelvic floor muscle abnormalities, altered neuroendocrine pathways, chemically induced inflammation, bacterial infection, autoimmune processes, dysfunctional voiding as well intraprostatic ductal reflux mechanisms have all been identified in men with chronic pelvic pain syndrome.

  10. Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS

    Hyunsung Kim

    2014-12-01

    Full Text Available The digitization of patient health information (PHI for wireless health monitoring systems (WHMSs has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient’s PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient’s privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks.

  11. Practical private database queries based on a quantum-key-distribution protocol

    Jakobi, Markus; Simon, Christoph; Gisin, Nicolas; Bancal, Jean-Daniel; Branciard, Cyril; Walenta, Nino; Zbinden, Hugo

    2011-01-01

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.

  12. Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS

    Kim, Hyunsung

    2014-01-01

    The digitization of patient health information (PHI) for wireless health monitoring systems (WHMSs) has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient's PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient's privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP) for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks. PMID:25513824

  13. Risk management of key issues of FPSO

    Sun, Liping; Sun, Hai

    2012-12-01

    Risk analysis of key systems have become a growing topic late of because of the development of offshore structures. Equipment failures of offloading system and fire accidents were analyzed based on the floating production, storage and offloading (FPSO) features. Fault tree analysis (FTA), and failure modes and effects analysis (FMEA) methods were examined based on information already researched on modules of relex reliability studio (RRS). Equipment failures were also analyzed qualitatively by establishing a fault tree and Boolean structure function based on the shortage of failure cases, statistical data, and risk control measures examined. Failure modes of fire accident were classified according to the different areas of fire occurrences during the FMEA process, using risk priority number (RPN) methods to evaluate their severity rank. The qualitative analysis of FTA gave the basic insight of forming the failure modes of FPSO offloading, and the fire FMEA gave the priorities and suggested processes. The research has practical importance for the security analysis problems of FPSO.

  14. Managing clinical education through understanding key principles.

    Cunningham, Joanne; Wright, Caroline; Baird, Marilyn

    2015-01-01

    Traditionally, a practicum facilitated the integration of on-campus learning and practical workplace training. Over the past 3 decades, an educative practicum has evolved that promotes clinical reasoning, including analytical and evaluative abilities, through reflective practice. Anecdotal evidence indicates that the delivery of clinical education within medical radiation science entry-level programs continues to vacillate between traditional practicums and the new reflective practicums. To review the literature about clinical education within the medical radiation sciences and identify key principles for practitioners seeking to reflect upon and improve their approach to teaching and supporting students in the clinical environment. A search of 3 major journal databases, Internet searches, and hand searches of reference lists were conducted to identify literature about clinical education in the medical radiation sciences from January 1, 2000, to December 31, 2012. Twenty-two studies were included in this review. The 5 key elements associated with clinical education include the clinical support model and quality, overcoming the theory-practice gap, learning outcomes and reliable and valid assessment, preparing and supporting students, and accommodating differing teaching and learning needs. Many factors influence the quality of clinical education, including the culture of the clinical environment and clinical leadership roles. Several approaches can help students bridge the theory-practice gap, including simulators, role-playing activities, and reflective journals. In addition, clinical educators should use assessment strategies that objectively measure student progress, and they should be positive role models for their students. The successful clinical education of students in the medical radiation sciences depends upon the systems, structures, and people in the clinical environment. Clinical education is accomplished through the collaborative efforts of the

  15. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Alavalapati Goutham Reddy

    Full Text Available Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  16. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  17. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  18. Managing cumulative impacts: A key to sustainability?

    Hunsaker, C.T.

    1994-12-31

    This paper addresses how science can be more effectively used in creating policy to manage cumulative effects on ecosystems. The paper focuses on the scientific techniques that we have to identify and to assess cumulative impacts on ecosystems. The term ``sustainable development`` was brought into common use by the World Commission on Environment and Development (The Brundtland Commission) in 1987. The Brundtland Commission report highlighted the need to simultaneously address developmental and environmental imperatives simultaneously by calling for development that ``meets the needs of the present generation without compromising the needs of future generations.`` We cannot claim to be working toward sustainable development until we can quantitatively assess cumulative impacts on the environment: The two concepts are inextricibally linked in that the elusiveness of cumulative effects likely has the greatest potential of keeping us from achieving sustainability. In this paper, assessment and management frameworks relevant to cumulative impacts are discussed along with recent literature on how to improve such assessments. When possible, examples are given for marine ecosystems.

  19. Key factors of efficient organization management

    Firsankov, I. E.; Фирсанков, И. Е.

    2014-01-01

    Issues of efficiency of organization management are examined in the article. Aggressive competition between companies; what’s the difference between manager and leader; who is a leader; personal qualities of strong charismatic leaders etc. Particular attention is paid to the question of possibility to become a leader or to be born a leader. В статье рассмотрены основные черты настоящего лидера, затронута тема различия между лидером и менеджером, а также освещён вопрос о том, можно ли стать...

  20. On the vulnerability of basic quantum key distribution protocols and three protocols stable to attack with 'blinding' of avalanche photodetectors

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com [Russian Federation Academy of Cryptography (Russian Federation)

    2012-05-15

    The fundamental quantum mechanics prohibitions on the measurability of quantum states allow secure key distribution between spatially remote users to be performed. Experimental and commercial implementations of quantum cryptography systems, however, use components that exist at the current technology level, in particular, one-photon avalanche photodetectors. These detectors are subject to the blinding effect. It was shown that all the known basic quantum key distribution protocols and systems based on them are vulnerable to attacks with blinding of photodetectors. In such attacks, an eavesdropper knows all the key transferred, does not produce errors at the reception side, and remains undetected. Three protocols of quantum key distribution stable toward such attacks are suggested. The security of keys and detection of eavesdropping attempts are guaranteed by the internal structure of protocols themselves rather than additional technical improvements.

  1. Meta-Key: A Secure Data-Sharing Protocol under Blockchain-Based Decentralised Storage Architecture

    Fu, Yue

    2017-01-01

    In this paper a secure data-sharing protocol under blockchain-based decentralised storage architecture is proposed, which fulfils users who need to share their encrypted data on-cloud. It implements a remote data-sharing mechanism that enables data owners to share their encrypted data to other users without revealing the original key. Nor do they have to download on-cloud data with re-encryption and re-uploading. Data security as well as efficiency are ensured by symmetric encryption, whose k...

  2. Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths

    Hayashi, Masahito; Nakayama, Ryota

    2014-01-01

    This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett–Brassard 1984 protocol for finite key lengths, when we employ the decoy method. Using the formula, we can guarantee the security parameter for a realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting. (paper)

  3. Security bound of two-basis quantum-key-distribution protocols using qudits

    Nikolopoulos, Georgios M.; Alber, Gernot

    2005-01-01

    We investigate the security bounds of quantum-cryptographic protocols using d-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the Bennett-Brassard 1984 quantum-key-distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum-cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid

  4. Intercept-resend attacks in the Bennett-Brassard 1984 quantum-key-distribution protocol with weak coherent pulses

    Curty, Marcos; Luetkenhaus, Norbert

    2005-01-01

    Unconditional security proofs of the Bennett-Brassard 1984 protocol of quantum key distribution have been obtained recently. These proofs cover also practical implementations that utilize weak coherent pulses in the four signal polarizations. Proven secure rates leave open the possibility that new proofs or new public discussion protocols will obtain larger rates over increased distance. In this paper we investigate limits to the error rate and signal losses that can be tolerated by future protocols and proofs

  5. An improved two-way continuous-variable quantum key distribution protocol with added noise in homodyne detection

    Sun Maozhu; Peng Xiang; Guo Hong

    2013-01-01

    We propose an improved two-way continuous-variable quantum key distribution (CV QKD) protocol by adding proper random noise on the receiver’s homodyne detection, the security of which is analysed against general collective attacks. The simulation result under the collective entangling cloner attack indicates that despite the correlation between two-way channels decreasing the secret key rate relative to the uncorrelated channels slightly, the performance of the two-way protocol is still far beyond that of the one-way protocols. Importantly, the added noise in detection is beneficial for the secret key rate and the tolerable excess noise of this two-way protocol. With the reasonable reconciliation efficiency of 90%, the two-way CV QKD with added noise allows the distribution of secret keys over 60 km fibre distance. (paper)

  6. Key Issues in the Application of Knowledge Management in Education

    Mendoza, George A

    2005-01-01

    .... This shift in paradigms has made knowledge the key resource as organizations shift their focus from natural resources to intellectual assets, heralding the use of a concept called Knowledge Management (KM...

  7. Free-space measurement-device-independent quantum-key-distribution protocol using decoy states with orbital angular momentum

    Wang Le; Zhao Sheng-Mei; Cheng Wei-Wen; Gong Long-Yan

    2015-01-01

    In this paper, we propose a measurement-device-independent quantum-key-distribution (MDI-QKD) protocol using orbital angular momentum (OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol, the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie’s successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover, the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence (AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source. (paper)

  8. Protocol compliance and time management in blunt trauma resuscitation.

    Spanjersberg, W R; Bergs, E A; Mushkudiani, N; Klimek, M; Schipper, I B

    2009-01-01

    To study advanced trauma life support (ATLS) protocol adherence prospectively in trauma resuscitation and to analyse time management of daily multidisciplinary trauma resuscitation at a level 1 trauma centre, for both moderately and severely injured patients. All victims of severe blunt trauma were consecutively included. Patients with a revised trauma score (RTS) of 12 were resuscitated by a "minor trauma" team and patients with an RTS of less than 12 were resuscitated by a "severe trauma" team. Digital video recordings were used to analyse protocol compliance and time management during initial assessment. From 1 May to 1 September 2003, 193 resuscitations were included. The "minor trauma" team assessed 119 patients, with a mean injury severity score (ISS) of 7 (range 1-45). Overall protocol compliance was 42%, ranging from 0% for thoracic percussion to 93% for thoracic auscultation. The median resuscitation time was 45.9 minutes (range 39.7-55.9). The "severe team" assessed 74 patients, with a mean ISS of 22 (range 1-59). Overall protocol compliance was 53%, ranging from 4% for thoracic percussion to 95% for thoracic auscultation. Resuscitation took 34.8 minutes median (range 21.6-44.1). Results showed the current trauma resuscitation to be ATLS-like, with sometimes very low protocol compliance rates. Timing of secondary survey and radiology and thus time efficiency remains a challenge in all trauma patients. To assess the effect of trauma resuscitation protocols on outcome, protocol adherence needs to be improved.

  9. A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks

    Huang Jen-Yan

    2011-01-01

    Full Text Available Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result, few current key management schemes are appropriate for wireless sensor networks. This paper proposes a new key management method that uses dynamic key management schemes for heterogeneous sensor networks. The proposed scheme loads a hash function into the base station, cluster heads, and sensor nodes. The cluster heads and sensor nodes then generate their own keychains to provide forward authentication in case of key changes, security breaches, key changes due to security breaches. The cluster heads and sensor nodes establish pairwise keys to ensure transmission secrecy. The proposed scheme decreases the number of keys required for sensor nodes and cluster heads and is robust to the following attacks: guessing attacks, replay attacks, man-in-the-middle attacks, node capture attacks, and denial-of-service attacks.

  10. Optimisation of key performance measures in air cargo demand management

    Alexander May; Adrian Anslow; Udechukwu Ojiako; Yue Wu; Alasdair Marshall; Maxwell Chipulu

    2014-01-01

    This article sought to facilitate the optimisation of key performance measures utilised for demand management in air cargo operations. The focus was on the Revenue Management team at Virgin Atlantic Cargo and a fuzzy group decision-making method was used. Utilising intelligent fuzzy multi-criteria methods, the authors generated a ranking order of ten key outcome-based performance indicators for Virgin Atlantic air cargo Revenue Management. The result of this industry-driven study showed that ...

  11. Information Systems Management: an Australian view of the key issues

    Graham Pervan

    1994-05-01

    Full Text Available Studies investigating the key issues in IS management serve to better understand the concerns of IS managers and help to guide IS researchers in choosing IS management problems worthy of investigation. This paper presents results from a study of the key issues facing the IS managers of Australia's largest 300 organisations which is part of a three-yearly longitudinal study. In order to gain consensus on the relative importance of the key issues, a three-round Delphi method was applied. The results reveal that IS strategic planning continues to be the paramount issue in our industry, as are many issues associated with IS strategic planning, including responsiveness of the IT infrastructure, effective use of the data resource, IS for competitive advantage, and a comprehensive information architecture. A greater emphasis on quality is also revealed in highly rated issues such as effective use of the data resource, data integrity and quality assurance, and the quality of software development

  12. Key aspects to perform a project on energy management

    Bachini, R.

    1993-01-01

    A general overview on elements and organisms playing a key role to launch a new industrial project is given, taking as base case an energy management project. Likewise the problematic of training personnel involved in the project is analyzed. Energy management becomes crucial in industries where energy costs represent a big portion of the whole production cost. Main aspects to be analyzed are: - Adequate production procedures to be competitive - Environment protection regarding waste management - Maximization of safety at production installations. (Author)

  13. Sequential attack with intensity modulation on the differential-phase-shift quantum-key-distribution protocol

    Tsurumaru, Toyohiro

    2007-01-01

    In this paper, we discuss the security of the differential-phase-shift quantum-key-distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. [Phys. Rev. A 73, 012344 (2006)]. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposition of the single-photon states which she sends to the receiver. Concentrating especially on the 'discretized Gaussian' intensity modulation, we show that our attack is more effective than the individual attack, which had been the best attack up to present. As a result of this, the recent experiment with communication distance of 100 km reported by Diamanti et al. [Opt. Express 14, 13073 (2006)] turns out to be insecure. Moreover, it can be shown that in a practical experimental setup which is commonly used today, the communication distance achievable by the DPSQKD protocol is less than 95 km

  14. Key management issue in SCADA networks: A review

    Abdalhossein Rezai

    2017-02-01

    Full Text Available Supervisory Control And Data Acquisition (SCADA networks have a vital role in Critical Infrastructures (CIs such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs and Intelligence Electronic Devices (IEDs in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.

  15. Key determinants of managing the marketing asset of global companies

    Tatyana Tsygankova; Roman Ponomarenko

    2016-01-01

    As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development). The article identified the optimal set of key elements of the system of marketing assets, which are th...

  16. Scalable Multi-group Key Management for Advanced Metering Infrastructure

    Benmalek , Mourad; Challal , Yacine; Bouabdallah , Abdelmadjid

    2015-01-01

    International audience; Advanced Metering Infrastructure (AMI) is composed of systems and networks to incorporate changes for modernizing the electricity grid, reduce peak loads, and meet energy efficiency targets. AMI is a privileged target for security attacks with potentially great damage against infrastructures and privacy. For this reason, Key Management has been identified as one of the most challenging topics in AMI development. In this paper, we propose a new Scalable multi-group key ...

  17. Optimisation of key performance measures in air cargo demand management

    Alexander May

    2014-04-01

    Full Text Available This article sought to facilitate the optimisation of key performance measures utilised for demand management in air cargo operations. The focus was on the Revenue Management team at Virgin Atlantic Cargo and a fuzzy group decision-making method was used. Utilising intelligent fuzzy multi-criteria methods, the authors generated a ranking order of ten key outcome-based performance indicators for Virgin Atlantic air cargo Revenue Management. The result of this industry-driven study showed that for Air Cargo Revenue Management, ‘Network Optimisation’ represents a critical outcome-based performance indicator. This collaborative study contributes to existing logistics management literature, especially in the area of Revenue Management, and it seeks to enhance Revenue Management practice. It also provides a platform for Air Cargo operators seeking to improve reliability values for their key performance indicators as a means of enhancing operational monitoring power.

  18. DNA based random key generation and management for OTP encryption.

    Zhang, Yunpeng; Liu, Xin; Sun, Manhui

    2017-09-01

    One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.

  19. Knowledge Management – the Key Resource in the Knowledge Economy

    Domingo NEVADO PEÑA

    2010-06-01

    Full Text Available The influence of global information and communication technology changes and globalization have transformed our society by favoring the economy and innovation as key driver of global competition. Creation and exploitation of knowledge has become key resource in the new economy. All advanced economies are technologically knowledgebased economy. Many of today's managers and their employees, still guided by the definition given by Francis Bacon (1597 “Knowledge is power” instead of “sharing and managing knowledge is power”. Knowing taken alone may not bring value if not shared before and then managed in an efficient manner. This article seeks to demonstrate what knowledge, what the knowledge management is and what are its main implications in the new economy, a knowledge-based economy.

  20. Protocol compliance and time management in blunt trauma resuscitation.

    Spanjersberg, W.R.; Bergs, E.A.; Mushkudiani, N.; Klimek, M.; Schipper, I.B.

    2009-01-01

    OBJECTIVES: To study advanced trauma life support (ATLS) protocol adherence prospectively in trauma resuscitation and to analyse time management of daily multidisciplinary trauma resuscitation at a level 1 trauma centre, for both moderately and severely injured patients. PATIENTS AND METHODS: All

  1. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Xie Qi; Hu Bin; Chen Ke-Fei; Liu Wen-Hao; Tan Xiao

    2015-01-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. (paper)

  2. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  3. Network Information Management: The Key To Providing High WAN Availability.

    Tysdal, Craig

    1996-01-01

    Discusses problems associated with increasing corporate network complexity as a result of the proliferation of client/server applications at remote locations, and suggests the key to providing high WAN (wide area network) availability is relational databases used in an integrated management approach. (LRW)

  4. Institutional Data Management in Higher Education. ECAR Key Findings

    Yanosky, Ronald

    2009-01-01

    This document presents the key findings from the 2009 ECAR (EDUCAUSE Center for Applied Research) study of institutional data management, which examines the policies and practices by which higher education institutions effectively collect, protect, and use digital information assets to meet academic and business needs. Importantly, it also…

  5. Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    I-Hsien Lin

    2010-08-01

    Full Text Available Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.

  6. Key determinants of managing the marketing asset of global companies

    Tatyana Tsygankova

    2016-12-01

    Full Text Available As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development. The article identified the optimal set of key elements of the system of marketing assets, which are the brand, customer loyalty, reputation, network cooperation, marketing strategy, internal marketing, marketing information system and marketing innovation. Due to correlation and regression analysis of the impact of each system elements on performance of global companies, the model of the "marketing asset octagon" was built as an integrative management tool. Also, as a result of construction of the said model, the authors identified the most profitable marketing assets, return on investment and development of competencies in the field of efficient management will bring the highest profit to the company. On the basis of summarizing the regional and branch features of managing the disparate elements of the marketing assets of global companies, the key regional and sectoral priorities of formation, development and improvement of existing concepts of the international marketing management were identified, particularly in terms of building an author’s integrative octagon model.

  7. Scintillation has minimal impact on far-field Bennett-Brassard 1984 protocol quantum key distribution

    Shapiro, Jeffrey H. [Research Laboratory of Electronics, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139 (United States)

    2011-09-15

    The effect of scintillation, arising from propagation through atmospheric turbulence, on the sift and error probabilities of a quantum key distribution (QKD) system that uses the weak-laser-pulse version of the Bennett-Brassard 1984 (BB84) protocol is evaluated. Two earth-space scenarios are examined: satellite-to-ground and ground-to-satellite transmission. Both lie in the far-field power-transfer regime. This work complements previous analysis of turbulence effects in near-field terrestrial BB84 QKD [J. H. Shapiro, Phys. Rev. A 67, 022309 (2003)]. More importantly, it shows that scintillation has virtually no impact on the sift and error probabilities in earth-space BB84 QKD, something that has been implicitly assumed in prior analyses for that application. This result contrasts rather sharply with what is known for high-speed laser communications over such paths, in which deep, long-lived scintillation fades present a major challenge to high-reliability operation.

  8. Reduced and oxidised scytonemin: theoretical protocol for Raman spectroscopic identification of potential key biomolecules for astrobiology.

    Varnali, Tereza; Edwards, Howell G M

    2014-01-03

    Scytonemin is an important UV-radiation protective biomolecule synthesised by extremophilic cyanobacteria in stressed terrestrial environments. Scytonemin and its reduced form have been both isolated experimentally and the Raman spectrum for scytonemin has been assigned and characterised experimentally both in extracts and in living extremophilic cyanobacterial colonies. Scytonemin is recognised as a key biomarker molecule for terrestrial organisms in stressed environments. We propose a new, theoretically plausible structure for oxidised scytonemin which has not been mentioned in the literature hitherto. DFT calculations for scytonemin, reduced scytonemin and the new structure modelled and proposed for oxidised scytonemin are reported along with their Raman spectroscopic data and λmax UV-absorption data obtained theoretically. Comparison of the vibrational spectroscopic assignments allows the three forms of scytonemin to be detected and identified and assist not only in the clarification of the major features in the experimentally observed Raman spectral data for the parent scytonemin but also support a protocol proposed for their analytical discrimination. The results of this study provide a basis for the search for molecules of this type in future astrobiological missions of exploration and the search for extinct and extant life terrestrially. Copyright © 2013 Elsevier B.V. All rights reserved.

  9. Studying protocol-based pain management in the emergency department

    Akkamahadevi Patil

    2017-01-01

    Full Text Available Background: Majority of the patients presenting to emergency department (ED have pain. ED oligoanalgesia remains a challenge. Aims: This study aims to study the effect of implementing a protocol-based pain management in the ED on (1 time to analgesia and (2 adequacy of analgesia obtained. Settings and Design: Cross-sectional study in the ED. Methods: Patients aged 18–65 years of age with pain of numeric rating scale (NRS ≥4 were included. A series of 100 patients presenting before introduction of the protocol-based pain management were grouped “pre-protocol,” and managed as per existing practice. Following this, a protocol for management of all patients presenting to ED with pain was implemented. Another series of 100 were grouped as “post-protocol” and managed as per the new pain management protocol. The data of patients from both the groups were collected and analyzed. Statistical Analysis Used: Descriptive statistical tests such as percentage, mean and standard deviation and inferential statistical tests such as Pearson coefficient, Student's t-test were applied. Differences were interpreted as significant when P < 0.05. Results: Mean time to administer analgesic was significantly lesser in the postprotocol group (preprotocol 20.30 min vs. postprotocol 13.05 min; P < 0.001. There was significant difference in the pain relief achieved (change in NRS between the two groups, with greater pain relief achieved in the postprotocol group (preprotocol group 4.6800 vs. postprotocol group 5.3600; P < 0.001. Patients' rating of pain relief (assessed on E5 scale was significantly higher in the postprotocol group (preprotocol 3.91 vs. postprotocol 4.27; P = 0.001. Patients' satisfaction (North American Spine Society scale with the overall treatment was also compared and found to be significantly higher in postprotocol group (mean: preprotocol 1.59 vs. postprotocol 1.39; P = 0.008. Conclusion: Protocol-based pain management provided timely and

  10. TH-C-18A-08: A Management Tool for CT Dose Monitoring, Analysis, and Protocol Review

    Wang, J; Chan, F; Newman, B; Larson, D; Leung, A; Fleischmann, D; Molvin, L; Marsh, D; Zorich, C; Phillips, L

    2014-01-01

    Purpose: To develop a customizable tool for enterprise-wide managing of CT protocols and analyzing radiation dose information of CT exams for a variety of quality control applications Methods: All clinical CT protocols implemented on the 11 CT scanners at our institution were extracted in digital format. The original protocols had been preset by our CT management team. A commercial CT dose tracking software (DoseWatch,GE healthcare,WI) was used to collect exam information (exam date, patient age etc.), scanning parameters, and radiation doses for all CT exams. We developed a Matlab-based program (MathWorks,MA) with graphic user interface which allows to analyze the scanning protocols with the actual dose estimates, and compare the data to national (ACR,AAPM) and internal reference values for CT quality control. Results: The CT protocol review portion of our tool allows the user to look up the scanning and image reconstruction parameters of any protocol on any of the installed CT systems among about 120 protocols per scanner. In the dose analysis tool, dose information of all CT exams (from 05/2013 to 02/2014) was stratified on a protocol level, and within a protocol down to series level, i.e. each individual exposure event. This allows numerical and graphical review of dose information of any combination of scanner models, protocols and series. The key functions of the tool include: statistics of CTDI, DLP and SSDE, dose monitoring using user-set CTDI/DLP/SSDE thresholds, look-up of any CT exam dose data, and CT protocol review. Conclusion: our inhouse CT management tool provides radiologists, technologists and administration a first-hand near real-time enterprise-wide knowledge on CT dose levels of different exam types. Medical physicists use this tool to manage CT protocols, compare and optimize dose levels across different scanner models. It provides technologists feedback on CT scanning operation, and knowledge on important dose baselines and thresholds

  11. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  12. Improvement of burn pain management through routine pain monitoring and pain management protocol.

    Yang, Hyeong Tae; Hur, Giyeun; Kwak, In-Suk; Yim, Haejun; Cho, Yong Suk; Kim, Dohern; Hur, Jun; Kim, Jong Hyun; Lee, Boung Chul; Seo, Cheong Hoon; Chun, Wook

    2013-06-01

    Pain management is an important aspect of burn management. We developed a routine pain monitoring system and pain management protocol for burn patients. The purpose of this study is to evaluate the effectiveness of our new pain management system. From May 2011 to November 2011, the prospective study was performed with 107 burn patients. We performed control group (n=58) data analysis and then developed the pain management protocol and monitoring system. Next, we applied our protocol to patients and performed protocol group (n=49) data analysis, and compared this to control group data. Data analysis was performed using the Numeric Rating Scale (NRS) of background pain and procedural pain, Clinician-Administered PTSD Scale (CAPS), Hamilton Depression Rating Scale (HDRS), State-Trait Anxiety Inventory Scale (STAIS), and Holmes and Rahe Stress Scale (HRSS). The NRS of background pain for the protocol group was significantly decreased compared to the control group (2.8±2.0 versus 3.9±1.9), and the NRS of procedural pain of the protocol group was significantly decreased compared to the control group (4.8±2.8 versus 3.7±2.5). CAPS and HDRS were decreased in the protocol group, but did not have statistical significance. STAIS and HRSS were decreased in the protocol group, but only the STAIS had statistical significance. Our new pain management system was effective in burn pain management. However, adequate pain management can only be accomplished by a continuous and thorough effort. Therefore, pain control protocol and pain monitoring systems need to be under constant revision and improvement using creative ideas and approaches. Copyright © 2012 Elsevier Ltd and ISBI. All rights reserved.

  13. The Assistant Manager - a Key Factor of the Managerial Team

    Lecturer Ph. D. Niculina Vargolici

    2009-05-01

    Full Text Available The new economic context, marked by the crisis and by radical transformations of the labor market, generates the need for more and more sophisticated skills for the assistant manager. That is because the efficiency of the secretarial activity implies both strategic skills and complex abilities, starting from knowledge about the specific activity of the company/institution where the person works as assistant manager, to connected areas such as: management, marketing, human resources, brand communication, company’s culture etc. Whether the manager changes his job together with the “boss”, or the boss is changed and he is bond to adapt to new conditions, a strong team spirit between the manager and his assistant is one of the most important elements that contribute to the productivity and efficiency of the both. The loyalty to the boss and to the company where he works, his adaptation capacity, his competence and his professionalism make the today’s assistant manager a key factor of the managerial team. The essence of the assistant manager job consists in making more efficient the managerial activities, namely, to make it respond to the expectations expressed or not of the manager, or even to anticipate them.

  14. Knowledge management - A key issue for EnBW

    Zimmer, H.J.

    2007-01-01

    Full text: The motivation for knowledge management can be summarised with the words of EnBW CEO Prof. Claassen, 2002 'knowledge manager of the year' in Germany: 'Against the backdrop of the ever-increasing complexity of strategic planning and activities on the operational front, knowledge management is a key factor in the long-term success of our business.' Professional knowledge management motivates and supports employees, helping to create networks in which they can lay the foundations for the future success of the company. It must be emphasised that knowledge management is the responsibility of management, and EnBW has established a suitable framework consisting of different action levels and goals: 1) Normative level (corporate culture): creating a knowledge-aware and knowledge-friendly corporate culture 2) Strategic level (human resources): systematic gearing of internal intangible potentials towards future requirements. 3) Operational level (information/communication): making the required knowledge available in the necessary scope and quality, in the right place and at the right time. If knowledge management can generally be seen as basic requirement for successful companies, then it is even more important for nuclear operators. Today, nuclear energy is an important generating technology in Europe, for Germany and for EnBW with major future potential, but a technology that must be employed with great caution and attaching top priority to safe operation. For nuclear operators, the rule is always 'safety first'. But knowledge management implemented and used in the right way can also enhance both safety and competitive operation of the plants at the same time. In this connection, successful knowledge management plays a key role due to the complex interplay of many different disciplines within a demanding legal and regulatory framework, the paramount importance of collective past experience and the high demands on the expertise of the employees operating nuclear

  15. Protocol for the management of psychiatric patients with psychomotor agitation.

    Vieta, Eduard; Garriga, Marina; Cardete, Laura; Bernardo, Miquel; Lombraña, María; Blanch, Jordi; Catalán, Rosa; Vázquez, Mireia; Soler, Victòria; Ortuño, Noélia; Martínez-Arán, Anabel

    2017-09-08

    Psychomotor agitation (PMA) is a state of motor restlessness and mental tension that requires prompt recognition, appropriate assessment and management to minimize anxiety for the patient and reduce the risk for escalation to aggression and violence. Standardized and applicable protocols and algorithms can assist healthcare providers to identify patients at risk of PMA, achieve timely diagnosis and implement minimally invasive management strategies to ensure patient and staff safety and resolution of the episode. Spanish experts in PMA from different disciplines (psychiatrists, psychologists and nurses) convened in Barcelona for a meeting in April 2016. Based on recently issued international consensus guidelines on the standard of care for psychiatric patients with PMA, the meeting provided the opportunity to address the complexities in the assessment and management of PMA from different perspectives. The attendees worked towards producing a consensus for a unified approach to PMA according to the local standards of care and current local legislations. The draft protocol developed was reviewed and ratified by all members of the panel prior to its presentation to the Catalan Society of Psychiatry and Mental Health, the Spanish Society of Biological Psychiatry (SEPB) and the Spanish Network Centre for Research in Mental Health (CIBERSAM) for input. The final protocol and algorithms were then submitted to these organizations for endorsement. The protocol presented here provides guidance on the appropriate selection and use of pharmacological agents (inhaled/oral/IM), seclusion, and physical restraint for psychiatric patients suspected of or presenting with PMA. The protocol is applicable within the Spanish healthcare system. Implementation of the protocol and the constituent algorithms described here should ensure the best standard of care of patients at risk of PMA. Episodes of PMA could be identified earlier in their clinical course and patients could be managed in

  16. Key Management Infrastructure Increment 2 (KMI Inc 2)

    2016-03-01

    Infrastructure (KMI) is a unified, scalable, interoperable, and trusted infrastructure that provides net-centric key management services to systems that rely ...products to human users and devices (hereinafter referred to as "supported" or "security-enabled") to enable secure communications. The objectives for...Threshold met during Spiral 1 IOT &E and FOT&E. Connected Networks: Network Identification KMI products and services shall be provided to KMI clients via

  17. From Expert Protocols to Standardized Management of Infectious Diseases.

    Lagier, Jean-Christophe; Aubry, Camille; Delord, Marion; Michelet, Pierre; Tissot-Dupont, Hervé; Million, Matthieu; Brouqui, Philippe; Raoult, Didier; Parola, Philippe

    2017-08-15

    We report here 4 examples of management of infectious diseases (IDs) at the University Hospital Institute Méditerranée Infection in Marseille, France, to illustrate the value of expert protocols feeding standardized management of IDs. First, we describe our experience on Q fever and Tropheryma whipplei infection management based on in vitro data and clinical outcome. Second, we describe our management-based approach for the treatment of infective endocarditis, leading to a strong reduction of mortality rate. Third, we report our use of fecal microbiota transplantation to face severe Clostridium difficile infections and to perform decolonization of patients colonized by emerging highly resistant bacteria. Finally, we present the standardized management of the main acute infections in patients admitted in the emergency department, promoting antibiotics by oral route, checking compliance with the protocol, and avoiding the unnecessary use of intravenous and urinary tract catheters. Overall, the standardization of the management is the keystone to reduce both mortality and morbidity related to IDs. © The Author 2017. Published by Oxford University Press for the Infectious Diseases Society of America. All rights reserved. For permissions, e-mail: journals.permissions@oup.com.

  18. Developing a protocol for evaluating teachers' classroom management styles

    Đigić, Gordana; Stojiljković, Snežana

    2011-01-01

    The paper first defines the concept of classroom management and highlights the key-elements and presuppositions of successful classroom management. Further follows a description of different styles based on views of Martin and Baldwin who stress three dimensions of classroom management: personality (the teacher's convictions about the student's personality and actions based on them), teaching (what the teacher does to initiate and maintain class activities) and discipline (the procedures the ...

  19. Smart Traffic Management Protocol Based on VANET architecture

    Amilcare Francesco Santamaria

    2014-01-01

    Full Text Available Nowadays one of the hottest theme in wireless environments research is the application of the newest technologies to road safety problems and traffic management exploiting the (VANET architecture. In this work, a novel protocol that aims to achieve a better traffic management is proposed. The overal system is able to reduce traffic level inside the city exploiting inter-communication among vehicles and support infrastructures also known as (V2V and (V2I communications. We design a network protocol called (STMP that takes advantages of IEEE 802.11p standard. On each road several sensors system are placed and they are responsible of monitoring. Gathered data are spread in the network exploiting ad-hoc protocol messages. The increasing knowledge about environment conditions make possible to take preventive actions. Moreover, having a realtime monitoring of the lanes it is possible to reveal roads and city blocks congestions in a shorter time. An external entity to the (VANET is responsible to manage traffic and rearrange traffic along the lanes of the city avoiding huge traffic levels.

  20. Implementation of a Hydrotherapy Protocol to Improve Postpartum Pain Management.

    Batten, Meghann; Stevenson, Eleanor; Zimmermann, Deb; Isaacs, Christine

    2017-03-01

    A growing number of women are seeking alternatives to traditional pharmacologic pain management during birth. While there has been an extensive array of nonpharmacologic options developed for labor, there are limited offerings in the postpartum period. The purpose of this quality improvement project was to implement a hydrotherapy protocol in the early postpartum period to improve pain management for women choosing a nonmedicated birth. The postpartum hydrotherapy protocol was initiated in a certified nurse-midwife (CNM) practice in an urban academic medical center. All women who met criteria were offered a 30-minute warm water immersion bath at one hour postpartum. Pain scores were assessed prior to the bath, at 15 minutes after onset, and again at the conclusion (30 minutes). Women who completed the bath were also asked to complete a brief survey on their experience with postpartum hydrotherapy. In women who used the bath (N = 45), there was a significant reduction in pain scores (P hydrotherapy protocol as an alternative or adjunct to medication for early postpartum pain management that significantly reduced pain and improved the birth experience for those who used it. It offers a nonpharmacologic alternative where there have traditionally been limited options. © 2017 by the American College of Nurse-Midwives.

  1. A harmonized segmentation protocol for hippocampal and parahippocampal subregions: why do we need one and what are the key goals?

    Olsen, Rosanna K.; Berron, David; Carr, Valerie A.; Stark, Craig E.L.; Amaral, Robert S.C.; Amunts, Katrin; Augustinack, Jean C.; Bender, Andrew R.; Bernstein, Jeffrey D.; Boccardi, Marina; Bocchetta, Martina; Burggren, Alison; Chakravarty, M. Mallar; Chupin, Marie; Ekstrom, Arne; de Flores, Robin; Insausti, Ricardo; Kanel, Prabesh; Kedo, Olga; Kennedy, Kristen M.; Kerchner, Geoffrey A.; LaRocque, Karen F.; Liu, Xiuwen; Maass, Anne; Malykhin, Nicolai; Mueller, Susanne G.; Ofen, Noa; Palombo, Daniela J.; Parekh, Mansi B.; Pluta, John B.; Pruessner, Jens C.; Raz, Naftali; Rodrigue, Karen M.; Schoemaker, Dorothee; Shafer, Andrea T.; Steve, Trevor A.; Suthana, Nanthia; Wang, Lei; Winterburn, Julie L.; Yassa, Michael A.; Yushkevich, Paul A.; la Joie, Renaud

    2016-01-01

    The advent of high-resolution magnetic resonance imaging (MRI) has enabled in vivo research in a variety of populations and diseases on the structure and function of hippocampal subfields and subdivisions of the parahippocampal gyrus. Due to the many extant and highly discrepant segmentation protocols, comparing results across studies is difficult. To overcome this barrier, the Hippocampal Subfields Group was formed as an international collaboration with the aim of developing a harmonized protocol for manual segmentation of hippocampal and parahippocampal subregions on high-resolution MRI. In this commentary we discuss the goals for this protocol and the associated key challenges involved in its development. These include differences among existing anatomical reference materials, striking the right balance between reliability of measurements and anatomical validity, and the development of a versatile protocol that can be adopted for the study of populations varying in age and health. The commentary outlines these key challenges, as well as the proposed solution of each, with concrete examples from our working plan. Finally, with two examples, we illustrate how the harmonized protocol, once completed, is expected to impact the field by producing measurements that are quantitatively comparable across labs and by facilitating the synthesis of findings across different studies. PMID:27862600

  2. Managing key capabilities: A challenge for nuclear plant building companies

    Pascal Corbel

    2003-01-01

    The nuclear plant building industry faces a paradoxical situation. The use of nuclear reactors to produce energy for civil purposes is both a promising technology, with potentially huge outlets, and a technology facing declining demand. One of the key problems is then: how to maintain the capabilities necessary to benefit from the potential recovery? The resource-based view of strategic management has shown the importance of different types of resources and capabilities in gaining a sustainable competitive advantage. Successful incumbents in the market of nuclear station building have built those kinds of distinctive capabilities that give them a competitive advantage over potential new entrants. But we show that, without a permanent activity in plant building, preserving those capabilities necessitates specific strategic action. We firstly develop the argument that the nuclear plant building industry is in a paradoxical situation in terms of demand and technical performance trends. Secondly, we try to identify the key capabilities of the incumbents. We show that companies in that field use mainly three types of distinctive capabilities: pure technical and scientific knowledge in direct relation to the use of nuclear as an energy generator, competences in risk management and competences in large project management, including financing. Thirdly, we show that although some of those capabilities are used through other nuclear-related activities such as plant maintenance or fuel supply, some of them necessitate taking strategic actions in order to be preserved. We argue that this should be a priority of nuclear equipment company managers in the next few years. (author)

  3. Managing Key Risks in Post-Merger IS Integration

    Alaranta, Mar; Mathiassen, L

    2014-01-01

    Mergers and acquisitions (M&A) require organizations to blend together different information system (IS) configurations. Unfortunately, less than 50 percent of M&A's achieve their goals, with IS integration being a major problem. Here, the authors offer a framework to help managers prepare for......, analyze, and mitigate risks during post-merger IS integration. They identify key risks relating to IS integration content, process, and context, and present five strategies for mitigating those risks. Their framework aims to help managers proactively reduce the impact of adverse events. Adopting...... the framework supported by their templates is straightforward and the time and resources required are minimal. When properly executed, adoption increases the likelihood of successful merger outcomes; the framework is thus a valuable addition to the management tool box and can be applied in collaboration...

  4. Free-space measurement-device-independent quantum-key-distribution protocol using decoy states with orbital angular momentum

    Wang, Le; Zhao, Sheng-Mei; Gong, Long-Yan; Cheng, Wei-Wen

    2015-12-01

    In this paper, we propose a measurement-device-independent quantum-key-distribution (MDI-QKD) protocol using orbital angular momentum (OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol, the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie’s successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover, the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence (AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source. Project supported by the National Natural Science Foundation of China (Grant Nos. 61271238 and 61475075), the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20123223110003), the Natural Science Research Foundation for Universities of Jiangsu Province of China (Grant No. 11KJA510002), the Open Research Fund of Key Laboratory of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, China (Grant No. NYKL2015011), and the

  5. Active listening: The key of successful communication in hospital managers.

    Jahromi, Vahid Kohpeima; Tabatabaee, Seyed Saeed; Abdar, Zahra Esmaeili; Rajabi, Mahboobeh

    2016-03-01

    One of the important causes of medical errors and unintentional harm to patients is ineffective communication. The important part of this skill, in case it has been forgotten, is listening. The objective of this study was to determine whether managers in hospitals listen actively. This study was conducted between May and June 2014 among three levels of managers at teaching hospitals in Kerman, Iran. Active Listening skill among hospital managers was measured by self-made Active Listening Skill Scale (ALSS), which consists of the key elements of active listening and has five subscales, i.e., Avoiding Interruption, Maintaining Interest, Postponing Evaluation, Organizing Information, and Showing Interest. The data were analyzed by IBM-SPSS software, version 20, and the Pearson product-moment correlation coefficient, the chi-squared test, and multiple linear regressions. The mean score of active listening in hospital managers was 2.32 out of 3.The highest score (2.27) was obtained by the first-level managers, and the top managers got the lowest score (2.16). Hospital mangers were best in showing interest and worst in avoiding interruptions. The area of employment was a significant predictor of avoiding interruption and the managers' gender was a strong predictor of skill in maintaining interest (p < 0.05). The type of management and education can predict postponing evaluation, and the length of employment can predict showing interest (p < 0.05). There is a necessity for the development of strategies to create more awareness among the hospital managers concerning their active listening skills.

  6. Information Systems Management: an Australasian view of key issues - 1996

    Graham Pervan

    1997-11-01

    Full Text Available As part of a longitudinal study of key information systems management issues, a survey of Australasia's largest 500 organisations was conducted to identify which issues were perceived by the IS executives as being important, problematic and critical over the next three to five years. The most critical issues were revealed to be a mix of technology management issues (IT infrastructure, communications, disaster recovery, strategic management issues (competitive advantage, IS planning, aligning the IS organisation, people management issues (organisational learning, educating senior management in IT, systems development and data management issues (effective use of the data resource, and end-user computing. This reflects the need for a balance of business, technical, and people skills in an IS executive. Non-critical issues were mostly related to systems development and the individual technologies which must be integrated and managed to ensure a responsive IT infrastructure. The study also reveals that some issues are much more important than problematic (disaster recovery, competitive advantage, information architecture, and IS alignment while others are much more problematic than important (end-user computing, IS role and contribution, and BPR. The former reflects a growing level of knowledge in handling these issues, while the latter reflects a continuing problem with them. The differences between this study and similar studies conducted in 1988 and 1992 show that there is a growing confidence in the IS executive's ability to manage the strategic issues, a continuing concern about providing a responsive IT infrastructure (especially communications, and a continuing concern with educating all 'customers' in the organisation in the effective use of IT, including senior management.

  7. Actions of a protocol for radioactive waste management

    Sousa, Joyce Caroline de Oliveira; Andrade, Idalmar Gomes da Silva; Frazão, Denys Wanderson Pereira; Abreu, Lukas Maxwell Oliveira de; França, Clyslane Alves; Macedo, Paulo de Tarso Silva de

    2017-01-01

    Radioactive wastes are all those materials generated in the various uses of radioactive materials, which can not be reused and which have radioactive substances in quantities that can not be treated as ordinary waste. All management of these wastes must be carried out carefully, including actions ranging from its collection to the point where they are generated to their final destination. However, any and all procedures must be carried out in order to comply with the requirements for the protection of workers, individuals, the public and the environment. The final product of the study was a descriptive tutorial on the procedures and actions of a standard radioactive waste management protocol developed from scientific publications on radiation protection. The management of radioactive waste is one of the essential procedures in the radiological protection of man and the environment where the manipulation of radioactive materials occurs. The standard radioactive management protocol includes: collection, segregation of various types of wastes, transport, characterization, treatment, storage and final disposal. The radioactive wastes typology interferes with sequencing and the way in which actions are developed. The standardization of mechanisms in the management of radioactive waste contributes to the radiological safety of all those involved

  8. Key Management for Secure Multicast over IPv6 Wireless Networks

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  9. Safe management of nuclear energy. A key towards sustainable development

    Dreimanis, Andrejs

    2011-01-01

    Management of nuclear risks - crucial factor for acceptance of novel nuclear projects. We propose an interdisciplinary approach to societal optimization of nuclear energy management. As the keystones we choose: self-organization concept, 2) the principle of the requisite variety. A primary source of growth of internal variety - information and knowledge. Comprehensive knowledge management and informational support firstly is needed in: Technical issues: a) nuclear energy indicators of safety and reliability, b) extensive research and development of advanced technologies, c) multilateral cooperation in common projects; Societal issues: a) general nuclear awareness, b) risk management, engagement in decision-making, personnel education and training, staff renascence, c) public education, stakeholder involvement. There is shown: public education and social learning - efficient self-organization mechanisms, thereby forming a learning and knowledge-creating community. Such an acquired and created knowledge could facilitate solution of key socio-technical issues of nuclear safety as a) public acceptance, in particular, of siting of novel nuclear power plant and radioactive waste disposal objects, b) promotion of adequate perception of risk, equity and trust factors, and c) elevation of safety level of nuclear facilities and adequate management of nuclear risks. The importance of multi-level confidence building at global, regional and national levels is emphasized. (author)

  10. A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN

    Chang-Seop Park

    2015-01-01

    Full Text Available A new key management and security scheme is proposed to integrate Layer Two (L2 and Layer Three (L3 keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN. Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6 that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.

  11. Wireless Intelligent Sensors Management Application Protocol-WISMAP

    Antonio Jesus Yuste-Delgado

    2010-09-01

    Full Text Available Although many recent studies have focused on the development of new applications for wireless sensor networks, less attention has been paid to knowledge-based sensor nodes. The objective of this work is the development in a real network of a new distributed system in which every sensor node can execute a set of applications, such as fuzzy ruled-base systems, measures, and actions. The sensor software is based on a multi-agent structure that is composed of three components: management, application control, and communication agents; a service interface, which provides applications the abstraction of sensor hardware and other components; and an application layer protocol. The results show the effectiveness of the communication protocol and that the proposed system is suitable for a wide range of applications. As real world applications, this work presents an example of a fuzzy rule-based system and a noise pollution monitoring application that obtains a fuzzy noise indicator.

  12. Key management of the double random-phase-encoding method using public-key encryption

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  13. Optimising waste management performance - The key to successful decommissioning

    Keep, Matthew

    2007-01-01

    Available in abstract form only. Full text of publication follows: On the 1. of April 2005 the United Kingdom's Nuclear Decommissioning Authority became responsible for the enormous task of decommissioning the UK's civilian nuclear liabilities. The success of the NDA in delivering its key objectives of safer, cheaper and faster decommissioning depends on a wide range factors. It is self-evident, however, that the development of robust waste management practices by those charged with decommissioning liability will be at the heart of the NDA's business. In addition, the implementation of rigorous waste minimisation techniques throughout decommissioning will deliver tangible environmental benefits as well as better value for money and release funds to accelerate the decommissioning program. There are mixed views as to whether waste minimisation can be achieved during decommissioning. There are those that argue that the radioactive inventory already exists, that the amount of radioactivity cannot be minimised and that the focus of activities should be focused on waste management rather than waste minimisation. Others argue that the management and decommissioning of the UK's civilian nuclear liability will generate significant volumes of additional radioactive waste and it is in this area where the opportunities for waste minimisation can be realised. (author)

  14. Secure Trust Based Key Management Routing Framework for Wireless Sensor Networks

    Jugminder Kaur

    2016-01-01

    Full Text Available Security is always a major concern in wireless sensor networks (WSNs. Several trust based routing protocols are designed that play an important role in enhancing the performance of a wireless network. However they still have some disadvantages like limited energy resources, susceptibility to physical capture, and little protection against various attacks due to insecure wireless communication channels. This paper presents a secure trust based key management (STKF routing framework that establishes a secure trustworthy route depending upon the present and past node to node interactions. This route is then updated by isolating the malicious or compromised nodes from the route, if any, and a dedicated link is created between every pair of nodes in the selected route with the help of “q” composite random key predistribution scheme (RKPS to ensure data delivery from source to destination. The performance of trust aware secure routing framework (TSRF is compared with the proposed routing scheme. The results indicate that STKF provides an effective mechanism for finding out a secure route with better trustworthiness than TSRF which avoids the data dropping, thereby increasing the data delivery ratio. Also the distance required to reach the destination in the proposed protocol is less hence effectively utilizing the resources.

  15. An Analysis of Error Reconciliation Protocols for use in Quantum Key Distribution

    2012-02-01

    INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN // CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR...of the messages passed, and that the time to prepare or separate the message information is negligible . Finally, for this experiment all errors...of interactions becomes negligible . In fact, of the three protocols, experiments performed here have shown that Winnow produces the highest average

  16. Secure multi-party communication with quantum key distribution managed by trusted authority

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  17. Secure multi-party communication with quantum key distribution managed by trusted authority

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2017-06-14

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  18. Review of Evidence for Adult Diabetic Ketoacidosis Management Protocols

    Tara T. T. Tran

    2017-06-01

    Full Text Available BackgroundDiabetic ketoacidosis (DKA is an endocrine emergency with associated risk of morbidity and mortality. Despite this, DKA management lacks strong evidence due to the absence of large randomised controlled trials (RCTs.ObjectiveTo review existing studies investigating inpatient DKA management in adults, focusing on intravenous (IV fluids; insulin administration; potassium, bicarbonate, and phosphate replacement; and DKA management protocols and impact of DKA resolution rates on outcomes.MethodsOvid Medline searches were conducted with limits “all adult” and published between “1973 to current” applied. National consensus statements were also reviewed. Eligibility was determined by two reviewers’ assessment of title, abstract, and availability.ResultsA total of 85 eligible articles published between 1973 and 2016 were reviewed. The salient findings were (i Crystalloids are favoured over colloids though evidence is lacking. The preferred crystalloid and hydration rates remain contentious. (ii IV infusion of regular human insulin is preferred over the subcutaneous route or rapid acting insulin analogues. Administering an initial IV insulin bolus before low-dose insulin infusions obviates the need for supplemental insulin. Consensus-statements recommend fixed weight-based over “sliding scale” insulin infusions although evidence is weak. (iii Potassium replacement is imperative although no trials compare replacement rates. (iv Bicarbonate replacement offers no benefit in DKA with pH > 6.9. In severe metabolic acidosis with pH < 6.9, there is lack of both data and consensus regarding bicarbonate administration. (v There is no evidence that phosphate replacement offers outcome benefits. Guidelines consider replacement appropriate in patients with cardiac dysfunction, anaemia, respiratory depression, or phosphate levels <0.32 mmol/L. (vi Upon resolution of DKA, subcutaneous insulin is recommended with IV insulin infusions

  19. Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

    Molotkov, S. N.

    2008-01-01

    In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper's capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determined for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency (η ∼ 20%) and dark count probability (p dark ∼ 10 -7 )

  20. Key management schemes using routing information frames in secure wireless sensor networks

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  1. Quantum cryptography: Theoretical protocols for quantum key distribution and tests of selected commercial QKD systems in commercial fiber networks

    Jacak, Monika; Jacak, Janusz; Jóźwiak, Piotr; Jóźwiak, Ireneusz

    2016-06-01

    The overview of the current status of quantum cryptography is given in regard to quantum key distribution (QKD) protocols, implemented both on nonentangled and entangled flying qubits. Two commercial R&D platforms of QKD systems are described (the Clavis II platform by idQuantique implemented on nonentangled photons and the EPR S405 Quelle platform by AIT based on entangled photons) and tested for feasibility of their usage in commercial TELECOM fiber metropolitan networks. The comparison of systems efficiency, stability and resistivity against noise and hacker attacks is given with some suggestion toward system improvement, along with assessment of two models of QKD.

  2. Management of the infertile couple: an evidence-based protocol

    Kamel Remah M

    2010-03-01

    Full Text Available Abstract Background Infertility is defined as inability of a couple to conceive naturally after one year of regular unprotected sexual intercourse. It remains a major clinical and social problem, affecting perhaps one couple in six. Evaluation usually starts after 12 months; however it may be indicated earlier. The most common causes of infertility are: male factor such as sperm abnormalities, female factor such as ovulation dysfunction and tubal pathology, combined male and female factors and unexplained infertility. Objectives The aim of this study is to provide the healthcare professionals an evidence-based management protocol for infertile couples away from medical information overload. Methods A comprehensive review where the literature was searched for "Management of infertility and/or infertile couples" at library website of University of Bristol (MetaLib by using a cross-search of different medical databases besides the relevant printed medical journals and periodicals. Guidelines and recommendations were retrieved from the best evidence reviews such as that from the American College of Obstetricians and Gynaecologists (ACOG, American Society for Reproductive Medicine (ASRM, Canadian Fertility and Andrology Society (CFAS, and Royal College of Obstetricians and Gynaecologists (RCOG. Results A simple guide for the clinicians to manage the infertile couples. Conclusions The study deploys a new strategy to translate the research findings and evidence-base recommendations into a simplified focused guide to be applied on routine daily practice. It is an approach to disseminate the recommended medical care for infertile couple to the practicing clinicians.

  3. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.

    Sanchez-Iborra, Ramon; Sánchez-Gómez, Jesús; Pérez, Salvador; Fernández, Pedro J; Santa, José; Hernández-Ramos, José L; Skarmeta, Antonio F

    2018-06-05

    Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN), which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa) and its layer-two supporter LoRa Wide Area Network (LoRaWAN), which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie⁻Hellman Over COSE (EDHOC) is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  4. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach

    Ramon Sanchez-Iborra

    2018-06-01

    Full Text Available Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN, which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa and its layer-two supporter LoRa Wide Area Network (LoRaWAN, which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie–Hellman Over COSE (EDHOC is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  5. Designing and implementing a key account management strategy

    M. A. Sisti

    2011-01-01

    Sales Management offers a global perspective on the opportunities and issues facing today's sales managers. Current textbooks have failed to move beyond the US context; Sales Management provides unique access to European and international experts, with globally relevant case studies.

  6. Organizational agility key factors for dynamic business process management

    Triaa , Wafa; Gzara , Lilia; Verjus , Hervé

    2016-01-01

    International audience; For several years, Business Process Management (BPM) is recognized as a holistic management approach that promotes business effectiveness and efficiency. Increasingly, corporates find themselves, operating in business environments filled with unpredictable, complex and continuous change. Driven by these dynamic competitive conditions, they look for a dynamic management of their business processes to maintain their processes performance. To be competitive, companies hav...

  7. Computerised sepsis protocol management. Description of an early warning system.

    de Dios, Begoña; Borges, Marcio; Smith, Timothy D; Del Castillo, Alberto; Socias, Antonia; Gutiérrez, Leticia; Nicolás, Jordi; Lladó, Bartolomé; Roche, Jose A; Díaz, Maria P; Lladó, Yolanda

    2018-02-01

    New strategies need to be developed for the early recognition and rapid response for the management of sepsis. To achieve this purpose, the Multidisciplinary Sepsis Team (MST) developed the Computerised Sepsis Protocol Management (PIMIS). The aim of this study was to evaluate the convenience of using PIMIS, as well as the activity of the MST. An analysis was performed on the data collected from solicited MST consultations (direct activation of PIMIS by attending physician or telephone request) and unsolicited ones (by referral from the microbiology laboratory or an automatic referral via the hospital vital signs recording software [SIDCV]), as well as the hospital department, source of infection, treatment recommendation, and acceptance of this. Of the 1,581 first consultations, 65.1% were solicited consultations (84.1% activation of PIMIS and 15.9% by telephone). The majority of unsolicited consultations were generated by the microbiology laboratory (95.2%), and 4.8% from the SIDCV. Referral from solicited consultations were generated sooner (5.63days vs 8.47days; P<.001) and came from clinical specialties rather than from the surgical ward (73.0% vs 39.1%; P<.001). A recommendation was made for antimicrobial prescription change in 32% of first consultations. The treating physician accepted 78.1% of recommendations. The high rate of solicited consultations and acceptance of recommended prescription changes suggest that a MST is seen as a helpful resource, and that PIMIS software is perceived to be useful and convenient to use, as it is the main source of referral. Copyright © 2016 Elsevier España, S.L.U. and Sociedad Española de Enfermedades Infecciosas y Microbiología Clínica. All rights reserved.

  8. SHAMROCK: A Synthesizable High Assurance Cryptography and Key Management Coprocessor

    2016-11-01

    cryptographic functions such as Advanced Encryption Standard ( AES ) [5] to produce keywraps to orchestrate key exchanges between groups of devices. These...Storage (MPMS). This is done for two reasons: first, the mission package is encrypted using AES keywrap mode with the CEK [7], which is a special version...Zone 1) denoting ephemeral secrets such as dynamic keys. AES encryption is employed as a one-way function leading from the ephemeral Zone 1 to the

  9. Evaluating Management Information Systems, A Protocol for Automated Peer Review Systems

    Black, Gordon C.

    1980-01-01

    This paper discusses key issues in evaluating an automated Peer Review System. Included are the conceptual base, design, steps in planning structural components, operation parameters, criteria, costs and a detailed outline or protocol for use in the evaluation.

  10. A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks

    Law, Y.W.; Corin, R.J.; Etalle, Sandro; Hartel, Pieter H.

    We present a decentralized key management architecture for wireless sensor networks, covering the aspects of key deployment, key refreshment and key establishment. Our architecture is based on a clear set of assumptions and guidelines. Balance between security and energy consumption is achieved by

  11. Leadership – The Key Element in Improving Quality Management

    Iveta Paulová

    2011-10-01

    Full Text Available The present contribution is processed partial results of the survey application of leadership as one of the fundamental principles of quality management in organizations in the Slovak Republic. This survey was conducted in the research project VEGA No. 1/0229/08 Perspectives of quality management development in coherence with requirements of Slovak republic market. Results from the survey were the basis for proposals to improve the quality management in Slovak industrial organizations

  12. Anesthetic management of minimally invasive intervention in children's oncohematology: preoperative patient management protocol

    V. V. Shchukin

    2013-01-01

    Full Text Available Preoperative patient management protocol in the complex anesthetic support of minimally invasive interventions in pediatric oncology is described. Choice of general anesthesia method was determined by the specific clinical situation by analyzing all of the following factors: airway management, necessity and anticipated duration of unconsciousness, the need for analgesia, necessity and duration of immobilization, prevention of hypothermia, the presence and severity of disturbances in the hemostatic system, comfort for the child and his representatives (parents. Basic techniques of child preoperative examination, as well as the methodology for predicting the risk of perioperative adverse events are described.

  13. Anesthetic management of minimally invasive intervention in children's oncohematology: preoperative patient management protocol

    V. V. Shchukin

    2014-07-01

    Full Text Available Preoperative patient management protocol in the complex anesthetic support of minimally invasive interventions in pediatric oncology is described. Choice of general anesthesia method was determined by the specific clinical situation by analyzing all of the following factors: airway management, necessity and anticipated duration of unconsciousness, the need for analgesia, necessity and duration of immobilization, prevention of hypothermia, the presence and severity of disturbances in the hemostatic system, comfort for the child and his representatives (parents. Basic techniques of child preoperative examination, as well as the methodology for predicting the risk of perioperative adverse events are described.

  14. Financial Management: Opportunities to Improve Experience and Training of Key Navy Comptrollers

    1997-01-01

    .... Furthermore, accurate financial data are needed for measuring performance under GPRA. One key factor in agencies being able to achieve these objectives will be having trained and experienced financial management staff in key positions...

  15. Successful customer value management : Key lessons and emerging trends

    Verhoef, P.C.; Lemon, Katherine

    In the past decade, firms have paid increasing attention to customer value management (CVM). Through customer-centric management systems, firms aim to maximize customer value. In this article, we put forth six important lessons that firms can employ for successful CVM, integrating available research

  16. Development and implementation of the Dutch protocol for rehabilitative management in amyotrophic lateral sclerosis.

    van den Berg, J P; de Groot, I J M; Joha, B C; van Haelst, J M; van Gorcom, P; Kalmijn, S

    2004-12-01

    In the Netherlands, rehabilitation care plays an important role in the symptomatic and palliative treatment of ALS patients. However, until 1999 there were no guidelines or practice parameters available for the management of ALS. Therefore, the Dutch protocol for rehabilitative management in ALS was developed. We describe the development process, the outcome and implementation of the protocol. A concept management protocol was written and the Delphi method was selected to develop the protocol further. This method comprises repetitive discussion sessions from postulates, using a combination of written questionnaires and work-conferences. Between 80 and 90 persons (rehabilitation team members of different professional backgrounds and neurologists) were involved in this process. The protocol was implemented by sending it to all consultants in rehabilitation medicine in the Netherlands; they were asked to inform all the treatment team members about the final protocol and to implement it in their treatment of ALS patients. The protocol was developed in 1999, implemented in 2000 and evaluated in 2001. Recommendations for improvement were made during the evaluation and improvements are currently being developed by an expert group. The protocol is widely used (88.9%) by consultants in rehabilitation medicine and their treatment teams in the Netherlands. The Dutch protocol for rehabilitative management was developed to provide an optimal and adequate care plan for patients with ALS. It is widely used in the Netherlands.

  17. Quality Management and Key Performance Indicators in Oncologic Esophageal Surgery.

    Gockel, Ines; Ahlbrand, Constantin Johannes; Arras, Michael; Schreiber, Elke Maria; Lang, Hauke

    2015-12-01

    Ranking systems and comparisons of quality and performance indicators will be of increasing relevance for complex "high-risk" procedures such as esophageal cancer surgery. The identification of evidence-based standards relevant for key performance indicators in esophageal surgery is essential for establishing monitoring systems and furthermore a requirement to enhance treatment quality. In the course of this review, we analyze the key performance indicators case volume, radicality of resection, and postoperative morbidity and mortality, leading to continuous quality improvement. Ranking systems established on this basis will gain increased relevance in highly complex procedures within the national and international comparison and furthermore improve the treatment of patients with esophageal carcinoma.

  18. The role of primary care in adult weight management: qualitative interviews with key stakeholders in weight management services

    Blane, David N.; Macdonald, Sara; Morrison, David; O’Donnell, Catherine A.

    2017-01-01

    Background Primary care has a key role to play in the prevention and management of obesity, but there remain barriers to engagement in weight management by primary care practitioners. The aim of this study was to explore the views of key stakeholders in adult weight management services on the role of primary care in adult weight management. Methods Qualitative study involving semi-structured interviews with nine senior dietitians involved in NHS weight management from seven Scottish health bo...

  19. Determinants of Key Account Management Effectiveness: The Case ...

    Ethiopian Journal of Business and Economics (The) ... the postulated seven determinants of KAM effectiveness (strategy, solution, people, management, ... The findings provide the empirical application of the KAM model theorized by Zupancic ...

  20. Key challenges facing water resource management in South Africa

    Ashton, P

    2008-11-01

    Full Text Available Resource Managers The Dichotomy of Water Source of destruction, dispute and poverty • Drought and desertification • Flooding and erosion • Salinization • Malnutrition and starvation • Contamination • Epidemics and diseases • Dispute...

  1. Key Practice for Green Building Management In Malaysia

    Aghili Nasim; Bin Mohammed Abdul Hakim; Sheau-Ting Low

    2016-01-01

    This paper identifies the management practices for green building management in Malaysia. A set of practices was ascertained from the reviewed of various established Green Building Standard in the world. Green building practices are significant role in attaining sustainability particularly in the construction industry. Green building is constructed for minimizing impacts to environment as well as decreasing building effects on occupants. To achieve the goals of green buildings, set of managem...

  2. Application of the Intervention Mapping protocol to develop Keys, a family child care home intervention to prevent early childhood obesity.

    Mann, Courtney M; Ward, Dianne S; Vaughn, Amber; Benjamin Neelon, Sara E; Long Vidal, Lenita J; Omar, Sakinah; Namenek Brouwer, Rebecca J; Østbye, Truls

    2015-12-10

    Many families rely on child care outside the home, making these settings important influences on child development. Nearly 1.5 million children in the U.S. spend time in family child care homes (FCCHs), where providers care for children in their own residences. There is some evidence that children in FCCHs are heavier than those cared for in centers. However, few interventions have targeted FCCHs for obesity prevention. This paper will describe the application of the Intervention Mapping (IM) framework to the development of a childhood obesity prevention intervention for FCCHs Following the IM protocol, six steps were completed in the planning and development of an intervention targeting FCCHs: needs assessment, formulation of change objectives matrices, selection of theory-based methods and strategies, creation of intervention components and materials, adoption and implementation planning, and evaluation planning Application of the IM process resulted in the creation of the Keys to Healthy Family Child Care Homes program (Keys), which includes three modules: Healthy You, Healthy Home, and Healthy Business. Delivery of each module includes a workshop, educational binder and tool-kit resources, and four coaching contacts. Social Cognitive Theory and Self-Determination Theory helped guide development of change objective matrices, selection of behavior change strategies, and identification of outcome measures. The Keys program is currently being evaluated through a cluster-randomized controlled trial The IM process, while time-consuming, enabled rigorous and systematic development of intervention components that are directly tied to behavior change theory and may increase the potential for behavior change within the FCCHs.

  3. Managing the pursuit of health and wealth: the key challenges.

    Fidler, David P; Drager, Nick; Lee, Kelley

    2009-01-24

    This article forms part of a six-part Series on trade and health, and sets the stage for this Series by analysing key aspects of the relationship between trade and health. The Series takes stock of this relation and provides timely analysis of the key challenges facing efforts to achieve an appropriate balance between trade and health across a diverse range of issues. This introductory article reviews how trade and health have risen and expanded on global policy agendas in the past decade in unprecedented ways, describes how trade and health issues are respectively governed in international relations, examines the ongoing search for policy coherence between the two policy spheres, and highlights the topics of the remaining articles in the Series.

  4. Managing Water in the Rural-Urban Interface : the Key to Climate ...

    Managing Water in the Rural-Urban Interface : the Key to Climate Change Resilient Cities ... cities - one in East and the other in West Africa - through better management ... Sustaining water use : stakeholders' strategies under different climate ...

  5. MASY: Management of secret keys in federated wireless sensor networks

    Maerien, Jef; Michiels, Sam; Huygens, Christophe; Joosen, Wouter

    2010-01-01

    Wireless Sensor Networks are becoming federated and mobile environments. These new capabilities pose a lot of new possibilities and challenges. One of these challenges is to create a secure environment to allow multiple trusted companies to share and merge their sensor network infrastructure. The most basic need for a secure environment is the deployment of key material. However, most current day research assumes pre-shared secrets between the sensor nodes of most, if not all, companies in a ...

  6. Customer service: the key to remaining competitive in managed care.

    Howard, J E

    2000-01-01

    The health care industry is undergoing a rapid transformation to meet the ever-increasing needs and demands of its patient population. Employers and managed care organizations are demanding better service and higher quality care, while providers are trying to tackle reimbursement cutbacks, streamlining of services, and serving a diverse population. Providers have begun to realize that to overcome these obstacles and meet the needs of their health plans and consumers, they must focus on the demands of their customers. Health care organizations have found they can meet the demands of both the consumer and the managed care industry through initiating and maintaining a customer service program. This essay explains the importance of customer service and its link to success in the managed care environment.

  7. Program management: The keys to a successful ERWM contract

    Lenyk, R.G.; Cusack, J.G.

    1995-01-01

    Program management for a large Environmental Restoration and Waste Management (ERWM) task order contract is both a skill and an art. Unlike project management, program management deals with global and political issues, with both client and home organizations, as well as with day-to-day operations. Program management requires up-front planning and nurturing, for no contract matures successfully by itself. This paper identifies the many opportunities presented in the planning and initial implementation of the contract. Potential traps are identified so that they can be recognized and avoided or mitigated. Teaming and subcontracting are also addressed. The authors rely on years of program management experience to explore such questions as the following: Can you have an integrated team? What needs to be done before you sign Your contract? Do you know who your client(s) is(are)? Have you incorporated the relevant, especially any new, procurement strategies? The US Department of Energy-Oak Ridge Operations (DOE-ORO) ERWM Remedial Design Contract with Foster Wheeler Environmental Corporation is used as a model for exploring these topics. This ERWM Program-which focuses on the Oak Ridge National Laboratory, the Y-12 Weapons Plant, and the K-25 Site in Oak Ridge, Tennessee; the Paducah Gaseous Diffusion Plant in Paducah, Kentucky; and the Portsmouth Gaseous Diffusion Plant in Portsmouth, Ohio-is in its fifth year with over 225 task orders. The program has been highly successful and has obtained from DOE outstanding marks for achieving quality, responsiveness, timeliness, and subcontracting goals

  8. [Discussion on developing a data management plan and its key factors in clinical study based on electronic data capture system].

    Li, Qing-na; Huang, Xiu-ling; Gao, Rui; Lu, Fang

    2012-08-01

    Data management has significant impact on the quality control of clinical studies. Every clinical study should have a data management plan to provide overall work instructions and ensure that all of these tasks are completed according to the Good Clinical Data Management Practice (GCDMP). Meanwhile, the data management plan (DMP) is an auditable document requested by regulatory inspectors and must be written in a manner that is realistic and of high quality. The significance of DMP, the minimum standards and the best practices provided by GCDMP, the main contents of DMP based on electronic data capture (EDC) and some key factors of DMP influencing the quality of clinical study were elaborated in this paper. Specifically, DMP generally consists of 15 parts, namely, the approval page, the protocol summary, role and training, timelines, database design, creation, maintenance and security, data entry, data validation, quality control and quality assurance, the management of external data, serious adverse event data reconciliation, coding, database lock, data management reports, the communication plan and the abbreviated terms. Among them, the following three parts are regarded as the key factors: designing a standardized database of the clinical study, entering data in time and cleansing data efficiently. In the last part of this article, the authors also analyzed the problems in clinical research of traditional Chinese medicine using the EDC system and put forward some suggestions for improvement.

  9. Networking: A Key to Career Communication and Management Consulting Success

    Clark, Thomas

    2009-01-01

    Now that job security with one organization is a relic of the past and companies are outsourcing training and other "nonessential" functions, the author suggests in his career communication classes that students develop the same inventive strategies to plan their employment futures that management consultants use to market themselves in the 21st…

  10. Key characteristics relevant for selecting knowledge management software tools

    Smuts, H

    2011-07-01

    Full Text Available The shift to knowledge as the primary source of value results in the new economy being led by those who manage knowledge effectively. Today’s organisations are creating and leveraging knowledge, data and information at an unprecedented pace – a...

  11. Key Institutions in Business and Management Education Research

    Fornaciari, Charles J.; Arbaugh, J. B.; Asarta, Carlos J.; Bento, Regina F.; Hwang, Alvin; Lund Dean, Kathy

    2017-01-01

    The authors investigate institutional productivity in business and management education (BME) research based on the analysis of 4,464 articles published by 7,210 authors across 17 BME journals over a 10-year period, involving approximately 1,900 schools worldwide. Departing from traditional disciplinary silos, they examine the BME research field…

  12. Waste to energy – key element for sustainable waste management

    Brunner, Paul H.; Rechberger, Helmut

    2015-01-01

    Highlights: • First paper on the importance of incineration from a urban metabolism point of view. • Proves that incineration is necessary for sustainable waste management. • Historical and technical overview of 100 years development of MSW incineration. - Abstract: Human activities inevitably result in wastes. The higher the material turnover, and the more complex and divers the materials produced, the more challenging it is for waste management to reach the goals of “protection of men and environment” and “resource conservation”. Waste incineration, introduced originally for volume reduction and hygienic reasons, went through a long and intense development. Together with prevention and recycling measures, waste to energy (WTE) facilities contribute significantly to reaching the goals of waste management. Sophisticated air pollution control (APC) devices ensure that emissions are environmentally safe. Incinerators are crucial and unique for the complete destruction of hazardous organic materials, to reduce risks due to pathogenic microorganisms and viruses, and for concentrating valuable as well as toxic metals in certain fractions. Bottom ash and APC residues have become new sources of secondary metals, hence incineration has become a materials recycling facility, too. WTE plants are supporting decisions about waste and environmental management: They can routinely and cost effectively supply information about chemical waste composition as well as about the ratio of biogenic to fossil carbon in MSW and off-gas

  13. Cultural Intelligence as a Key Construct for Global Talent Management

    Bücker, J.J.L.E.; Al Ariss, A.

    2014-01-01

    This chapter focuses on the competencies needed to undertake global talent management (GTM), according to the concept of cultural intelligence (CQ) and its four main dimensions. Using real-world examples and excerpts from interviews with relevant actors in this field, this chapter outlines the CQ

  14. Key Elements of the Tutorial Support Management Model

    Lynch, Grace; Paasuke, Philip

    2011-01-01

    In response to an exponential growth in enrolments the "Tutorial Support Management" (TSM) model has been adopted by Open Universities Australia (OUA) after a two-year project on the provision of online tutor support in first year, online undergraduate units. The essential focus of the TSM model was the development of a systemic approach…

  15. Resource management as a key factor for sustainable urban planning

    Agudelo Vera, C.M.; Mels, A.R.; Keesman, K.J.; Rijnaarts, H.H.M.

    2011-01-01

    Due to fast urbanization and increasing living standards, the environmental sustainability of our global society becomes more and more questionable. In this historical review we investigate the role of resources management (RM) and urban planning (UP) and propose ways for integration in sustainable

  16. Media Management Education: Key Themes, Pedagogies, and Challenges

    Förster, Kati; Rohn, Ulrike

    2015-01-01

    The media sphere has changed significantly as a result of globalization, technology, and new habits of media use. Scholars in journalism and mass communication thus call on a transformation and reinvention of higher education in the field. The purpose of this article is to investigate how media management is taught across different institutions,…

  17. Waste to energy – key element for sustainable waste management

    Brunner, Paul H., E-mail: paul.h.brunner@tuwien.ac.at; Rechberger, Helmut

    2015-03-15

    Highlights: • First paper on the importance of incineration from a urban metabolism point of view. • Proves that incineration is necessary for sustainable waste management. • Historical and technical overview of 100 years development of MSW incineration. - Abstract: Human activities inevitably result in wastes. The higher the material turnover, and the more complex and divers the materials produced, the more challenging it is for waste management to reach the goals of “protection of men and environment” and “resource conservation”. Waste incineration, introduced originally for volume reduction and hygienic reasons, went through a long and intense development. Together with prevention and recycling measures, waste to energy (WTE) facilities contribute significantly to reaching the goals of waste management. Sophisticated air pollution control (APC) devices ensure that emissions are environmentally safe. Incinerators are crucial and unique for the complete destruction of hazardous organic materials, to reduce risks due to pathogenic microorganisms and viruses, and for concentrating valuable as well as toxic metals in certain fractions. Bottom ash and APC residues have become new sources of secondary metals, hence incineration has become a materials recycling facility, too. WTE plants are supporting decisions about waste and environmental management: They can routinely and cost effectively supply information about chemical waste composition as well as about the ratio of biogenic to fossil carbon in MSW and off-gas.

  18. Key Determinants of Human Resource Management in Hospitals: Stakeholder Perspective

    Buchelt Beata Irma

    2017-06-01

    Full Text Available Over the past decade, theoretical and empirical research on the various aspects of human resources (HR within the healthcare (HC sector has grown extensively due to its′ strategic importance in the sector. There is a visible tendency among researchers to pursue an effective human resource management (HRM strategies, methods, and tools. Countries implement policies which should increase the amount and competences of employees within healthcare. Providers of HC services (i.e. hospitals tend to enforce modern HRM solutions adapted from business organisations to attract, retain and develop HR. However, these seem not be as effective as they could (Hyde et al., 2013. Because of this, authors approached a researched reality from the point of view of a contextual paradigm, assuming that HRM solutions to be effective should match the reality of HC providers (Pocztowski, 2008. The aim of the research was to detect determinants which might influence the management of medical personnel in hospitals and identify the possible strength of these determinants so a more adjusted organisational and human resource management strategy could be elaborated. The list of possible determinants of hospital operations as the result of meta-analysis was elaborated. The list created the basis for interviews conducted among stakeholders and experts. Respondents were asked to appraise the factors with the usage of numerical scale considering their influence on medical personnel management in hospitals (physicians, nurses and others. In total, there were 28 interviews completed. The general conclusion which can be drawn from the analysis of these data is that hospitals should reorient their HRM practices in such the way that not only the quantitative but also the qualitative aspect of performance would be properly handled. This paper draws from HRM theory (contextual approach, stakeholder theory, and healthcare management theory, adding new insight to each in the context of

  19. Optimal energy management of urban rail systems: Key performance indicators

    González-Gil, A.; Palacin, R.; Batty, P.

    2015-01-01

    Highlights: • An overall picture of urban rail energy use is provided. • Performance indicators are developed for urban rail system energy optimisation. • A multi-level methodology for assessing energy efficiency measures is presented. - Abstract: Urban rail systems are facing increasing pressure to minimise their energy consumption and thusly reduce their operational costs and environmental impact. However, given the complexity of such systems, this can only be effectively achieved through a holistic approach which considers the numerous interdependences between subsystems (i.e. vehicles, operations and infrastructure). Such an approach requires a comprehensive set of energy consumption-related Key Performance Indicators (KEPIs) that enable: a multilevel analysis of the actual energy performance of the system; an assessment of potential energy saving strategies; and the monitoring of the results of implemented measures. This paper proposes an original, complete list of KEPIs developed through a scientific approach validated by different stakeholders. It consists of a hierarchical list of 22 indicators divided into two levels: 10 key performance indicators, to ascertain the performance of the whole system and complete subsystems; and 12 performance indicators, to evaluate the performance of single units within subsystems, for example, a single rail vehicle or station. Additionally, the paper gives a brief insight into urban rail energy usage by providing an adequate context in which to understand the proposed KEPIs, together with a methodology describing their application when optimising the energy consumption of urban rail systems

  20. Six key elements' analysis of FAC effective management in nuclear power plant

    Zhong Zhaojiang; Chen Hanming

    2010-01-01

    Corporate Commitment, Analysis, Operating Experience, Inspection, Training and Engineering Judgment, Long-Term Strategy are the six key elements of FAC effective management in nuclear power plant. Corporate commitment is the economy base of FAC management and ensure of management system, Analysis is the method of FAC's optimization and consummation, Operating experience is the reference and complementarity of FAC, Inspection is the base of accumulating FAC data, Training and engineering judgment is the technical complementarity and deepening, Long-term strategy is successful key of FAC management. Six key elements supplement each other, and make up of a full system of FAC effective management. For present FAC management in our national nuclear power plant, six key elements are the core and bring out the best in each other to found the FAC effective management system and prevent great FAC occurrence. (authors)

  1. Implementation of a Rapid, Protocol-based TIA Management Pathway.

    Jarhult, Susann J; Howell, Melissa L; Barnaure-Nachbar, Isabelle; Chang, Yuchiao; White, Benjamin A; Amatangelo, Mary; Brown, David F; Singhal, Aneesh B; Schwamm, Lee H; Silverman, Scott B; Goldstein, Joshua N

    2018-03-01

    Our goal was to assess whether use of a standardized clinical protocol improves efficiency for patients who present to the emergency department (ED) with symptoms of transient ischemic attack (TIA). We performed a structured, retrospective, cohort study at a large, urban, tertiary care academic center. In July 2012 this hospital implemented a standardized protocol for patients with suspected TIA. The protocol selected high-risk patients for admission and low/intermediate-risk patients to an ED observation unit for workup. Recommended workup included brain imaging, vascular imaging, cardiac monitoring, and observation. Patients were included if clinical providers determined the need for workup for TIA. We included consecutive patients presenting during a six-month period prior to protocol implementation, and those presenting between 6-12 months after implementation. Outcomes included ED length of stay (LOS), hospital LOS, use of neuroimaging, and 90-day risk of stroke or TIA. From 01/2012 to 06/2012, 130 patients were evaluated for TIA symptoms in the ED, and from 01/2013 to 06/2013, 150 patients. The final diagnosis was TIA or stroke in 45% before vs. 41% after (p=0.18). Following the intervention, the inpatient admission rate decreased from 62% to 24% (pTIA among those with final diagnosis of TIA was 3% for both periods. Implementation of a TIA protocol significantly reduced ED LOS and total hospital LOS.

  2. Temporary Operational Protocol for making safe and managing Orphaned or Seized Radioactive Sources

    2013-01-01

    This protocol outlines the arrangements to manage the safe interim storage of an orphaned radioactive source or of a source identified for seizure, pending its ultimate disposal. Such sources may be sources found outside of regulatory control, detected at a frontier or seized in the public interest. This includes a radioactive source arising from a CBRN, chemical, biological, radiological, nuclear, incident, following neutralisation of any associated dispersal device and confirmation of the suspect object as radioactive. The arrangements in this protocol are meant to be consistent with and used in conjunction with relevant protocols to the Major Emergency Framework Document and may be revisited as necessary as those protocols are further developed

  3. Audit as Key Element of System Management Improvement in Company

    L. Wojtynek

    2007-07-01

    Full Text Available This article presents what is an audit for a company, tries to regularize the quality audits, presents main differences between separate types of audits and between audit and control. There are also some exemplary types of nonconformance in a company. Each system has a risk of deficiencies. They can result from material defects or human imperfection. A good quality system should allow the company to detect them in an organized and systematical manner. It guarantees that the irregularities will be removed before they cause a defective production. Quality management consists of planning the quality via quality plans, control and research plans, and supervision and verification by audits and controls. The objective of this paper is to present a special message of audit for organizations which is the improvement of management system in company. Quality audit is used with reference to quality system and its elements, to process, products and services. It compares the real values with expected ones with reference to the activities connected with quality and their results, and planned data. Thanks to quality audits, it is possible to state if the quality management instruments achieve the desired effect. Quality audit can be conducted for the internal and external purposes. One of the quality audit purposes is to estimate if the improvement is necessary or to take corrective actions. The universality of audit, which is completed by periodic system review preformed by head management, allows the use of its application effects both on the strategic and operational effects. Audit is often misled with quality monitoring or control, i.e. activities which aim to control the process or accept the product. Therefore this paper shows the differences between the notions. The information used to conduct an audit is only based on facts (evidence objective, which really exist, independent on emotions or prejudice. They can be documented, declared, based on observed

  4. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

    Syed Muhammad Khaliq-ur-Rahman Raazi

    2010-04-01

    Full Text Available Wireless body area networks (WBAN consist of resource constrained sensing devices just like other wireless sensor networks (WSN. However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  5. BARI+: a biometric based distributed key management approach for wireless body area networks.

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  6. Management of key pension plan risks from the user aspects

    Rakonjac-Antić Tatjana

    2013-01-01

    Full Text Available The pension system is an important form of protection of individuals, i.e. of their ensuring for a period of living after retirement, when they are no longer able for working engagement. On the other hand, as a form of long-term insurance, this system presents a strong investment incentive for each economy. Pension plans are an important element of the pension system. There are defined benefit plans, defined contribution plans and hybrid plans, which represent a combination of the two previously mentioned plans. The aim of the work is to define the key risks for each of these types of pension plans in order to determine their advantages and disadvantages, from the aspect of their potential users, on the basis of their comparative analysis.

  7. VerSAMI: Versatile and Scalable key management for Smart Grid AMI systems

    Benmalek , Mourad; Challal , Yacine; Derhab , Abdelouahid; Bouabdallah , Abdelmadjid

    2018-01-01

    International audience; In this paper, we propose four new key management schemes for Advanced Metering Infrastructure (AMI) to secure data communications in the Smart Grid (SG). The schemes are based on individual and batch rekeying operations using a novel multi-group key graph structure, are also versatile in the sense that they can support broadcast, unicast, as well as multicast communications. Security analysis shows that our schemes satisfy key management security properties. Furthermo...

  8. Development of a standard communication protocol for an emergency situation management in nuclear power plants

    Kim, Man Cheol, E-mail: charleskim@kaeri.re.k [Integrated Risk Assessment Center, Korea Atomic Energy Research Institute, 150, Deokjin-dong, Yuseong-gu, Daejeon 305-353 (Korea, Republic of); Park, Jinkyun; Jung, Wondea [Integrated Risk Assessment Center, Korea Atomic Energy Research Institute, 150, Deokjin-dong, Yuseong-gu, Daejeon 305-353 (Korea, Republic of); Kim, Hanjeom; Kim, Yoon Joong [YGN Nuclear Power Division Training Center, Korea Hydro and Nuclear Power Company, 517 Kyemari, Hongnong-eup, Yeongkwang-gun, Chonnam 513-880 (Korea, Republic of)

    2010-06-15

    Correct communication between main control room (MCR) operators is an important factor in the management of emergency situations in nuclear power plants (NPPs). For this reason, a standard communication protocol for the management of emergency situations in NPPs has been developed, with the basic direction of enhancing the safety of NPPs and the standardization of communication protocols. To validate the newly developed standard communication protocol, validation experiments with 10 licensed NPP MCR operator teams was performed. From the validation experiments, it was found that the use of the standard communication protocol required more time, but it can contribute to the enhancement of the safety of NPPs by an operators' better grasp of the safety-related parameters and a more efficient and clearer communication between NPP operators, while imposing little additional workloads on the NPP MCR operators. The standard communication protocol is expected to be used to train existing NPP MCR operators without much aversion, as well as new operators.

  9. Knowledge communication: a key to successful crisis management.

    Johansson, Anders; Härenstam, Malin

    2013-09-01

    A winning concept of crisis management can be summarized in 2 words: knowledge communication. If decision makers, communicators, experts, and the public understand what the crisis is about and share their knowledge, the process of handling it will be optimized. Effective crisis communication implies the necessity of an unhindered but purposeful exchange of information within and between authorities, organizations, media, involved individuals, and groups before, during, and after a crisis. This article focuses on the importance of the before, or prevention, part of a crisis since it holds a rich possibility to enhance the chances for successful crisis management of a bioterrorism incident. An extended perspective on crisis communication efficiently links to a more thorough understanding of risk perception with various stakeholders and the public, which also will be helpful for situational awareness. Furthermore, the grounded baseline for the dialogue type of crisis communication suitable in modern society and to modern social media is achieved by linking to those risk communication efforts that are made. The link between risk and crisis should be afforded more attention since, especially in biosecurity, there would be no crisis without risk negligence and poor or malfunctioning preventive efforts.

  10. Geriatric hip fracture management: keys to providing a successful program.

    Basu, N; Natour, M; Mounasamy, V; Kates, S L

    2016-10-01

    Hip fractures are a common event in older adults and are associated with significant morbidity, mortality and costs. This review examines the necessary elements required to implement a successful geriatric fracture program and identifies some of the barriers faced when implementing a successful program. The Geriatric Fracture Center (GFC) is a treatment model that standardizes the approach to the geriatric fracture patient. It is based on five principles: surgical fracture management; early operative intervention; medical co-management with geriatricians; patient-centered, standard order sets to employ best practices; and early discharge planning with a focus on early functional rehabilitation. Implementing a geriatric fracture program begins with an assessment of the hospital's data on hip fractures and standard care metrics such as length of stay, complications, time to surgery, readmission rates and costs. Business planning is essential along with the medical planning process. To successfully develop and implement such a program, strong physician leadership is necessary to articulate both a short- and long-term plan for implementation. Good communication is essential-those organizing a geriatric fracture program must be able to implement standardized plans of care working with all members of the healthcare team and must also be able to foster relationships both within the hospital and with other institutions in the community. Finally, a program of continual quality improvement must be undertaken to ensure that performance outcomes are improving patient care.

  11. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks

    Ying Zhang

    2016-01-01

    Full Text Available In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  12. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  13. Adaptability and flexibility : keys towards successful SCAT data management

    Lamarche, A.

    2008-01-01

    The Shoreline Cleanup Assessment Technique (SCAT) is the standard method used in North America to document oiling conditions in the aftermath of an oil spill. The data generated by SCAT can support all aspects of shoreline spill response, including treatment strategies, selecting treatment methods, providing detailed instructions to response personnel and evaluating the response effort. However, some adaptations were needed, such as adding shoreline types specific to the impacted area, accommodating multiple teams surveying the same shoreline segment, and adding descriptors to characterize unique practical aspects of oil conditions. This paper presented a review, description and examples of the various adaptations that were needed to provide SCAT data management support during a number of spill response incidents. 10 refs., 3 tabs., 12 figs

  14. Resource management as a key factor for sustainable urban planning.

    Agudelo-Vera, Claudia M; Mels, Adriaan R; Keesman, Karel J; Rijnaarts, Huub H M

    2011-10-01

    Due to fast urbanization and increasing living standards, the environmental sustainability of our global society becomes more and more questionable. In this historical review we investigate the role of resources management (RM) and urban planning (UP) and propose ways for integration in sustainable development (SD). RM follows the principle of circular causation, and we reflect on to what extent RM has been an element for urban planning. Since the existence of the first settlements, a close relationship between RM, urbanization and technological development has been present. RM followed the demand for urban resources like water, energy, and food. In history, RM has been fostered by innovation and technology developments and has driven population growth and urbanization. Recent massive resource demand, especially in relation to energy and material flows, has altered natural ecosystems and has resulted in environmental degradation. UP has developed separately in response to different questions. UP followed the demand for improved living conditions, often associated to safety, good manufacturing and trading conditions and appropriate sanitation and waste management. In history UP has been a developing research area, especially since the industrial era and the related strong urbanization at the end of the 18th century. UP responded to new emerging problems in urban areas and became increasingly complex. Nowadays, UP has to address many objectives that are often conflicting, including, the urban sustainability. Our current urban un-sustainability is rooted in massive resource consumption and waste production beyond natural limits, and the absence of flows from waste to resources. Therefore, sustainable urban development requires integration of RM into UP. We propose new ways to this integration. Copyright © 2011 Elsevier Ltd. All rights reserved.

  15. Symmetric Link Key Management for Secure Neighbor Discovery in a Decentralized Wireless Sensor Network

    2017-09-01

    KEY MANAGEMENT FOR SECURE NEIGHBOR DISCOVERY IN A DECENTRALIZED WIRELESS SENSOR NETWORK by Kelvin T. Chew September 2017 Thesis Advisor...and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT...DATE September 2017 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE SYMMETRIC LINK KEY MANAGEMENT FOR SECURE NEIGHBOR

  16. Key Account Management and Quality in Business-to-Business Relationships

    Ojasalo, Jukka

    2000-01-01

    What are the main elements of successful Key Account Management (KAM)? What is the nature of quality for the company and for the individual in business-to-business relationships? What kind of managerial practices are required at the company and individual level in Key Account Management? This paper focuses on these central aspects of KAM. It describes the main elements of KAM, which is a systematic marketing management approach in the business-to-business context with the objective to build p...

  17. Protocol for the quantification of greenhouse gas emissions from waste management activities

    2013-10-01

    The Waste Sector GHG Protocol is intended to provide guidelines for calculating and reporting greenhouse gas (GHG) emissions associated with a waste management service, over a specific time period (usually one year) and based on simple operational data. The Protocol itself has evolved with time, going through 4 version updates. The different versions correspond to evolutions initiated by the original Entreprises pour l'Environnement Working Group (Seche Environnement, Suez Environnement and Veolia Environnement) but also to the suggestions and feedback provided by several waste associations that have reviewed and commented on the Protocol. As a result, several worldwide associations have validated and used the Protocol for their own greenhouse gas inventories. The version 5 of the Waste Sector GHG Protocol has received the 'Built on the GHG Protocol' label. With such label, the Waste Sector Protocol reinforces its desire to be the reference tool for the waste sector by ensuring its users of a total and transparent coherence and conformity with the GHG Protocol Corporate Standard's requirements. The Protocol is also available on the following web page: http://www.ghgprotocol.org/Tools-Built-on-GHG-Protocol. The Waste Sector GHG Protocol aims at: Providing a consistent and transparent approach to quantify, report and verify GHG direct (scope 1), indirect (scope 2) and avoided emissions of waste management actors; Establishing best practice across the waste sector for the implementation of coherent and homogeneous GHG emissions inventories; Explaining waste sector's particularities in terms of GHG emissions (diffuse emission from landfills, GHG avoided emissions, carbon sequestration); Helping companies to take proper commitments and stakeholders to understand and verify those commitments. The Protocol consists of a manual with two additional documents: A 'Frequently Asked Questions' document; A 'Follow-up of modifications

  18. Sustainable energy management - a prerequisite for the realization Kyoto Protocol

    Mirjana Golušin

    2012-07-01

    Full Text Available Energy management can be defined as the process of planning, directing, implementing and controlling the process of generation, transmission and energy consumption. Energy management is a kind of synthesis of phenomena and concepts of modern energy management (management, or the use of modern settings management in the energy sector. Furthermore, when outlining the basic settings for power management Modern management is based on the assumptions of sustainability and conservation of energy stability for present and future generations. Therefore, modern energy management can be seen as a kind of synthesis of three actuarial sciences: energy, sustainable development and management. Sustainable Energy Management is a unique new concept, idea and approach that require many changes in the traditional way of understanding and interpretation of energy management at all levels. Sustainable energy management concept can not therefore be construed as an adopted and defined the concept, but must be constantly modified and adjusted in accordance with changes in the three areas that define it, and in accordance with the specific country or region where applicable. Accordingly, sustainable energy management can be defined as the process of energy management that is based on fundamental principles of sustainable development.

  19. Can action research strengthen district health management and improve health workforce performance? A research protocol.

    Mshelia, C; Huss, R; Mirzoev, T; Elsey, H; Baine, S O; Aikins, M; Kamuzora, P; Bosch-Capblanch, X; Raven, J; Wyss, K; Green, A; Martineau, T

    2013-08-30

    The single biggest barrier for countries in sub-Saharan Africa (SSA) to scale up the necessary health services for addressing the three health-related Millennium Development Goals and achieving Universal Health Coverage is the lack of an adequate and well-performing health workforce. This deficit needs to be addressed both by training more new health personnel and by improving the performance of the existing and future health workforce. However, efforts have mostly been focused on training new staff and less on improving the performance of the existing health workforce. The purpose of this paper is to disseminate the protocol for the PERFORM project and reflect on the key challenges encountered during the development of this methodology and how they are being overcome. The overall aim of the PERFORM project is to identify ways of strengthening district management in order to address health workforce inadequacies by improving health workforce performance in SSA. The study will take place in three districts each in Ghana, Tanzania and Uganda using an action research approach. With the support of the country research teams, the district health management teams (DHMTs) will lead on planning, implementation, observation, reflection and redefinition of the activities in the study. Taking into account the national and local human resource (HR) and health systems (HS) policies and practices already in place, 'bundles' of HR/HS strategies that are feasible within the context and affordable within the districts' budget will be developed by the DHMTs to strengthen priority areas of health workforce performance. A comparative analysis of the findings from the three districts in each country will add new knowledge on the effects of these HR/HS bundles on DHMT management and workforce performance and the impact of an action research approach on improving the effectiveness of the DHMTs in implementing these interventions. Different challenges were faced during the development of

  20. Cost savings using a protocol approach to manage anemia in a hemodialysis unit.

    Charlesworth, Emily C; Richardson, Robert M; Battistella, Marisa

    2014-01-01

    National guidelines recommend using anemia management protocols to guide treatment. The objective of this study was to determine if an anemia management protocol would improve hemoglobin (Hgb) indices in hemodialysis patients and to measure whether the protocol would reduce the use and cost of darbepoetin alfa (DBO) and intravenous (IV) iron in hemodialysis patients. An anemia management protocol was created and implemented for hemodialysis patients at our institution. A retrospective observational review of the use of DBO and IV iron as well as changes in Hgb, transferrin saturation and ferritin in 174 patients was conducted 6 months before and after implementation of the anemia protocol. The number of Hgb measurements in the target range increased from 44.3 to 46.0% (p = 0.48) after protocol implementation. The mean weekly dose of DBO was reduced from 34.56 ± 31.12 to 31.11 ± 28.64 μg post-protocol implementation (p = 0.011), which translated to a cost savings of USD 41,649 over 6 months. The mean monthly IV iron dose also decreased from 139.56 ± 98.83 to 97.65 ± 79.05 mg (p DBO and iron agents while increasing the number of patients in the target Hgb range, which led to significant cost savings in the treatment of anemia.

  1. Performance Evaluation of Distributed Mobility Management Protocols: Limitations and Solutions for Future Mobile Networks

    J. Carmona-Murillo

    2017-01-01

    Full Text Available Mobile Internet data traffic has experienced an exponential growth over the last few years due to the rise of demanding multimedia content and the increasing number of mobile devices. Seamless mobility support at the IP level is envisioned as a key architectural requirement in order to deal with the ever-increasing demand for data and to efficiently utilize a plethora of different wireless access networks. Current efforts from both industry and academia aim to evolve the mobility management protocols towards a more distributed operation to tackle shortcomings of fully centralized approaches. However, distributed solutions face several challenges that can result in lower performance which might affect real-time and multimedia applications. In this paper, we conduct an analytical and simulated evaluation of the main centralized and proposed Distributed Mobility Management (DMM solutions. Our results show that, in some scenarios, when users move at high speed and/or when the mobile node is running long-lasting applications, the DMM approaches incur high signaling cost and long handover latency.

  2. Key Account Management - nøglen til vækst?

    Skogberg, Simon

    2011-01-01

    Artiklen tager afsæt i en beskrivelse af begrebet Key Account Management samt den udvikling begrebet har gennemgået de senere år. Artiklen diskuterer problemstillingen om hvorvidt virksomheder skal implementere Key Account Management som et styringsredskab, men sætter samtidig spørgsmålstegn ved om...... Key Account Management nu også er den frelser som faglitteraturen ofte betegner det som. Artiklen inddrager eksempler fra en nordjysk energivirksomhed, hvis aktuelle situation illustrerer de udfordringer mange virksomheder i praksis står overfor....

  3. Implementation of a Rapid, Protocol-based TIA Management Pathway

    Susann J. Jarhult

    2018-02-01

    Full Text Available Introduction: Our goal was to assess whether use of a standardized clinical protocol improves efficiency for patients who present to the emergency department (ED with symptoms of transient ischemic attack (TIA. Methods: We performed a structured, retrospective, cohort study at a large, urban, tertiary care academic center. In July 2012 this hospital implemented a standardized protocol for patients with suspected TIA. The protocol selected high-risk patients for admission and low/intermediate-risk patients to an ED observation unit for workup. Recommended workup included brain imaging, vascular imaging, cardiac monitoring, and observation. Patients were included if clinical providers determined the need for workup for TIA. We included consecutive patients presenting during a six-month period prior to protocol implementation, and those presenting between 6–12 months after implementation. Outcomes included ED length of stay (LOS, hospital LOS, use of neuroimaging, and 90-day risk of stroke or TIA. Results: From 01/2012 to 06/2012, 130 patients were evaluated for TIA symptoms in the ED, and from 01/2013 to 06/2013, 150 patients. The final diagnosis was TIA or stroke in 45% before vs. 41% after (p=0.18. Following the intervention, the inpatient admission rate decreased from 62% to 24% (p<0.001, median ED LOS decreased by 1.2 hours (5.7 to 4.9 hours, p=0.027, and median total hospital LOS from 29.4 hours to 23.1 hours (p=0.019. The proportion of patients receiving head computed tomography (CT went from 68% to 58% (p=0.087; brain magnetic resonance (MR imaging from 83% to 88%, (p=0.44 neck CT angiography from 32% to 22% (p=0.039; and neck MR angiography from 61% to 72% (p=0.046. Ninety-day stroke or recurrent TIA among those with final diagnosis of TIA was 3% for both periods. Conclusion: Implementation of a TIA protocol significantly reduced ED LOS and total hospital LOS.

  4. A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.

    Lang, Jun

    2012-01-30

    In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.

  5. A Collaborative Protocol for Encopresis Management in School-Aged Children.

    Chaney, Carol A.

    1995-01-01

    Encopresis affects a small percentage of children, but most parents are unaware of the condition and react punitively. The lengthy, complex management program usually includes physiological and behavioral approaches. The collaborative management protocol focuses on medical clinicians, families, children, school nurses, and teachers, and can help…

  6. An Overview of the Object Protocol Model (OPM) and the OPM Data Management Tools.

    Chen, I-Min A.; Markowitz, Victor M.

    1995-01-01

    Discussion of database management tools for scientific information focuses on the Object Protocol Model (OPM) and data management tools based on OPM. Topics include the need for new constructs for modeling scientific experiments, modeling object structures and experiments in OPM, queries and updates, and developing scientific database applications…

  7. Evaluation of a protocol for the non-operative management of perforated peptic ulcer.

    Marshall, C; Ramaswamy, P; Bergin, F G; Rosenberg, I L; Leaper, D J

    1999-01-01

    The non-operative management of perforated peptic ulcer has previously been shown to be both safe and effective although it remains controversial. A protocol for non-operative management was set up in this hospital in 1989. Adherence to the guidelines in the protocol has been audited over a 6-year period with a review of outcome. The case-notes of patients with a diagnosis of perforated peptic ulcer were reviewed. Twelve guidelines from the protocol were selected for evaluation of compliance to the protocol. Forty-nine patients underwent non-operative treatment initially. Eight patients failed to respond and underwent operation. Complications included abscess formation (seven patients), renal failure (one), gastric ileus (one), chest infection (two), and cardiac failure and stroke (one). Four deaths occurred in this group. Adherence to certain protocol guidelines was poor, notably those concerning prevention of thromboembolism, use of antibiotics, use of contrast examination to confirm the diagnosis and referral for follow-up endoscopy. Two gastric cancers were detected on subsequent endoscopy. This experience demonstrates that non-operative treatment can be used successfully in a general hospital. Adherence to protocol guidelines was found to be variable and the protocol has therefore been simplified. This study highlights the need for an accurate diagnosis and the importance of follow-up endoscopy.

  8. Key Element Performance In Occupational Safety And Health Management System In Organization (A Literature

    Agus Salim Nuzaihan Aras

    2016-01-01

    Full Text Available Setting an effective safety and health management system is crucial in order to reduce problem relating to accident and ill in management organizational. It is involve with multiple level of management and stakeholders who empower the organization to the management in handling the safety and health cases and issues in organizational. It is necessary to prepare a well knowledge about safety and health management systems and preparing the framework for setting a certain scale in measuring its performance in this area. The successful or failure of management does showing the capability of the organization in delivering the responsible to management levels [1]. The problem in safe work issues and practices cause by the management commitment and involvement that create improper safety program and procedures, and this crisis keep continuing till present [2]. This paper describes about key element of safety and health management system and measuring the performance in order to get an effective management system in organization that describes the process in achieving effectiveness in management. The literature review will be conducted through the data collection from research findings and defined the strong character of key element in which focusing on measuring performance. A guide on key element performance in occupational safety and health management system is specifically drawn to prepare for a future research.

  9. Protocol and Practice in the Adaptive Management of Waterfowl Harvests

    Fred Johnson

    1999-06-01

    Full Text Available Waterfowl harvest management in North America, for all its success, historically has had several shortcomings, including a lack of well-defined objectives, a failure to account for uncertain management outcomes, and inefficient use of harvest regulations to understand the effects of management. To address these and other concerns, the U.S. Fish and Wildlife Service began implementation of adaptive harvest management in 1995. Harvest policies are now developed using a Markov decision process in which there is an explicit accounting for uncontrolled environmental variation, partial controllability of harvest, and structural uncertainty in waterfowl population dynamics. Current policies are passively adaptive, in the sense that any reduction in structural uncertainty is an unplanned by-product of the regulatory process. A generalization of the Markov decision process permits the calculation of optimal actively adaptive policies, but it is not yet clear how state-specific harvest actions differ between passive and active approaches. The Markov decision process also provides managers the ability to explore optimal levels of aggregation or "management scale" for regulating harvests in a system that exhibits high temporal, spatial, and organizational variability. Progress in institutionalizing adaptive harvest management has been remarkable, but some managers still perceive the process as a panacea, while failing to appreciate the challenges presented by this more explicit and methodical approach to harvest regulation. Technical hurdles include the need to develop better linkages between population processes and the dynamics of landscapes, and to model the dynamics of structural uncertainty in a more comprehensive fashion. From an institutional perspective, agreement on how to value and allocate harvests continues to be elusive, and there is some evidence that waterfowl managers have overestimated the importance of achievement-oriented factors in

  10. Ex-post evaluation of the Kyoto Protocol: four key lessons for the 2015 Paris Agreement. Climate Report no. 44

    Morel, Romain; Shishlov, Igor

    2014-05-01

    Signed in 1997, following the 1992 United Nations Framework Convention on Climate Change (UNFCCC), the Kyoto Protocol (KP) is the first international tool focused on greenhouse gas (GHG) mitigation involving as many countries: in its final configuration, thirty-six developed countries committed to reduce their emissions by 4% between 1990 and 2008-2012 - the first commitment period (CP1). In April 2014, the data from the CP1 was officially published. This report thus presents the first comprehensive ex-post analysis of the first period of the KP. In terms of emission reductions - and the effectiveness of the agreement - countries party to the protocol globally surpassed their commitment reducing their emissions by 24%. While positive, this 'over-achievement' appears to be mainly due to the highly-criticized 'hot air' - or the emission reductions that already occurred in economies in transition before 1997 - equivalent to 18.5% of total base-year emissions. Nevertheless, other developed countries would have complied even without the 'hot air', as they have globally seen economic growth coupled with declining emissions. This low-carbon growth can be explained by better primary energy-mix, the continued expansion of the service sector, declining GHG intensity of industries and out-sourcing the production of goods overseas. Despite a low need to use flexibility mechanisms, KP countries actively embraced all of them. Based on the results of this report, it is possible to draw four key lessons from the Kyoto experience for the establishment of a new global agreement that is expected to be signed in Paris in 2015: 1. The GHG emission coverage of the KP was insufficient to stop the growth of global GHG emissions. Thus, expanding the coverage is a priority. The KP included rules tailored for specific sectors' or countries' contexts that helped ensure their participation. In that perspective, it can be strategic to implement specific

  11. Trust Threshold Based Public Key Management in Mobile Ad Hoc Networks

    2016-03-05

    detection 49 [6,7] , authentication, access control, key management, iso- 50 lating misbehaving nodes for effective routing [6,8,9] , and 51 many other...83 84 85 aims to achieve: (a) resiliency against misbehaving nodes 86 in the network to maintain minimum security vulnerabil- 87 ity; (b...neighbor will decreas the misbehaving node’s direct competence trust. Fur thermore, this neighbor when acting as a recommended public key management in

  12. Managing and developing key supplier relationships : An introduction to the special issue, discussion and implications

    Ivens, B.; van de Vijver, M.A.R.; Vos, G.C.J.M.

    2013-01-01

    This article provides an introduction to this special issue on managing and developing key supplier relationships. Key suppliers are increasingly seen as strategic assets of buying companies which need careful nurturing to fully utilize their potential for value creation. The six articles of this

  13. ERP as an organization innovation : Key users and cross-boundary knowledge management

    Maas, J.-B.; van Fenema, P.C.; Soeters, J.M.M.L.

    2016-01-01

    Purpose The purpose of this study is to provide more insight in the ways key users act as knowledge managers and boundary spanners during the enterprise resource planning (ERP) system usage phase. Despite the recognized importance of key users during the implementation phase of an ERP system, little

  14. IMPlementation of A Relatives' Toolkit (IMPART study): an iterative case study to identify key factors impacting on the implementation of a web-based supported self-management intervention for relatives of people with psychosis or bipolar experiences in a National Health Service: a study protocol.

    Lobban, Fiona; Appleton, Victoria; Appelbe, Duncan; Barraclough, Johanna; Bowland, Julie; Fisher, Naomi R; Foster, Sheena; Johnson, Sonia; Lewis, Elizabeth; Mateus, Céu; Mezes, Barbara; Murray, Elizabeth; O'Hanlon, Puffin; Pinfold, Vanessa; Rycroft-Malone, Jo; Siddle, Ron; Smith, Jo; Sutton, Chris J; Walker, Andrew; Jones, Steven H

    2017-12-28

    Web-based interventions to support people to manage long-term health conditions are available and effective but rarely used in clinical services. The aim of this study is to identify critical factors impacting on the implementation of an online supported self-management intervention for relatives of people with recent onset psychosis or bipolar disorder into routine clinical care and to use this information to inform an implementation plan to facilitate widespread use and inform wider implementation of digital health interventions. A multiple case study design within six early intervention in psychosis (EIP) services in England, will be used to test and refine theory-driven hypotheses about factors impacting on implementation of the Relatives' Education And Coping Toolkit (REACT). Qualitative data including behavioural observation, document analysis, and in-depth interviews collected in the first two EIP services (wave 1) and analysed using framework analysis, combined with quantitative data describing levels of use by staff and relatives and impact on relatives' distress and wellbeing, will be used to identify factors impacting on implementation. Consultation via stakeholder workshops with staff and relatives and co-facilitated by relatives in the research team will inform development of an implementation plan to address these factors, which will be evaluated and refined in the four subsequent EIP services in waves 2 and 3. Transferability of the implementation plan to non-participating services will be explored. Observation of implementation in a real world clinical setting, across carefully sampled services, in real time provides a unique opportunity to understand factors impacting on implementation likely to be generalizable to other web-based interventions, as well as informing further development of implementation theories. However, there are inherent challenges in investigating implementation without influencing the process under observation. We outline our

  15. Chilean Nutrition Management Protocol for Patients With Phenylketonuria

    Gabriela Castro

    2017-02-01

    Full Text Available Since neonatal screening and early nutritional treatment began, it has been possible to reverse the neurological damage that phenylketonuria (PKU causes. Scientific evidence gathered over more than 50 years on the monitoring of individuals with PKU indicates that a phenylalanine level of about 6 mg/dL (360 µmol/L is ideal and points to the necessity of starting a long-term phenylalanine-restricted diet in which blood phenylalanine level should stay between 2 and 6 mg/dL (120-360 µmol/L. This article aims to establish the general basis for proper monitoring of people with PKU and provide a useful tool for clinicians overseeing treatment. We hope to establish similar criteria throughout Latin America and create a uniform protocol in order to have comparative monitoring results for the region.

  16. Implementing a pain management nursing protocol for orthopaedic surgical patients: Results from a PAIN OUT project.

    Cui, Cui; Wang, Ling-Xiao; Li, Qi; Zaslansky, Ruth; Li, Li

    2018-04-01

    To investigate the effect of introducing a standardised pain management nursing protocol in orthopaedic patients undergoing surgery. Postoperative pain is a common phenomenon but is still undertreated in hospitalised patients. Nurses' lack of sufficient knowledge and skills about pain management may be a contributing factor to poor outcomes. An interventional, separate sample pre- and post-test. A pain management nursing protocol was introduced and a handbook and training sessions regarding management of postsurgical pain were provided to the nurses on a Joint Orthopaedic ward at a university-affiliated general hospital in Guangzhou, China. Before and after the intervention, nurses' knowledge about pain management and attitudes were assessed, and perioperative management practices and pain-related patient-reported outcomes were evaluated. Sixteen and 15 registered nurses, and 77 and 71 patients participated in the study before and after the intervention, respectively. Nurses' scores related to knowledge and skills increased significantly after the protocol was introduced but were still insufficient with regard to pharmacological-related items. The proportion of patients receiving a combined opioid and nonopioid increased after the intervention. Clinically significant changes were observed in some patient-reported outcomes, such as worst pain since surgery, percentage of time experiencing severe pain, and pain interference with activities out of bed. There were significant changes in nonpharmacological methods administered by nurses to patients or used by patients to relieve pain. Implementation of a pain management nursing protocol combined with education in one surgical ward was associated with nurses' increased knowledge and attitudes regarding pain, a change in some management practices, and improvement in a number of pain-related patient-reported outcomes. It was feasible to develop and implement a standardised pain management nursing protocol and use it in the

  17. Development of GPS survey data management protocols/policy.

    2010-08-01

    This project developed a statewide policy and criteria for collecting, analyzing, and managing global position system (GPS) survey data. The research project determined the needs of the Department in adopting the GPS real time kinetic (GPS RTK) stake...

  18. Evaluation of Adherence to a Convulsion management Protocol for Children in Rwanda

    kaputu-kalal-malu, Célestin; D'Amour Birindabagabo, Jean; Walker, Timothy David; Mafuta-Musalu, Eric; Ntumba-Tshitenge, Olga; Preux, Pierre-Marie; MISSON, Jean-Paul

    2014-01-01

    Inappropriate seizure management may result in high morbidity and mortality. We assessed the adherence of health professionals in southern Rwanda to a national protocol for pharmacological management of seizures in children. A questionnaire featuring a 5-year-old child with generalized prolonged seizures was administered. The questions focused on the choice of initial treatment and the sequence of management following failure of the initial treatment choice. Benzodiazepine was cho...

  19. Managing symptoms during cancer treatments: evaluating the implementation of evidence-informed remote support protocols

    Stacey Dawn

    2012-11-01

    Full Text Available Abstract Background Management of cancer treatment-related symptoms is an important safety issue given that symptoms can become life-threatening and often occur when patients are at home. With funding from the Canadian Partnership Against Cancer, a pan-Canadian steering committee was established with representation from eight provinces to develop symptom protocols using a rigorous methodology (CAN-IMPLEMENT©. Each protocol is based on a systematic review of the literature to identify relevant clinical practice guidelines. Protocols were validated by cancer nurses from across Canada. The aim of this study is to build an effective and sustainable approach for implementing evidence-informed protocols for nurses to use when providing remote symptom assessment, triage, and guidance in self-management for patients experiencing symptoms while undergoing cancer treatments. Methods A prospective mixed-methods study design will be used. Guided by the Knowledge to Action Framework, the study will involve (a establishing an advisory knowledge user team in each of three targeted settings; (b assessing factors influencing nurses’ use of protocols using interviews/focus groups and a standardized survey instrument; (c adapting protocols for local use, ensuring fidelity of the content; (d selecting intervention strategies to overcome known barriers and implementing the protocols; (e conducting think-aloud usability testing; (f evaluating protocol use and outcomes by conducting an audit of 100 randomly selected charts at each of the three settings; and (g assessing satisfaction with remote support using symptom protocols and change in nurses’ barriers to use using survey instruments. The primary outcome is sustained use of the protocols, defined as use in 75% of the calls. Descriptive analysis will be conducted for the barriers, use of protocols, and chart audit outcomes. Content analysis will be conducted on interviews/focus groups and usability testing

  20. Agri-Environmental Resource Management by Large-Scale Collective Action: Determining KEY Success Factors

    Uetake, Tetsuya

    2015-01-01

    Purpose: Large-scale collective action is necessary when managing agricultural natural resources such as biodiversity and water quality. This paper determines the key factors to the success of such action. Design/Methodology/Approach: This paper analyses four large-scale collective actions used to manage agri-environmental resources in Canada and…

  1. Perceptions of food risk management among key stakeholders: Results from a cross-European study

    Kleef, van E.; Frewer, L.J.; Chryssochoidis, G.M.; Houghton, J.R.; Korzen-Bohr, S.; Krystallis, T.; Lassen, J.; Pfenning, U.; Rowe, G.

    2006-01-01

    In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management. The objective of this study is to identify similarities and differences in perceptions of, and attitudes

  2. Current protocols in the management of oral submucous fibrosis: An update.

    Arakeri, Gururaj; Rai, Kirthi Kumar; Boraks, George; Patil, Shekar Gowda; Aljabab, Abdulsalam S; Merkx, M A W; Carrozzo, Marco; Brennan, Peter A

    2017-07-01

    Oral submucous fibrosis (OSMF) is a debilitating condition of oral cavity which has significant potential for malignant transformation. In spite of over 20 years of research, the pathogenesis of the condition is still obscure and no single management modality is effective. Many OSMF treatment protocols have been proposed to alleviate the signs and symptoms of the disorder and there is overwhelming evidence that as areca nut is primary cause, stopping its use may have a considerable effect on symptoms rather than reversing pre-existing fibrosis. We present a review of the current protocols for managing OSMF. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  3. The most important key-performance indicators at BC Timişoara management

    Silvia GRĂDINARU

    2017-02-01

    Full Text Available This article explores the management of objectives at BC Timisoara, motivation and performance analysis. The aim of this paper is to analyze the most important key factors involved in a basketball team performance. The basketball team analyzed is BC Timisoara, a well established club in this city of Western Romania. The article combines information gathered from BC Timisoara’s manager and management theories relevant to the topic. Goal setting is affected by financial and human resource factors as well control and regulation functions. Finally motivation plays a key role in players performance.

  4. Advanced Inverter Functions and Communication Protocols for Distribution Management

    Nagarajan, Adarsh; Palmintier, Bryan; Baggu, Murali

    2016-05-05

    This paper aims at identifying the advanced features required by distribution management systems (DMS) service providers to bring inverter-connected distributed energy resources into use as an intelligent grid resource. This work explores the standard functions needed in the future DMS for enterprise integration of distributed energy resources (DER). The important DMS functionalities such as DER management in aggregate groups, including the discovery of capabilities, status monitoring, and dispatch of real and reactive power are addressed in this paper. It is intended to provide the industry with a point of reference for DER integration with other utility applications and to provide guidance to research and standards development organizations.

  5. Managing malocclusion in the mixed dentition: six keys to success. Part 1.

    Fleming, Padhraig S; Johal, Ama; DiBiase, Andrew T

    2008-11-01

    Indications of developing malocclusion are often present in the mixed dentition.With judicious supervision and timely intervention their effects can be minimized. The general dental practitioner is ideally placed to recognize, manage and correct many such incipient problems. This first of two papers considers three keys to success involving, normal dental development, deviations from normal eruption patterns, crossbite correction and habit cessation. The appropriate management of developing malocclusion may simplify later orthodontic management or indeed make such intervention unnecessary.

  6. Development of a community based management protocol for ...

    It is evident that water quality management would only be effective by changing the practices that contribute to diffuse pollution. This paper is based on a project that employed a systematic approach to involve and mobilise rural communities in water quality control programmes. The aim of the project is to develop ...

  7. Delay and cost performance analysis of the diffie-hellman key exchange protocol in opportunistic mobile networks

    Soelistijanto, B.; Muliadi, V.

    2018-03-01

    Diffie-Hellman (DH) provides an efficient key exchange system by reducing the number of cryptographic keys distributed in the network. In this method, a node broadcasts a single public key to all nodes in the network, and in turn each peer uses this key to establish a shared secret key which then can be utilized to encrypt and decrypt traffic between the peer and the given node. In this paper, we evaluate the key transfer delay and cost performance of DH in opportunistic mobile networks, a specific scenario of MANETs where complete end-to-end paths rarely exist between sources and destinations; consequently, the end-to-end delays in these networks are much greater than typical MANETs. Simulation results, driven by a random node movement model and real human mobility traces, showed that DH outperforms a typical key distribution scheme based on the RSA algorithm in terms of key transfer delay, measured by average key convergence time; however, DH performs as well as the benchmark in terms of key transfer cost, evaluated by total key (copies) forwards.

  8. Automation in an Addiction Treatment Research Clinic: Computerized Contingency Management, Ecological Momentary Assessment, and a Protocol Workflow System

    Vahabzadeh, Massoud; Lin, Jia-Ling; Mezghanni, Mustapha; Epstein, David H.; Preston, Kenzie L.

    2009-01-01

    Issues A challenge in treatment research is the necessity of adhering to protocol and regulatory strictures while maintaining flexibility to meet patients’ treatment needs and accommodate variations among protocols. Another challenge is the acquisition of large amounts of data in an occasionally hectic environment, along with provision of seamless methods for exporting, mining, and querying the data. Approach We have automated several major functions of our outpatient treatment research clinic for studies in drug abuse and dependence. Here we describe three such specialized applications: the Automated Contingency Management (ACM) system for delivery of behavioral interventions, the Transactional Electronic Diary (TED) system for management of behavioral assessments, and the Protocol Workflow System (PWS) for computerized workflow automation and guidance of each participant’s daily clinic activities. These modules are integrated into our larger information system to enable data sharing in real time among authorized staff. Key Findings ACM and TED have each permitted us to conduct research that was not previously possible. In addition, the time to data analysis at the end of each study is substantially shorter. With the implementation of the PWS, we have been able to manage a research clinic with an 80-patient capacity having an annual average of 18,000 patient-visits and 7,300 urine collections with a research staff of five. Finally, automated data management has considerably enhanced our ability to monitor and summarize participant-safety data for research oversight. Implications and conclusion When developed in consultation with end users, automation in treatment-research clinics can enable more efficient operations, better communication among staff, and expansions in research methods. PMID:19320669

  9. Key Supplier Relationship Management: The Case of Croatian Medium-Sized and Large Manufacturing Companies

    Dario Miočević

    2011-06-01

    Full Text Available The key supplier relationship management represents a vital organizational process. Companies should pay attention not only to managing customer relationships but also to managing relationships with suppliers in order to perform well. They should identify the extent to which a certain supplier adds value through the procurement process. In this line of reasoning, both theory and practice make a distinction between strategic (key and non-strategic (transactional suppliers. By employing the segmentation of the supply market, companies balance their supplier portfolio and are capable of identifying the key suppliers. They can also develop specific programs and initiatives that are aimed at preserving these relationships. In the empirical part of the paper, a survey was conducted on a sample of 123 medium-sized and large Croatian manufacturing companies. The structural model involving the relationship between the key supplier relationship management and value-oriented purchasing was tested. The results indicate that there is a statistically direct, positive and significant relationship between these two constructs. Likewise, the results stress that a theoretical conceptualization and operationalization of the key supplier relationship management construct is both valid and justified. Finally, the theoretical and practical implications and limitations of this study are offered.

  10. Key elements on implementing an occupational health and safety management system using ISO 45001 standard

    Darabont Doru Costin

    2017-01-01

    Full Text Available Occupational health and safety (OHS management system is one of the main elements of the company’s general management system. During last decade, Romanian companies gained a valuable experience on implementing this type of management systems, using OHSAS 18001 referential and standard. However, the projected release of the ISO 45001 represents a new approach which requires the companies to take in consideration new key elements for a successful implementation of the OHS management system. The aim of the paper is to identify and analyse these key elements, by integration of the following issues: standard requirements, Romanian OHS legislation and good practice examples, including the general control measures for new and emerging risks such as psycho-social risks, workforce ageing and new technologies. The study results represent an important work instrument for each company interested to implement or upgrade its OHS management system using ISO 45001 standard and could be used regardless the company size or activity domain.

  11. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    Le Xuan Hung

    2008-12-01

    Full Text Available For many sensor network applications such as military or homeland security, it is essential for users (sinks to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1 Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2 The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3 The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4 Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5 No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.

  12. A Study on the Key Management Strategy for Wireless Sensor Networks

    Hoon KO

    2015-05-01

    Full Text Available Many users who are in a cyber-space usually want to join the social group to have or to share their information. Now, there are two ways to join the group, the group manager invites them, and the users who want to join ask the owner. These days the group polices usually follow this way. But, it can be faced a security problem when the manager send group messages in near future because they don’t have any securities. Therefore, the security modules to join groups will be needed when they join the group or when they read the group messages. To set the security, we have to think how to keep the key such as a generation /an update/an arrangement, because all users need the key to join the groups or to read the group messages by decrypting. The key are going to be used to joining the group when it dynamically changes such as frequent group joining and leaving. If it applies or uses the existing methods in the smart cities which consider the users who will move globally, it could easily assume that the overhead/the cost of CPU will be increased and it follows capacity down because of lots of the key updates. So, to let them down, we suggest three key strategies, a group key, a subgroup key and a session key in this paper.

  13. Managing orthopedics and neurosciences costs through standard treatment protocols.

    McGinnity, E S; Pluth, T E

    1994-06-01

    High-cost, high-volume specialty programs such as orthopedics and neurosciences find themselves in a position of evaluating the costs and in some cases the appropriateness of medical practices in response to payer scrutiny and provider selection processes. Orthopedics and neurosciences programs are at a stage of development analogous to that of cardiovascular care several years ago. Many of the same trends have come into play, such as payer "carve-outs" for orthopedic services, payer selection of centers of excellence based on cost and quality, reduction of Medicare reimbursement, greater use of high-cost technology, the decline of profitability due to "older, sicker, and tougher" patients, and the recent emergence of national orthopedic specialty networks oriented to national contracts for care. In an era in which payers demand value on both sides of the cost-plus-quality equation, programs are challenged to maximize the return on a patient population rife with "no-win" situations. In the orthopedic service line these include a high proportion of Medicare patients and chronic conditions such as workers' compensation medical back cases or repetitive motion injuries, which can be elusive to diagnose and expensive to treat. Many hospitals continue to lose money on joint replacement surgeries, the largest-volume orthopedic inpatient service, primarily because of the high Medicare population and the cost of implants. Neuroservices, while still relatively well reimbursed, face a rising proportion of Medicare payments as patients live longer and develop chronic, degenerative conditions. Inpatient days are decreasing due to payer pressures to limit hospital stays and to shift inpatient care to outpatient services. Some hospitals "have lost interest in (the orthopedic) service line during the last five years because of recent trends in orthopedic-related inpatient volume and payment." But by managing costs strategically, both the neurosciences and orthopedics service lines

  14. Signcryption-Based Key Management for MANETs Applications in Mobile Commerce

    LI Jingfeng; ZHU Yuefei; ZHANG Yajuan; PAN Heng

    2006-01-01

    Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the business model of mobile commerce if such networks are used as the underlying network technology for mobile commerce. Mobile commerce will remain in a niche market until the security issue is properly addressed. Hence, security is also very important for MANET applications in mobile commerce. Robust key management is one of the most crucial technologies for security of MANETs. In this paper, a new solution for key management is proposed using identity-based (ID-based) signcryption and threshold secret sharing. It enables flexible and efficient key management while respecting the constraints of MANETs. In our solution, each mobile host uses its globally unique identity as its public key. It greatly decreases the computation and storage costs of mobile hosts, as well as communication cost for system key management.

  15. Interventional management of low-flow priapism: A protocol proposal

    Herney Andrés García-Perdomo

    2018-01-01

    Full Text Available Priapism is an involuntary prolonged erection that lasts for more than 4 h. Although several interventions have been proposed to manage the condition, these strategies are based on expert panel opinions, and little evidence exists regarding prognosis and outcomes. To synthetize information about interventions to treat priapism and to make evidence-based recommendations, we performed a literature search of Medline via Ovid, Scopus (including Embase and Lilacs from 1980 to the current day with the following keywords: ischemic priapism, erectile function, drainage, and shunt. The length of the ischemic priapism is an important variable for the prognosis because of the pathophysiology of this condition. Here, we propose a step-by-step approach based on the time and invasiveness of the intervention. However, it is important to note that we could not find any clinical trial that supports this approach, and more research is needed for the future statements.

  16. MSCT renal stone protocol; dose penalty and influence on management decision of patients: Is it really worth the radiation dose?

    Ahmed Hamimi

    2016-03-01

    Conclusions: Considering time is of the essence; MSCT renal stone protocol using low dose technique is crucial in the management of renal stone in acute setting including the diagnosis and management decision.

  17. Effects of a group-based reproductive management extension programme on key management outcomes affecting reproductive performance.

    Brownlie, Tom S; Morton, John M; Heuer, Cord; McDougall, Scott

    2015-02-01

    A group-based reproductive management extension programme has been designed to help managers of dairy herds improve herd reproductive performance. The aims of this study were, firstly, to assess effects of participation by key decision makers (KDMs) in a farmer action group programme in 2009 and 2010 on six key management outcomes (KMOs) that affect reproductive performance over 2 years (2009-2010 and 2010-2011), and secondly, to describe KDM intentions to change management behaviour(s) affecting each management outcome after participation in the programme. Seasonal calving dairy herds from four regions of New Zealand were enrolled in the study. Intentions to modify management behaviour were recorded using the formal written action plans developed during the extension programme. KMOs assessed were calving pattern of the herd, pre-calving heifer liveweight, pre-calving and premating body condition score (BCS), oestrus detection, anoestrus cow management and bull management. Participation was associated with improvements in heifer liveweight, more heifers calving in the first 6 weeks of the seasonal calving period, premating BCS and oestrus detection. No significant effects were observed on anoestrus cow management or bull management. KDMs with greater numbers of proposed actions had lower 6 week in-calf rates in the second study year than KDMs who proposed fewer actions. A more effective strategy to ensure more appropriate objectives is proposed. Strategies to help KDMs to implement proposed actions more successfully should be investigated to improve the programme further. Copyright © 2014 Elsevier Ltd. All rights reserved.

  18. Study protocol for the Fukushima health management survey

    Yasumura, Seiji; Hosoya, Mitsuaki; Yamashita, Shunichi; Kamiya, Kenji; Abe, Masafumi; Akashi, Makoto; Kodama, Kazunori; Ozasa, Kotaro

    2012-01-01

    The accidents that occurred at the Fukushima Daiichi Nuclear Power Plant after the Great East Japan Earthquake on 11 March 2011 have resulted in long-term, ongoing anxiety among the residents of Fukushima, Japan. Soon after the disaster, Fukushima Prefecture launched the Fukushima Health Management Survey to investigate long-term low-dose radiation exposure caused by the accident. Fukushima Medical University took the lead in planning and implementing this survey. The primary purposes of this survey are to monitor the long-term health of residents, promote their future well-being, and confirm whether long-term low-dose radiation exposure has health effects. This report describes the rationale and implementation of the Fukushima Health Management Survey. This cohort study enrolled all people living in Fukushima Prefecture after the earthquake and comprises a basic survey and 4 detailed surveys. The basic survey is to estimate levels of external radiation exposure among all 2.05 million residents. It should be noted that internal radiation levels were estimated by Fukushima Prefecture using whole-body counters. The detailed surveys comprise a thyroid ultrasound examination for all Fukushima children aged 18 years or younger, a comprehensive health check for all residents from the evacuation zones, an assessment of mental health and lifestyles of all residents from the evacuation zones, and recording of all pregnancies and births among all women in the prefecture who were pregnant on 11 March. All data have been entered into a database and will be used to support the residents and analyze the health effects of radiation. The low response rate (<30%) to the basic survey complicates the estimation of health effects. There have been no cases of malignancy to date among 38 114 children who received thyroid ultrasound examinations. The importance of mental health care was revealed by the mental health and lifestyle survey and the pregnancy and birth survey. This long

  19. Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments

    Saha, Amal; Sanyal, Sugata

    2014-01-01

    After discussing the concept of DUKPT based symmetric encryption key management (e.g., for 3DES) and definition of cloud or remote wallet, the paper analyses applicability of DUKPT to different use cases like mobile banking, NFC payment using EMV contactless card and mobile based EMV card emulation, web browser based transaction and cloud or remote wallet. Cloud wallet is an emerging payment method and is gaining momentum very fast. Anticipating that the wallet product managers and security s...

  20. Development of pig welfare assessment protocol integrating animal-, environment-, and management-based measures.

    Renggaman, Anriansyah; Choi, Hong L; Sudiarto, Sartika Ia; Alasaarela, Laura; Nam, Ok S

    2015-01-01

    Due to increased interest in animal welfare, there is now a need for a comprehensive assessment protocol to be used in intensive pig farming systems. There are two current welfare assessment protocols for pigs: Welfare Quality® Assessment Protocols (applicable in the Europe Union), that mostly focuses on animal-based measures, and the Swine Welfare Assurance Program (applicable in the United States), that mostly focuses on management- and environment-based measures. In certain cases, however, animal-based measures might not be adequate for properly assessing pig welfare status. Similarly, welfare assessment that relies only on environment- and management-based measures might not represent the actual welfare status of pigs. Therefore, the objective of this paper was to develop a new welfare protocol by integrating animal-, environment-, and management-based measures. The background for selection of certain welfare criteria and modification of the scoring systems from existing welfare assessment protocols are described. The developed pig welfare assessment protocol consists of 17 criteria that are related to four main principles of welfare (good feeding, good housing, good health, and appropriate behavior). Good feeding, good housing, and good health were assessed using a 3-point scale: 0 (good welfare), 1 (moderate welfare), and 2 (poor welfare). In certain cases, only a 2-point scale was used: 0 (certain condition is present) or 2 (certain condition is absent). Appropriate behavior was assessed by scan sampling of positive and negative social behaviors based on qualitative behavior assessment and human-animal relationship tests. Modification of the body condition score into a 3-point scale revealed pigs with a moderate body condition (score 1). Moreover, additional criteria such as feed quality confirmed that farms had moderate (score 1) or poor feed quality (score 2), especially those farms located in a high relative humidity region. The developed protocol can be

  1. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Alexandra Rivero-García

    2017-03-01

    Full Text Available A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  2. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  3. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  4. KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks

    Gong, Zheng; Tang, Qiang; Law, Y.W.; Chen, Hongyang; Lai, X.; Yung, M.

    2010-01-01

    The constrained resources of sensors restrict the design of a key management scheme for wireless sensor networks (WSNs). In this work, we first formalize the security model of ALwEN, which is a gossip-based wireless medical sensor network (WMSN) for ambient assisted living. Our security model

  5. Securing Metering Infrastructure of Smart Grid: A Machine Learning and Localization Based Key Management Approach

    Imtiaz Parvez

    2016-08-01

    Full Text Available In smart cities, advanced metering infrastructure (AMI of the smart grid facilitates automated metering, control and monitoring of power distribution by employing a wireless network. Due to this wireless nature of communication, there exist potential threats to the data privacy in AMI. Decoding the energy consumption reading, injecting false data/command signals and jamming the networks are some hazardous measures against this technology. Since a smart meter possesses limited memory and computational capability, AMI demands a light, but robust security scheme. In this paper, we propose a localization-based key management system for meter data encryption. Data are encrypted by the key associated with the coordinate of the meter and a random key index. The encryption keys are managed and distributed by a trusted third party (TTP. Localization of the meter is proposed by a method based on received signal strength (RSS using the maximum likelihood estimator (MLE. The received packets are decrypted at the control center with the key mapped with the key index and the meter’s coordinates. Additionally, we propose the k-nearest neighbors (kNN algorithm for node/meter authentication, capitalizing further on data transmission security. Finally, we evaluate the security strength of a data packet numerically for our method.

  6. Key Performance Indicators for Maintenance Management Effectiveness of Public Hospital Building

    Farhana Omar Mardhiah

    2017-01-01

    Full Text Available Effectiveness of management in maintenance aspect holds the key element in influencing the performance of overall maintenance management. Similarly, public hospital building needs an effective maintenance management as this type of building in nature is one of the most complex issues in the field of maintenance. Improper building maintenance management adopted by the organization significantly will interrupt the overall operation of the building. Therefore, this paper is aim to identifying the key performance indicator (KPI of effectiveness of maintenance management for the public hospital building. A total of 32 set of questionnaires were distributed to the maintenance manager for each hospital in the northern region of peninsular Malaysia by using self-administration strategy. The survey answer was analyzed by performing descriptive analysis in SPSS. Overall, the result of descriptive analysis shows that all the ten factors of effectiveness of maintenance management are accepted as KPI since the mean value is at least 3.93 which classified as important and significant. The most significant factor of effectiveness of maintenance management is task planning and scheduling with the mean score of 4.35. While less significant factor is identify as maintenance approach with the value of mean score is 3.93. The both results indicates that the management need to have well-structured planning for the maintenance works and also need to embrace the exact strategy of maintenance approach in order to achieved better overall performance of maintenance management. This study may draw a standard practice for the government in assessing the performance of public facilities in terms of maintenance management.

  7. A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks

    Danyang Qin

    2016-01-01

    Full Text Available Security problem is one of the most popular research fields in wireless sensor networks for both the application requirement and the resource-constrained essence. An effective and lightweight Authentication and Key Management Scheme (AKMS is proposed in this paper to solve the problem of malicious nodes occurring in the process of networking and to offer a high level of security with low cost. For the condition that the mobile sensor nodes need to be authenticated, the keys in AKMS will be dynamically generated and adopted for security protection. Even when the keys are being compromised or captured, the attackers can neither use the previous keys nor misuse the authenticated nodes to cheat. Simulation results show that the proposed scheme provides more efficient security with less energy consumption for wireless sensor networks especially with mobile sensors.

  8. The Platform Architecture and Key Technology of Cloud Service that Support Wisdom City Management

    Liang Xiao

    2013-05-01

    Full Text Available According to the new requirement of constructing “resource sharing and service on demand” wisdom city system, this paper put forward the platform architecture of cloud service for wisdom city management which support IaaS, PaaS and SaaS three types of service model on the basis of researching the operation mode of the wisdom city which under cloud computing environment and through the research of mass storing technology of cloud data, building technology of cloud resource pool, scheduling management methods and monitoring technology of cloud resource, security management and control technology of cloud platform and other key technologies. The platform supports wisdom city system to achieve business or resource scheduling management optimization and the unified and efficient management of large-scale hardware and software, which has the characteristics of cross-domain resource scheduling, cross-domain data sharing, cross-domain facilities integration and cross-domain service integration.

  9. Intervention mapping protocol for developing a theory-based diabetes self-management education program.

    Song, Misoon; Choi, Suyoung; Kim, Se-An; Seo, Kyoungsan; Lee, Soo Jin

    2015-01-01

    Development of behavior theory-based health promotion programs is encouraged with the paradigm shift from contents to behavior outcomes. This article describes the development process of the diabetes self-management program for older Koreans (DSME-OK) using intervention mapping (IM) protocol. The IM protocol includes needs assessment, defining goals and objectives, identifying theory and determinants, developing a matrix to form change objectives, selecting strategies and methods, structuring the program, and planning for evaluation and pilot testing. The DSME-OK adopted seven behavior objectives developed by the American Association of Diabetes Educators as behavioral outcomes. The program applied an information-motivation-behavioral skills model, and interventions were targeted to 3 determinants to change health behaviors. Specific methods were selected to achieve each objective guided by IM protocol. As the final step, program evaluation was planned including a pilot test. The DSME-OK was structured as the 3 determinants of the IMB model were intervened to achieve behavior objectives in each session. The program has 12 weekly 90-min sessions tailored for older adults. Using the IM protocol in developing a theory-based self-management program was beneficial in terms of providing a systematic guide to developing theory-based and behavior outcome-focused health education programs.

  10. Barriers and enablers in primary care clinicians' management of osteoarthritis: protocol for a systematic review and qualitative evidence synthesis.

    Egerton, T; Diamond, L; Buchbinder, R; Bennell, K; Slade, S C

    2016-05-27

    Osteoarthritis is a highly prevalent and disabling condition. Primary care management of osteoarthritis is generally suboptimal despite evidence for several modestly effective interventions and the availability of high-quality clinical practice guidelines. This report describes a planned study to synthesise the views of primary care clinicians on the barriers and enablers to following recommended management of osteoarthritis, with the aim of providing new interpretations that may facilitate the uptake of recommended treatments, and in turn improve patient care. A systematic review and meta-synthesis of qualitative studies. 5 databases will be searched using key search terms for qualitative research, evidence-based practice, clinical practice guidelines, osteoarthritis, beliefs, perceptions, barriers, enablers and adherence. A priori inclusion/exclusion criteria include availability of data from primary care clinicians, reports on views regarding management of osteoarthritis, and studies using qualitative methods for both data collection and analysis. At least 2 independent reviewers will identify eligible reports, conduct a critical appraisal of study conduct, extract data and synthesise reported findings and interpretations. Synthesis will follow thematic analysis within a grounded theory framework of inductive coding and iterative theme identification. The reviewers plus co-authors will contribute to the meta-synthesis to find new themes and theories. The Confidence in the Evidence from Reviews of Qualitative research (CERQual) approach will be used to determine a confidence profile of each finding from the meta-synthesis. The protocol has been registered on PROSPERO and is reported using the Preferred Reporting Items for Systematic Review and Meta-Analyses Protocols (PRISMA-P) guidelines. Ethical approval is not required. The systematic review will be published in a peer-reviewed journal. The results will help to inform policy and practice and assist in the

  11. Optimization of Key Parameters of Energy Management Strategy for Hybrid Electric Vehicle Using DIRECT Algorithm

    Jingxian Hao

    2016-11-01

    Full Text Available The rule-based logic threshold control strategy has been frequently used in energy management strategies for hybrid electric vehicles (HEVs owing to its convenience in adjusting parameters, real-time performance, stability, and robustness. However, the logic threshold control parameters cannot usually ensure the best vehicle performance at different driving cycles and conditions. For this reason, the optimization of key parameters is important to improve the fuel economy, dynamic performance, and drivability. In principle, this is a multiparameter nonlinear optimization problem. The logic threshold energy management strategy for an all-wheel-drive HEV is comprehensively analyzed and developed in this study. Seven key parameters to be optimized are extracted. The optimization model of key parameters is proposed from the perspective of fuel economy. The global optimization method, DIRECT algorithm, which has good real-time performance, low computational burden, rapid convergence, is selected to optimize the extracted key parameters globally. The results show that with the optimized parameters, the engine operates more at the high efficiency range resulting into a fuel savings of 7% compared with non-optimized parameters. The proposed method can provide guidance for calibrating the parameters of the vehicle energy management strategy from the perspective of fuel economy.

  12. Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

    B. Madhusudhanan

    2015-01-01

    Full Text Available In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  13. Efficient Key Management System for Large-scale Smart RFID Applications

    Mohammad Fal Sadikin

    2015-08-01

    Full Text Available Due to low-cost and its practical solution, the integration of RFID tag to the sensor node called smart RFID has become prominent solution in various fields including industrial applications. Nevertheless, the constrained nature of smart RFID system introduces tremendous security and privacy problem. One of them is the problem in key management system. Indeed, it is not feasible to recall all RFID tags in order to update their security properties (e.g. update their private keys. On the other hand, using common key management solution like standard TLS/SSL is too heavy-weight that can drain and overload the limited resources. Furthermore, most of existing solutions are highly susceptible to various threats reaching from privacy threats, physical attacks to various technics of Man-in-the-Middle attacks. This paper introduces novel key management system, tailored to the limited resources of smart RFID system. It proposes light-weight mutual authentication and identity protection to mitigate the existing threats.

  14. How do primary health care teams learn to integrate intimate partner violence (IPV) management? A realist evaluation protocol.

    Goicolea, Isabel; Vives-Cases, Carmen; San Sebastian, Miguel; Marchal, Bruno; Kegels, Guy; Hurtig, Anna-Karin

    2013-03-23

    Despite the existence of ample literature dealing, on the one hand, with the integration of innovations within health systems and team learning, and, on the other hand, with different aspects of the detection and management of intimate partner violence (IPV) within healthcare facilities, research that explores how health innovations that go beyond biomedical issues-such as IPV management-get integrated into health systems, and that focuses on healthcare teams' learning processes is, to the best of our knowledge, very scarce if not absent. This realist evaluation protocol aims to ascertain: why, how, and under what circumstances primary healthcare teams engage (if at all) in a learning process to integrate IPV management in their practices; and why, how, and under what circumstances team learning processes lead to the development of organizational culture and values regarding IPV management, and the delivery of IPV management services. This study will be conducted in Spain using a multiple-case study design. Data will be collected from selected cases (primary healthcare teams) through different methods: individual and group interviews, routinely collected statistical data, documentary review, and observation. Cases will be purposively selected in order to enable testing the initial middle-range theory (MRT). After in-depth exploration of a limited number of cases, additional cases will be chosen for their ability to contribute to refining the emerging MRT to explain how primary healthcare learn to integrate intimate partner violence management. Evaluations of health sector responses to IPV are scarce, and even fewer focus on why, how, and when the healthcare services integrate IPV management. There is a consensus that healthcare professionals and healthcare teams play a key role in this integration, and that training is important in order to realize changes. However, little is known about team learning of IPV management, both in terms of how to trigger such learning

  15. Sustainable Materials Management (SMM) - Materials and Waste Management in the United States Key Facts and Figures

    U.S. Environmental Protection Agency — Each year EPA produces a report called Advancing Sustainable Materials Management: Facts and Figures. It includes information on municipal solid waste (MSW)...

  16. Domo arigato Kyoto: Four key lessons from the Kyoto Protocol for a new agreement in Paris 2015. Climate Brief no. 35

    Morel, Romain; Shishlov, Igor; Bellassen, Valentin

    2014-05-01

    The results from the first commitment period of the Kyoto Protocol (KP) show that developed countries fulfilled their commitments through varied strategies. However, the Kyoto protocol did not manage to stabilize global GHG concentrations; furthermore its direct impact on domestic emissions reductions is unclear. Nevertheless, the KP has likely paved the way for a low-carbon transition by establishing international standards on emissions monitoring and on emission reductions projects. Yet, domestic policies - especially the EU ETS - are the main driver of emissions reductions and the principal catalyzers of private finance flows. A new, more effective, agreement would therefore need to expand its coverage, and take down the specter of 'internationally binding' emission reductions commitments in order to focus on MRV requirements. Similar to Kyoto, a Paris outcome could take the form of a framework agreement setting up requirements and mechanisms with subsequent implementing agreements expected by 2020. (authors)

  17. National disease management plans for key chronic non-communicable diseases in Singapore.

    Tan, C C

    2002-07-01

    In Singapore, chronic, non-communicable diseases, namely coronary heart disease, stroke and cancer, account for more than 60% of all deaths and a high burden of disability and healthcare expenditure. The burden of these diseases is likely to rise with our rapidly ageing population and changing lifestyles, and will present profound challenges to our healthcare delivery and financing systems over the next 20 to 30 years. The containment and optimal management of these conditions require a strong emphasis on patient education and the development of integrated models of healthcare delivery in place of the present uncoordinated, compartmentalised way of delivering healthcare. To meet these challenges, the Ministry of Health's major thrusts are disease control measures which focus mainly on primary prevention; and disease management, which coordinates the national effort to reduce the incidence of these key diseases and their predisposing factors and to ameliorate their long-term impact by optimising control to reduce mortality, morbidity and complications, and improving functional status through rehabilitation. The key initiatives include restructuring of the public sector healthcare institutions into two clusters, each comprising a network of primary health care polyclinics, regional hospitals and tertiary institutions. The functional integration of these healthcare elements within each cluster under a common senior administrative and professional management, and the development of common clinical IT systems will greatly facilitate the implementation of disease management programmes. Secondly, the Ministry is establishing National Disease Registries in coronary heart disease, cancer, stroke, myopia and kidney failure, which will be valuable sources of clinical and outcomes data. Thirdly, in partnership with expert groups, national committees and professional agencies, the Ministry will produce clinical practice guidelines which will assist doctors and healthcare

  18. TH-E-209-00: Radiation Dose Monitoring and Protocol Management

    2016-01-01

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilities over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.

  19. Internet Group Management Protocol for IPTV Services in Passive Optical Network

    Lee, Eunjo; Park, Sungkwon

    We propose a new Internet group management protocol (IGMP) which can be used in passive optical network (PON) especially for IPTV services which dramatically reduces the channel change response time caused by traditional IGMP. In this paper, the newly proposed IGMP is introduced in detail and performance analysis is also included. Simulation results demonstrated the performance of the newly proposed IGMP, whereby, viewers can watch the shared IPTV channels without the channel change response time when channel request reaches a threshold.

  20. TH-E-209-00: Radiation Dose Monitoring and Protocol Management

    NONE

    2016-06-15

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilities over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.

  1. [Incidence of phlebitis due to peripherally inserted venous catheters: impact of a catheter management protocol].

    Ferrete-Morales, C; Vázquez-Pérez, M A; Sánchez-Berna, M; Gilabert-Cerro, I; Corzo-Delgado, J E; Pineda-Vergara, J A; Vergara-López, S; Gómez-Mateos, J

    2010-01-01

    To assess the impact on the incidence of PPIVC by implementing a catheter management protocol and to determine risk factors for PPIVC development in hospitalized patients. A total of 3978 episodes of venous catheterization were prospectively included from September 2002 to December 2007. A catheter management protocol was implemented during this period of time. The incidence and variables associated to the occurrence of PPIVC were determined. The incidence of PPIVC from 2002 to 2007 was 4.8%, 4.3%, 3.6%, 2.5%, 1.3% and 1.8% (phistory of phlebitis was the only factor independently associated to phlebitis due to peripherally inserted central venous catheters (AOR 3.24; CI at 95% CI= 1.05-9.98, p=0.04). A catheter management protocol decreases the incidence of PPIVC in hospitalized patients. The risk of PPIVC increases for peripherally inserted central venous catheters when the patients have a history of phlebitis and for peripheral venous catheters when amiodarone or cefotaxime are infused. Catheterization of peripheral veins performed during morning shifts is associated with a lower incidence of PPIVC when compared with night shift catheterizations.

  2. RE: Forests and forest management plays a key role in mitigating climate change

    Bentsen, Niclas Scott; Nord-Larsen, Thomas; Larsen, Søren

    2016-01-01

    as also reported by Naudts et al. By ignoring the link between forestry and fossil carbon pools and not considering development in the absence of forest management, there is no accounting for the effect on GHG emissions, and no basis for estimating the contribution of forest management to cl......The report by Naudts et al. concludes that forest management in Europe during the last 260 years has failed to result in net CO2 removal from the atmosphere. The authors have reached this conclusion through their failure to consider a key factor in their otherwise comprehensive analysis....... The authors present an analysis of net carbon emissions from forest, but omit substitution effects related to the link between forest management and the fossil carbon pool. The link between fossil and terrestrial carbon pools is however critical for modelling climate impacts. To conclude as they do...

  3. Complex of Key Instruments of Management of Operation Activity of a Small Business Trade Enterprise

    Serdyuk Vira M.

    2013-11-01

    Full Text Available The article offers a complex of key instruments of management of operation activity of a small business trade enterprise, including: 1 budgeting of operation activity; 2 its accounting by norms and deviations from them; 3 monitoring of operational activity of an enterprise, which envisages analysis of revealed deviations. The article shows the most efficient way of realisation and practical use of the presented concept – application of the “standard-cost” scheme within the framework of which the following tasks are solved: 1 budgeting of income from operational activity; 2 establishment of standards of costs; 3 accumulation of data on factual income and expenditures; 4 analysis of deviations and reporting; and 5 introduction of necessary amendments. The article also offers an imitation model of analysis of dynamics of trade processes, which allows detection of key spheres of management of operation activity of a small trade enterprise and principles of carrying out an efficient and well thought over financial policy.

  4. A brief review on key technologies in the battery management system of electric vehicles

    Liu, Kailong; Li, Kang; Peng, Qiao; Zhang, Cheng

    2018-04-01

    Batteries have been widely applied in many high-power applications, such as electric vehicles (EVs) and hybrid electric vehicles, where a suitable battery management system (BMS) is vital in ensuring safe and reliable operation of batteries. This paper aims to give a brief review on several key technologies of BMS, including battery modelling, state estimation and battery charging. First, popular battery types used in EVs are surveyed, followed by the introduction of key technologies used in BMS. Various battery models, including the electric model, thermal model and coupled electro-thermal model are reviewed. Then, battery state estimations for the state of charge, state of health and internal temperature are comprehensively surveyed. Finally, several key and traditional battery charging approaches with associated optimization methods are discussed.

  5. Protocol for a thematic synthesis to identify key themes and messages from a palliative care research network.

    Nicholson, Emma

    2016-10-21

    Research networks that facilitate collaborative research are increasing both regionally and globally and such collaborations contribute greatly to knowledge transfer particularly in health research. The Palliative Care Research Network is an Irish-based network that seeks to create opportunities and engender a collaborative environment to encourage innovative research that is relevant for policy and practice. The current review outlines a methodology to identify cross-cutting messages to identify how dissemination outputs can be optimized to ensure that key messages from this research reaches all knowledge users.

  6. Policy legitimacy - The key to long term Management of Radioactive Waste

    Atherton, E.; Dalton, J.; Wild, D.

    2003-01-01

    Experience in the UK has shown that the central theme of delivering a solution is contingent on building a broad base of support for the long term management project. This is multi-layered, both in terms of local, regional and national political actors, but also across societal groups. Legitimacy is the key to success and needs to be understood in three main domains - equity, competence and economics. Finding the appropriate balance is essential for progress in the long term. (authors)

  7. Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems

    Lei, Ao; Cruickshank, Haitham; Cao, Y; Asuquo, Philip; Anyigor Ogah, Chibueze Pascal; Sun, Zhili

    2017-01-01

    As modern vehicle and communication technologies advanced apace, people begin to believe that Intelligent Transportation System (ITS) would be achievable in one decade.\\ud ITS introduces information technology to the transportation infrastructures and aims to improve road safety and traffic efficiency. However, security is still a main concern in Vehicular Communication Systems (VCS). This can be addressed through secured group broadcast. Therefore, secure key management schemes are considere...

  8. Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems

    LIU Xuening; YIN Hao; LIN Chuang; DU Changlai

    2009-01-01

    Recent development of the peer-to-peer (P2P) live streaming technique has brought unprece-dented new momentum to the Internet with the characters of effective, scalable, and low cost. However, be-fore these applications can be successfully deployed as commercial applications, efficient access control mechanisms are needed. This work based on earlier research of the secure streaming architecture in Trust-Stream, analyzes how to ensure that only authorized users can access the original media in the P2P live streaming system by adopting a user authentication and key management scheme. The major features of this system include (1) the management server issues each authorized user a unique public key certificate,(2) the one-way hash chain extends the certificate's lifetime, (3) the original media is encrypted by the ses-sion key and delivered to the communication group, and (4) the session key is periodically updated and dis-tributed with the media. Finally, analyses and test results show that scheme provides a secure, scalable, re-liable, and efficient access control solution for P2P live streaming systems.

  9. Identifying key factors and strategies for reducing industrial CO2 emissions from a non-Kyoto protocol member's (Taiwan) perspective

    Lin, Sue J.; Lu, I.J.; Lewis, Charles

    2006-01-01

    In this study we use Divisia index approach to identify key factors affecting CO 2 emission changes of industrial sectors in Taiwan. The changes of CO 2 emission are decomposed into emission coefficient, energy intensity, industrial structure and economic growth. Furthermore, comparisons with USA, Japan, Germany, the Netherlands and South Korea are made to have a better understanding of emission tendency in these countries and to help formulate our CO 2 reduction strategies for responding to the international calls for CO 2 cuts. The results show that economic growth and high energy intensity were two key factors for the rapid increase of industrial CO 2 emission in Taiwan, while adjustment of industrial structure was the main component for the decrease. Although economic development is important, Taiwan must keep pace with the international trends for CO 2 reduction. Among the most important strategies are continuous efforts to improve energy intensity, fuel mix toward lower carbon, setting targets for industrial CO 2 cuts, and advancing green technology through technology transfer. Also, the clean development mechanism (CDM) is expected to play an important role in the future

  10. The Impact of a Management Protocol on the Outcomes of Child Abuse in Hospitalized Children in Hong Kong

    Lee, Anselm C. W.; Li, C. H.; So, K. T.

    2006-01-01

    Objective: To study the outcomes of children hospitalized for suspected child abuse before and after the implementation of a management protocol in a hospital in Hong Kong. Study period: Two 2-year periods before (1994-1995) and after (2002-2003) the implementation of the protocol in 1998. Methods: This is a retrospective hospital chart review in…

  11. Impact of a community-based diabetes self-management program on key metabolic parameters

    Johnson C

    2014-12-01

    Full Text Available Objective: Characterize the impact of a pharmacist-led diabetes self-management program on three key metabolic parameters: glycosylated hemoglobin (HbA1c, low-density lipoprotein cholesterol (LDL-C, and mean arterial blood pressure (MAP among employee health program participants. Methods: A self-insured company in the Kansas City metropolitan area began offering a pharmacist-led diabetes self-management program to eligible company employees and their dependents in 2008. A retrospective pre-post analysis was conducted to determine if the program affected key metabolic parameters in participants by determining mean change after one year of participation. Results: Among 183 program participants, 65 participants met inclusion criteria. All three key metabolic parameters were significantly reduced from baseline to one year of program participation: HbA1c decreased from 8.1% to 7.3% (p=0.007; LDL-C decreased from 108.3 mg/dL to 96.4 mg/dL (p=0.009; and MAP decreased from 96.1 to 92.3 mm Hg (p=0.005. Conclusions: The pharmacist-led diabetes self-management program demonstrated significant reductions in HbA1c, LDL-C, and MAP from baseline to one year of program participation. Improvements were statistically significant and clinically relevant for each parameter. Previous studies indicate these reductions may cause reduced overall healthcare costs.

  12. Teamwork in Trauma: System Adjustment to a Protocol for the Management of Multiply Injured Patients.

    Vallier, Heather A; Moore, Timothy A; Como, John J; Dolenc, Andrea J; Steinmetz, Michael P; Wagner, Karl G; Smith, Charles E; Wilczewski, Patricia A

    2015-11-01

    .6%), or cardiac issues (3.7%). Our trauma center and surgeons became more accustomed to the protocol and had fewer delays over time; 10% were delayed 2 years after implementation. Management of trauma patients with injury to multiple systems requires teamwork among providers from related specialties and hospital support, in terms of operating room access, with appropriate ancillary personnel and equipment. Our system adjusted quickly to the protocol. Surgeon preference was the most common reason for delayed fixation, but within 24 months, only 10% of fractures were treated on a delayed basis, as long as patients were resuscitated.

  13. Key Factors Controlling the Growth of Biological Soil Crusts: Towards a Protocol to Produce Biocrusts in Greenhouse Facilities

    Velasco Ayuso, Sergio; María Giraldo Silva, Ana; Nelson, Corey; Barger, Nichole; Antoninka, Anita; Bowker, Matthew; Garcia-Pichel, Ferran

    2016-04-01

    Biological soil crusts (= biocrusts) are topsoil communities comprise of, but not limited to, cyanobacteria, algae, lichens, and mosses that grow intimately associated with soil particles in drylands. Biocrusts have central ecological roles in these areas as sources of carbon and nutrients, and efficiently retain water and prevent soil erosion, which improves soil structure and promotes soil fertility. However, human activities, such as cattle grazing, hiking or military training, are rapidly striking biocrusts. Although it is well known that the inoculation with cyanobacteria or lichens can enhance the recovery of biocrusts in degraded soils, little is known about the factors that control their growth rates. Using soil and inocula from four different sites located in one cold desert (Utah) and in one hot desert (New Mexico), we performed a fractional factorial experiment involving seven factors (water, light, P, N, calcium carbonate, trace metals and type of inoculum) to screen their effects on the growth of biocrusts. After four months, we measured the concentration of chlorophyll a, and we discovered that water, light and P, N or P+N were the most important factors controlling the growth of biocrusts. In the experimental treatments involving these three factors we measured a similar concentration of chlorophyll a (or even higher) to this found in the field locations. Amplification of the 16S rRNA gene segment using universal bacteria primers revealed a microbial community composition in the biocrusts grown that closely corresponds to initial measurements made on inocula. In summary, based on our success in obtaining biocrust biomass from natural communities in greenhouse facilities, without significantly changing its community composition at the phylum and cyanobacterial level, we are paving the road to propose a protocol to produce a high quality-nursed inoculum aiming to assist restoration of arid and semi-arid ecosystems affected by large-scale disturbances.

  14. Evaluating Management Information Systems, A Protocol for Automated Peer Review Systems

    Black, Gordon C.

    1980-01-01

    This paper discusses key issues in evaluating an automated Peer Review System. Included are the conceptual base, design, steps in planning structural components, operation parameters, criteria, costs and a detailed outline or protocol for use in the evaluation. At the heart of the Peer Review System is the criteria utilized for measuring quality. Criteria evaluation should embrace, as a minimum, appropriateness, validity and reliability, and completemess or comprehensiveness of content. Such an evaluation is not complete without determining the impact (clinical outcome) of the service system or the patient and the population served.

  15. Clinical risk management in hospitals: strategy, central coordination and dialogue as key enablers.

    Briner, Matthias; Manser, Tanja; Kessler, Oliver

    2013-04-01

    The study aims to identify key enablers fostering clinical risk management (CRM) in hospitals to guide health care in this vital area of patient safety. A cross-sectional survey was conducted at the national level in 324 Swiss hospitals in 2007-2008 to assess the relationship between key elements and systematic CRM. Therefore, a comprehensive monitoring instrument for CRM was used for the first time. Organizational factors (e.g. strategy, coordination, resources) and structural conditions (e.g. hospital size) were tested as key elements. CRM was assessed by evaluating its maturity (i.e. the level of CRM development) by 12 theoretically derived indices joining together essential aspects of CRM at the hospital level and the service level. Chi-square measures were used to analyse the relationships between organizational factors or structural conditions and maturity of CRM. Participation in this voluntary survey was good, with CRM experts of 138 out of 324 hospitals responding (response rate 43%). Three key enablers for CRM were identified: implementing a function for central CRM coordination, assuring dialogue with and between the different hospital services, and developing strategic CRM objectives. This study offers, for the first time, an assessment of the maturity of hospitals' CRM and identifies key enablers related to CRM. This is a feasible first step in guiding hospitals to shape their CRM and presents a basis for future studies, for example, linking CRM to outcome data. © 2012 Blackwell Publishing Ltd.

  16. Efficacy of protocol-based pharmacotherapy management on anticoagulation with warfarin for patients with cardiovascular surgery.

    Katada, Y; Nakagawa, S; Minakata, K; Odaka, M; Taue, H; Sato, Y; Yonezawa, A; Kayano, Y; Yano, I; Nakatsu, T; Sakamoto, K; Uehara, K; Sakaguchi, H; Yamazaki, K; Minatoya, K; Sakata, R; Matsubara, K

    2017-10-01

    Anticoagulation therapy with warfarin requires periodic monitoring of prothrombin time-international normalized ratio (PT-INR) and adequate dose adjustments based on the data to minimize the risk of bleeding and thromboembolic events. In our hospital, we have developed protocol-based pharmaceutical care, which we called protocol-based pharmacotherapy management (PBPM), for warfarin therapy. The protocol requires pharmacists to manage timing of blood sampling for measuring PT-INR and warfarin dosage determination based on an algorithm. This study evaluated the efficacy of PBPM in warfarin therapy by comparing to conventional pharmaceutical care. From October 2013 to June 2015, a total of 134 hospitalized patients who underwent cardiovascular surgeries received post-operative warfarin therapy. The early series of patients received warfarin therapy as the conventional care (control group, n=77), whereas the latter received warfarin therapy based on the PBPM (PBPM group, n=68). These patients formed the cohort of the present study and were retrospectively analysed. The indications for warfarin included aortic valve replacement (n=56), mitral valve replacement (n=4), mitral valve plasty (n=22) and atrial fibrillation (n=29). There were no differences in patients' characteristics between both groups. The percentage time in therapeutic range in the first 10 days was significantly higher in the PBPM group (47.1%) than that in the control group (34.4%, PWarfarin therapy based on our novel PBPM was clinically safe and resulted in significantly better anticoagulation control compared to conventional care. © 2017 John Wiley & Sons Ltd.

  17. The Proposal of Key Performance Indicators in Facility Management and Determination the Weights of Significance

    Rimbalová, Jarmila; Vilčeková, Silvia

    2013-11-01

    The practice of facilities management is rapidly evolving with the increasing interest in the discourse of sustainable development. The industry and its market are forecasted to develop to include non-core functions, activities traditionally not associated with this profession, but which are increasingly being addressed by facilities managers. The scale of growth in the built environment and the consequential growth of the facility management sector is anticipated to be enormous. Key Performance Indicators (KPI) are measure that provides essential information about performance of facility services delivery. In selecting KPI, it is critical to limit them to those factors that are essential to the organization reaching its goals. It is also important to keep the number of KPI small just to keep everyone's attention focused on achieving the same KPIs. This paper deals with the determination of weights of KPI of FM in terms of the design and use of sustainable buildings.

  18. Optic neuritis in paediatric patients: Experience over 27 years and a management protocol.

    Monge Galindo, L; Martínez de Morentín, A L; Pueyo Royo, V; García Iñiguez, J P; Sánchez Marco, S; López-Pisón, J; Peña-Segura, J L

    2018-03-08

    In this article, we present our experience on optic neuritis (ON) and provide a diagnostic/therapeutic protocol, intended to rule out other aetiologies (particularly infection), and a fact sheet for parents. We conducted a descriptive, retrospective study of patients with ON over a 27-year period (1990-2017). A review of the available scientific evidence was performed in order to draft the protocol and fact sheet. Our neuropaediatrics department has assessed 20,744 patients in the last 27 years, of whom 14 were diagnosed with ON: 8 had isolated ON, 1 had multiple sclerosis (MS), 1 had clinically isolated syndrome (CIS), 3 had acute disseminated encephalomyelitis, and 1 had isolated ON and a history of acute disseminated encephalomyelitis one year previously. Patients' age range was 4-13 years; 50% were boys. Eight patients were aged over 10: 7 had isolated ON and 1 had MS. Nine patients had bilateral ON, and 3 had retrobulbar ON. MRI results were normal in 7 patients and showed involvement of the optic nerve only in 2 patients and optic nerve involvement + central nervous system demyelination in 5. Thirteen patients received corticosteroids. One patient had been vaccinated against meningococcus-C the previous month. Progression was favourable, except in the patient with MS. A management protocol and fact sheet are provided. ON usually has a favourable clinical course. In children aged older than 10 years with risk factors for MS or optic neuromyelitis (hyperintensity on brain MRI, oligoclonal bands, anti-NMO antibody positivity, ON recurrence), the initiation of immunomodulatory treatment should be agreed with the neurology department. The protocol is useful for diagnostic decision-making, follow-up, and treatment of this rare disease with potentially major repercussions. The use of protocols and fact sheets is important. Copyright © 2018 Sociedad Española de Neurología. Publicado por Elsevier España, S.L.U. All rights reserved.

  19. Key factors of case management interventions for frequent users of healthcare services: a thematic analysis review.

    Hudon, Catherine; Chouinard, Maud-Christine; Lambert, Mireille; Diadiou, Fatoumata; Bouliane, Danielle; Beaudin, Jérémie

    2017-10-22

    The aim of this paper was to identify the key factors of case management (CM) interventions among frequent users of healthcare services found in empirical studies of effectiveness. Thematic analysis review of CM studies. We built on a previously published review that aimed to report the effectiveness of CM interventions for frequent users of healthcare services, using the Medline, Scopus and CINAHL databases covering the January 2004-December 2015 period, then updated to July 2017, with the keywords 'CM' and 'frequent use'. We extracted factors of successful (n=7) and unsuccessful (n=6) CM interventions and conducted a mixed thematic analysis to synthesise findings. Chaudoir's implementation of health innovations framework was used to organise results into four broad levels of factors: (1) ,environmental/organisational level, (2) practitioner level, (3) patient level and (4) programme level. Access to, and close partnerships with, healthcare providers and community services resources were key factors of successful CM interventions that should target patients with the greatest needs and promote frequent contacts with the healthcare team. The selection and training of the case manager was also an important factor to foster patient engagement in CM. Coordination of care, self-management support and assistance with care navigation were key CM activities. The main issues reported by unsuccessful CM interventions were problems with case finding or lack of care integration. CM interventions for frequent users of healthcare services should ensure adequate case finding processes, rigorous selection and training of the case manager, sufficient intensity of the intervention, as well as good care integration among all partners. Other studies could further evaluate the influence of contextual factors on intervention impacts. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted

  20. Development of a waste management protocol based on assessment of knowledge and practice of healthcare personnel in surgical departments.

    Mostafa, Gehan M A; Shazly, Mona M; Sherief, Wafaa I

    2009-01-01

    Good healthcare waste management in a hospital depends on a dedicated waste management team, good administration, careful planning, sound organization, underpinning legislation, adequate financing, and full participation by trained staff. Hence, waste management protocols must be convenient and sensible. To assess the knowledge and practice related to waste management among doctors, nurses, and housekeepers in the surgical departments at Al-Mansoura University Hospital, and to design and validate a waste management protocol for the health team in these settings. This cross-sectional study was carried out in the eight surgical departments at Al-Mansoura University Hospital. All health care personnel and their assistants were included: 38 doctors, 106 nurses, and 56 housekeepers. Two groups of jury were included for experts' opinions validation of the developed protocol, one from academia (30 members) and the other from service providers (30 members). Data were collected using a self-administered knowledge questionnaire for nurses and doctors, and an interview questionnaire for housekeepers. Observation checklists were used for assessment of performance. The researchers developed the first draft of the waste management protocol according to the results of the analysis of the data collected in the assessment phase. Then, the protocol was presented to the jury group for validation, and then was implemented. Only 27.4% of the nurses, 32.1% of the housekeepers, and 36.8% of the doctors had satisfactory knowledge. Concerning practice, 18.9% of the nurses, 7.1% of the housekeepers, and none of the doctors had adequate practice. Nurses' knowledge score had a statistically significant weak positive correlation with the attendance of training courses (r=0.23, pwaste management. The knowledge among nurses is positively affected by attendance of training programs. Based on the findings, a protocol for healthcare waste management was developed and validated. It is recommended to

  1. Conceptual framework for holistic dialysis management based on key performance indicators.

    Liu, Hu-Chen; Itoh, Kenji

    2013-10-01

    This paper develops a theoretical framework of holistic hospital management based on performance indicators that can be applied to dialysis hospitals, clinics or departments in Japan. Selection of a key indicator set and its validity tests were performed primarily by a questionnaire survey to dialysis experts as well as their statements obtained through interviews. The expert questionnaire asked respondents to rate the degree of "usefulness" for each of 66 indicators on a three-point scale (19 responses collected). Applying the theoretical framework, we selected a minimum set of key performance indicators for dialysis management that can be used in the Japanese context. The indicator set comprised 27 indicators and items that will be collected through three surveys: patient satisfaction, employee satisfaction, and safety culture. The indicators were confirmed by expert judgment from viewpoints of face, content and construct validity as well as their usefulness. This paper established a theoretical framework of performance measurement for holistic dialysis management from primary healthcare stakeholders' perspectives. In this framework, performance indicators were largely divided into healthcare outcomes and performance shaping factors. Indicators of the former type may be applied for the detection of operational problems or weaknesses in a dialysis hospital, clinic or department, while latent causes of each problem can be more effectively addressed by the latter type of indicators in terms of process, structure and culture/climate within the organization. © 2013 The Authors. Therapeutic Apheresis and Dialysis © 2013 International Society for Apheresis.

  2. A CEO View of Key Issues in Australian Information Systems Management - 1997

    Graham Pervan

    1998-05-01

    Full Text Available As part of a research programme on key information systems management issues, a survey of Australasia's largest 500 organisations was conducted to identify which issues were perceived by their chief executive officers (CEOs as being important, problematic and critical over the next three to five years. The results reported are based on a relatively low response rate (though perhaps reasonable for the target group so should be regarded as only exploratory. The most critical issues were revealed to be a mix of technology management issues (IT infrastructure, disaster recovery, strategic management issues (BPR, competitive advantage, information architecture, people management issues (organisational learning, systems development and data management issues (effective use of the data resource, effectiveness/productivity of IS, effectiveness of software development, and their own support systems (EIS/DSS. This reflects their interest in a wide range of issues, but all with an organisation-wide focus. Non-critical issues were mostly related to the individual technologies and the place and role of IS in the organisation. While the CEOs showed some agreement with their chief information officers (CIOs on issues such as the IT infrastructure, competitive advantage, and organisational learning some distinct differences exist, particularly in relation to the quality and effectiveness of systems and processes and also how CEOs and CIOs perceive each other.

  3. COST ACCOUNTING AS THE KEY INFORMATION CORE OF THE COMPANY MANAGEMENT

    Radmila Jablan STEFANOVIĆ

    2010-12-01

    Full Text Available The management is expected to lead the company towards the achievement of set objectives which, in the contemporary settings of marked external and internal complexity, inevitably requires sophisticated expert knowledge and skills, as well as quality information support. Cost accounting generates cost and performance information with the goal of qualitatively meeting information needs of, above all, internal users. It represents the essential part of the company’s accounting information system as a whole and it is often stressed as the key information core and a reliable information support for the company’s management in performing their managerial activities. The contemporary business environment inevitably requires the restructuring of cost accounting and new approaches to costing and cost management, in the attempt to improve the quality of cost information that has always been the object of particular interest. Moreover, only a flexibly designed cost accounting information system can qualitatively respond to the increasingly numerous and various information requirements. In this paper we discuss the role cost accounting has in offering adequate information support to managers at all managerial levels. We emphasize some of the new tools, techniques, concepts and approaches to costing and cost management

  4. Do the key prognostic factors for non-specific neck pain have moderation effects? - A study protocol.

    Balasundaram, Arun Prasad; Robinson, Hilde Stendal; Vøllestad, Nina Køpke

    2018-05-01

    Neck pain is one of the common musculoskeletal conditions prevalent in the general population in Norway. Patients with neck pain, seek treatment from different health professionals such as general practitioners, physiotherapists, chiropractors and alternative medicine practitioners. The interventions for neck pain are typically provided in a primary care or specialised healthcare setting depending on the general practitioners' referral patterns. Clinicians are interested to know the various prognostic factors that can explain the recovery from neck pain. In order to know this, studies have explored and reported on a range of prognostic factors that contribute to the outcomes in patients with neck pain. This information is currently available only for neck pain following whiplash injury that has a traumatic origin. There is limited information on the role of prognostic factors specifically for non-specific neck pain without a traumatic episode. Moreover, there is a lack of data on whether there are interactions (moderation effects) between the prognostic factors. Therefore, we propose a hypothesis to elucidate whether the same set of prognostic factors found in neck pain associated with whiplash injuries are also identified in patients with neck pain without trauma. Additionally, we hypothesize that the association between a prognostic factor and the outcome variable (s) would be dependent on the third variable, thereby confirming the moderation effects. Clinicians could make informed decisions in the clinical management of neck pain with the knowledge of prognostic factors that explain the outcomes. It could also be used for the development of new interventions or for modifying the existing ones. Copyright © 2018 Elsevier Ltd. All rights reserved.

  5. Research on and design of key circuits in RFID tag chip for container management

    Wang Wenjie

    2016-01-01

    Full Text Available This paper introduces the design of semi-passive RFID tag chip capable of monitoring container safety. A system framework complying with requirements by ISO/IEC 18000-6C is firstly presented, and then differences from the key units of common passive chip, such as switch-state monitoring circuit, power management unit and anti-shake design in baseband processor, are elaborated. The main function of such a chip is to record the container opening frequency during transportation. Finally, the realizations of each unit’s function are simulated.

  6. Protocol to Manage Heritage-Building Interventions Using Heritage Building Information Modelling (HBIM

    Isabel Jordan-Palomar

    2018-03-01

    Full Text Available The workflow in historic architecture projects presents problems related to the lack of clarity of processes, dispersion of information and the use of outdated tools. Different heritage organisations have showed interest in innovative methods to resolve those problems and improve cultural tourism for sustainable economic development. Building Information Modelling (BIM has emerged as a suitable computerised system for improving heritage management. Its application to historic buildings is named Historic BIM (HBIM. HBIM literature highlights the need for further research in terms of the overall processes of heritage projects, its practical implementation and a need for better cultural documentation. This work uses Design Science Research to develop a protocol to improve the workflow in heritage interdisciplinary projects. Research techniques used include documentary analysis, semi-structured interviews and focus groups. HBIM is proposed as a virtual model that will hold heritage data and will articulate processes. As a result, a simple and visual HBIM protocol was developed and applied in a real case study. The protocol was named BIMlegacy and it is divided into eight phases: building registration, determine intervention options, develop design for intervention, planning the physical intervention, physical intervention, handover, maintenance and culture dissemination. It contemplates all the stakeholders involved.

  7. Lifetime assessment and lifetime management for key components of nuclear power plants

    Dou Yikang; Sun Hanhong; Qu Jiadi

    2000-01-01

    On the bases of investigation on recent development of plant lifetime management in the world, the author gives some points of view on how to establish plant lifetime assessment (PLA) and management (PLM) systems for Chinese nuclear power plants. The main points lie in: 1) safety regulatory organizations, utilities and R and D institutes work cooperatively for PLA and PLM; 2) PLA and PLM make a interdependent cycle, which means that a good PLM system ensures authentic input for PLA, while veritable PLA provides valuable feedback for PLM improvement; 3) PLA and PLM should be initiated for some key components. The author also analyzes some important problems to be tackled in PLA and PLM from the view angle of a R and D institute

  8. Emergency management in health: key issues and challenges in the UK.

    Lee, Andrew C K; Phillips, Wendy; Challen, Kirsty; Goodacre, Steve

    2012-10-19

    Emergency planning in the UK has grown considerably in recent years, galvanised by the threat of terrorism. However, deficiencies in NHS emergency planning were identified and the evidence-base that underpins it is questionable. Inconsistencies in terminologies and concepts also exist. Different models of emergency management exist internationally but the optimal system is unknown. This study examines the evidence-base and evidence requirements for emergency planning in the UK health context. The study involved semi-structured interviews with key stakeholders and opinion leaders. Purposive sampling was used to obtain a breadth of views from various agencies involved in emergency planning and response. Interviews were then analysed using a grounded approach using standard framework analysis techniques. We conducted 17 key informant interviews. Interviewees identified greater gaps in operational than technical aspects of emergency planning. Social and behavioural knowledge gaps were highlighted with regards to how individuals and organisations deal with risk and behave in emergencies. Evidence-based approaches to public engagement and for developing community resilience to disasters are lacking. Other gaps included how knowledge was developed and used. Conflicting views with regards to the optimal configuration and operation of the emergency management system were voiced. Four thematic categories for future research emerged:(i) Knowledge-base for emergency management: Further exploration is needed of how knowledge is acquired, valued, disseminated, adopted and retained.(ii) Social and behavioural issues: Greater understanding of how individuals approach risk and behave in emergencies is required.(iii) Organisational issues in emergencies: Several conflicting organisational issues were identified; value of planning versus plans, flexible versus standardized procedures, top-down versus bottom-up engagement, generic versus specific planning, and reactive versus

  9. [Idiopathic intracranial hypertension: Experience over 25 years and a management protocol].

    Monge Galindo, Lorena; Fernando Martínez, Ruth; Fuertes Rodrigo, Cristina; Fustero de Miguel, David; Pueyo Royo, Victoria; García Iñiguez, Juan Pablo; López-Pisón, Javier; Peña-Segura, José Luis

    2017-08-01

    We present our experience on idiopathic intracranial hypertension (IIH), before and after the introduction of a specific diagnosis and management protocol. A descriptive retrospective study was conducted on patients with IIH over a 25year period (1990-2015), comparing the last 7years (after introduction of the protocol) with the previous 18years. Among the 18,865 patients evaluated, there were 54 cases of IIH (29 infants and 25 children). A comparison was made between the two time periods: 32 cases in 1990-2008 -published in An Pediatr (Barc). 2009;71:400-6-, and 23 cases in 2008-2015. In post-protocol period, there were 13 patients aged between 3-10months (62% males) with transient bulging fontanelle, and 10 aged between 2-14years (50% males), with papilloedema. A total of 54% of infants had recently finished corticosteroid treatment for bronchitis. In the older children, there was one case associated with venous thrombosis caused by otomastoiditis, one case on corticosteroid treatment for angioma, and another case treated with growth hormone. Transfontanelle ultrasound was performed on all infants, and CT, MRI and angio-MRI was performed on every child. Lumbar puncture was performed on 2 infants in whom meningitis was suspected, and in all children. All patients progressed favourably, with treatment being started in 3 of them. One patient relapsed. Characteristics and outcomes of patients overlap every year. IIH usually has a favourable outcome, although it may be longer in children than in infants. It can cause serious visual disturbances, so close ophthalmological control is necessary. The protocol is useful to ease diagnostic decisions, monitoring, and treatment. Copyright © 2016 Asociación Española de Pediatría. Publicado por Elsevier España, S.L.U. All rights reserved.

  10. Key Technologies in the Context of Future Networks: Operational and Management Requirements

    Lorena Isabel Barona López

    2016-12-01

    Full Text Available The concept of Future Networks is based on the premise that current infrastructures require enhanced control, service customization, self-organization and self-management capabilities to meet the new needs in a connected society, especially of mobile users. In order to provide a high-performance mobile system, three main fields must be improved: radio, network, and operation and management. In particular, operation and management capabilities are intended to enable business agility and operational sustainability, where the addition of new services does not imply an excessive increase in capital or operational expenditures. In this context, a set of key-enabled technologies have emerged in order to aid in this field. Concepts such as Software Defined Network (SDN, Network Function Virtualization (NFV and Self-Organized Networks (SON are pushing traditional systems towards the next 5G network generation.This paper presents an overview of the current status of these promising technologies and ongoing works to fulfill the operational and management requirements of mobile infrastructures. This work also details the use cases and the challenges, taking into account not only SDN, NFV, cloud computing and SON but also other paradigms.

  11. Modelling management process of key drivers for economic sustainability in the modern conditions of economic development

    Pishchulina E.S.

    2017-01-01

    Full Text Available The text is about issues concerning the management of driver for manufacturing enterprise economic sustainability and manufacturing enterprise sustainability assessment as the key aspect of the management of enterprise economic sustainability. The given issues become topical as new requirements for the methods of manufacturing enterprise management in the modern conditions of market economy occur. An economic sustainability model that is considered in the article is an integration of enterprise economic growth, economic balance of external and internal environment and economic sustainability. The method of assessment of economic sustainability of a manufacturing enterprise proposed in the study allows to reveal some weaknesses in the enterprise performance, and untapped reserves, which can be further used to improve the economic sustainability and efficiency of the enterprise. The management of manufacturing enterprise economic sustainability is one of the most important factors of business functioning and development in modern market economy. The relevance of this trend is increasing in accordance with the objective requirements of the growing volumes of production and sale, the increasing complexity of economic relations, changing external environment of an enterprise.

  12. Protocol Adherence for Severe Sepsis and Septic Shock Management in the Emergency Department; a Clinical Audit

    Mostafa Alavi-Moghaddam

    2016-12-01

    Full Text Available Introduction: Although significant development in the field of medicine is achieved, sepsis is still a major issue threatening humans’ lives. This study was aimed to audit the management of severe sepsis and septic shock patients in emergency department (ED according to the present standard guidelines.Method: This is a prospective audit on approaching adult septic patients who were admitted to ED. The audit checklist was created based on the protocols of Surviving Sepsis Campaign and British Royal College recommendations. The mean knowledge score and the compliance rate of studied measures regarding standard protocols were calculated using SPSS version 21.Results: 30 emergency medicine residents were audited (63.3% male. The mean knowledge score of studied residents regarding standard guidelines were 5.07 ± 1.78 (IQR = 2 in pre education and 8.17 ± 1.31 (IQR = 85 in post education phase (p < 0.001. There was excellent compliance with standard in 4 (22% studied measures, good in 2 (11%, fair in 1 (6%, weak in 2 (11%, and poor in 9 (50%. 64% of poor compliance measures correlated to therapeutic factors. After training, score of 5 measures including checking vital signs in < 20 minute, central vein pressure measurement in < 1 hour, blood culture request, administration of vasopressor agents, and high flow O2 therapy were improved clinically, but not statistically.Conclusion: The protocol adherence in management of severe sepsis and septic shock for urine output measurement, central venous pressure monitoring, administration of inotrope agents, blood transfusion, intravenous antibiotic and hydration therapy, and high flow O2 delivery were disappointingly low. It seems training workshops and implementation of Clinical audit can improve residents’ adherence to current standard guidelines regarding severe sepsis and septic shock.

  13. Trauma surgeon becomes consultant: evaluation of a protocol for management of intermediate-level trauma patients.

    Fallon, Sara C; Delemos, David; Christopher, Daniel; Frost, Mary; Wesson, David E; Naik-Mathuria, Bindi

    2014-01-01

    At our level 1 pediatric trauma center, 9-54 intermediate-level ("level 2") trauma activations are received per month. Previously, the surgery team was required to respond to and assume responsibility for all patients who had "level 2" trauma activations. In 8/2011, we implemented a protocol where the emergency room (ER) physician primarily manages these patients with trauma consultation for surgical evaluation or admission. The purpose of this study was to prospectively evaluate the effects of the new protocol to ensure that patient safety and quality of care were maintained. We compared outcomes of patients treated PRE-implementation (10/2010-7/2011) and POST-implementation (9/2011-5/2012), including surgeon consultation rate, utilization of imaging and laboratory testing, ER length of stay, admission rate, and missed injuries or readmissions. Statistical analysis included chi-square and Student's t-test. We identified 472 patients: 179 in the PRE and 293 in the POST period. The populations had similar baseline clinical characteristics. The surgical consultation rate in the POST period was only 42%, with no missed injuries or readmissions. The ER length of stay did not change. However, in the POST period there were significant decreases in the admission rate (73% to 44%) and the mean number of CT scans (1.4 to 1), radiographs (2.4 to 1.7), and laboratory tests (5.1 to 3.3) ordered in the emergency room (all p<0.001). Intermediate-level pediatric trauma patients can be efficiently and safely managed by pediatric emergency room physicians, with surgical consultation only as needed. The protocol change improved resource utilization by decreasing testing and admissions and streamlining resident utilization in an era of reduced duty hours. © 2014.

  14. Early Versus Late Weight-Bearing Protocols for Surgically Managed Posterior Wall Acetabular Fractures.

    Heare, Austin; Kramer, Nicholas; Salib, Christopher; Mauffrey, Cyril

    2017-07-01

    Despite overall improved outcomes with open reduction and internal fixation of acetabular fractures, posterior wall fractures show disproportionately poor results. The effect of weight bearing on outcomes of fracture management has been investigated in many lower extremity fractures, but evidence-based recommendations in posterior wall acetabular fractures are lacking. The authors systematically reviewed the current literature to determine if a difference in outcome exists between early and late postoperative weight-bearing protocols for surgically managed posterior wall acetabular fractures. PubMed and MEDLINE were searched for posterior wall acetabular fracture studies that included weight-bearing protocols and Merle d'Aubigné functional scores. Twelve studies were identified. Each study was classified as either early or late weight bearing. Early weight bearing was defined as full, unrestricted weight bearing at or before 12 weeks postoperatively. Late weight bearing was defined as restricted weight bearing for greater than 12 weeks postoperatively. The 2 categories were then compared by functional score using a 2-tailed t test and by complication rate using chi-square analysis. Six studies (152 fractures) were placed in the early weight-bearing category. Six studies (302 fractures) were placed in the late weight-bearing category. No significant difference in Merle d'Aubigné functional scores was found between the 2 groups. No difference was found regarding heterotopic ossification, avascular necrosis, superficial infections, total infections, or osteoarthritis. This systematic review found no difference in functional outcome scores or complication rates between early and late weight-bearing protocols for surgically treated posterior wall fractures. [Orthopedics. 2017: 40(4):e652-e657.]. Copyright 2017, SLACK Incorporated.

  15. Patient-centered disease management (PCDM) for heart failure: study protocol for a randomised controlled trial.

    Bekelman, David B; Plomondon, Mary E; Sullivan, Mark D; Nelson, Karin; Hattler, Brack; McBryde, Connor; Lehmann, Kenneth G; Potfay, Jonathan; Heidenreich, Paul; Rumsfeld, John S

    2013-07-09

    Chronic heart failure (HF) disease management programs have reported inconsistent results and have not included comorbid depression management or specifically focused on improving patient-reported outcomes. The Patient Centered Disease Management (PCDM) trial was designed to test the effectiveness of collaborative care disease management in improving health status (symptoms, functioning, and quality of life) in patients with HF who reported poor HF-specific health status. Patients with a HF diagnosis at four VA Medical Centers were identified through population-based sampling. Patients with a Kansas City Cardiomyopathy Questionnaire (KCCQ, a measure of HF-specific health status) score of patients were randomized to receive usual care or the PCDM intervention, which included: (1) collaborative care management by VA clinicians including a nurse, cardiologist, internist, and psychiatrist, who worked with patients and their primary care providers to provide guideline-concordant care management, (2) home telemonitoring and guided patient self-management support, and (3) screening and treatment for comorbid depression. The primary study outcome is change in overall KCCQ score. Secondary outcomes include depression, medication adherence, guideline-based care, hospitalizations, and mortality. The PCDM trial builds on previous studies of HF disease management by prioritizing patient health status, implementing a collaborative care model of health care delivery, and addressing depression, a key barrier to optimal disease management. The study has been designed as an 'effectiveness trial' to support broader implementation in the healthcare system if it is successful. Unique identifier: NCT00461513.

  16. Balancing nurses' workload in hospital wards: study protocol of developing a method to manage workload.

    van den Oetelaar, W F J M; van Stel, H F; van Rhenen, W; Stellato, R K; Grolman, W

    2016-11-10

    Hospitals pursue different goals at the same time: excellent service to their patients, good quality care, operational excellence, retaining employees. This requires a good balance between patient needs and nursing staff. One way to ensure a proper fit between patient needs and nursing staff is to work with a workload management method. In our view, a nursing workload management method needs to have the following characteristics: easy to interpret; limited additional registration; applicable to different types of hospital wards; supported by nurses; covers all activities of nurses and suitable for prospective planning of nursing staff. At present, no such method is available. The research follows several steps to come to a workload management method for staff nurses. First, a list of patient characteristics relevant to care time will be composed by performing a Delphi study among staff nurses. Next, a time study of nurses' activities will be carried out. The 2 can be combined to estimate care time per patient group and estimate the time nurses spend on non-patient-related activities. These 2 estimates can be combined and compared with available nursing resources: this gives an estimate of nurses' workload. The research will take place in an academic hospital in the Netherlands. 6 surgical wards will be included, capacity 15-30 beds. The study protocol was submitted to the Medical Ethical Review Board of the University Medical Center (UMC) Utrecht and received a positive advice, protocol number 14-165/C. This method will be developed in close cooperation with staff nurses and ward management. The strong involvement of the end users will contribute to a broader support of the results. The method we will develop may also be useful for planning purposes; this is a strong advantage compared with existing methods, which tend to focus on retrospective analysis. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence

  17. Deviation Management: Key Management Subsystem Driver of Knowledge-Based Continuous Improvement in the Henry Ford Production System.

    Zarbo, Richard J; Copeland, Jacqueline R; Varney, Ruan C

    2017-10-01

    To develop a business subsystem fulfilling International Organization for Standardization 15189 nonconformance management regulatory standard, facilitating employee engagement in problem identification and resolution to effect quality improvement and risk mitigation. From 2012 to 2016, the integrated laboratories of the Henry Ford Health System used a quality technical team to develop and improve a management subsystem designed to identify, track, trend, and summarize nonconformances based on frequency, risk, and root cause for elimination at the level of the work. Programmatic improvements and training resulted in markedly increased documentation culminating in 71,641 deviations in 2016 classified by a taxonomy of 281 defect types into preanalytic (74.8%), analytic (23.6%), and postanalytic (1.6%) testing phases. The top 10 deviations accounted for 55,843 (78%) of the total. Deviation management is a key subsystem of managers' standard work whereby knowledge of nonconformities assists in directing corrective actions and continuous improvements that promote consistent execution and higher levels of performance. © American Society for Clinical Pathology, 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  18. Group assessment of key indicators of sustainable waste management in developing countries.

    Tot, Bojana; Vujić, Goran; Srđević, Zorica; Ubavin, Dejan; Russo, Mário Augusto Tavares

    2017-09-01

    Decision makers in developing countries are struggling to solve the present problems of solid waste management. Prioritisation and ranking of the most important indicators that influence the waste management system is very useful for any decision maker for the future planning and implementation of a sustainable waste management system. The aim of this study is to evaluate key indicators and their related sub-indicators in a group decision-making environment. In order to gain insight into the subject it was necessary to obtain the qualified opinions of decision makers from different countries who understand the situation in the sector of waste management in developing countries. An assessment is performed by 43 decision makers from both developed and developing countries, and the applied methodology is based on a combined use of the analytic hierarchy process, from the multi-criteria decision-making set of tools, and the preferential voting method known as Borda Count, which belongs to social choice theory. Pairwise comparison of indicators is performed with the analytic hierarchy process, and the ranking of indicators once obtained is assessed with Borda Count. Detailed analysis of the final results showed that the Institutional-Administrative indicator was the most important one, with the maximum weight as derived by both groups of decision makers. The results also showed that the combined use of the analytic hierarchy process and Borda Count contributes to the credibility and objectivity of the decision-making process, allowing its use in more complex waste management group decision-making problems to be recommended.

  19. Key performance indicators in plant asset management: hype, burden or real help?

    Jovanovic, A. (Steinbeis Advanced Risk Technologies, Stuttgart (Germany)); Bareiss, J.M. (EnBW, Stuttgart (Germany))

    2010-05-15

    The paper tackles the increasing role and use of indicators (e.g. the key performance indicators, KPIs) in asset management in power and process plants, in particular for risk and safety management (safety performance indicators, SPIs), inspection, maintenance, emerging risks analysis and aging management. The two main aspects of the use of indicators are monitoring of performance (e.g. of a single unit) and benchmarking (e.g. among different units). The basis for the considerations presented in the paper are several international projects in the field, showing that the main issue in the field is not and cannot be just the introduction of new indicators as such. They deal with the principles of establishing indicators, establishing generally accepted indicators (goal 'globally accepted' indicators), creating of 'repositories' of indicators in industry and respective tools. The repository/tool developed in the EU project iNTeg-Risk is presented in more detail. The main proposed criteria for successful introduction are the acceptance, transparency and clear added value, e.g. when the indicators help in finding solutions for the issues where the conventional analysis, e.g. the one based on engineering models and analysis is too expensive, complex or simply unavailable. Three practical cases are briefly shown in the paper: one for the improved asset management in a refinery, one for the identification of indicators helping to deal with emerging risks (how to identify them and how to assess risks of a new technology) and one for the implementation of a complex aging management program for industrial plants. (orig.)

  20. Key performance indicators in plant asset management: hype, burden or real help?

    Jovanovic, A.; Bareiss, J.M.

    2010-01-01

    The paper tackles the increasing role and use of indicators (e.g. the key performance indicators, KPIs) in asset management in power and process plants, in particular for risk and safety management (safety performance indicators, SPIs), inspection, maintenance, emerging risks analysis and aging management. The two main aspects of the use of indicators are monitoring of performance (e.g. of a single unit) and benchmarking (e.g. among different units). The basis for the considerations presented in the paper are several international projects in the field, showing that the main issue in the field is not and cannot be just the introduction of new indicators as such. They deal with the principles of establishing indicators, establishing generally accepted indicators (goal 'globally accepted' indicators), creating of 'repositories' of indicators in industry and respective tools. The repository/tool developed in the EU project iNTeg-Risk is presented in more detail. The main proposed criteria for successful introduction are the acceptance, transparency and clear added value, e.g. when the indicators help in finding solutions for the issues where the conventional analysis, e.g. the one based on engineering models and analysis is too expensive, complex or simply unavailable. Three practical cases are briefly shown in the paper: one for the improved asset management in a refinery, one for the identification of indicators helping to deal with emerging risks (how to identify them and how to assess risks of a new technology) and one for the implementation of a complex aging management program for industrial plants. (orig.)

  1. The scheduling of repeat cesarean section operations: prospective management protocol experience.

    Read, J A

    1985-03-01

    There are benefits to patients and a busy obstetric service if repeat cesarean section operations are performed on a scheduled basis. Optimum management avoids prematurity and reduces the need for amniocentesis. Over a period of 20 months repeat cesarean sections were performed at Tripler Army Medical Center while a protocol with the following elements was used: (1) known last menstrual period; (2) landmarks: positive urine human chorionic gonadotropin test by 6 weeks, Doppler fetal heart tone by 12 weeks, date determination by examination before 10 weeks, fetoscope fetal heart tone by 20 weeks, and date determination by size before 30 weeks; (3) date determination by midtrimester sonogram(s); (4) normal third-trimester glucose screening; (5) biparietal diameter of 9.2 or 9.5 cm before scheduling. With two or more clinical landmarks and one date by sonogram or one landmark and date by two sonograms, elective repeat cesarean section was scheduled at 39 weeks if the biparietal diameter was greater than or equal to 9.2 cm (127). If dates by sonogram were less than dates by last menstrual period but greater than 1 week or if last menstrual period was unknown, dates by sonogram and landmarks corresponding to dates by sonogram were used to electively schedule, with biparietal diameters of 9.2 or 9.5 cm respectively required (28). If protocol criteria were not met or earlier delivery was indicated (e.g., vertical scar or diabetes), amniocentesis was performed (42), except when not possible, advisable, or refused when patients either elected labor (20) or were scheduled if three or more criteria for 40+ weeks were met (18). Of 225 patients (70.5%) scheduled by protocol (173), amniocentesis (34), or medical indication (18), 188 (58.9%) were delivered without labor. In the 147 patients (46.1%) delivered electively by protocol without labor or amniocentesis, there were no cases of respiratory distress syndrome and the mean birth weight was 3517 gm. With early care and better

  2. Impact of Sleep Telemedicine Protocol in Management of Sleep Apnea: A 5-Year VA Experience.

    Baig, Mirza M; Antonescu-Turcu, Andrea; Ratarasarn, Kavita

    2016-05-01

    protocol at the Milwaukee VAMC was associated with increased efficiency of sleep services. Timeliness of sleep management interventions for sleep apnea improved in spite of the increased volume of service.

  3. The radiological monitoring protocol for metallic products and cleared scrap management

    Gil Lopez, E.

    2003-01-01

    Event though the use of nuclear and radiological techniques is subject to strict controls in most countries, the presence of radioactive material in batches of metallic scrap has been detected with relative frequency in the last few years. This circumstance has motivated the implementation of a series of national and international initiatives aimed at detecting and preventing this type of events, whether they be intentional or involuntary. The Spanish iron and steel industry is one of the country's most important industrial sectors, and to a great extent it depends on the importation of a very significant amount of metallic scrap that it uses as raw material. Experience has shown that countries that import large amounts of scrap, apart from supporting the mentioned international initiatives, should complement them with other national initiatives to reduce the risks resulting from the presence of radioactive material in scrap. In this context, the Spanish authorities, together with trade unions and entrepreneurial associations in the metal reclamations and smelting sectors and ENRESA, have signed a voluntary Protocol that defines and implements a national radiological monitoring and control system for scrap materials and their byproducts. The Protocol defines the obligations and rights of the signatories, and it describes the monitoring and control system and its legal bases, the operation of both specific and other general-purpose radiological monitoring equipment that existed prior to this initiative, the development of radiological training and dissemination plans for professionals in the metal reclamation and smelting sectors, the establishment of effective systems for the safe management of any radioactive materials detected, and the general improvement of the national response system in the event of radiological emergencies. Since the Protocol took effect in November 1999, more than 100 enterprises from the metallurgical (steel, copper, lead and aluminum

  4. Stakeholder Confidence and Radioactive Waste management - An annotated glossary of key terms

    Martell, Meritxell; Pescatore, Claudio; Mays, Claire

    2013-01-01

    The OECD Nuclear Energy Agency (NEA) Forum on Stakeholder Confidence (FSC) Annotated Glossary is a review of concepts central to societal decision making about radioactive waste management. It records the evolution in understanding that has taken place in the group as the FSC has worked with these concepts over time. This should be a useful resource not only for new FSC participants but also for others: this annotated glossary forms a good reference handbook for future texts regarding societal aspects of radioactive waste management and its governance. Each glossary entry is structured, to the extent possible, as follows: - The term and its variants, if any, in FSC literature are identified. - The common FSC understanding of the concept and any guidance are captured, based upon a review of all FSC documents to date. - Any evolution of the concept observed over the decade of FSC work is analysed. - The FSC interpretation of the symbolic dimension is explored. - The current status of outlook in the FSC, and intended activities according to the current Programme of Work (2010 and beyond) are assessed. Overall, although different persons and groups may assign different meanings to words, and although terminology will continue to evolve, this glossary is the FSC's 'state-of-the-art' guide to key terms in use. As such, it should prove to be a handy reference for all those interested in the governance of radioactive waste management

  5. Asthma referrals: a key component of asthma management that needs to be addressed

    Price D

    2017-07-01

    Full Text Available David Price,1,2 Leif Bjermer,3 David A Bergin,4 Rafael Martinez5 1Centre of Academic Primary Care, University of Aberdeen, Aberdeen, UK; 2Observational and Pragmatic Research Institute, Singapore; 3Department of Respiratory Medicine and Allergology, Lund University, Lund, Sweden; 4Novartis Ireland Limited, Dublin, Ireland; 5Novartis Pharma AG, Basel, Switzerland Abstract: Heterogeneity of asthma and difficulty in achieving optimal control are the major challenges in the management of asthma. To help attain the best possible clinical outcomes in patients with asthma, several guidelines provide recommendations for patients who will require a referral to a specialist. Such referrals can help in clearing the uncertainty from the initial diagnosis, provide tailored treatment options to patients with persistent symptoms and offer the patients access to health care providers with expertise in the management of the asthma; thus, specialist referrals have a substantial impact on disease prognosis and the patient’s health status. Hurdles in implementing these recommendations include lack of their dissemination among health care providers and nonadherence to these guidelines; these hurdles considerably limit the implementation of specialist referrals, eventually affecting the rate of referrals. In this review, recommendations for specialist referrals from several key international and national asthma guidelines and other relevant published literature are evaluated. Furthermore, we highlight why referrals are not happening, how this can be improved, and ultimately, what should be done in the specialist setting, based on existing evidence in published literature. Keywords: asthma, disease management, specialization, primary care physicians, referral

  6. Study protocol: patient reported outcomes for bladder management strategies in spinal cord injury.

    Patel, Darshan P; Lenherr, Sara M; Stoffel, John T; Elliott, Sean P; Welk, Blayne; Presson, Angela P; Jha, Amitabh; Rosenbluth, Jeffrey; Myers, Jeremy B

    2017-10-10

    The majority of spinal cord injury (SCI) patients have urinary issues, such as incontinence, retention, and frequency. These problems place a significant burden on patients' physical health and quality of life (QoL). There are a wide variety of bladder management strategies available to patients with no clear guidelines on appropriate selection. Inappropriate bladder management can cause hospitalizations and serious complications, such as urosepsis and renal failure. Patients believe that both independence and ability to carry out daily activities are just as important as physical health in selecting the right bladder-management strategy but little is known about patient's QoL with different bladder managements. Our study's aim is to assess patient reported QoL measures with various bladder managements after SCI. This manuscript describes the approach, study design and common data elements for our central study. This is a multi-institutional prospective cohort study comparing three different bladder-management strategies (clean intermittent catheterization, indwelling catheters, and surgery). Information collected from participants includes demographics, past medical and surgical history, injury characteristics, current and past bladder management, and SCI /bladder-related complications. Patient reported outcomes and QoL questionnaires were administered at enrollment and every 3 months for 1 year. Aims of this study protocol are: (1) to assess baseline QoL differences between the three different bladder-management strategies; (2) determine QoL impact when those using either form of catheter management undergo a surgery over the 1 year of follow-up among patients eligible for surgery; (3) assess the effects of changes in bladder management and complications on QoL over a 1-year longitudinal follow-up. By providing information about patient-reported outcomes associated with different bladder management strategies after SCI, and the impact of bladder management

  7. Applying fluvial geomorphology to river channel management: Background for progress towards a palaeohydrology protocol

    Gregory, K. J.; Benito, G.; Downs, P. W.

    2008-06-01

    Significant developments have been achieved in applicable and applied fluvial geomorphology as shown in publications of the last three decades, analyzed as the basis for using results of studies of environmental change as a basis for management. The range of types of publications and of activities are more pertinent to river channel management as a result of concern with sustainability, global climate change, environmental ethics, ecosystem health concepts and public participation. Possible applications, with particular reference to river channel changes, include those concerned with form and process, assessment of channel change, urbanization, channelization, extractive industries, impact of engineering works, historical changes in land use, and restoration with specific examples illustrated in Table 1. In order to achieve general significance for fluvial geomorphology, more theory and extension by modelling methods is needed, and examples related to morphology and process characteristics, integrated approaches, and changes of the fluvial system are collected in Table 2. The ways in which potential applications are communicated to decision-makers range from applicable outputs including publications ranging from review papers, book chapters, and books, to applied outputs which include interdisciplinary problem solving, educational outreach, and direct involvement, with examples summarized in Table 3. On the basis of results gained from investigations covering periods longer than continuous records, a protocol embracing palaeohydrological inputs for application to river channel management is illustrated and developed as a synopsis version (Table 4), demonstrating how conclusions from geomorphological research can be expressed in a format which can be considered by managers.

  8. Development and application of safety and waste management protocols for the Laboratorio de Ingenieria Quimica

    Scott Jimenez, Stephanie

    2014-01-01

    Security and waste management protocols are developed for the laboratory de la Escuela de Ingenieria Quimica at the Universidad de Costa Rica. The protocols are elaborated according to the provisions and guidelines stipulated in the Costa Rican legislation, technical references and documents issued by the chemical regency of the Universidad de Costa Rica. An inspection guide was prepared and applied as diagnostic tool for the evaluation of the safety conditions and handling of chemical substances in the laboratory. Inspections of the physical plant and interviews to area managers were realized. The results obtained have allowed to implement improvements of the activities in safe working environment conditions and teaching; and an adequate signaling and demarcation of the facilities, location and recharge of fire extinguishers. An emergency plan is elaborated for the Laboratorio de Ingenieria Quimica, by performing a sequence of stages proposed by Comision Nacional de Emergencias. In addition, a plan for the safe and effective management of waste generated is made based on the reagents most frequently used in the different practices. The method of storage Flinn Scientific was selected as the most appropriate method to organize and distribute chemicals in the laboratory reagent storage area, obtaining the highest percentage in the decision matrix. Security aspects in the registration and documentation system implemented in the laboratory administration are evaluated by a checklist. This assessment has allowed to propose improvements, to increase the efficiency and to obtain an easy storage, control and a fast search of the information by means of the procedures documented and elaborated. Some of the recommendations proposed have been the establishment of an emergency action committee, the reduction of unnecessary quantities of chemicals stored, training on safety, operation of fire extinguisher and first aid; and construction of an emergency exit, etc. [es

  9. The nursing management of diarrhoea and constipation before and after the implementation of a bowel management protocol.

    McKenna, S; Wallis, M; Brannelly, A; Cawood, J

    2001-02-01

    Intensive care unit (ICU) patients frequently suffer problems associated with both diarrhoea and constipation. Strategies to optimise the management of these conditions need to focus on improving the communication between staff and ensuring effective treatment is implemented. The team involved in this study developed a Bowel Management Protocol (BMP). The effect of this BMP on the documentation of assessment and management of diarrhoea and constipation was evaluated using a quasi-experimental research design. Data were collected via a retrospective audit of medical records. Two groups of patient records were randomly sampled. The records of 60 patients who were admitted to ICU in the 6 months before the introduction of the BMP were accessed together with the records of 60 patients admitted in the 6 months following the introduction of the BMP. Data were collected regarding patient demographics and the assessment and management of bowel function before and after BMP introduction. The results indicated that a BMP improved documentation of the assessment of bowel function. In addition, there was an improvement in the documentation of nursing intervention in the presence of constipation and diarrhoea. These results have to be interpreted with caution because, despite random sampling over two 6 month periods, there were statistically significant differences in age, length of stay, method of feeding and medical diagnosis between the two groups. Further research into the effectiveness of using a BMP is recommended.

  10. Research on key technology of prognostic and health management for autonomous underwater vehicle

    Zhou, Zhi

    2017-12-01

    Autonomous Underwater Vehicles (AUVs) are non-cable and autonomous motional underwater robotics. With a wide range of activities, it can reach thousands of kilometers. Because it has the advantages of wide range, good maneuverability, safety and intellectualization, it becomes an important tool for various underwater tasks. How to improve diagnosis accuracy of the AUVs electrical system faults, and how to repair AUVs by the information are the focus of navy in the world. In turn, ensuring safe and reliable operation of the system has very important significance to improve AUVs sailing performance. To solve these problems, in the paper the prognostic and health management(PHM) technology is researched and used to AUV, and the overall framework and key technology are proposed, such as data acquisition, feature extraction, fault diagnosis, failure prediction and so on.

  11. Ecological thresholds: The key to successful enviromental management or an important concept with no practical application?

    Groffman, P.M.; Baron, Jill S.; Blett, T.; Gold, A.J.; Goodman, I.; Gunderson, L.H.; Levinson, B.M.; Palmer, Margaret A.; Paerl, H.W.; Peterson, G.D.; Poff, N.L.; Rejeski, D.W.; Reynolds, J.F.; Turner, M.G.; Weathers, K.C.; Wiens, J.

    2006-01-01

    An ecological threshold is the point at which there is an abrupt change in an ecosystem quality, property or phenomenon, or where small changes in an environmental driver produce large responses in the ecosystem. Analysis of thresholds is complicated by nonlinear dynamics and by multiple factor controls that operate at diverse spatial and temporal scales. These complexities have challenged the use and utility of threshold concepts in environmental management despite great concern about preventing dramatic state changes in valued ecosystems, the need for determining critical pollutant loads and the ubiquity of other threshold-based environmental problems. In this paper we define the scope of the thresholds concept in ecological science and discuss methods for identifying and investigating thresholds using a variety of examples from terrestrial and aquatic environments, at ecosystem, landscape and regional scales. We end with a discussion of key research needs in this area.

  12. Identifying and weighting of key performance indicators of knowledge management2.0 in organizations

    Saeed Khalilazar

    2016-03-01

    Full Text Available Main purpose of this research is identifying and weighting of key performance indicators of knowledge management2.0 in organizations. According to widespread permeation of technology, especially social media in different organizational dimensions and functional view to this phenomenon in knowledge management, performance measurement of this kind of media in order to meet organizational goals seems necessary. KM2.0 key performance indicators in this article has been identified and weighted through Delphi methodology, via questionnaire in three rounds. KM2.0 KPIs which are identified and weighted in this article are applicable in organizations that are eager to implement KM2.0 initiative and they can measure the performance of KM2.0 activities therefore this research is applicable in goal oriented approach. According to the results, KM2.0 participation process consists of 3 stages and 8 steps as mentioned below: First stage which is presence, consists of 3 steps which are registration, visit and download. Second stage which is feedback consists of 3 steps which are conversation, applause and amplification. Finally, third stage which is creation consists of 2 steps which are codification and personalization. Ultimate contribution of this research is identifying and weighting KPIs of KM2.0 in conceptual framework of KM2.0. Based on developing a conceptual framework and participation process in KM2.0 and listing related KPIs as an applicable solution in order to measure and improve the performance of organizational social media, this research has unique innovation among related and other articles.

  13. Risk based knowledge assessments: towards a toolbox for managing key knowledge assets

    Bright, Clive

    2008-01-01

    Full text: It is now well acknowledged that considerable Knowledge Management (KM) issues are faced by national and international nuclear communities. Much of these problems relate to issues of an ageing workforce and the significantly reduced influx of new generation of nuclear engineers and scientists. The management discipline of KM contains a broad spectrum of methods and techniques. However, the effective implementation of a KM strategy requires the selection and deployment of appropriate and targeted approaches that are pertinent to the particular issues of the technical or business area within an organisation. A clear strategy is contingent upon an assessment of what are the knowledge areas and what are the key (knowledge) risk areas. In particular the following issues have to be addressed: 'what knowledge exists?', 'what is the nature and format of that knowledge?' and 'what knowledge is key to our continued, safe, and effective operation?'. Answers to such questions will enable an organisation to prioritise KM effort and employ subsequent KM approaches that are appropriate. Subsequent approaches ranging from the utilisation of information technologies, such as databases; knowledge retention methods; and the setting up of Community of Practices to share knowledge and experience. This paper considers a risk assessment based approach to KM. In so doing the paper extends work previously reported on an approach to conducting knowledge audits by considering the integration of that approach with approaches to (knowledge) risk assessment. The paper also provides a brief review of the various KM approaches that can act to reduce the level of risk faced by an organisation. The paper concludes by reflecting upon the role, value of deploying such a risk based approach. (author)

  14. The key incident monitoring and management system - history and role in quality improvement.

    Badrick, Tony; Gay, Stephanie; Mackay, Mark; Sikaris, Ken

    2018-01-26

    The determination of reliable, practical Quality Indicators (QIs) from presentation of the patient with a pathology request form through to the clinician receiving the report (the Total Testing Process or TTP) is a key step in identifying areas where improvement is necessary in laboratories. The Australasian QIs programme Key Incident Monitoring and Management System (KIMMS) began in 2008. It records incidents (process defects) and episodes (occasions at which incidents may occur) to calculate incident rates. KIMMS also uses the Failure Mode Effects Analysis (FMEA) to assign quantified risk to each incident type. The system defines risk as incident frequency multiplied by both a harm rating (on a 1-10 scale) and detection difficulty score (also a 1-10 scale). Between 2008 and 2016, laboratories participating rose from 22 to 69. Episodes rose from 13.2 to 43.4 million; incidents rose from 114,082 to 756,432. We attribute the rise in incident rate from 0.86% to 1.75% to increased monitoring. Haemolysis shows the highest incidence (22.6% of total incidents) and the highest risk (26.68% of total risk). "Sample is suspected to be from the wrong patient" has the second lowest frequency, but receives the highest harm rating (10/10) and detection difficulty score (10/10), so it is calculated to be the 8th highest risk (2.92%). Similarly, retracted (incorrect) reports QI has the 10th highest frequency (3.9%) but the harm/difficulty calculation confers the second highest risk (11.17%). TTP incident rates are generally low (less than 2% of observed episodes), however, incident risks, their frequencies multiplied by both ratings of harm and discovery difficulty scores, concentrate improvement attention and resources on the monitored incident types most important to manage.

  15. Prioritizing key resilience indicators to support coral reef management in a changing climate.

    McClanahan, Tim R; Donner, Simon D; Maynard, Jeffrey A; MacNeil, M Aaron; Graham, Nicholas A J; Maina, Joseph; Baker, Andrew C; Alemu I, Jahson B; Beger, Maria; Campbell, Stuart J; Darling, Emily S; Eakin, C Mark; Heron, Scott F; Jupiter, Stacy D; Lundquist, Carolyn J; McLeod, Elizabeth; Mumby, Peter J; Paddack, Michelle J; Selig, Elizabeth R; van Woesik, Robert

    2012-01-01

    Managing coral reefs for resilience to climate change is a popular concept but has been difficult to implement because the empirical scientific evidence has either not been evaluated or is sometimes unsupportive of theory, which leads to uncertainty when considering methods and identifying priority reefs. We asked experts and reviewed the scientific literature for guidance on the multiple physical and biological factors that affect the ability of coral reefs to resist and recover from climate disturbance. Eleven key factors to inform decisions based on scaling scientific evidence and the achievability of quantifying the factors were identified. Factors important to resistance and recovery, which are important components of resilience, were not strongly related, and should be assessed independently. The abundance of resistant (heat-tolerant) coral species and past temperature variability were perceived to provide the greatest resistance to climate change, while coral recruitment rates, and macroalgae abundance were most influential in the recovery process. Based on the 11 key factors, we tested an evidence-based framework for climate change resilience in an Indonesian marine protected area. The results suggest our evidence-weighted framework improved upon existing un-weighted methods in terms of characterizing resilience and distinguishing priority sites. The evaluation supports the concept that, despite high ecological complexity, relatively few strong variables can be important in influencing ecosystem dynamics. This is the first rigorous assessment of factors promoting coral reef resilience based on their perceived importance, empirical evidence, and feasibility of measurement. There were few differences between scientists' perceptions of factor importance and the scientific evidence found in journal publications but more before and after impact studies will be required to fully test the validity of all the factors. The methods here will increase the feasibility

  16. Prioritizing key resilience indicators to support coral reef management in a changing climate.

    Tim R McClanahan

    Full Text Available Managing coral reefs for resilience to climate change is a popular concept but has been difficult to implement because the empirical scientific evidence has either not been evaluated or is sometimes unsupportive of theory, which leads to uncertainty when considering methods and identifying priority reefs. We asked experts and reviewed the scientific literature for guidance on the multiple physical and biological factors that affect the ability of coral reefs to resist and recover from climate disturbance. Eleven key factors to inform decisions based on scaling scientific evidence and the achievability of quantifying the factors were identified. Factors important to resistance and recovery, which are important components of resilience, were not strongly related, and should be assessed independently. The abundance of resistant (heat-tolerant coral species and past temperature variability were perceived to provide the greatest resistance to climate change, while coral recruitment rates, and macroalgae abundance were most influential in the recovery process. Based on the 11 key factors, we tested an evidence-based framework for climate change resilience in an Indonesian marine protected area. The results suggest our evidence-weighted framework improved upon existing un-weighted methods in terms of characterizing resilience and distinguishing priority sites. The evaluation supports the concept that, despite high ecological complexity, relatively few strong variables can be important in influencing ecosystem dynamics. This is the first rigorous assessment of factors promoting coral reef resilience based on their perceived importance, empirical evidence, and feasibility of measurement. There were few differences between scientists' perceptions of factor importance and the scientific evidence found in journal publications but more before and after impact studies will be required to fully test the validity of all the factors. The methods here will

  17. Management of investment-construction projects basing on the matrix of key events

    Morozenko Andrey Aleksandrovich

    2016-11-01

    Full Text Available The article considers the current problematic issues in the management of investment-construction projects, examines the questions of efficiency increase of construction operations on the basis of the formation of a reflex-adaptive organizational structure. The authors analyzed the necessity of forming a matrix of key events in the investment-construction project (ICP, which will create the optimal structure of the project, basing on the work program for its implementation. For convenience of representing programs of the project implementation in time the authors make recommendations to consolidate the works into separate, economically independent functional blocks. It is proposed to use an algorithm of forming the matrix of an investment-construction project, considering the economic independence of the functional blocks and stages of the ICP implementation. The use of extended network model is justified, which is supplemented by organizational and structural constraints at different stages of the project, highlighting key events fundamentally influencing the further course of the ICP implementation.

  18. An energy-efficient MAC protocol using dynamic queue management for delay-tolerant mobile sensor networks.

    Li, Jie; Li, Qiyue; Qu, Yugui; Zhao, Baohua

    2011-01-01

    Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC) for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay.

  19. Resource use and costs of type 2 diabetes patients receiving managed or protocolized primary care: a controlled clinical trial.

    van der Heijden, Amber A W A; de Bruijne, Martine C; Feenstra, Talitha L; Dekker, Jacqueline M; Baan, Caroline A; Bosmans, Judith E; Bot, Sandra D M; Donker, Gé A; Nijpels, Giel

    2014-06-25

    The increasing prevalence of diabetes is associated with increased health care use and costs. Innovations to improve the quality of care, manage the increasing demand for health care and control the growth of health care costs are needed. The aim of this study is to evaluate the care process and costs of managed, protocolized and usual care for type 2 diabetes patients from a societal perspective. In two distinct regions of the Netherlands, both managed and protocolized diabetes care were implemented. Managed care was characterized by centralized organization, coordination, responsibility and centralized annual assessment. Protocolized care had a partly centralized organizational structure. Usual care was characterized by a decentralized organizational structure. Using a quasi-experimental control group pretest-posttest design, the care process (guideline adherence) and costs were compared between managed (n = 253), protocolized (n = 197), and usual care (n = 333). We made a distinction between direct health care costs, direct non-health care costs and indirect costs. Multivariate regression models were used to estimate differences in costs adjusted for confounding factors. Because of the skewed distribution of the costs, bootstrapping methods (5000 replications) with a bias-corrected and accelerated approach were used to estimate 95% confidence intervals (CI) around the differences in costs. Compared to usual and protocolized care, in managed care more patients were treated according to diabetes guidelines. Secondary health care use was higher in patients under usual care compared to managed and protocolized care. Compared to usual care, direct costs were significantly lower in managed care (€-1.181 (95% CI: -2.597 to -334)) while indirect costs were higher (€ 758 (95% CI: -353 to 2.701), although not significant. Direct, indirect and total costs were lower in protocolized care compared to usual care (though not significantly). Compared to usual care, managed

  20. Quantum dense key distribution

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  1. Some key principles in implementing knowledge management: the views of employees in a small software company

    Clair Wagner

    2002-09-01

    Full Text Available As the Knowledge Era replaces the Information Age the challenge is to transform information into knowledge and use this knowledge to create and sustain the competitive advantage of organisations. In this article four key principles for implementing knowledge management are discussed. These principles were derived from a survey and discussions with employees at a small software company. The four principles are: the need for a common definition of and vision for knowledge management, the interdependence between the human and technology track, the way employees punctuate ‘knowing’ and the structure of a reward system for sharing knowledge. Opsomming Organisasies word gekonfronteer met unieke uitdagings soos wat die Kennisera die Inligtingsera vervang. Een van die grootste uitdagings is om inligting te verander na betekenisvolle kennis en om die kennis te gebruik om ‘n kompeterende voorsprong te skep en te bou. In hierdie artikel word vier kern beginsels vir die implementering van kennisbestuur bespreek. Die beginsels is geskoei op ‘n opname van en onderhoude met werknemers in ‘n klein sagteware besigheid. Die vier beginsels is: die behoefte aan ‘n definisie en visie van kennisbestuur, die interafhanklikheid tussen mense en tegnologie, die wyse waarop werknemers kennis punktueer en die skep van ‘n beloningstruktuur vir die deel van kennis.

  2. Mechanisms of chronic pain - key considerations for appropriate physical therapy management.

    Courtney, Carol A; Fernández-de-Las-Peñas, César; Bond, Samantha

    2017-07-01

    In last decades, knowledge of nociceptive pain mechanisms has expanded rapidly. The use of quantitative sensory testing has provided evidence that peripheral and central sensitization mechanisms play a relevant role in localized and widespread chronic pain syndromes. In fact, almost any patient suffering with a chronic pain condition will demonstrate impairments in the central nervous system. In addition, it is accepted that pain is associated with different types of trigger factors including social, physiological, and psychological. This rational has provoked a change in the understanding of potential mechanisms of manual therapies, changing from a biomechanical/medical viewpoint, to a neurophysiological/nociceptive viewpoint. Therefore, interventions for patients with chronic pain should be applied based on current knowledge of nociceptive mechanisms since determining potential drivers of the sensitization process is critical for effective management. The current paper reviews mechanisms of chronic pain from a clinical and neurophysiological point of view and summarizes key messages for clinicians for proper management of individuals with chronic pain.

  3. Key Design Considerations When Calculating Cost Savings for Population Health Management Programs in an Observational Setting.

    Murphy, Shannon M E; Hough, Douglas E; Sylvia, Martha L; Dunbar, Linda J; Frick, Kevin D

    2018-02-08

    To illustrate the impact of key quasi-experimental design elements on cost savings measurement for population health management (PHM) programs. Population health management program records and Medicaid claims and enrollment data from December 2011 through March 2016. The study uses a difference-in-difference design to compare changes in cost and utilization outcomes between program participants and propensity score-matched nonparticipants. Comparisons of measured savings are made based on (1) stable versus dynamic population enrollment and (2) all eligible versus enrolled-only participant definitions. Options for the operationalization of time are also discussed. Individual-level Medicaid administrative and claims data and PHM program records are used to match study groups on baseline risk factors and assess changes in costs and utilization. Savings estimates are statistically similar but smaller in magnitude when eliminating variability based on duration of population enrollment and when evaluating program impact on the entire target population. Measurement in calendar time, when possible, simplifies interpretability. Program evaluation design elements, including population stability and participant definitions, can influence the estimated magnitude of program savings for the payer and should be considered carefully. Time specifications can also affect interpretability and usefulness. © Health Research and Educational Trust.

  4. A Hierarchical structure of key performance indicators for operation management and continuous improvement in production systems.

    Kang, Ningxuan; Zhao, Cong; Li, Jingshan; Horst, John A

    2016-01-01

    Key performance indicators (KPIs) are critical for manufacturing operation management and continuous improvement (CI). In modern manufacturing systems, KPIs are defined as a set of metrics to reflect operation performance, such as efficiency, throughput, availability, from productivity, quality and maintenance perspectives. Through continuous monitoring and measurement of KPIs, meaningful quantification and identification of different aspects of operation activities can be obtained, which enable and direct CI efforts. A set of 34 KPIs has been introduced in ISO 22400. However, the KPIs in a manufacturing system are not independent, and they may have intrinsic mutual relationships. The goal of this paper is to introduce a multi-level structure for identification and analysis of KPIs and their intrinsic relationships in production systems. Specifically, through such a hierarchical structure, we define and layer KPIs into levels of basic KPIs, comprehensive KPIs and their supporting metrics, and use it to investigate the relationships and dependencies between KPIs. Such a study can provide a useful tool for manufacturing engineers and managers to measure and utilize KPIs for CI.

  5. Identifying Key Performance Indicators for Holistic Hospital Management with a Modified DEMATEL Approach.

    Si, Sheng-Li; You, Xiao-Yue; Liu, Hu-Chen; Huang, Jia

    2017-08-19

    Performance analysis is an important way for hospitals to achieve higher efficiency and effectiveness in providing services to their customers. The performance of the healthcare system can be measured by many indicators, but it is difficult to improve them simultaneously due to the limited resources. A feasible way is to identify the central and influential indicators to improve healthcare performance in a stepwise manner. In this paper, we propose a hybrid multiple criteria decision making (MCDM) approach to identify key performance indicators (KPIs) for holistic hospital management. First, through integrating evidential reasoning approach and interval 2-tuple linguistic variables, various assessments of performance indicators provided by healthcare experts are modeled. Then, the decision making trial and evaluation laboratory (DEMATEL) technique is adopted to build an interactive network and visualize the causal relationships between the performance indicators. Finally, an empirical case study is provided to demonstrate the proposed approach for improving the efficiency of healthcare management. The results show that "accidents/adverse events", "nosocomial infection", ''incidents/errors", "number of operations/procedures" are significant influential indicators. Also, the indicators of "length of stay", "bed occupancy" and "financial measures" play important roles in performance evaluation of the healthcare organization. The proposed decision making approach could be considered as a reference for healthcare administrators to enhance the performance of their healthcare institutions.

  6. Comparison of Greenhouse Gas Offset Quantification Protocols for Nitrogen Management in Dryland Wheat Cropping Systems of the Pacific Northwest

    Tabitha T. Brown

    2017-11-01

    Full Text Available In the carbon market, greenhouse gas (GHG offset protocols need to ensure that emission reductions are of high quality, quantifiable, and real. Lack of consistency across protocols for quantifying emission reductions compromise the credibility of offsets generated. Thus, protocol quantification methodologies need to be periodically reviewed to ensure emission offsets are credited accurately and updated to support practical climate policy solutions. Current GHG emission offset credits generated by agricultural nitrogen (N management activities are based on reducing the annual N fertilizer application rate for a given crop without reducing yield. We performed a “road test” of agricultural N management protocols to evaluate differences among protocol components and quantify nitrous oxide (N2O emission reductions under sample projects relevant to N management in dryland, wheat-based cropping systems of the inland Pacific Northwest (iPNW. We evaluated five agricultural N management offset protocols applicable to North America: two methodologies of American Carbon Registry (ACR1 and ACR2, Verified Carbon Standard (VCS, Climate Action Reserve (CAR, and Alberta Offset Credit System (Alberta. We found that only two protocols, ACR2 and VCS, were suitable for this study, in which four sample projects were developed representing feasible N fertilizer rate reduction activities. The ACR2 and VCS protocols had identical baseline and project emission quantification methodologies resulting in identical emission reduction values. Reducing N fertilizer application rate by switching to variable rate N (sample projects 1–3 or split N application (sample project 4 management resulted in a N2O emission reduction ranging from 0.07 to 0.16, and 0.26 Mg CO2e ha−1, respectively. Across the range of C prices considered ($5, $10, and $50 per metric ton of CO2 equivalent, we concluded that the N2O emission offset payment alone ($0.35–$13.0 ha−1 was unlikely to

  7. [Protocols of health security in the light of some examples of risk management].

    Postel-Vinay, Nicolas; Coquin, Yves

    2005-11-30

    Throughout medical training, medical risk management is a subject that has been insufficiently addressed and treated without a global vision. Yet the different dangers often make the front page of a media that addresses the question of health security when there is a failure of the system or new legal developments. Added to this disequilibrium of communication and training is the great complexity of risk management. Not only is the nature of the potentially dangerous agents extraordinarily varied but also the entity that detects the risk is sometimes a stranger to the causes of its appearance. The surrounding regulations are themselves complex and dense. Using the examples that have arisen over the last 2 or 3 years, this article describes the current French protocols in risk management, that rely upon the agencies delivering their expertise, certain of which are endowed with the power of policing these regulations. In practice, the doctor should understand the role of these agencies, know how to find the validated information that they can provide, and understand his role in this picture. A role that is perceived as far away as long as the risk has not emerged, but is in the forefront once the event arises.

  8. Graded Exercise Testing in a Pediatric Weight Management Center: The DeVos Protocol.

    Eisenmann, Joey C; Guseman, Emily Hill; Morrison, Kyle; Tucker, Jared; Smith, Lucie; Stratbucker, William

    2015-12-01

    In this article, we describe a protocol used to test the functional capacity of the obese pediatric patient and describe the peak oxygen consumption (VO2peak) of patients seeking treatment at a pediatric weight management center. One hundred eleven (mean age, 12.5 ± 3.0 years) patients performed a multistage exercise test on a treadmill, of which 90 (81%) met end-test criteria and provided valid VO2peak data. Peak VO2 was expressed: (1) in absolute terms (L·min(-1)); (2) as the ratio of the volume of oxygen consumed per minute relative to total body mass (mL·kg(-1)·min(-1)); and (3) as the ratio of the volume of oxygen consumed per minute relative to fat-free mass (mL·FFM·kg(-1)·min(-1)). Mean BMI z-score was 2.4 ± 0.3 and the mean percent body fat was 36.5 ± 9.7%. Absolute VO2peak (L·min(-1)) was significantly different between sexes; however, relative values were similar between sexes. Mean VO2peak was 25.7 ± 4.8 mL·kg(-1)·min(-1) with a range of 13.5-36.7 mL·kg(-1)·min(-1). Obese youth seeking treatment at a stage 3 pediatric weight management center exhibit low VO2peak. The protocol outlined here should serve as a model for similar programs interested in the submaximal and peak responses to exercise in obese pediatric patients.

  9. Capacity building in water demand management as a key component for attaining millennium development goals

    Gumbo, Bekithemba; Forster, Laura; Arntzen, Jaap

    Successful water demand management (WDM) implementation as a component of integrated water resource management (IWRM) can play a significant role in the alleviation of poverty through more efficient use of available water resources. The urban population in Southern African cities is characterised by so-called ‘water poor’ communities who typically expend a high percentage of their household income on poor quality water. Usually they have no access to an affordable alternative source. Although WDM as a component of IWRM is not a panacea for poverty, it can help alleviate poverty by facilitating water services management by municipal water supply agencies (MWSAs) in the region. WDM is a key strategy for achieving the millennium development goals (MDGs) and, as such, should be given due attention in the preparation of national IWRM and water efficiency plans. Various studies in the Southern African region have indicated that capacity building is necessary for nations to develop IWRM and water-use efficiency plans to meet the targets set out in the MDGs. WDM education and training of water professionals and end-users is particularly important in developing countries, which are resource and information-access poor. In response to these findings, The World Conservation Union (IUCN) and its consulting partners, the Training and Instructional Design Academy of South Africa (TIDASA), and Centre for Applied Research (CAR) designed, developed and presented a pilot WDM Guideline Training Module for MWSAs as part of Phase II of IUCN’s Southern Africa regional WDM project. Pilot training was conducted in July 2004 in Lusaka, Zambia for a group of 36 participants involved in municipal water supply from nine Southern African countries. This paper looks at the links between building the capacity of professionals, operational staff and other role-players in the municipal water supply chain to implement WDM as part of broader IWRM strategies, and the subsequent potential for

  10. Compliance with AAPM Practice Guideline 1.a: CT Protocol Management and Review — from the perspective of a university hospital

    Bour, Robert K.; Pozniak, Myron; Ranallo, Frank N.

    2015-01-01

    The purpose of this paper is to describe our experience with the AAPM Medical Physics Practice Guideline 1.a: “CT Protocol Management and Review Practice Guideline”. Specifically, we will share how our institution's quality management system addresses the suggestions within the AAPM practice report. We feel this paper is needed as it was beyond the scope of the AAPM practice guideline to provide specific details on fulfilling individual guidelines. Our hope is that other institutions will be able to emulate some of our practices and that this article would encourage other types of centers (e.g., community hospitals) to share their methodology for approaching CT protocol optimization and quality control. Our institution had a functioning CT protocol optimization process, albeit informal, since we began using CT. Recently, we made our protocol development and validation process compliant with a number of the ISO 9001:2008 clauses and this required us to formalize the roles of the members of our CT protocol optimization team. We rely heavily on PACS‐based IT solutions for acquiring radiologist feedback on the performance of our CT protocols and the performance of our CT scanners in terms of dose (scanner output) and the function of the automatic tube current modulation. Specific details on our quality management system covering both quality control and ongoing optimization have been provided. The roles of each CT protocol team member have been defined, and the critical role that IT solutions provides for the management of files and the monitoring of CT protocols has been reviewed. In addition, the invaluable role management provides by being a champion for the project has been explained; lack of a project champion will mitigate the efforts of a CT protocol optimization team. Meeting the guidelines set forth in the AAPM practice guideline was not inherently difficult, but did, in our case, require the cooperation of radiologists, technologists, physicists, IT

  11. Recall of ICU Stay in Patients Managed With a Sedation Protocol or a Sedation Protocol With Daily Interruption.

    Burry, Lisa; Cook, Deborah; Herridge, Margaret; Devlin, John W; Fergusson, Dean; Meade, Maureen; Steinberg, Marilyn; Skrobik, Yoanna; Olafson, Kendiss; Burns, Karen; Dodek, Peter; Granton, John; Ferguson, Niall; Jacka, Michael; Tanios, Maged; Fowler, Robert; Reynolds, Steven; Keenan, Sean; Mallick, Ranjeeta; Mehta, Sangeeta

    2015-10-01

    To 1) describe factual, emotional, and delusional memories of ICU stay for patients enrolled in the SLEAP (Daily sedation interruption in mechanically ventilated critically ill patients cared for with a sedation protocol) trial; 2) compare characteristics of patients with and without ICU recall, and patients with and without delusional memories; and 3) determine factors associated with delusional memories 28 days after ICU discharge. Prospective cohort. Sixteen North American medical and surgical ICUs. Critically ill, mechanically ventilated adults randomized in the SLEAP trial. Post-ICU interviews on days 3, 28, and 90 using the validated ICU Memory Tool. Overall, 289 of 297 ICU survivors (97%) (146 protocolized sedation and 143 protocolized sedation plus daily interruption patients) were interviewed at least once. Because there were no differences in recall status or types of memories between the two sedation groups, we present the findings for all patients rather than by study group. On days 3, 28, and 90, 28%, 26%, and 36% of patients, respectively, reported no recall of being in the ICU (overall perception, self-reported) (p = 0.75). Mean daily doses of benzodiazepines and opioids were lower in patients with no ICU recall than those with recall (p patients reporting no recall of ICU stay on day 3, 97% and 90% reported at least one factual and one emotional memory from ICU, respectively. Emotional memories declined with time after ICU discharge, particularly panic and confusion. Delusional memories 28 days after discharge were common (70%) yet unrelated to delirium (p = 0.84), recall status (p = 0.15), total dose of benzodiazepine (p = 0.78), or opioid (p = 0.21). Delusional memories were less likely with longer duration of mechanical ventilation (odds ratio, 0.955; 95% CI, 0.91-1.00; p = 0.04). Recall of ICU stay and types of memories reported were not influenced by the trial sedation strategy. Lack of ICU recall and delusional memories were common after ICU

  12. DreamTel; Diabetes risk evaluation and management tele-monitoring study protocol.

    Tobe, Sheldon W; Wentworth, Joan; Ironstand, Laurie; Hartman, Susan; Hoppe, Jackie; Whiting, Judi; Kennedy, Janice; McAllister, Colin; Kiss, Alex; Perkins, Nancy; Vincent, Lloyd; Pylypchuk, George; Lewanczuk, Richard Z

    2009-05-09

    The rising prevalence of type 2 diabetes underlines the importance of secondary strategies for the prevention of target organ damage. While access to diabetes education centers and diabetes intensification management has been shown to improve blood glucose control, these services are not available to all that require them, particularly in rural and northern areas. The provision of these services through the Home Care team is an advance that can overcome these barriers. Transfer of blood glucose data electronically from the home to the health care provider may improve diabetes management. The study population will consist of patients with type 2 diabetes with uncontrolled A1c levels living on reserve in the Battlefords region of Saskatchewan, Canada. This pilot study will take place over three phases. In the first phase over three months the impact of the introduction of the Bluetooth enabled glucose monitor will be assessed. In the second phase over three months, the development of guidelines based treatment algorithms for diabetes intensification will be completed. In the third phase lasting 18 months, study subjects will have diabetes intensification according to the algorithms developed. The first phase will determine if the use of the Bluetooth enabled blood glucose devices which can transmit results electronically will lead to changes in A1c levels. It will also determine the feasibility of recruiting subjects to use this technology. The rest of the Diabetes Risk Evaluation and Management Tele-monitoring (DreamTel) study will determine if the delivery of a diabetes intensification management program by the Home Care team supported by the Bluetooth enabled glucose meters leads to improvements in diabetes management. Protocol NCT00325624.

  13. DreamTel; Diabetes risk evaluation and management tele-monitoring study protocol

    Kiss Alex

    2009-05-01

    Full Text Available Abstract Background The rising prevalence of type 2 diabetes underlines the importance of secondary strategies for the prevention of target organ damage. While access to diabetes education centers and diabetes intensification management has been shown to improve blood glucose control, these services are not available to all that require them, particularly in rural and northern areas. The provision of these services through the Home Care team is an advance that can overcome these barriers. Transfer of blood glucose data electronically from the home to the health care provider may improve diabetes management. Methods and design The study population will consist of patients with type 2 diabetes with uncontrolled A1c levels living on reserve in the Battlefords region of Saskatchewan, Canada. This pilot study will take place over three phases. In the first phase over three months the impact of the introduction of the Bluetooth enabled glucose monitor will be assessed. In the second phase over three months, the development of guidelines based treatment algorithms for diabetes intensification will be completed. In the third phase lasting 18 months, study subjects will have diabetes intensification according to the algorithms developed. Discussion The first phase will determine if the use of the Bluetooth enabled blood glucose devices which can transmit results electronically will lead to changes in A1c levels. It will also determine the feasibility of recruiting subjects to use this technology. The rest of the Diabetes Risk Evaluation and Management Tele-monitoring (DreamTel study will determine if the delivery of a diabetes intensification management program by the Home Care team supported by the Bluetooth enabled glucose meters leads to improvements in diabetes management. Trial Registration Protocol NCT00325624

  14. Impact of a Newly Implemented Burn Protocol on Surgically Managed Partial Thickness Burns at a Specialized Burns Center in Singapore.

    Tay, Khwee-Soon Vincent; Chong, Si-Jack; Tan, Bien-Keem

    2016-03-01

    This study evaluated the impact of a newly implemented protocol for superficial to mid-dermal partial thickness burns which involves early surgery and rapid coverage with biosynthetic dressing in a specialized national burns center in Singapore. Consecutive patients with 5% or greater total body surface area (TBSA) superficial to mid-dermal partial thickness burns injury admitted to the Burns Centre at the Singapore General Hospital between August and December 2014 for surgery within 48 hours of injury were prospectively recruited into the study to form the protocol group. Comparable historical cases from the year 2013 retrieved from the burns center audit database were used to form the historical control group. Demographics (age, sex), type and depth of burns, %TBSA burnt, number of operative sessions, and length of stay were recorded for each patient of both cohorts. Thirty-nine burns patients managed under the new protocol were compared with historical control (n = 39) comparable in age and extensiveness of burns. A significantly shorter length of stay (P burns was observed in the new protocol group (0.74 day/%TBSA) versus historical control (1.55 day/%TBSA). Fewer operative sessions were needed under the new protocol for burns 10% or greater TBSA burns (P protocol for surgically managed burns patients which involves early surgery and appropriate use of biosynthetic dressing on superficial to mid-dermal partial thickness burns. Clinically, shorter lengths of stay, fewer operative sessions, and decreased need for skin grafting of burns patient were observed.

  15. Policies for managing urban growth and landscape change: a key to conservation in the 21st century

    David N., tech. ed. Bengston

    2005-01-01

    Protecting natural areas in the face of urbanization is one of the most important challenges for conservation in the 21st century. The papers in this collection examine key issues related to growth management and selected approaches to managing urban growth and minimizing its social and environmental costs. They were presented at the 2004 annual meeting of the Society...

  16. EMSODEV and EPOS-IP: key findings for effective management of EU research infrastructure projects

    Materia, Paola; Bozzoli, Sabrina; Beranzoli, Laura; Cocco, Massimo; Favali, Paolo; Freda, Carmela; Sangianantoni, Agata

    2017-04-01

    -2019) is a project of 47 partners, 6 associate partners and several international organizations for a total of 25 countries involved. EPOS IP is a key step in EPOS' mission of a pan-European Earth science integrated platform. It will deliver not only a suite of domain-specific and multidisciplinary data and services in one platform, but also the legal, governance and financial frameworks to ensure the infrastructure future operation and sustainability (EPOS ERIC). INGV experience over the years indicates that effective management of EU RIs projects should contain 5 basic elements: 1.Defined life cycle and milestones: Map of phases, deliverables, key milestones and sufficiency criteria for each group involved in the project using project management tools and software. 2.Shared organization, systems, roles: Defined roles for team members and responsibilities for functional managers are crucial. Similarly, a system of communication and team involvement is essential to success. Leadership and interpersonal/organizational skills are also important. 3.Quality assurance: Quality dimension should be aligned to the project objectives and specific criteria should be identified for each phase of the project. 4.Tracking and variance analysis: Regular reports and periodic meetings of the teams are crucial to identify when things are off target. Schedule slips, cost overruns, open issues, new risks and problems must be dealt with as early as possible. 5.Impact assessment by monitoring the achievement of results and socio-economic impact.

  17. The impact of a chest tube management protocol on the outcome of trauma patients with tube thoracostomy.

    de Abreu, Emanuelle Maria Sávio; Machado, Carla Jorge; Pastore Neto, Mario; de Rezende Neto, João Baptista; Sanches, Marcelo Dias

    2015-01-01

    to investigate the effect of standardized interventions in the management of tube thoracostomy patients and to assess the independent effect of each intervention. A chest tube management protocol was assessed in a retrospective cohort study. The tube thoracostomy protocol (TTP) was implemented in August 2012, and consisted of: antimicrobial prophylaxis, chest tube insertion in the operating room (OR), admission post chest tube thoracostomy (CTT) in a hospital floor separate from the emergency department (ED), and daily respiratory therapy (RT) sessions post-CTT. The inclusion criteria were, hemodynamic stability, patients between the ages of 15 and 59 years, and injury severity score (ISS) chest wall, lung, and pleura. During the study period 92 patients were managed according to the standardized protocol. The outcomes of those patients were compared to 99 patients treated before the TTP. Multivariate logistic regression analysis was performed to assess the independent effect of each variable of the protocol on selected outcomes. Demographics, injury severity, and trauma mechanisms were similar among the groups. As expected, protocol compliance increased after the implementation of the TTP. There was a significant reduction (pchest tube days. Respiratory therapy was independently linked to significant reduction (pchest tube insertion was associated with significant (ptrauma patients.

  18. Adequate Security Protocols Adopt in a Conceptual Model in Identity Management for the Civil Registry of Ecuador

    Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio

    2017-08-01

    We analyzed the problems of security of the information of the civil registries and identification at world level that are considered strategic. The objective is to adopt the appropriate security protocols in a conceptual model in the identity management for the Civil Registry of Ecuador. In this phase, the appropriate security protocols were determined in a Conceptual Model in Identity Management with Authentication, Authorization and Auditing (AAA). We used the deductive method and exploratory research to define the appropriate security protocols to be adopted in the identity model: IPSec, DNSsec, Radius, SSL, TLS, IEEE 802.1X EAP, Set. It was a prototype of the location of the security protocols adopted in the logical design of the technological infrastructure considering the conceptual model for Identity, Authentication, Authorization, and Audit management. It was concluded that the adopted protocols are appropriate for a distributed database and should have a direct relationship with the algorithms, which allows vulnerability and risk mitigation taking into account confidentiality, integrity and availability (CIA).

  19. Village doctor-assisted case management of rural patients with schizophrenia: protocol for a cluster randomized control trial.

    Gong, Wenjie; Xu, Dong; Zhou, Liang; Brown, Henry Shelton; Smith, Kirk L; Xiao, Shuiyuan

    2014-01-16

    Strict compliance with prescribed medication is the key to reducing relapses in schizophrenia. As villagers in China lack regular access to psychiatrists to supervise compliance, we propose to train village 'doctors' (i.e., villagers with basic medical training and currently operating in villages across China delivering basic clinical and preventive care) to manage rural patients with schizophrenia with respect to compliance and monitoring symptoms. We hypothesize that with the necessary training and proper oversight, village doctors can significantly improve drug compliance of villagers with schizophrenia. We will conduct a cluster randomized controlled trial in 40 villages in Liuyang, Hunan Province, China, home to approximately 400 patients with schizophrenia. Half of the villages will be randomized into the treatment group (village doctor, or VD model) wherein village doctors who have received training in a schizophrenia case management protocol will manage case records, supervise drug taking, educate patients and families on schizophrenia and its treatment, and monitor patients for signs of relapse in order to arrange prompt referral. The other 20 villages will be assigned to the control group (case as usual, or CAU model) wherein patients will be visited by psychiatrists every two months and receive free antipsychotic medications under an on-going government program, Project 686. These control patients will receive no other management or follow up from health workers. A baseline survey will be conducted before the intervention to gather data on patient's socio-economic status, drug compliance history, and clinical and health outcome measures. Data will be re-collected 6 and 12 months into the intervention. A difference-in-difference regression model will be used to detect the program effect on drug compliance and other outcome measures. A cost-effectiveness analysis will also be conducted to compare the value of the VD model to that of the CAU group. Lack of

  20. [Application of laboratory information system in the management of the key indicators of quality inspection].

    Guo, Ye; Chen, Qian; Wu, Wei; Cui, Wei

    2015-03-31

    To establish a system of monitoring the key indicator of quality for inspection (KIQI) on a laboratory information system (LIS), and to have a better management of KIQI. Clinical sample made in PUMCH were collected during the whole of 2014. Next, interactive input program were designed to accomplish data collecting of the disqualification rate of samples, the mistake rate of samples and the occasions of losing samples, etc. Then, a series moment of sample collection, laboratory sample arrived, sample test, sample check, response to critical value, namely, trajectory information left on LIS were recorded and the qualification rate of TAT, the notification rate of endangering result were calculated. Finally, the information about quality control were collected to build an internal quality control database and the KIQI, such as the out-of-control rate of quality control and the total error of test items were monitored. The inspection of the sample management shows the disqualification rates in 2014 were all below the target, but the rates in January and February were a little high and the rates of four wards were above 2%. The mistake rates of samples was 0.47 cases/10 000 cases, attaining the target (laboratory reports shows the qualification rates of TAT was within the acceptable range (> 95%), however the rates of blood routine in November (94.75%) was out of range. We have solved the problem by optimizing the processes. The notification rate of endangering result attained the target (≥ 98%), while the rate of timely notification is needed to improve. Quality inspection shows the CV of APTT in August (5.02%) was rising significantly, beyond the accepted CV (5.0%). We have solved the problem by changing the reagent. The CV of TT in 2014 were all below the allowable CV, thus the allowable CV of the next year lower to 10%. It is an objective and effective method to manage KIQI with the powerful management mode of database and information process capability on LIS.

  1. Closing the water cycle - the key role of water and wastewater management in a circular economy

    Uhlenbrook, Stefan; Connor, Rick; Koncagul, Engin; Ortigara, Angela

    2017-04-01

    Planetary water boundaries are exceeded locally and regionally as water demand and use are escalating and per capita water availability is decreasing. However, wastewater represents an alternative yet reliable source containing for instance, nutrients (for use as fertilizer) and metals that can be extracted, and can be a source of energy. These characteristics mean that water and wastewater are set to play a key role in the circular economy. Furthermore, wastewater use can generate business opportunities and enhance water, food and energy security, therefore helping to alleviate poverty. However, to increase the collection, treatment and use of wastewater, investments in infrastructure and appropriate (low cost) technologies are needed. Ensuring the development of human and institutional capacity is also essential for proper wastewater management. The UN World Water Assessment Programme (WWAP) produces together with several UN-Water Members and Partners the annual World Water Development Report (WWDR). Its 2017 edition "Wastewater: The Untapped Resource" focuses on the critical role of wastewater management for vibrant economies, resilient societies and the maintenance of a healthy environment. Wastewater issues play also a central role in the 2030 Agenda for Sustainable Development, most notably through Sustainable Development Goal (SDG) target 6.3 that aims to improve water quality by reducing the proportion of untreated wastewater released to the environment and increasing its recycling and safe reuse globally. This target is interlinked with several other targets of SDG 6 ('the water goal') as well as to several other SDGs that relate to, poverty reduction, health, energy and food security, among others. The main policy-relevant messages of the WWDR 2017 will be introduced and linked to socio-hydrological approaches. These messages are an important input to the implementation of the water research agenda of the Panta Rhei initiative of IAHS.

  2. Energy management in production: A novel method to develop key performance indicators for improving energy efficiency

    May, Gökan; Barletta, Ilaria; Stahl, Bojan; Taisch, Marco

    2015-01-01

    Highlights: • We propose a 7-step methodology to develop firm-tailored energy-related KPIs (e-KPIs). • We provide a practical guide for companies to identify their most important e-KPIs. • e-KPIs support identification of energy efficiency improvement areas in production. • The method employs an action plan for achieving energy saving targets. • The paper strengthens theoretical base for energy-based decision making in manufacturing. - Abstract: Measuring energy efficiency performance of equipments, processes and factories is the first step to effective energy management in production. Thus, enabled energy-related information allows the assessment of the progress of manufacturing companies toward their energy efficiency goals. In that respect, the study addresses this challenge where current industrial approaches lack the means and appropriate performance indicators to compare energy-use profiles of machines and processes, and for the comparison of their energy efficiency performance to that of competitors’. Focusing on this challenge, the main objective of the paper is to present a method which supports manufacturing companies in the development of energy-based performance indicators. For this purpose, we provide a 7-step method to develop production-tailored and energy-related key performance indicators (e-KPIs). These indicators allow the interpretation of cause-effect relationships and therefore support companies in their operative decision-making process. Consequently, the proposed method supports the identification of weaknesses and areas for energy efficiency improvements related to the management of production and operations. The study therefore aims to strengthen the theoretical base necessary to support energy-based decision making in manufacturing industries

  3. Delivery room management of very low birth weight infants in Germany, Austria and Switzerland - a comparison of protocols

    Roehr CC

    2010-11-01

    Full Text Available Abstract Background Surveys from the USA, Australia and Spain have shown significant inter-institutional variation in delivery room (DR management of very low birth weight infants (VLBWI, Objective To investigate protocols for DR management of VLBWI in Germany, Austria and Switzerland and to compare these with the 2005 ILCOR guidelines. Methods DR management protocols were surveyed in a prospective, questionnaire-based survey in 2008. Results were compared between countries and between academic and non-academic units. Protocols were compared to the 2005 ILCOR guidelines. Results In total, 190/249 units (76% replied. Protocols for DR management existed in 94% of units. Statistically significant differences between countries were found regarding provision of 24 hr in house neonatal service; presence of a designated resuscitation area; devices for respiratory support; use of pressure-controlled manual ventilation devices; volume control by respirator; and dosage of Surfactant. There were no statistically significant differences regarding application and monitoring of supplementary oxygen, or targeted saturation levels, or for the use of sustained inflations. Comparison of academic and non-academic hospitals showed no significant differences, apart from the targeted saturation levels (SpO2 at 10 min. of life. Comparison with ILCOR guidelines showed good adherence to the 2005 recommendations. Summary Delivery room management in German, Austrian and Swiss neonatal units was commonly based on written protocols. Only minor differences were found regarding the DR setup, devices used and the targeted ranges for SpO2 and FiO2. DR management was in good accordance with 2005 ILCOR guidelines, some units already incorporated evidence beyond the ILCOR statement into their routine practice.

  4. Behaviour change interventions for the management of Raynaud's phenomenon: a systematic review protocol.

    Daniels, Jo; Pauling, John D; Eccelston, Christopher

    2017-08-04

    Raynaud's phenomenon (RP) describes excessive peripheral vasospasm to cold exposure and/or emotional stress. RP episodes are associated with digital colour changes, pain and reduced quality of life. Pharmacological interventions are of low to moderate efficacy and often result in adverse effects such as facial flushing and headaches. Recommended lifestyle and behavioural interventions have not been evaluated. The objectives of the proposed systematic review are to assess the comparative safety and efficacy of behaviour change interventions for RP and identify what we can learn to inform future interventions. Studies eligible for inclusion include randomised controlled trials testing behaviour change interventions with a control comparator. A comprehensive search strategy will include peer review and grey literature up until 30 April 2017. Search databases will include Medline, Embase, PsychINFO and Cochrane. Initial sifting, eligibility, data extraction, risk of bias and quality assessment will be subject to review by two independent reviewers with a third reviewer resolving discrepancies. Risk of bias assessment will be performed using Cochrane risk of a bias assessment tool with quality of evidence assessed using Grading of Recommendations Assessment, Development and Evaluation(GRADE). A meta-analysis will be performed if there are sufficient data. Two subgroup analyses are planned: primary versus secondary RP outcomes; comparison of theoretically informed interventions with pragmatic interventions. This review does not require ethical approval as it will summarise published studies with non-identifiable data. This protocol complies with the Preferred Reporting Items for Systematic Review and Meta-Analysis Protocols (PRISMA-P) guidelines. Findings will be disseminated in peer-reviewed articles and reported according to PRISMA. This review will make a significant contribution to the management of RP where no review of behaviour-change interventions currently exist

  5. Interreality for the management and training of psychological stress: study protocol for a randomized controlled trial

    2013-01-01

    Background Psychological stress occurs when an individual perceives that environmental demands tax or exceed his or her adaptive capacity. Its association with severe health and emotional diseases, points out the necessity to find new efficient strategies to treat it. Moreover, psychological stress is a very personal problem and requires training focused on the specific needs of individuals. To overcome the above limitations, the INTERSTRESS project suggests the adoption of a new paradigm for e-health - Interreality - that integrates contextualized assessment and treatment within a hybrid environment, bridging the physical and the virtual worlds. According to this premise, the aim of this study is to investigate the advantages of using advanced technologies, in combination with cognitive behavioral therapy (CBT), based on a protocol for reducing psychological stress. Methods/Design The study is designed as a randomized controlled trial. It includes three groups of approximately 50 subjects each who suffer from psychological stress: (1) the experimental group, (2) the control group, (3) the waiting list group. Participants included in the experimental group will receive a treatment based on cognitive behavioral techniques combined with virtual reality, biofeedback and mobile phone, while the control group will receive traditional stress management CBT-based training, without the use of new technologies. The wait-list group will be reassessed and compared with the two other groups five weeks after the initial evaluation. After the reassessment, the wait-list patients will randomly receive one of the two other treatments. Psychometric and physiological outcomes will serve as quantitative dependent variables, while subjective reports of participants will be used as the qualitative dependent variable. Discussion What we would like to show with the present trial is that bridging virtual experiences, used to learn coping skills and emotional regulation, with real

  6. Human and organisational factors as key levers of performance in D and D project management - 59323

    Flament, Thierry; Willmann, Bertrand; Laval, Gregoire de; Lemarch, Jean-Louis; Cordoba, Alain

    2012-01-01

    Document available in abstract form only. Full text of publication follows: In a number pf D and D projects, the type of installations to be dismantled and the variety of their equipments (glove-boxes, tanks..) and the products present on site (plutonium, uranium) in the form of powder are making many operations manual ones. Key phases in HR and organisation management: - The first D and D experience, the learning curve ramp-up - To begin any project, you usually try to benefit from benchmark of similar projects to be able to build up the first scenario, by using the best practices. The first experimental team consisted of operators who already had experienced dismantling at least once in the course of their career. This first dismantling operation is preferably to be conducted on an installation relatively poorly contaminated. This was to implement the correct techniques thus reducing the consequences of a possible unforeseen event. The capitalisation on the return on experience The success of this first dismantling site operation allowed us to implement a process of experience feedback to build the scenarios and the operating procedures of the following sites. In particular, targeted safety-security stop points are positioned for validation on the operations by people responsible for safety and security

  7. Key Performance Indicators in Radiology: You Can't Manage What You Can't Measure.

    Harvey, H Benjamin; Hassanzadeh, Elmira; Aran, Shima; Rosenthal, Daniel I; Thrall, James H; Abujudeh, Hani H

    2016-01-01

    Quality assurance (QA) is a fundamental component of every successful radiology operation. A radiology QA program must be able to efficiently and effectively monitor and respond to quality problems. However, as radiology QA has expanded into the depths of radiology operations, the task of defining and measuring quality has become more difficult. Key performance indicators (KPIs) are highly valuable data points and measurement tools that can be used to monitor and evaluate the quality of services provided by a radiology operation. As such, KPIs empower a radiology QA program to bridge normative understandings of health care quality with on-the-ground quality management. This review introduces the importance of KPIs in health care QA, a framework for structuring KPIs, a method to identify and tailor KPIs, and strategies to analyze and communicate KPI data that would drive process improvement. Adopting a KPI-driven QA program is both good for patient care and allows a radiology operation to demonstrate measurable value to other health care stakeholders. Copyright © 2015 Mosby, Inc. All rights reserved.

  8. An empirical investigation on the effects of electronic banking on key customer relationship management

    Kazem Chavoshi

    2013-12-01

    Full Text Available In recent years, there has been good progress on information and communication technology influencing businesses with a new emerging concept called customer relationship management (CRM and it has made significant changes in electronic banking. The primary objective of this paper is to survey electronic banking effects on key CRM components in one of Iranian banks in city of Tehran, Iran. The survey designs a questionnaire and distributes it among some experts in one of selected regions and the results are verified based on t-student and Freedman tests. Results show that all electronic banking services influence on CRM. In addition, that there are no significant differences among effects of electronic services on CRM but each CRM component has different effects on electronic services. In fact, according to freedman test, improving customer relationship process is the most important factor followed by providing appropriate service for each customer, providing appropriate service on appropriate time for each customer and providing appropriate service by appropriate channel for each customer.

  9. A Novel Mobile App and Population Management System to Manage Rheumatoid Arthritis Flares: Protocol for a Randomized Controlled Trial.

    Wang, Penny; Luo, Dee; Lu, Fengxin; Elias, Josephine S; Landman, Adam B; Michaud, Kaleb D; Lee, Yvonne C

    2018-04-11

    provider visits, (2) patient engagement in monitoring their condition, and (3) communication between patients and health care providers through the population management system. ClinicalTrials.gov NCT02822521, http://clinicaltrials.gov/ct2/show/NCT02822521 (Archived by WebCite at http://www.webcitation.org/6xed3kGPd). ©Penny Wang, Dee Luo, Fengxin Lu, Josephine S Elias, Adam B Landman, Kaleb D Michaud, Yvonne C Lee. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 11.04.2018.

  10. A protocol using coho salmon to monitor Tongass National Forest Land and Resource Management Plan standards and guidelines for fish habitat.

    M.D. Bryant; Trent McDonald; R. Aho; B.E. Wright; Michelle Bourassa Stahl

    2008-01-01

    We describe a protocol to monitor the effectiveness of the Tongass Land Management Plan (TLMP) management standards for maintaining fish habitat. The protocol uses juvenile coho salmon (Oncorhynchus kisutch) in small tributary streams in forested watersheds. We used a 3-year pilot study to develop detailed methods to estimate juvenile salmonid...

  11. Where is the competitive advantage going?: a management model that incorporates people as a key element of the business strategy

    Emilio García Vega

    2015-09-01

    Full Text Available Competitive advantage is a concept that has evolved in an accelerated way during the last few years. Some scholars and executives claim that people are a fundamental element of its construction. In this line, business management has shown an inclination towards the human resources management – also called “talents” – as the key element of its organizational success. In this journey, the ideas, paradigms and conceptions have been modified in an interesting way. This paper tries to propose these new conceptions facing the organization management challenge, and proposes a management model based on the importance of the people in the competitive advantage administration.

  12. Peer mentorship to promote effective pain management in adolescents: study protocol for a randomised controlled trial

    Hayes Loran P

    2011-05-01

    Full Text Available Abstract Background This protocol is for a study of a new program to improve outcomes in children suffering from chronic pain disorders, such as fibromyalgia, recurrent headache, or recurrent abdominal pain. Although teaching active pain self-management skills through cognitive-behavioral therapy (CBT or a complementary program such as hypnotherapy or yoga has been shown to improve pain and functioning, children with low expectations of skill-building programs may lack motivation to comply with therapists' recommendations. This study will develop and test a new manualized peer-mentorship program which will provide modeling and reinforcement by peers to other adolescents with chronic pain (the mentored participants. The mentorship program will encourage mentored participants to engage in therapies that promote the learning of pain self-management skills and to support the mentored participants' practice of these skills. The study will examine the feasibility of this intervention for both mentors and mentored participants, and will assess the preliminary effectiveness of this program on mentored participants' pain and functional disability. Methods This protocol will recruit adolescents ages 12-17 with chronic pain and randomly assign them to either peer mentorship or a treatment-as-usual control group. Mentored participants will be matched with peer mentors of similar age (ages 14-18 who have actively participated in various treatment modalities through the UCLA Pediatric Pain Program and have learned to function successfully with a chronic pain disorder. The mentors will present information to mentored participants in a supervised and monitored telephone interaction for 2 months to encourage participation in skill-building programs. The control group will receive usual care but without the mentorship intervention. Mentored and control subjects' pain and functioning will be assessed at 2 months (end of intervention for mentored participants and

  13. Evaluation of an electronic health record-supported obesity management protocol implemented in a community health center: a cautionary note.

    Steglitz, Jeremy; Sommers, Mary; Talen, Mary R; Thornton, Louise K; Spring, Bonnie

    2015-07-01

    Primary care clinicians are well-positioned to intervene in the obesity epidemic. We studied whether implementation of an obesity intake protocol and electronic health record (EHR) form to guide behavior modification would facilitate identification and management of adult obesity in a Federally Qualified Health Center serving low-income, Hispanic patients. In three studies, we examined clinician and patient outcomes before and after the addition of the weight management protocol and form. In the Clinician Study, 12 clinicians self-reported obesity management practices. In the Population Study, BMI and order data from 5000 patients and all 40 clinicians in the practice were extracted from the EHR preintervention and postintervention. In the Exposure Study, EHR-documented outcomes for a sub-sample of 46 patients actually exposed to the obesity management form were compared to matched controls. Clinicians reported that the intake protocol and form increased their performance of obesity-related assessments and their confidence in managing obesity. However, no improvement in obesity management practices or patient weight-loss was evident in EHR records for the overall clinic population. Further analysis revealed that only 55 patients were exposed to the form. Exposed patients were twice as likely to receive weight-loss counseling following the intervention, as compared to before, and more likely than matched controls. However, their obesity outcomes did not differ. Results suggest that an obesity intake protocol and EHR-based weight management form may facilitate clinician weight-loss counseling among those exposed to the form. Significant implementation barriers can limit exposure, however, and need to be addressed. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  14. A preliminary evaluation of optometric management and referral protocols for pa-tients with diabetic retinopathy

    M. Mehta

    2005-12-01

    Full Text Available Aim: The purpose of this pilot study was to investigate  the  assessment,  management  and referral practices of South African optometrists in  the  care  of  patients  with  diabetic  retinop-athy  (DR  and  to  recommend  strategies  to improve  and  standardize  patient  management as required.  Methods:  The  study  design  incorporated quantitative,  qualitative  and  clinical  measures that were administered to fourteen experienced optometrists from the Durban area. The quan-titative measure, the questionnaire in appendix I, evaluated the optometrists’ management pro-tocols of patients with diabetes mellitus (DM.  These  included  the  optometrists’  referral  and co-management practices, their awareness and usage  of  appropriate  guidelines  in  the  man-agement  and  referral  of  these  patients,  their perceived levels of competence and confidence in their education, levels of service offered to the patients and finally the role of Continuous Professional  Development  (CPD.  This  self-report information was supplemented by a set of clinical measures where the study sample grad-ed levels of DR, chose appropriate management options  and  indicated  prognosis  for  disease progression based on a set of slides presented to  them.  Finally  the  fourteen  optometrists,  as well as two ophthalmologists, were interviewed using tailored, semi-structured interview sched-ules. These interviews were used to elaborate and corroborate information obtained from the other two research approaches.  Results:  Descriptive  analysis  was  used  to analyse  the  data  from  the  quantitative  and clinical  measures,  whilst  the  interviews  were analysed  thematically.  Although  86%  of  the sample routinely screened for ocular manifesta-tions of DM, there was no standardization in the criteria used by the fourteen optometrists

  15. Biometrics based key management of double random phase encoding scheme using error control codes

    Saini, Nirmala; Sinha, Aloka

    2013-08-01

    In this paper, an optical security system has been proposed in which key of the double random phase encoding technique is linked to the biometrics of the user to make it user specific. The error in recognition due to the biometric variation is corrected by encoding the key using the BCH code. A user specific shuffling key is used to increase the separation between genuine and impostor Hamming distance distribution. This shuffling key is then further secured using the RSA public key encryption to enhance the security of the system. XOR operation is performed between the encoded key and the feature vector obtained from the biometrics. The RSA encoded shuffling key and the data obtained from the XOR operation are stored into a token. The main advantage of the present technique is that the key retrieval is possible only in the simultaneous presence of the token and the biometrics of the user which not only authenticates the presence of the original input but also secures the key of the system. Computational experiments showed the effectiveness of the proposed technique for key retrieval in the decryption process by using the live biometrics of the user.

  16. KEY ASPECTS OF MANAGING AN INNOVATION PROJECT IN THE EU FRAMEWORK PROGRAMME HORIZON 2020

    Siniša M. Arsić

    2015-01-01

    Full Text Available The program EU Horizon 2020 (ec.europa.eu is the largest source of resources for all legal entities from Europe, with the budget of 80 billion €. It is possible to use donations from the EU for various proposals and themes, from the 91 calls for projects, with subjects differing from sustainable transport to the innovation support of the SME sector. A group of Serbian authors decided to enter into somewhat of an ambitious endeavour (authors had individual experience on projects, they decided to send a project proposal in the framework of the „SME Instrument“ call, which is directed to inovation support project in the SME sector. The projects that are proposed for the financing by the EU Horizon 2020 program, are in the group of complex and very specific projects, so the authors presented the review of key aspects of projects that are engaged in realization of the inovation process that starts with a certain idea on paper, and ends with a verified product which is placed on the competitive EU market. The special chapter of this paper deals with the sinergy of the inovation project explorers, which must answer to the multidisciplinarity of research problems. The possibilities are examined in the research of the technical-technological sciences, by using organizational-informatic tools, developed for the needs of managing projects. The main use of this work for readers are illuminating of numerous unknown technical details regarding the proposal itself, and the process of connecting with the project partners, because the large number of proposals quits off right at the beginning. Then contribution is reflected in the fact that the paper signifies a sort of basis for a knowledge base, which can be served to higher education institutions and economy to focus a part of their intentions on lifting their own capacity for the struggle with the massive competition of EU that is expected in years and decades to come.

  17. Omega West Reactor program management and communication key to successful Decontamination and Decommissioning (D and D)

    Mee, Stephen F.; Rendell, Keith R.; Peifer, Martin J. [Los Alamos National Laboratory, PO Box 1663, Los Alamos, NM 87545 (United States); Gallegos, John A. [National Nuclear Security Administration, P.O. Box 5400, Albuquerque, NM 87185 (United States); Straehr, James P.; Stringer, Joe B. [Framatome ANP, Tour AREVA, 92084 - Paris la Defense (France)

    2003-07-01

    This paper describes what differentiates the Omega West Reactor (OWR) Decommissioning and Decontamination (D and D) Project from other projects with similar scope and how the project was successfully completed ahead of schedule. With less than 26 months to scope, schedule, advertise, select a contractor and complete the actual D and D, Los Alamos National Laboratory (LANL) needed a new approach to form the foundation for the project's success and ensure that the project was completed on time and within the original contract value. This paper describes the three key elements of this new approach - including team building, strong project management and technical innovation. LANL and WD3, a joint venture between Framatome ANP, Inc. and Washington Group Inc., teamed through a fixed price best value contract to perform the D and D of the OWR. The project was initiated in an effort to reduce the risk to LANL facilities identified in the aftermath of the Cerro Grande fires. Between May 4 and June 10, 2000, a devastating wildfire swept across the Bandelier National Monument in the Jemez Mountains of northern New Mexico and onto the Department of Energy's (DOE's) LANL. The Cerro Grande fire burned about 43,000 acres, including 7,500 acres of LANL property. Large areas of vegetation in the Jemez Mountains surrounding LANL were destroyed. The DOE, LANL, other federal agencies, and the State of New Mexico initiated prompt actions to identify and mitigate the risks from the fire aftermath. Assessments conducted after the fire determined that serious environmental and safety problems associated with flash floods, erosion, and contaminant run-off would persist at LANL for a number of years. Since the OWR was located in a potential flash flood area it was decided to accelerate the D and D of the facility. (authors)

  18. Key role of lipid management in nitrogen and aroma metabolism in an evolved wine yeast strain.

    Rollero, Stéphanie; Mouret, Jean-Roch; Sanchez, Isabelle; Camarasa, Carole; Ortiz-Julien, Anne; Sablayrolles, Jean-Marie; Dequin, Sylvie

    2016-02-09

    Fermentative aromas play a key role in the organoleptic profile of young wines. Their production depends both on yeast strain and fermentation conditions. A present-day trend in the wine industry consists in developing new strains with aromatic properties using adaptive evolution approaches. An evolved strain, Affinity™ ECA5, overproducing esters, was recently obtained. In this study, dynamics of nitrogen consumption and of the fermentative aroma synthesis of the evolved and its ancestral strains were compared and coupled with a transcriptomic analysis approach to better understand the metabolic reshaping of Affinity™ ECA5. Nitrogen assimilation was different between the two strains, particularly amino acids transported by carriers regulated by nitrogen catabolite repression. We also observed differences in the kinetics of fermentative aroma production, especially in the bioconversion of higher alcohols into acetate esters. Finally, transcriptomic data showed that the enhanced bioconversion into acetate esters by the evolved strain was associated with the repression of genes involved in sterol biosynthesis rather than an enhanced expression of ATF1 and ATF2 (genes coding for the enzymes responsible for the synthesis of acetate esters from higher alcohols). An integrated approach to yeast metabolism-combining transcriptomic analyses and online monitoring data-showed differences between the two strains at different levels. Differences in nitrogen source consumption were observed suggesting modifications of NCR in the evolved strain. Moreover, the evolved strain showed a different way of managing the lipid source, which notably affected the production of acetate esters, likely because of a greater availability of acetyl-CoA for the evolved strain.

  19. Omega West Reactor program management and communication key to successful Decontamination and Decommissioning (D and D)

    Mee, Stephen F.; Rendell, Keith R.; Peifer, Martin J.; Gallegos, John A.; Straehr, James P.; Stringer, Joe B.

    2003-01-01

    This paper describes what differentiates the Omega West Reactor (OWR) Decommissioning and Decontamination (D and D) Project from other projects with similar scope and how the project was successfully completed ahead of schedule. With less than 26 months to scope, schedule, advertise, select a contractor and complete the actual D and D, Los Alamos National Laboratory (LANL) needed a new approach to form the foundation for the project's success and ensure that the project was completed on time and within the original contract value. This paper describes the three key elements of this new approach - including team building, strong project management and technical innovation. LANL and WD3, a joint venture between Framatome ANP, Inc. and Washington Group Inc., teamed through a fixed price best value contract to perform the D and D of the OWR. The project was initiated in an effort to reduce the risk to LANL facilities identified in the aftermath of the Cerro Grande fires. Between May 4 and June 10, 2000, a devastating wildfire swept across the Bandelier National Monument in the Jemez Mountains of northern New Mexico and onto the Department of Energy's (DOE's) LANL. The Cerro Grande fire burned about 43,000 acres, including 7,500 acres of LANL property. Large areas of vegetation in the Jemez Mountains surrounding LANL were destroyed. The DOE, LANL, other federal agencies, and the State of New Mexico initiated prompt actions to identify and mitigate the risks from the fire aftermath. Assessments conducted after the fire determined that serious environmental and safety problems associated with flash floods, erosion, and contaminant run-off would persist at LANL for a number of years. Since the OWR was located in a potential flash flood area it was decided to accelerate the D and D of the facility. (authors)

  20. A Public-key based Information Management Model for Mobile Agents

    Rodriguez, Diego; Sobrado, Igor

    2000-01-01

    Mobile code based computing requires development of protection schemes that allow digital signature and encryption of data collected by the agents in untrusted hosts. These algorithms could not rely on carrying encryption keys if these keys could be stolen or used to counterfeit data by hostile hosts and agents. As a consequence, both information and keys must be protected in a way that only authorized hosts, that is the host that provides information and the server that has sent the mobile a...

  1. A Prospective Pilot Study to Validate the Management Protocol for Patients Presenting with Acute Urinary Retention: A Community-Based, Nonhospitalised Protocol

    Shyamala S. Gopi

    2006-01-01

    Full Text Available Acute urinary retention (AUR in males is managed conventionally by hospital admission, alpha-adrenergic therapy, and trial without catheter. To reduce inpatient bed pressures, we set up a protocol to manage such patients in the community. We review our results in this paper. We performed a prospective study of male patients presenting to our acute admissions ward and Accident and Emergency department over 6 months. Patients with chronic urinary retention, macroscopic haematuria, sepsis, urinary tract infection, and/or serum creatinine >130 mmol/l were excluded from the study. Those enrolled were catheterised, commenced on alfuzosin (10 mg nocte, and discharged to the community. A trial without catheter (TWOC was performed 5—7 days later. QoL/IPSS, peak flow rate, and residual volume assessment were performed following successful TWOC 3 months later.Thirty-one male patients with a median age of 69 years were studied and the median residual volume following catheterisation was 900 ml. The aetiology of AUR was benign prostatic hyperplasia (BPH in 29 patients and constipation in the remaining 2 patients. TWOC was successful in 19 patients (61.3% following first TWOC, 26 (83.9% following second trial of voiding. The mean peak flow rate was 6.5 ml/sec and postvoid scan 165 ml, following an immediate TWOC. At 3 months follow-up, mean peak flow rate was 13.2 ml/sec, postvoid scan 26.5 ml, IPSS 4.5, and QoL score was 2. This study has shown that AUR can be managed safely and effectively in the community. Effective communication with the nurse urology specialist, general practitioner, and emergency department are crucial for the successful implementation of the protocol.

  2. Mobile Application to Promote Adherence to Oral Chemotherapy and Symptom Management: A Protocol for Design and Development.

    Fishbein, Joel Nathan; Nisotel, Lauren Ellen; MacDonald, James John; Amoyal Pensak, Nicole; Jacobs, Jamie Michele; Flanagan, Clare; Jethwani, Kamal; Greer, Joseph Andrew

    2017-04-20

    symptoms and side effects. At every stage in this trial, we are engaging stakeholders to solicit feedback on our progress and next steps. To our knowledge, we are the first to describe the development of an app designed for people taking oral chemotherapy. The app addresses many concerns with oral chemotherapy, such as medication adherence and symptom management. Soliciting feedback from stakeholders with broad perspectives and expertise ensured that the app was acceptable and potentially beneficial for patients, caregivers, and clinicians. In our development process, we instantiated 7 of the 8 best practices proposed in a recent review of mobile health app development. Our process demonstrated the importance of effective communication between research groups and technical teams, as well as meticulous planning of technical specifications before development begins. Future efforts should consider incorporating other proven strategies in software, such as gamification, to bolster the impact of mobile health apps. Forthcoming results from our randomized controlled trial will provide key data on the effectiveness of this app in improving medication adherence and symptom management. ClinicalTrials.gov NCT02157519; https://clinicaltrials.gov/ct2/show/NCT02157519 (Archived by WebCite at http://www.webcitation.org/6prj3xfKA). ©Joel Nathan Fishbein, Lauren Ellen Nisotel, James John MacDonald, Nicole Amoyal Pensak, Jamie Michele Jacobs, Clare Flanagan, Kamal Jethwani, Joseph Andrew Greer. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 20.04.2017.

  3. Orofacial lymphatic malformation: management with a three steps diode laser protocol

    Miccoli, Simona; Tempesta, Angela; Limongelli, Luisa; Caporusso, Concetta; Di Venere, Daniela; Petruzzi, Massimo; Lacaita, Mariagrazia; Maiorano, Eugenio; Favia, Gianfranco

    2014-01-01

    Lymphatic Malformation (LM) according to ISSVA Classification, is a rare benign disorder with unknown aetiology. LM may grow slowly over years or develop rapidly over the course of days becoming a bulky lump, infected or bleeding. We propose our three steps Diode Laser protocol for LM management, based on its persistent vascular blood component. 1. Histological and cytological examination, to evaluate the vascular blood component (10-40%), shows mature lymphocytes with red blood cells and endothelial cells. 2. Diode Laser Photocoagulation (DLP) in pulsed mode (on 100ms / off 400ms) at 10W and 800nm with a 300μm fibre kept 2-3mm from the tissues, to reduce the lesion. 3. Diode Laser surgical excision in pulsed mode (on 50ms / off 200ms) at 8W and 800nm with a 300 μm fibre in close contact with tissues, and histological intraoperative margins control on frozen sections. Even if it has inconstant results (lesions decreasing rate is 10% to 40% proportionally to vascular blood component), DLP simplifies the last and the most important step. Use of Diode Laser also in surgical excision reduces intra and postoperatory complications.

  4. Aromatherapy for managing menopausal symptoms: A protocol for systematic review and meta-analysis.

    Choi, Jiae; Lee, Hye Won; Lee, Ju Ah; Lim, Hyun-Ja; Lee, Myeong Soo

    2018-02-01

    Aromatherapy is often used as a complementary therapy for women's health. This systematic review aims to evaluate the therapeutic effects of aromatherapy as a management for menopausal symptoms. Eleven electronic databases will be searched from inception to February 2018. Randomized controlled trials that evaluated any type of aromatherapy against any type of control in individuals with menopausal symptoms will be eligible. The methodological quality will be assessed using the Cochrane risk of bias tool. Two authors will independently assess each study for eligibility and risk of bias and to extract data. This study will provide a high quality synthesis of current evidence of aromatherapy for menopausal symptoms measured with Menopause Rating Scale, the Kupperman Index, the Greene Climacteric Scale, or other validated questionnaires. The conclusion of our systematic review will provide evidence to judge whether aromatherapy is an effective intervention for patient with menopausal women. Ethical approval will not be required, given that this protocol is for a systematic review. The systematic review will be published in a peer-reviewed journal. The review will also be disseminated electronically and in print. PROSPERO CRD42017079191.

  5. An ICMP-Based Mobility Management Approach Suitable for Protocol Deployment Limitation

    Jeng-Yueng Chen

    2009-01-01

    Full Text Available Mobility management is one of the important tasks on wireless networks. Many approaches have been proposed in the past, but none of them have been widely deployed so far. Mobile IP (MIP and Route Optimization (ROMIP, respectively, suffer from triangular routing problem and binding cache supporting upon each node on the entire Internet. One step toward a solution is the Mobile Routing Table (MRT, which enables edge routers to take over address binding. However, this approach demands that all the edge routers on the Internet support MRT, resulting in protocol deployment difficulties. To address this problem and to offset the limitation of the original MRT approach, we propose two different schemes, an ICMP echo scheme and an ICMP destination-unreachable scheme. These two schemes work with the MRT to efficiently find MRT-enabled routers that greatly reduce the number of triangular routes. In this paper, we analyze and compare the standard MIP and the proposed approaches. Simulation results have shown that the proposed approaches reduce transmission delay, with only a few routers supporting MRT.

  6. Dynamic Session-Key Generation for Wireless Sensor Networks

    Chen Chin-Ling

    2008-01-01

    Full Text Available Abstract Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  7. Dynamic Session-Key Generation for Wireless Sensor Networks

    Cheng-Ta Li

    2008-09-01

    Full Text Available Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting m keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  8. Introduction of an Oral Fluid Challenge Protocol in the Management of Children with Acute Gastroenteritis: A Regional Hospital Experience.

    Umana, E

    2018-06-01

    Oral rehydration therapy (ORT) remains the ideal first line therapy for acute gastroenteritis (AGE). Our aim was to assess the impact of introducing an Oral Fluid Challenge (OFC) protocol on outcomes such as intravenous fluid use and documentation in our institution. A single centre study with data collected retrospectively pre-implementation (April 2015) of the OFC protocol and post implementation (April 2016). Consecutive sampling of the first 55 patients presenting with GE like symptoms and underwent OFC were recruited. One hundred and ten patients were included in this study with 55 patients per cycle. The rates of IVF use decreased from 22% (12) in cycle one to 18% (10) in cycle two. There was an improvement in documentation by 26% (14) for level of dehydration and 52% (31) for OFC volume from cycle one to two. Overall, the addition of the OFC protocol to the management of patients with uncomplicated AGE would help streamline and improve care.

  9. Non operative management of blunt splenic trauma: a prospective evaluation of a standardized treatment protocol.

    Brillantino, A; Iacobellis, F; Robustelli, U; Villamaina, E; Maglione, F; Colletti, O; De Palma, M; Paladino, F; Noschese, G

    2016-10-01

    The advantages of the conservative approach for major spleen injuries are still debated. This study was designed to evaluate the safety and effectiveness of NOM in the treatment of minor (grade I-II according with the American Association for the Surgery of Trauma; AAST) and severe (AAST grade III-V) blunt splenic trauma, following a standardized treatment protocol. All the hemodynamically stable patients with computer tomography (CT) diagnosis of blunt splenic trauma underwent NOM, which included strict clinical and laboratory observation, 48-72 h contrast-enhanced ultrasonography (CEUS) follow-up and splenic angioembolization, performed both in patients with admission CT evidence of vascular injuries and in patients with falling hematocrit during observation. 87 patients [32 (36.7 %) women and 55 (63.2 %) men, median age 34 (range 14-68)] were included. Of these, 28 patients (32.1 %) had grade I, 22 patients (25.2 %) grade II, 20 patients (22.9 %) grade III, 11 patients (12.6 %) grade IV and 6 patients (6.8 %) grade V injuries. The overall success rate of NOM was 95.4 % (82/87). There was no significant difference in the success rate between the patients with different splenic injuries grade. Of 24 patients that had undergone angioembolization, 22 (91.6 %) showed high splenic injury grade. The success rate of embolization was 91.6 % (22/24). No major complications were observed. The minor complications (2 pleural effusions, 1 pancreatic fistula and 2 splenic abscesses) were successfully treated by EAUS or CT guided drainage. The non operative management of blunt splenic trauma, according to our protocol, represents a safe and effective treatment for both minor and severe injuries, achieving an overall success rate of 95 %. The angiographic study could be indicated both in patients with CT evidence of vascular injuries and in patients with high-grade splenic injuries, regardless of CT findings.

  10. Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks

    Naranjo, J. A. M.; López-Ramos, J. A.; Casado, L. G.

    Key distribution for multimedia live streaming peer-to-peer overlay networks is a field still in its childhood stage. A scheme designed for networks of this kind must seek security and efficiency while keeping in mind the following restrictions: limited bandwidth, continuous playing, great audience size and clients churn. This paper introduces two novel schemes that allow a trade-off between security and efficiency by allowing to dynamically vary the number of levels used in the key hierarchy. These changes are motivated by great variations in audience size, and initiated by decision of the Key Server. Additionally, a comparative study of both is presented, focusing on security and audience size. Results show that larger key hierarchies can supply bigger audiences, but offer less security against statistical attacks. The opposite happens for shorter key hierarchies.

  11. Recall of intensive care unit stay in patients managed with a sedation protocol or a sedation protocol with daily sedative interruption: a pilot study.

    Ethier, Cheryl; Burry, Lisa; Martinez-Motta, Carlos; Tirgari, Sam; Jiang, Depeng; McDonald, Ellen; Granton, John; Cook, Deborah; Mehta, Sangeeta

    2011-04-01

    Analgesics and sedatives are integral for the relief of pain and anxiety in critically ill patients. However, these agents may contribute to amnesia for intensive care unit (ICU) events; which has been associated with development of posttraumatic stress disorder. Drug administration strategies that minimize sedative use have been associated with less amnesia. The objective of this pilot study was to evaluate recall of ICU stay in patients managed with 2 sedation strategies: a sedation protocol or a combination of sedation protocol and daily sedative/analgesic interruption. A questionnaire was administered on day 3 following ICU discharge to evaluate patients' recollections of pain, anxiety, fear, and sleep, as well as memories for specific ICU procedures. Participants were ICU survivors who had been enrolled in SLEAP - a randomized pilot trial comparing two sedation strategies, at 3 university-affiliated medical/surgical ICUs. Twenty-one patients who regained orientation within 72 hours of ICU discharge completed the questionnaire. More than 50% of patients recalled experiencing pain, anxiety, and fear to a moderate or extreme extent; and 57% reported inadequate sleep while in the ICU. Of the 21 patients, 48%, 33%, and 29% had no memories of endotracheal tube suctioning, being on a "breathing machine," and being bathed, respectively. A notable percentage of patients discharged from the ICU report moderate to extreme pain, anxiety, and fear, and inability to sleep during their ICU stay; and 29% to 48% have no recall of specific ICU events. Copyright © 2011 Elsevier Inc. All rights reserved.

  12. Vertical Protocol Composition

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  13. Teaching Integrity in Empirical Research: A Protocol for Documenting Data Management and Analysis

    Ball, Richard; Medeiros, Norm

    2012-01-01

    This article describes a protocol the authors developed for teaching undergraduates to document their statistical analyses for empirical research projects so that their results are completely reproducible and verifiable. The protocol is guided by the principle that the documentation prepared to accompany an empirical research project should be…

  14. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    2016-04-05

    applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...www.elsevier.com/locate/peva Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc...Accepted 19 September 2010 Available online 26 September 2010 Keywords: Mobile ad hoc networks Intrusion detection Group communication systems Group

  15. Management competences become key factor for success. Competition market energy; Managementkompetenzen werden Schluesselfaktor fuer Erfolg. Wettbewerbsmarkt Energie

    Bausch, A. [Allgemeine Betriebswirtschaftlehre/Internationales Management, Friedrich-Schiller-Univ. Jena (Germany); Strategisches Management und Controlling, Jacobs Univ. Bremen (Germany); Fritz, T. [Jacobs University Bremen (Germany); Werthschulte, S.; Schumacher, T.; Holst, A.; Schiegg, T. [Accenture GmbH (Germany)

    2007-07-09

    In view of deregulation, enhanced competition and a multitude of options for action, clear strategic positioning and a strong operative management have become key factors of success. The authors of the study 'Value Creator III' investigated the approaches that made current industrial leaders successful and the challenges to be met in the future. (orig.)

  16. A survey of selected key areas of management of South African ...

    Background: Previous surveys of neurosurgical patient management, including a South African (SA) survey conducted in 2001, confirmed the existence of significant dissimilarities in management on national and international levels. This survey aimed to determine current SA neurosurgical patient management and to ...

  17. Study protocol: mobile improvement of self-management ability through rural technology (mI SMART).

    Mallow, Jennifer A; Theeke, Laurie A; Long, Dustin M; Whetsel, Tara; Theeke, Elliott; Mallow, Brian K

    2015-01-01

    There are 62 million Americans currently residing in rural areas who are more likely to have multiple chronic conditions and be economically disadvantaged, and in poor health, receive less recommended preventive services and attend fewer visits to health care providers. Recent advances in mobile healthcare (mHealth) offer a promising new approach to solving health disparities and improving chronic illness care. It is now possible and affordable to transmit health information, including values from glucometers, automated blood pressure monitors, and scales, through Bluetooth-enabled devices. Additionally, audio and video communications technologies can allow healthcare providers to conduct many parts of a physical exam remotely from varied settings. These technologies could remove geographical distance as a barrier to care and diminish the access to care issues faced by patients who live rurally. However, currently there is lack of studies that provide evidence of feasibility, acceptability, and effectiveness of mHealth initiatives on improved outcomes of care, a needed step to make the translation to implementation studies in healthcare systems. The purpose of this paper is to present the protocol for the first study of mI SMART (mobile Improvement of Self-Management Ability through Rural Technology), a new integrated mHealth intervention. Our objective is to provide evidence of feasibility and acceptability for the use of mI SMART in an underserved population and establish evidence for the refinement of mI SMART. The proposed study will take place at Milan Puskar Health Right, a free primary care clinic in the state of West Virginia. The clinic provides health care at no cost to uninsured, low income; adults aged 18-64 living in West Virginia. We will enroll 30 participants into this feasibility study with plans of implementing a longitudinal randomized, comparative effectiveness design in the future. Data collection will include tracking of barriers and

  18. Importance of the use of protocols for the management of analgesia and sedation in pediatric intensive care unit

    Emiliana Motta

    Full Text Available Summary Introduction: Analgesia and sedation are essential elements in patient care in the intensive care unit (ICU, in order to promote the control of pain, anxiety and agitation, prevent the loss of devices, accidental extubation, and improve the synchrony of the patient with mechanical ventilation. However, excess of these medications leads to rise in morbidity and mortality. The ideal management will depend on the adoption of clinical and pharmacological measures, guided by scales and protocols. Objective: Literature review on the main aspects of analgesia and sedation, abstinence syndrome, and delirium in the pediatric intensive care unit, in order to show the importance of the use of protocols on the management of critically ill patients. Method: Articles published in the past 16 years on PubMed, Lilacs, and the Cochrane Library, with the terms analgesia, sedation, abstinence syndrome, mild sedation, daily interruption, and intensive care unit. Results: Seventy-six articles considered relevant were selected to describe the importance of using a protocol of sedation and analgesia. They recommended mild sedation and the use of assessment scales, daily interruptions, and spontaneous breathing test. These measures shorten the time of mechanical ventilation, as well as length of hospital stay, and help to control abstinence and delirium, without increasing the risk of morbidity and morbidity. Conclusion: Despite the lack of controlled and randomized clinical trials in the pediatric setting, the use of protocols, optimizing mild sedation, leads to decreased morbidity.

  19. Productivity--a key to managing cost-per-case. Part 1.

    Orefice, J J; Jennings, M C

    1983-08-01

    Productivity and productivity management are critical to effective case-mix management. Case-mix management expands on traditional productivity management to include the relationship between such intermediate products as patient days, tests and meals, and the ultimate end product, the case. As hospitals search to increase the profitability of specific case types, they must focus on two critical productivity control points. First, they must examine length of stay and ancillary utilization as one level of productivity. Then they must turn to more traditional analyses and review departmental productivity in the production of the intermediate products. No case-mix management system is complete unless it focuses on both of these critical relationships. Part two of this article will explore performance reporting and its role in managing both productivity and case mix.

  20. THE KEY ACTIVITIES OF GREEN LOGISTICS MANAGEMENT IN THE THAI AUTOMOTIVE INDUSTRY

    Thanyaphat Muangpan; Mana Chaowarat; Jutaporn Neamvonk

    2016-01-01

    Thai automotive industry needs to be developed for understanding activities management on inbound logistics that is an essential element of business operations for a manufacturing firm. The purpose of research is to study the main activities of green logistics management (inbound logistics) in the Thai automotive industry. Survey research was used in this study to collect data by sampling from the people in the field of logistics and environmental management of Thai automotive industry to exa...

  1. Key rate of quantum key distribution with hashed two-way classical communication

    Watanabe, Shun; Matsumoto, Ryutaroh; Uyematsu, Tomohiko; Kawano, Yasuhito

    2007-01-01

    We propose an information reconciliation protocol that uses two-way classical communication. The key rates of quantum key distribution (QKD) protocols that use our protocol are higher than those using previously known protocols for a wide range of error rates for the Bennett-Brassard 1984 and six-state protocols. We also clarify the relation between the proposed and known QKD protocols, and the relation between the proposed protocol and entanglement distillation protocols

  2. Understanding the cultures of fishing communities: a key to fisheries management and food security

    McGoodwin, James R

    2001-01-01

    .... The paper suggests methods that might help fisheries managers to obtain reliable information about fishing cultures in an ethical manner, including the rapid acquisition of important information...

  3. An Energy-Efficient MAC Protocol Using Dynamic Queue Management for Delay-Tolerant Mobile Sensor Networks

    Yugui Qu

    2011-02-01

    Full Text Available Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay.

  4. 557 Test and Manage Protocol for 841 Patients Requiring Iodinated Contrast Media (Icm) in Pediatrics

    Diaz, Maria Cristina; Lavrut, Alberto Jorge; Spinelli, Silvia Susana

    2012-01-01

    Background ICM's adverse effects are quite frequent and potentially serious. The use of protocols to test and manage patients receiving ICM could help to decrease the adverse effects because they advise against the studies or prescribe the administration of premedication; however, its use in pediatrics is still limited. We describe the results of the use of a test and management protocol for pediatric patients requiring ICM. Methods All the patients of a pediatric hospital prescribed with ICM between 31st January 2008 and 5th March 2011 were included. The following variables have been analyzed: age, sex, type of study to be performed, diagnoses and hospitalized or outpatient, risk (regular, increased or non-advised) and the presence of adverse reactions. We also analyzed the relation between risk and age, sex and condition (chi cuadrado o t test). Significance level P < 0.05. Results We included 841 patients (56.9% male, age = 92.7 ± 24.5 months, 60% hospitalized). The most frequent test was chest Tc (36%) and the most frequent diagnosis was solid tumors (25%). Patients with increased risk were significantly lower than those with regular risk (75.7 ± 69.7 months vs 109.7 ± 61.6, P < 0.001). During the research period there were no adverse effects. Conclusions The classification of risk groups by this Goverment Buenos Aires City protocols allows a rational management of the patients requiring ICM and minimize the adverse effects.

  5. Cost-utility analysis of an advanced pressure ulcer management protocol followed by trained wound, ostomy, and continence nurses.

    Kaitani, Toshiko; Nakagami, Gojiro; Iizaka, Shinji; Fukuda, Takashi; Oe, Makoto; Igarashi, Ataru; Mori, Taketoshi; Takemura, Yukie; Mizokami, Yuko; Sugama, Junko; Sanada, Hiromi

    2015-01-01

    The high prevalence of severe pressure ulcers (PUs) is an important issue that requires to be highlighted in Japan. In a previous study, we devised an advanced PU management protocol to enable early detection of and intervention for deep tissue injury and critical colonization. This protocol was effective for preventing more severe PUs. The present study aimed to compare the cost-effectiveness of the care provided using an advanced PU management protocol, from a medical provider's perspective, implemented by trained wound, ostomy, and continence nurses (WOCNs), with that of conventional care provided by a control group of WOCNs. A Markov model was constructed for a 1-year time horizon to determine the incremental cost-effectiveness ratio of advanced PU management compared with conventional care. The number of quality-adjusted life-years gained, and the cost in Japanese yen (¥) ($US1 = ¥120; 2015) was used as the outcome. Model inputs for clinical probabilities and related costs were based on our previous clinical trial results. Univariate sensitivity analyses were performed. Furthermore, a Bayesian multivariate probability sensitivity analysis was performed using Monte Carlo simulations with advanced PU management. Two different models were created for initial cohort distribution. For both models, the expected effectiveness for the intervention group using advanced PU management techniques was high, with a low expected cost value. The sensitivity analyses suggested that the results were robust. Intervention by WOCNs using advanced PU management techniques was more effective and cost-effective than conventional care. © 2015 by the Wound Healing Society.

  6. How coaching can play a key role in the development of nurse managers.

    Westcott, Liz

    2016-09-01

    The aim of this study was to explore empirically the role that coaching plays in the development of nurse managers in order to inform further research and policy makers about the potential utility and value of this means of development. There is evidence of the importance of the role of nurse managers who are first line managers of a team of nurses within any health sector. However, there appears to be little understanding of the United Kingdom wide scope of nurse manager development across the United Kingdom and the means to increase its effectiveness. At the same time, it appears that some nurse managers receive coaching to help in their development. This is a mixed methods study, using a pragmatist paradigm. Data was gathered from a quantitative survey and qualitative interviews. This paper is reporting the results of the qualitative interviews only. Twenty-one qualitative interviews were undertaken with nurse managers, coaches and directors of nursing to draw out their own experiences of coaching for nurse managers. Thematic analysis framework was used for data interrogation, identifying new patterns and emerging themes. Themes that emerged from interviews include how nurse managers were introduced to coaching, how they balanced transitions, the role of reflection, the value of relationships and overlaps between clinical supervision, mentoring and coaching. Findings show that following coaching, nurse managers gained increased resilience, confidence and better coping mechanisms. This resulted in perceived improved team management and cohesion and appeared to lead to better quality of care for patients. This study suggests the importance of nurse managers accessing coaching, to enable transformational leadership of their teams of nurses. It suggests also the importance of organisations supporting a coaching culture, to ensure staff satisfaction, motivation and improved quality of patient care. © 2016 John Wiley & Sons Ltd.

  7. An adaptive transmission protocol for managing dynamic shared states in collaborative surgical simulation.

    Qin, J; Choi, K S; Ho, Simon S M; Heng, P A

    2008-01-01

    A force prediction algorithm is proposed to facilitate virtual-reality (VR) based collaborative surgical simulation by reducing the effect of network latencies. State regeneration is used to correct the estimated prediction. This algorithm is incorporated into an adaptive transmission protocol in which auxiliary features such as view synchronization and coupling control are equipped to ensure the system consistency. We implemented this protocol using multi-threaded technique on a cluster-based network architecture.

  8. Exploration of Route to Establish the Office Administrative Management Matching the Key Colleges

    Xu Lili

    2015-01-01

    Full Text Available Based on the analysis on the main problems in office administrative work in the modern higher vocational colleges, I put forward some suggestions on improving the office management by changing administrative management idea, strengthening the service consciousness and professional skills, perfecting the rules and regulations, enhancing staff training and so on.

  9. Key convention on safe management of spent fuel and radioactive waste to enter into force

    2001-01-01

    At a ceremony at IAEA Headquarters today, Ireland deposited its instrument of ratification to an important convention on the safe management of spent fuel and radioactive waste, thereby ensuring its entry into force. The Convention will be the first international instrument to address the safety of management and storage of radioactive wastes and spent fuels in countries with and without nuclear programmes

  10. Key Authors in Business and Management Education Research: Productivity, Topics, and Future Directions

    Arbaugh, J. B.; Asarta, Carlos J.; Hwang, Alvin; Fornaciari, Charles J.; Bento, Regina F.; Dean, Kathy Lund

    2017-01-01

    Previous studies of author productivity in business and management education (BME) research have focused on single disciplinary areas, and even single journals. This study is the first to examine the productivity of BME scholars across multiple disciplinary areas (i.e., accounting, economics, finance, information systems, management, marketing,…

  11. Leadership and Quality Management: An Analysis of Three Key Features of the Greek Education System

    Saiti, Anna

    2012-01-01

    Purpose: This paper aims to investigate whether educational leadership in Greece implements the values of total quality management and contributes to the improvement of the educational process, and to offer proposals for a framework of total quality management that would contribute to an improvement in the overall quality of the education process.…

  12. Biodiversity in the city: key challenges for urban green space management

    Myla F.J. Aronson; Christopher A. Lepczyk; Karl L. Evans; Mark A. Goddard; Susannah B. Lerman; J. Scott MacIvor; Charles H. Nilon; Timothy. Vargo

    2017-01-01

    Cities play important roles in the conservation of global biodiversity, particularly through the planning and management of urban green spaces (UGS). However, UGS management is subject to a complex assortment of interacting social, cultural, and economic factors, including governance, economics, social networks, multiple stakeholders, individual preferences, and social...

  13. Interviewing Key Informants: Strategic Planning for a Global Public Health Management Program

    Kun, Karen E.; Kassim, Anisa; Howze, Elizabeth; MacDonald, Goldie

    2013-01-01

    The Centers for Disease Control and Prevention's Sustainable Management Development Program (SMDP) partners with low- and middle-resource countries to develop management capacity so that effective global public health programs can be implemented and better health outcomes can be achieved. The program's impact however, was variable. Hence, there…

  14. Lean Information Management: Criteria For Selecting Key Performance Indicators At Shop Floor

    Iuga, Maria Virginia; Kifor, Claudiu Vasile; Rosca, Liviu-Ion

    2015-07-01

    Most successful organizations worldwide use key performance indicators as an important part of their corporate strategy in order to forecast, measure and plan their businesses. Performance metrics vary in their purpose, definition and content. Therefore, the way organizations select what they think are the optimal indicators for their businesses varies from company to company, sometimes even from department to department. This study aims to answer the question of what is the most suitable way to define and select key performance indicators. More than that, it identifies the right criteria to select key performance indicators at shop floor level. This paper contributes to prior research by analysing and comparing previously researched selection criteria and proposes an original six-criteria-model, which caters towards choosing the most adequate KPIs. Furthermore, the authors take the research a step further by further steps to closed research gaps within this field of study.

  15. ANALYSIS OF THE KEY ACTIVITIES OF THE LIFE CYCLE OF KNOWLEDGE MANAGEMENT IN THE UNIVERSITY AND DEVELOPMENT OF THE CONCEPTUAL ARCHITECTURE OF THE KNOWLEDGE MANAGEMENT SYSTEM

    Eugene N. Tcheremsina

    2013-01-01

    Full Text Available This article gives an analysis of the key activities of the life cycle of knowledge management in terms of the features of knowledge management in higher education. Based on the analysis we propose the model of the conceptual architecture of virtual knowledge-space of a university. The proposed model is the basis for the development of kernel intercollegiate virtual knowledge-space, based on cloud technology. 

  16. Implementation of a protocol for the prevention and management of extravasation injuries in the neonatal intensive care patient.

    Warren, Diane

    2011-06-01

    This project sought to determine nurses' understanding and management of infants with intravenous (IV) therapy. There were three specific aims: • To improve identification and management of extravasation injuries in neonates • To ensure management of extravasation injuries in neonates is classified according to IV extravasation staging guidelines • To develop a protocol that outlined actions required to manage extravasation injuries. This project utilised a pre- and post-implementation audit strategy using the Joanna Briggs Institute (JBI) Getting Research into Practice (GRIP) program. This method has been used to improve clinical practice by utilising an audit, feedback and re-audit sequence. The project was implemented in four stages over a 7-month period from 21 October 2009 to 30 May 2010. Initially, there was poor compliance with all four criteria, ranging from zero to 63%. The GRIP phase of the project identified five barriers which were addressed throughout this project. These related to education of staff and the development of a protocol for the prevention and management of extravasation injuries in the neonatal population. Following implementation of best practice, the second audit showed a marked improvement in all four criteria, ranging from 70 to 100% compliance. Overall, this project has led to improvements in clinical practice in line with current evidence. This has resulted in enhanced awareness of the risks associated with IV therapy and of measures to prevent an injury occurring within this clinical setting. © 2011 The Author. International Journal of Evidence-Based Healthcare © 2011 The Joanna Briggs Institute.

  17. Granulocyte colony-stimulating factor in toxic epidermal necrolysis (TEN) and Chelsea & Westminster TEN management protocol [corrected].

    de Sica-Chapman, A; Williams, G; Soni, N; Bunker, C B

    2010-04-01

    Toxic epidermal necrolysis (TEN) is a rare but life-threatening, allergic drug reaction. Skin blistering with epidermal and mucosal necrolysis with subsequent detachment from an inflamed underlying dermis is a hallmark of the condition. The pathogenesis of TEN is not well understood, accounting for controversies about its management and significant delay in initiating potentially beneficial therapy. There are no management protocols based on a robust evidence base. Prompt recognition of the diagnosis and consensus on early management initiatives are necessary in order to improve outcomes and survival in TEN. To date, TEN management has been directed at arresting the allergic reaction and treating the complications. We have identified a need for specific medical interventions to accelerate wound regeneration. This approach has not previously been adopted in the management of TEN. We observed that in two cases of severe TEN, dramatic re-epithelialization and recovery coincided with the introduction of granulocyte colony-stimulating factor (G-CSF) for neutropenia. We explain how addition of the G-CSF promotes recovery from TEN by enhanced bioregeneration of the damaged tissues through accelerated re-epithelialization. G-CSF has been used for severe neutropenia in TEN, but we recommend and explain why, as in our Chelsea and Westminster protocol, G-CSF should be considered in treating severe TEN irrespective of the severity of neutropenia.

  18. INVAP and its project management capabilities: a key to company success

    Salvatore, Marcelo; Delgado, Ricardo; Niklison, Carlos; Ordonez, Juan Pablo; Gerbino, Juan Jose Gil

    2002-01-01

    Over the past 26 years, several factors have contributed to INVAP's projection into domestic and overseas operations. Of these, the most recognized is of course the technological capabilities INVAP keeps developing to satisfy our customer's requirements. In a second thought, the other factor is the strategic objective of providing specific purpose customer oriented solutions. The less obvious third important factor in this trilogy is the successful application of Project Management techniques and methods. INVAP's vision on Project Management encompasses well known concepts as: Integrated Management, Proactive solutions, Cost Control and Reporting, Quality Assurance, Target Schedules, Performance Requirements, Risk Management, Configuration Management and Integrated Logistic Support. After 2 years of execution of the Replacement Research Reactor Project for the Australian Nuclear Science and Technology Organization, our Project Management methodology have allowed us to timely meet all project milestones, complete basic and detail engineering, timely deliver the preliminary safety reports, manufacture and test technological concepts in specifically built mock ups and overcome risky situations -like the economical panorama in Argentina- without jeopardizing our Contractual commitments. Present paper depicts the practical approach INVAP has for Project Management -particularly within the Nuclear Division-, and a description of the tools to such aim developed. (author)

  19. The Intergovernmental Marine Bioenergy and Carbon Sequestration Protocol: Environmental and Political Risk Reduction of Global Carbon Management (The IMBECS Protocol Draft)

    Hayes, M.

    2014-12-01

    The IMBECS Protocol concept employs large cultivation and biorefinery installations, within the five Subtropical Convergence Zones (STCZs), to support the production of commodities such as carbon negative biofuels, seafood, organic fertilizer, polymers and freshwater, as a flexible and cost effective means of Global Warming Mitigation (GWM) with the primary objective being the global scale replacement of fossil fuels (FF). This governance approach is categorically distinct from all other large scale GWM governance concepts. Yet, many of the current marine related GWM technologies are adaptable to this proposals. The IMBECS technology would be managed by an intergovernmentally sanctioned non-profit foundation which would have the following functions/mission: Synthesises relevant treaty language Performs R&D activities and purchases relevant patents Under intergovernmental commission, functions as the primary responsible international actorfor environmental standards, production quotas and operational integrity Licence technology to for-profit actors under strict production/environmental standards Enforce production and environmental standards along with production quotas Provide a high level of transparency to all stakeholders Provide legal defence The IMBECS Protocol is conceptually related to the work found in the following documents/links. This list is not exhaustive: Climate Change Geoengineering The Science and Politics of Global Climate Change: A guide to the debate IPCC Special Report on Renewable Energy and Climate Change Mitigation DoE Roadmap for Algae Biofuels PodEnergy Ocean Agronomy development leaders and progenitor of this proposal. Artificial Upwelling of Deep Seawater Using the Perpetual Salt Fountain for Cultivation of Ocean Desert NASAs' OMEGA study. Cool Planet; Land based version of a carbon negative biofuel concept. Cellana; Leading developer of algae based bioproducts. The State of World Fisheries and Aquaculture Mariculture: A global analysis

  20. Effective knowledge management as basis for holistic knowledge engineering – Knowledge as the key asset of an organization

    Svetlana Lazović

    2013-03-01

    Full Text Available In knowledge management , human resources are in the foreground and their value is constantly rising. In the eyes of modern managers knowledge is the key asset of an organization. Effective management and management of knowledge processes are central preoccupations of modern managers and, at the same time, the most prominent feature of a knowledge-based organization. Like innovation and creativity, knowledge needs to be encouraged and treated with due care. Commitment to acquisition of new knowledge depends on how the interpersonal relationships are managed in an organization, therefore, those responsible for knowledge processes, the so-called modern knowledge managers, will develop partnership relation- ships with all members of their organization. In the core of such partnerships lie competences of individual employees and their creative application of knowledge. By encouraging learning, discussions and opinion exchange as well as personal and professional growth of their employees, management in knowledge-based organizations is improving the quality of work, and consequently, generation of new knowledge and their organization’s competitive advantage.

  1. Blockchain-based Public Key Infrastructure for Inter-Domain Secure Routing

    de la Rocha Gómez-Arevalillo , Alfonso; Papadimitratos , Panos

    2017-01-01

    International audience; A gamut of secure inter-domain routing protocols has been proposed in the literature. They use traditional PGP-like and centralized Public Key Infrastructures for trust management. In this paper, we propose our alternative approach for managing security associations, Secure Blockchain Trust Management (SBTM), a trust management system that instantiates a blockchain-based PKI for the operation of securerouting protocols. A main motivation for SBTM is to facilitate gradu...

  2. Development of exercise design, development and implementation protocol in the utilization of simulators for response management training

    Giesen, J. H.

    1997-01-01

    Development and operation of a marine oil spill management simulator system at Texas A and M University's Galveston Center for Marine Training and Safety was described. The Spill Management Simulator is a multi-year joint program between the U. S. Coast Guard and the Center. Essentially, it is a a computer-based modelling and scenario generator for conducting and evaluating incident management training. An independent evaluation group has been set up by the U.S.Coast Guard to evaluate the Galveston and similar programs established under the same legislation throughout the United States. This paper discusses the creation of a development and implementation protocol for Spill Management Team simulation as a foundation upon which to integrate available and future technology and for making it available to the response community as a whole. 12 refs.,1 tab., 4 figs

  3. Key Management Theories ... and What They Have to Say with Regards to Contemporary Headquarters Structures

    Nell, Phillip Christopher

    2018-01-01

    Multinational and multibusiness headquarters increasingly structure their headquarters in novel ways. They use several locations spread around the world, differentiate different types of headquarters activities in a very fine-grained way, they temporarily relocate top management teams, or relocate...

  4. The keys to CERN conference rooms - Managing local collaboration facilities in large organisations

    Baron, T; Duran, G; Correia Fernandes, J; Ferreira, P; Gonzalez Lopez, J B; Jouberjean, F; Lavrut, L; Tarocco, N

    2013-01-01

    For a long time HEP has been ahead of the curve in its usage of remote collaboration tools, like videoconference and webcast, while the local CERN collaboration facilities were somewhat behind the expected quality standards for various reasons. This time is now over with the creation by the CERN IT department in 2012 of an integrated conference room service which provides guidance and installation services for new rooms (either equipped for video-conference or not), as well as maintenance and local support. Managing now nearly half of the 250 meeting rooms available on the CERN sites, this service has been built to cope with the management of all CERN rooms with limited human resources. This has been made possible by the intensive use of professional software to manage and monitor all the room equipment, maintenance and activity. This paper will focus on presenting these packages, either off-the-shelf commercial products (asset and maintenance management tool, remote audiovisual equipment monitoring systems, ...

  5. Five Key Changes for the Management of UK Defence - An Agenda for Research?

    Tatham, Peter; Taylor, Trevor

    2008-01-01

    .... Given the paucity of academic research into the general area of defence management, it is suggested that there is considerable potential for focused application of ideas and concepts from a broad...

  6. Conference communication. Managing change in tourism destinations: Key issues and current trends.

    Mariani, M.M.; Buhalis, Dimitrios; Longhi, C.; Vitouladiti, O.

    2013-01-01

    This conference communication illustrates the major outcomes emerging from the EIASM Conference on Tourism Management and Tourism Related Issues held in Nice (France), September 20-21, 2012. While a number of managerial issues pertaining to the tourism field were dealt with, this communication covers three specific areas of interest for destination management and marketing: (1) the increasing competition among tourism destinations and the rise and consolidation of BRIC countries as outbound t...

  7. Managers’ Support – A Key Driver behind Enterprise Risk Management Maturity

    Sprčić Danijela Miloš

    2017-04-01

    Full Text Available Severe consequences of the global fi nancial crisis resulted in re-thinking the risk management processes and approaches, highlighting the need for a comprehensive risk management framework. Consequently, more and more companies are moving away from the Traditional “silo-based” Risk Management (TRM to a more holistic approach known as Enterprise Risk Management (ERM. This paper presents results of both exploratory and empirical research. First, we develop ERM Index that measures maturity of ERM process within the company. Then, we present empirical results on the level of maturity and determinants of risk management system development in listed Croatian companies. Research indicates low levels of ERM development: even 38 per cent of analysed companies have no elements of ERM system, from which 22 per cent do not manage corporate risks at all. Except the company’s size supported by the economies of scale argument, managers’ support is the most important determinant of ERM system maturity in Croatian companies.

  8. Rapid survey protocol that provides dynamic information on reef condition to managers of the Great Barrier Reef.

    Beeden, R J; Turner, M A; Dryden, J; Merida, F; Goudkamp, K; Malone, C; Marshall, P A; Birtles, A; Maynard, J A

    2014-12-01

    Managing to support coral reef resilience as the climate changes requires strategic and responsive actions that reduce anthropogenic stress. Managers can only target and tailor these actions if they regularly receive information on system condition and impact severity. In large coral reef areas like the Great Barrier Reef Marine Park (GBRMP), acquiring condition and impact data with good spatial and temporal coverage requires using a large network of observers. Here, we describe the result of ~10 years of evolving and refining participatory monitoring programs used in the GBR that have rangers, tourism operators and members of the public as observers. Participants complete Reef Health and Impact Surveys (RHIS) using a protocol that meets coral reef managers' needs for up-to-date information on the following: benthic community composition, reef condition and impacts including coral diseases, damage, predation and the presence of rubbish. Training programs ensure that the information gathered is sufficiently precise to inform management decisions. Participants regularly report because the demands of the survey methodology have been matched to their time availability. Undertaking the RHIS protocol we describe involves three ~20 min surveys at each site. Participants enter data into an online data management system that can create reports for managers and participants within minutes of data being submitted. Since 2009, 211 participants have completed a total of more than 10,415 surveys at more than 625 different reefs. The two-way exchange of information between managers and participants increases the capacity to manage reefs adaptively, meets education and outreach objectives and can increase stewardship. The general approach used and the survey methodology are both sufficiently adaptable to be used in all reef regions.

  9. National Low-Level Waste Management Program final summary report of key activities and accomplishments for fiscal year 1995

    Forman, S.

    1995-12-01

    To assist the Department of Energy (DOE) in fulfilling its responsibilities under the Low-Level Radioactive Waste Policy Amendments Act of 1985, the National Low-Level Waste Management Program (NLLWMP) outlines the key activities that the NLLWMP will accomplish in the following fiscal year. Additional activities are added during the fiscal year as necessary to accomplish programmatic goals. This report summarizes the activities and accomplishments of the NLLWMP during fiscal year 1995

  10. National Low-Level Waste Management Program final summary report of key activities and accomplishments for fiscal year 1996

    Garcia, R.S.

    1996-12-01

    To assist the Department of Energy (DOE) in fulfilling its responsibilities under the Low-Level Radioactive Waste Policy Amendments Act of 1985, the National Low-Level Waste Management Program (NLLWMP) outlines the key activities tat the NLLWMP will accomplish in the following fiscal year. Additional activities are added during the fiscal year as necessary to accomplish programmatic goals. This report summarizes the activities and accomplishments of the NLLWMP during Fiscal Year 1996

  11. The Effects of Quality Management Practices on Key Results: questionnaires sample for the industry of tourist accommodation in Spain

    José Álvarez García

    2014-12-01

    Full Text Available In this research work, we examine the direct and indirect effects of quality management practices on key results and we identify the relationship between quality practices. To achieve the proposed objective, a structural model was used, taking into account the previous review of the literature, in order to identify the quality practices and causal relationships with the key results. The theoretical model and hypotheses are tested using data collected from a sample of 186 tourist accommodation companies certified with the “Q for Tourist Quality” standard in Spain, from a questionnaire based on quality practices identified in the literature and on the EFQM Model, taking some of the most relevant scales as a reference. The methodology used consists of the application of an Exploratory and Confirmatory Factorial Analysis to validate the scales (reliability, one-dimensionality and validity and define the number of items of each of the measuring instruments of the constructs proposed, to then estimate the causal model proposed, proceeding to test the hypotheses formulated by using the Structural Equation Model (SEM technique. The results achieved support the relationship between quality practices and the direct and positive impact of two of the practices, processes management and quality policy/planning, on the key results. It was also observed that the quality practices that most influence key results are quality policy/planning along with leadership, when considering the total effects (direct and indirect.

  12. [Study protocol of a prevention of recurrent suicidal behaviour program based on case management (PSyMAC)].

    Sáiz, Pilar A; Rodríguez-Revuelta, Julia; González-Blanco, Leticia; Burón, Patricia; Al-Halabí, Susana; Garrido, Marlen; García-Alvarez, Leticia; García-Portilla, Paz; Bobes, Julio

    2014-01-01

    Prevention of suicidal behaviour is a public health priority in the European Union. A previous suicide attempt is the best risk predictor for future attempts, as well as completed suicides. The primary aim of this article is to describe a controlled study protocol designed for prevention of recurrent suicidal behaviour that proposes case management, and includes a psychoeducation program, as compared with the standard intervention (PSyMAC). Patients admitted from January 2011 to June 2013 to the emergency room of the Hospital Universitario Central de Asturias were evaluated using a protocol including sociodemographic, psychiatric, and psychosocial assessment. Patients were randomly assigned to either a group receiving continuous case management including participation in a psychoeducation program (experimental group), or a control group receiving standard care. The primary objective is to examine whether or not the period of time until recurrent suicidal behaviour in the experimental group is significantly different from that of the control group. PSyMAC proposes low cost and easily adaptable interventions to the usual clinical setting that can help to compensate the shortcoming of specific action protocols and suicidal behaviour prevention programs in our country. The evaluation of PSyMAC results will determine their real effectivity as a case-magament program to reduce suicidal risk. Copyright © 2013 SEP y SEPB. Published by Elsevier España. All rights reserved.

  13. Key articles and guidelines in the management of pulmonary arterial hypertension: 2011 update.

    Johnson, Samuel G; Kayser, Steven R; Attridge, Rebecca L; Duvall, Laura; Kiser, Tyree H; Moote, Rebecca; Reed, Brent N; Rodgers, Jo E; Erstad, Brian

    2012-06-01

    Pharmacotherapeutic approaches for the management of pulmonary arterial hypertension (PAH) have expanded greatly in the last 10 years. Pulmonary arterial hypertension is a relatively rare disease and is associated with myriad disease processes. The older term for PAH, primary PAH, has been changed to represent these differences and to distinguish it from postcapillary PAH associated with left-sided heart failure. Limitations in evaluating treatment approaches for PAH include its rarity, the small number of patients included in clinical trials, and issues regarding the use of placebo-controlled trials in a disease with such a high mortality rate if left untreated. Management options include the use of prostacyclin and prostacyclin analogues, endothelin receptor antagonists, and phosphodiesterase inhibitors, as well as traditional background therapy with diuretics, digoxin, calcium channel blockers, and warfarin. Numerous drugs are under investigation to evaluate their possible roles in management. Combination therapy is increasingly becoming a standard approach to therapy, with mounting literature to document effectiveness. Current or emerging roles for the pharmacist in the management of PAH largely involves ensuring access to drug therapy, facilitating specialty pharmacy dispensing, and providing patient counseling. Newer roles may include future drug development, optimized use of investigational drugs, and specialized disease management programs. This compilation includes a series of articles identifying important literature in cardiovascular pharmacotherapy. This bibliography focuses on pharmacotherapeutic management of pulmonary arterial hypertension (PAH). Most of the cited works present the results of significant human clinical studies that have shaped the management of patients with PAH. Limited primary literature is available for some topics, so in addition, consensus documents prepared by expert panels are reviewed. This compilation may serve as a

  14. AIS as key component in modern vessel traffic management and information systems

    Lamers, W. [DaimlerChrysler Aerospace AG (DASA), Ulm (Germany)

    1999-07-01

    The objective of this paper is to provide information in respect to universal shipborne identification system (UAIS) as main sensor in various vessel traffic applications. The presented paper will give general information concerning AIS functionality and the standardisation process. Based on experience from recent projects and various IALA working group activities, a typical future VTMIS architectures is also presented being based on AIS as key sensor. The required key performance of AIS associated with the HW components will be described. The results from European technology study Indris are presented and discussed. Finally, a summary and conclusion from the presented material will complete the technical paper. The elaboration of this presentation has been carried out as a joint task between Mr. Andre van Berg, MDS Suedafrika und Mr. Walter Lamers, DASA Ulm. (orig.)

  15. [Key points for the management of dermatitis in Latin America. The SLAAI Consensus].

    Sánchez, Jorge; Páez, Bruno; Macías-Weinmann, Alejandra; De Falco, Alicia

    2015-01-01

    The incidence of atopic dermatitis in Latin America, as in other regions, has been increasing in recent years. The SLAAI consensus is based on a systematic search for articles related to dermatitis, with focus in the pathophysiology and treatment and its impact on Latin America, and reviewed using the Delphi methodology (Revista Alergia Mexico 2014;61:178-211). In this article we highlight the key points of consensus and particular considerations in Latin America.

  16. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  17. The Key Principles of Process Manager Motivation in Production and Administration Processes in an Industrial Enterprise

    Chromjakova Felicita

    2016-03-01

    Full Text Available The basic premise of sustainable development is that companies should completely re-evaluate their enterprise work logic and process organization. Most of the necessary changes concern employee stimulation and motivation. If we are truly interested in improving business results and the effectiveness of business processes – there would be no progress otherwise – we have to strive to break down the barriers between company management (leadership and employees in order to establish effective relationships between firms and customers. This paper presents research results of process manager activities in modern industrial enterprises, connected with a methodology proposal for the systematically-oriented process manager motivation of employees in accordance with the increased competitiveness of production and administration processes. It also presents an effective methodology of how to increase the positive effects of welldefined employee motivations from the process manager´s perspective. The core benefit of this methodology lies in the design of a systematic approach to the motivation process from the process manager side, allowing for radical performance improvement via production and administrative processes and the increased competitiveness of enterprise processes.

  18. The Difficulty in Following Project Schedule as a Key Project Management Challenge: Family Firm Perspective

    Joanna SADKOWSKA

    2016-12-01

    Full Text Available The problem of how to manage projects successfully has been gaining growing interest for the last decades. The aforementioned is mainly caused by the fact that project management offers a wide range of methods and tools which, when properly used, can stimulate long-term growth of businesses. As a consequence it offers a particular development opportunity for family enterprises which, due to their specificity, have to overcome many difficulties. The primary objective of this paper is to examine whether family enterprises perceive, and to what extent, the factor of following project schedule as a difficulty in the area of project management. 154 Polish family firms representing different sectors were surveyed. The results of regression analysis show that family firms with global range of business activities, on the contrary to those with local or regional ones, do not find the factor of following project schedule as a difficulty. This results manly from the tools employed and the maturity level they have reached in project management. The findings support the current discussion on the specificity and uniqueness of family businesses in relationship to the knowledge area of project management. It also contributes to filling the gap on understanding the functioning of family firms in the emerging economies of Eastern Europe.

  19. Cryptographic Protocols:

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  20. The key to successful management of STS operations: An integrated production planning system

    Johnson, W. A.; Thomasen, C. T.

    1985-01-01

    Space Transportation System operations managers are being confronted with a unique set of challenges as a result of increasing flight rates, the demand for flight manifest/production schedule flexibility and an emphasis on continued cost reduction. These challenges have created the need for an integrated production planning system that provides managers with the capability to plan, schedule, status and account for an orderly flow of products and services across a large, multi-discipline organization. With increased visibility into the end-to-end production flow for individual and parallel missions in process, managers can assess the integrated impact of changes, identify and measure the interrelationships of resource, schedule, and technical performance requirements and prioritize productivity enhancements.

  1. Management of Energy Consumption on Cluster Based Routing Protocol for MANET

    Hosseini-Seno, Seyed-Amin; Wan, Tat-Chee; Budiarto, Rahmat; Yamada, Masashi

    The usage of light-weight mobile devices is increasing rapidly, leading to demand for more telecommunication services. Consequently, mobile ad hoc networks and their applications have become feasible with the proliferation of light-weight mobile devices. Many protocols have been developed to handle service discovery and routing in ad hoc networks. However, the majority of them did not consider one critical aspect of this type of network, which is the limited of available energy in each node. Cluster Based Routing Protocol (CBRP) is a robust/scalable routing protocol for Mobile Ad hoc Networks (MANETs) and superior to existing protocols such as Ad hoc On-demand Distance Vector (AODV) in terms of throughput and overhead. Therefore, based on this strength, methods to increase the efficiency of energy usage are incorporated into CBRP in this work. In order to increase the stability (in term of life-time) of the network and to decrease the energy consumption of inter-cluster gateway nodes, an Enhanced Gateway Cluster Based Routing Protocol (EGCBRP) is proposed. Three methods have been introduced by EGCBRP as enhancements to the CBRP: improving the election of cluster Heads (CHs) in CBRP which is based on the maximum available energy level, implementing load balancing for inter-cluster traffic using multiple gateways, and implementing sleep state for gateway nodes to further save the energy. Furthermore, we propose an Energy Efficient Cluster Based Routing Protocol (EECBRP) which extends the EGCBRP sleep state concept into all idle member nodes, excluding the active nodes in all clusters. The experiment results show that the EGCBRP decreases the overall energy consumption of the gateway nodes up to 10% and the EECBRP reduces the energy consumption of the member nodes up to 60%, both of which in turn contribute to stabilizing the network.

  2. The integrated supplier: key to cost management and multi-franchise capitation contracting.

    Schuweiler, R C

    1996-05-01

    Capitation...most healthcare providers do not work under it, comprehend it, or even want it, yet supply capitation contracting seminars are popping up everywhere creating the feeling that the bandwagon is leaving, and it might be time to get on board. Not true. Supply capitation is not for all organizations. Capitation contracting is not easy and there are not many successful models to help the uninitiated. If a panacea is sought for reducing supply costs, capitation is only one component of a systematic strategy to reduce materiel costs. This article suggests a direction using the Group Health Materiel Management (Group Health Cooperative of Puget Sound, WA) experience as a point of reference. It advocates a systematic approach that focuses on expense reduction in: cost of goods, holding cost of inventory, labor cost associated with all materiel processes, distribution cost (transportation and par stock pick, pack, and replenishment), product utilization, variation in product standards, and waste stream byproducts. At Group Health (GH) these issues are primarily addressed through the use of: information systems, supplier certification/selection processes, group purchasing compliance, supply channel management, supply capitation contracting programs, standardization, and utilization management. Because of managed care organizational structure, Group Health Cooperative supply capitation contracting, as performed at GH, is discussed not as a quick fix solution but in the spirit of sharing our experience with others who may be considering it as a cost savings tactic in the context of a broad-based materiel management strategy. This article highlights the experiences of GH beginning with materiel management's business process assumptions toward multiple-franchise supply capitation.

  3. Clusters Regarding Key Factors Affecting Changes in Accounting, Finance, Administration and Management Control

    Rodica Gabriela Blidisel

    2010-01-01

    Full Text Available During the last decade, important changes have occurred in public governance, which has evolved in this time from hierarchical bureaucracy to participatory governance, where the role of citizens in public decision-making process is more direct. There were performed reforms in finance, management administration and finances of public sector. Starting from the factors that influenced during the history the accounting, finances, administration and management control, we want to test the factors that affect the changes of these elements in Romanian environment.

  4. Strategic Planning, Key Tool for Brand Management in the New Advertising Context

    Santiago Mayorga-Escalada

    2016-07-01

    Full Text Available New market conditions combined with continuous technological development in Communication, push brands to take decisions in order to ensure viability. This adaptation process makes corporations to rethink new methods of Advertising Communication. Consumers have also changed, they are well informed and discerning buyers, a fact that forces brands to build relevant relationships with their audiences letting brands to develop powerful positioning connections and create added value. These new conditions lead brands to professionalize their management practices, developing comprehensive strategic planning process to manage their brand image building through the marketing mix also called branding.

  5. Automation in an addiction treatment research clinic: computerised contingency management, ecological momentary assessment and a protocol workflow system.

    Vahabzadeh, Massoud; Lin, Jia-Ling; Mezghanni, Mustapha; Epstein, David H; Preston, Kenzie L

    2009-01-01

    A challenge in treatment research is the necessity of adhering to protocol and regulatory strictures while maintaining flexibility to meet patients' treatment needs and to accommodate variations among protocols. Another challenge is the acquisition of large amounts of data in an occasionally hectic environment, along with the provision of seamless methods for exporting, mining and querying the data. We have automated several major functions of our outpatient treatment research clinic for studies in drug abuse and dependence. Here we describe three such specialised applications: the Automated Contingency Management (ACM) system for the delivery of behavioural interventions, the transactional electronic diary (TED) system for the management of behavioural assessments and the Protocol Workflow System (PWS) for computerised workflow automation and guidance of each participant's daily clinic activities. These modules are integrated into our larger information system to enable data sharing in real time among authorised staff. ACM and the TED have each permitted us to conduct research that was not previously possible. In addition, the time to data analysis at the end of each study is substantially shorter. With the implementation of the PWS, we have been able to manage a research clinic with an 80 patient capacity, having an annual average of 18,000 patient visits and 7300 urine collections with a research staff of five. Finally, automated data management has considerably enhanced our ability to monitor and summarise participant safety data for research oversight. When developed in consultation with end users, automation in treatment research clinics can enable more efficient operations, better communication among staff and expansions in research methods.

  6. The design of maternal centered life-style modification program for weight gain management during pregnancy - a study protocol.

    Farajzadegan, Ziba; Pozveh, Zahra Amini

    2013-08-01

    Abnormal weight gain during pregnancy increases the adverse health outcomes during the pregnancy, delivery, and the postpartum period. Most of the pregnant women develop weight gain more than the recommended limits; therefore, interventions to manage such disproportionate weight gain are needed. In this paper, the design of the maternal centered life-style intervention study is described, which focuses on controlling weight gaining during pregnancy for all body mass index (BMI) groups. In our randomized field trial, 160 pregnant women with 6-10 weeks of gestational age who visit one of the participating Isfahan four urban public-health centers and 4 private obstetric offices are included. The maternal centered life-style intervention carried out by trained midwives is standardized in a protocol. All the participants are visited at 6-10, 11-15, 16-20, 21-25, 26-30, 31-34, 35-37, 38, 39, and 40 weeks of pregnancy. The women who are randomized in the intervention group receive maternal centered educational package of prenatal care for the pregnant woman and a log book in the first visit. Counselors accompany the pregnant women to maintain or develop a healthy life-style. Data collection will perform monthly measuring body weight, BMI. Because, we don't have structured protocol for weight management during pregnancy especially, in private sectors if the maternal centered life-style intervention proves to be effective, it will be suggested to merge this package to routine care. Therewith by empowering women to manage their weight the public-health burden can be reduced. Beside that private obstetricians also have structured protocol for their client management.

  7. Characteristics of postoperative weight bearing and management protocols for tibial plateau fractures: Findings from a scoping review.

    Arnold, John B; Tu, Chen Gang; Phan, Tri M; Rickman, Mark; Varghese, Viju Daniel; Thewlis, Dominic; Solomon, Lucian B

    2017-12-01

    To identify and describe the characteristics of existing practices for postoperative weight bearing and management of tibial plateau fractures (TPFs), identify gaps in the literature, and inform the design of future research. Seven electronic databases and clinical trial registers were searched from inception until November 17th 2016. Studies were included if they reported on the surgical management of TPFs, had a mean follow-up time of ≥1year and provided data on postoperative management protocols. Data were extracted and synthesized according to study demographics, patient characteristics and postoperative management (weight bearing regimes, immobilisation devices, exercises and complications). 124 studies were included involving 5156 patients with TPFs. The mean age across studies was 45.1 years (range 20.8-72; 60% male), with a mean follow-up of 34.9 months (range 12-264). The most frequent fracture types were AO/OTA classification 41-B3 (29.5%) and C3 (25%). The most commonly reported non-weight bearing time after surgery was 4-6 weeks (39% of studies), with a further 4-6 weeks of partial weight bearing (51% of studies), resulting in 9-12 weeks before full weight bearing status was recommended (55% of studies). Loading recommendations for initial weight bearing were most commonly toe-touch/bearing was positively correlated with the proportion of fractures of AO/OTA type C (r=0.465, p=0.029) and Schatzker type IV-VI (r=0.614, pbearing time before full weight bearing is recommended at 9-12 weeks. Partial weight bearing protocols and brace use were varied. Type of rehabilitation may be an important factor influencing recovery, with future high quality prospective studies required to determine the impact of different protocols on clinical and radiological outcomes. Crown Copyright © 2017. Published by Elsevier Ltd. All rights reserved.

  8. An institutional ethnography of chronic pain management in family medicine (COPE) study protocol.

    Webster, Fiona; Bhattacharyya, Onil; Davis, Aileen; Glazier, Rick; Katz, Joel; Krueger, Paul; Upshur, Ross; Yee, Albert; Wilson, Lynn

    2015-11-05

    Patients with chronic conditions and multiple comorbidities represent a growing challenge for health care globally. Improved coordination of care is considered essential for providing more effective and cost-efficient care for these patients with complex needs. Osteoarthritis is one of the most common and debilitating chronic conditions, is the most frequent cause of chronic pain yet osteoarthritis care is often poorly-coordinated. Primary care is usually the first contact for patients requiring relief from chronic pain. Our previous work suggests discordance between the policy goals of improving patient care and the experience of osteoarthritis patients. We plan to investigate the empirical context of the primary care setting by focusing on primary physicians' conceptualizations and performance of their work in treating complex patients with chronic pain. This will allow for an exploration of how primary health care is - or could be - integrated with other services that play an important role in health care delivery. Our study is an Institutional Ethnography of pain management in family medicine, to be carried out in three phases over 3 years from 2014/15 to 2018. Over the first year we will undertake approximately 80 key informant interviews with primary care physicians, other health care providers, policymakers and clinical experts. In the second year we will focus on mobilizing our networks from year one to assist in the collection of key texts which shape the current context of care. These texts will be analyzed by the research team. In the final year of the study we will focus on synthesizing our findings in order to map the social relations informing care. As is standard and optimal in qualitative research, analysis will be concurrent with data collection. Our study will allow us to identify how the work of coordinating care across multiple settings is accomplished, in practice as well as discursively and textually. Ultimately, we will identify links

  9. The emergent demand chain management: key features and illustration from the beef business

    Canever, M.D.; Trijp, van J.C.M.; Beers, G.

    2008-01-01

    Abstract Purpose - The paper seeks to delineate the emergence of demand chain management (DCM) from a theoretical perspective and to illustrate its occurrence in practice. Design/methodology/approach ¿ The DCM concept is examined empirically through a case study with retailers involved in the beef

  10. Change Management and the SENCo Role: Developing Key Performance Indicators of Inclusivity

    Done, Elizabeth; Murphy, Mike; Bedford, Clare

    2016-01-01

    This article highlights the changing role of special educational needs co-ordinators (SENCos) in England. SENCos are now required to manage change strategically and deliver inclusive school cultures. A school-based evaluative study undertaken by a teacher who is studying for the postgraduate National Award for SEN Co-ordination (NASENCO) for…

  11. Enhancing chronic disease management: a review of key issues and strategies.

    Willison, Kevin D; Williams, Paul; Andrews, Gavin J

    2007-11-01

    This paper highlights three selected issues and potential strategies towards meeting chronic disease management needs. First, the orientation of the biomedical science model often gives insufficient attention to chronic health care needs. A second issue is that the use of complementary and alternative medicine (CAM) may offer for some an opportunity to enhance their chronic disease management efforts. A third issue is that our understanding of this potential is limited, as many who use CAM do not disclose such use. With reference to proposed solutions/strategies, first, an improved focus to respect patient/client values and goals may encourage people to disclose their use of CAM. Second, a community-based participatory approach shows promise in enhancing communication plus helps integrate CAM within new models of chronic disease management. Lastly, those in public health could help facilitate such an approach plus be a monitor of CAM practices. Overall, this review provides a springboard for further research and practice in CAM and the management of chronic diseases.

  12. Change Management and the SENCo Role: Developing Key Performance Indicators in the Strategic Development of Inclusivity

    Done, Liz; Murphy, Mike; Watt, Mia

    2016-01-01

    This article follows an earlier publication highlighting the changing role of special educational needs co-ordinators (SENCos) in England. SENCos are now required to manage change strategically and deliver inclusive school cultures. School-based action research undertaken by a teacher studying for the postgraduate National Award for SEN…

  13. The keys to CERN conference rooms - Managing local collaboration facilities in large organisations

    Baron, T; Domaracky, M; Duran, G; Fernandes, J; Ferreira, P; Lopez, J B Gonzalez; Jouberjean, F; Lavrut, L; Tarocco, N

    2014-01-01

    For a long time HEP has been ahead of the curve in its usage of remote collaboration tools, like videoconference and webcast, while the local CERN collaboration facilities were somewhat behind the expected quality standards for various reasons. This time is now over with the creation by the CERN IT department in 2012 of an integrated conference room service which provides guidance and installation services for new rooms (either equipped for videoconference or not), as well as maintenance and local support. Managing now nearly half of the 246 meeting rooms available on the CERN sites, this service has been built to cope with the management of all CERN rooms with limited human resources. This has been made possible by the intensive use of professional software to manage and monitor all the room equipment, maintenance and activity. This paper focuses on presenting these packages, either off-the-shelf commercial products (asset and maintenance management tool, remote audio-visual equipment monitoring systems, local automation devices, new generation touch screen interfaces for interacting with the room) when available or locally developed integration and operational layers (generic audio-visual control and monitoring framework) and how they help overcoming the challenges presented by such a service. The aim is to minimise local human interventions while preserving the highest service quality and placing the end user back in the centre of this collaboration platform.

  14. Right-of-way management: A key to controlling the spread of cogograss (Imperata cylindrica)

    W.H. Faircloth; M.G. Patterson; James H. Miller; D.H. Teem

    2004-01-01

    Cogongrass [Imperata cylindrica(L.) Beauv.] is an undesired species on highway rights-of-way (ROWS) due to its displacenent of native and/or more manageable grasses, unsightly growth characteristic, and propensity for fire. Fire not only poses a danger to motorists but could cause property loss to adjoining landowners. Most importantly, ROWS provide...

  15. Key-socio economic factors influencing sustainable land management investments in the West Usambara Highlands, Tanzania

    Nyanga, A.W.; Kessler, C.A.; Tenge, A.J.M.

    2016-01-01

    Low investments in sustainable land management (SLM) limit agricultural production in the East African Highlands, leading to increased soil erosion, low productivity of land and food insecurity. Recent studies in the region show that different socio-economic factors influence SLM investments by

  16. Positioning the Learning Asset Portfolio as a Key Component in an Organization's Enterprise Risk Management Strategy

    McAliney, Peter J.

    2009-01-01

    This article presents a process for valuing a portfolio of learning assets used by line executives across industries to value traditional business assets. Embedded within the context of enterprise risk management, this strategic asset allocation process is presented step by step, providing readers the operational considerations to implement this…

  17. Long-Term Soil Experiments: A Key to Managing Earth's Rapidly Changing Critical Zones

    Richter, D., Jr.

    2014-12-01

    In a few decades, managers of Earth's Critical Zones (biota, humans, land, and water) will be challenged to double food and fiber production and diminish adverse effects of management on the wider environment. To meet these challenges, an array of scientific approaches is being used to increase understanding of Critical Zone functioning and evolution, and one amongst these approaches needs to be long-term soil field studies to move us beyond black boxing the belowground Critical Zone, i.e., to further understanding of processes driving changes in the soil environment. Long-term soil experiments (LTSEs) provide direct observations of soil change and functioning across time scales of decades, data critical for biological, biogeochemical, and environmental assessments of sustainability; for predictions of soil fertility, productivity, and soil-environment interactions; and for developing models at a wide range of temporal and spatial scales. Unfortunately, LTSEs globally are not in a good state, and they take years to mature, are vulnerable to loss, and even today remain to be fully inventoried. Of the 250 LTSEs in a web-based network, results demonstrate that soils and belowground Critical Zones are highly dynamic and responsive to human management. The objective of this study is to review the contemporary state of LTSEs and consider how they contribute to three open questions: (1) can soils sustain a doubling of food production in the coming decades without further impinging on the wider environment, (2) how do soils interact with the global C cycle, and (3) how can soil management establish greater control over nutrient cycling. While LTSEs produce significant data and perspectives for all three questions, there is on-going need and opportunity for reviews of the long-term soil-research base, for establishment of an efficiently run network of LTSEs aimed at sustainability and improving management control over C and nutrient cycling, and for research teams that

  18. An Effective Key Management Approach to Differential Access Control in Dynamic Environments

    Yogesh Karandikar; Xukai Zou; Yuanshun Dai

    2006-01-01

    Applications like e-newspaper or interactive online gaming have more than one resource and a large number of users. There is a many-to-many relationship between users and resources; each user can access multiple resources and multiple users can access each resource. The resources are independent and each resource needs to be encrypted by a different Resource Encryption Key (REK). Each REK needs to be distributed to all subscribers of the resource and each subscriber must get all the REKs he/s...

  19. Optimized protocols for Mycobacterium leprae strain management: frozen stock preservation and maintenance in athymic nude mice.

    Trombone, Ana Paula Fávaro; Pedrini, Sílvia Cristina Barbosa; Diório, Suzana Madeira; Belone, Andréa de Faria Fernandes; Fachin, Luciana Raquel Vicenzi; do Nascimento, Dejair Caitano; Rosa, Patricia Sammarco

    2014-03-23

    Leprosy, caused by Mycobacterium leprae, is an important infectious disease that is still endemic in many countries around the world, including Brazil. There are currently no known methods for growing M. leprae in vitro, presenting a major obstacle in the study of this pathogen in the laboratory. Therefore, the maintenance and growth of M. leprae strains are preferably performed in athymic nude mice (NU-Foxn1(nu)). The laboratory conditions for using mice are readily available, easy to perform, and allow standardization and development of protocols for achieving reproducible results. In the present report, we describe a simple protocol for purification of bacilli from nude mouse footpads using trypsin, which yields a suspension with minimum cell debris and with high bacterial viability index, as determined by fluorescent microscopy. A modification to the standard method for bacillary counting by Ziehl-Neelsen staining and light microscopy is also demonstrated. Additionally, we describe a protocol for freezing and thawing bacillary stocks as an alternative protocol for maintenance and storage of M. leprae strains.

  20. Access to finance for community forest management under the UNFCCC and Kyoto Protocol

    Skutsch, Margaret

    2002-01-01

    A previous article in ETFRN News reviewed the potential for funding for forestry under international climate agreements, particularly under the Kyoto Protocol (Skutsch, 2000). Since then, further negotiations have taken place and this article aims at giving an overview of the current situation.

  1. THE JAPANESE MANAGEMENT, A KEY ELEMENT OF TOYOTA’S SUCCESS

    Toma Sorin-George

    2012-06-01

    Full Text Available After its defeat in the World War II, Japan was a country in ruin. The Japanese economy faced huge problems as unemployment and hyperinflation increased. The vast majority of its industry was destroyed and new industrial facilities had to be re-constructed from the ashes. In the 1970s Japan achieved a giant economic stature, evolving into the second largest economy of the world. There are many ways of analyzing the Japanese economic miracle, but in the final, management has to being considered as one of its most important factors. The aims of our paper are to emphasize some of the main features of the Japanese management in the globalization era, and to present the case of Toyota Motor Company. The research type is a literature review combined with a case study.

  2. Emotionally intelligent leadership as a key determinant of strategic and effective management of human capital

    Helena Viskupičová

    2016-06-01

    Full Text Available The purpose of this paper is to outline the strategic importance of Emotional Intelligence (EI in contemporary approaches to management of Human resources (HR. The aim of this study is to provide a conceptual theoretical insight of the relationship between EI and leadership. The paper also reflects the conditions within the present business environment in Slovakia with the emphasis on leadership in the context of EI (based on the research conducted in this field, while answering the following question: To what extent do Slovak organizations incorporate EI measures into the hiring process for managerial positions? The answer to this question would consequently disclose whether organizations in Slovakia consider Emotional Intelligence as a factor determining effective performance of managers – leaders.

  3. Management of waste from french nuclear fuel cycle: what are the key issues?

    Londres, V.; Do Quang, R.; Fournier, P.

    2000-01-01

    Like any other industry, the nuclear industry generates waste. This waste arises in the different successive stages of the fuel cycle, including nuclear power plants, and its physical and chemical properties vary greatly. What is special about it is the radioactivity it contains. Management of waste generated by spent fuel conditioning in nuclear reprocessing facilities, and which cannot be stored in surface repositories, according to current French regulations (ILW and HLW), is specifically discussed in this paper. (authors)

  4. The key role of shared participation in changing occupational self-efficacy through stress management courses

    Füllemann, Désirée; Jenny, Gregor J; Brauchli, Rebecca; Bauer, Georg F

    2015-01-01

    This study is the first that longitudinally examined change in occupational self-efficacy (OSE) through individual and shared participation in occupational stress management courses (SMC). Applying the framework of social cognitive theory (Bandura, 1986, Social foundations of thought and action: A social cognitive theory. Englewood Cliffs, NJ: Prentice-Hall), we assumed that participation in SMC facilitates OSE perceptions. We further assumed that the psychosocial environment promotes change ...

  5. Five Key Changes for the Management of UK Defence - An Agenda for Research?

    2008-04-23

    in which the high-level commander’s Strategic Intent is clearly spelled out. Subordinates are then encouraged and empowered to implement this...provision of so-called “C” vehicles7 announced in June 2005, and the Future Strategic Tanker Aircraft (FSTA) which requires industry to raise some £3...management. For example, writers in this field such as Hamel & Prahalad (1994) and Johnson, Scholes and Whittington (2005) recommend that companies should

  6. Motivation and job satisfaction as a key element of successful business management.

    Kazachok, Alina

    2011-01-01

    The subject of this thesis is motivation and job satisfaction of employees. The theoretical part deals with basic terms in the field of motivation and job satisfaction, motivation principles, factors that influence motivation and job satisfaction. Also the theoretical part gives consideration to the methods of measuring job satisfaction, manager's role in the sphere of motivation and job satisfaction. The part contains the description of the major motivational theories. The second part is dev...

  7. Key accountization at Bosch Automotive Aftermarket (BAA) Italy: managing and implementing a strategic change

    P.Guenzi

    2014-01-01

    The goal of this chapter is to describe how a multinational company adopted a KAM program in a local branch, using the lenses of a well-established framework. Starting from a change in Strategy, the company had to modify its Shared values (culture), leadership Style, organization Structure, support Systems, Skills and Staff characteristics. To do this, we first review the sparse literature on KAM and change management, and summarize it. Next, we introduce the background information abo...

  8. Toward a national policy for managing low-level radioactive waste: key issues and recommendations

    Duerksen, C.J.; Mantell, M.; Thompson, G.P.

    1981-06-01

    The Conservation Foundation, a not-for-profit research and public education organization, asked individuals with diverse backgrounds and viewpoints to come together under Foundation leadership as a Dialogue Group on Low-Level Radioactive Waste Management. The group, including persons who represent waste generators, concerned citizens, state regulators, and environmentalists, met over an 18-month period to discuss issues crucial to the development of a national policy on low-level wastes. The Dialogue Group agreed that three principles, if accepted broadly, would form the basis of a sound national policy for managing low-level radioactive wastes: with proper implementation, technology exists to manage low-level waste safely; generators and their customers should pay disposal costs; and greater public involvement at all stages can improve the disposal system. These principles acted as polestars for the group as it worked toward a series of policy recommendations in four main areas: (1) cleaning up closed commercial sites; (2) remodeling a system for defining and classifying low-level radioactive waste; (3) siting new low-level waste disposal facilities; and (4) decommissioning, long-term care, and liability. This report presents an extensive discussion of these recommendations covering qualifications, limitations, and alternatives

  9. Managing the nation's high-level radioactive waste: key issues and recommendations

    1981-07-01

    To date, no unified national plan has been adopted to develop and implement a comprehensive system of management and disposal of high-level radioactive waste in the United States. Growing public concern about this problem has resulted in a number of recent efforts to develop a national high-level waste management policy. The 96th Congress strove to resolve the central issues, but ultimately failed to pass legislation, partly because of disagreements about the appropriate role of states in the siting of repositories for military waste. Outside government, a number of organizations convened representatives of diverse groups concerned with national high-level radioactive waste management to seek agreement on the major elements of national policy. One such organization was RESOLVE, Center for Environmental Conflict Resolution, which in May 1981 was merged into The Conservation Foundation. RESOLVE convened Forum II, a series of discussions among representatives of environmental, industrial, governmental, and citizen interest groups, in 1981 specifically to address the issues blocking Congressional agreement on high-level waste policy. This report contains the recommendations which resulted from these deliberations. Reprocessing, interim storage, respository development, and licensing requirements are addressed. Federal, state, and public participation in decision making are also discussed

  10. Learning Lessons from TMI to Fukushima and Other Industrial Accidents: Keys for Assessing Safety Management Practices

    Dechy, N.; Rousseau, J.-M.; Dien, Y.; Montmayeul, R.; Llory, M.

    2016-01-01

    The main objective of the paper is to discuss and to argue about transfer, from an industrial sector to another industrial sector, of lessons learnt from accidents. It will be achieved through the discussion of some theoretical foundations and through the illustration of examples of application cases in assessment of safety management practices in Nuclear Power Plant (NPP). The nuclear energy production industry has faced three big ones in 30 years (TMI, Chernobyl, Fukushima) involving three different reactor technologies operated in three quite different cultural, organizational and regulatory contexts. Each of those accident has been the origin of questions, but also generator of lessons, some changing the worldview (see Wilpert and Fahlbruch, 1998) of what does cause an accident in addition to the engineering view about the importance of technical failures (human error, safety culture, sociotechnical interactions). Some of their main lessons were implemented such as improvements of human-machine interfaces ergonomics, recast of some emergency operating procedures, severe accident mitigation strategies and crisis management. Some lessons did not really provide deep changes. It is the case for organizational lessons such as, organizational complexity, management of production pressures, regulatory capture, and failure to learn, etc.

  11. A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

    Zeeshan Shafi Khan

    2014-01-01

    Full Text Available Vehicular ad hoc networks (VANETs are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach.

  12. Key aspects congenital infection

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  13. POSITIONING KNOWLEDGE MANAGEMENT AS KEY SUCCESS FACTOR IN THE GROWTH OF COOPERATIVES IN MALAYSIA

    Yeop Hussin Bidin

    2007-01-01

    Full Text Available Economic and business challenges in the new millennium have shaped the manner cooperative movement in Malaysia charts its future outlook. After almost 82 years, a national policy was launched by the Government on January 2004 to assist in the comprehensive development of the cooperative movement. The National CooperativePolicy (NCP will ensure that the huge resources of the cooperatives can be harnessed to generate and contribute to the economic growth of the country. However, in the light of many issues such as weak structure and the absence of good corporate governance in some cooperatives, the present Cooperative Act 1993 is being reviewed and several new provisions would be added to increase supervision, monitoring and enforcement against existing cooperatives in alaysia. It is quite imperative that by regulating the operation of cooperatives will require also the managing of intellectual and human capital assets that exist in the movement. Through establishing a framework and terms of reference such that fundamental elements of knowledge management can be instilled areprerequisites to developing innovativeness in this growing economic sector. The sharing of knowledge among the cooperatives will eventually produce better and more educated human resources that are able to experience greater control over the works and the administration of their quality working life. Structural analysis of the cooperative movement indicates the significant influence of knowledge management in sustaining its future growth given the timely introduction of the NCP. Thus, measures taken to underline this influence will also be addressed to represent the cooperative movement's readiness to face economic and business challenges in Malaysia.

  14. Management of graphite material: a key issue for High Temperature Gas Reactor system (HTGR)

    Bourdeloie, C.; Marimbeau, P.; Robin, J.C.; Cellier, F.

    2005-01-01

    Graphite material is used in nuclear High Temperature Gas-cooled Reactors (HTGR, Fig.1) as moderator, thermal absorber and also as structural components of the core (Fig.2). This type of reactor was selected by the Generation IV forum as a potential high temperature provider for supplying hydrogen production plants and is under development in France in the frame of the AREVA ANTARES program. In order to select graphite grades to be used in these future reactors, the requirements for mechanical, thermal, physical-chemical properties must match the internal environment of the nuclear core, especially with regard to irradiation effect. Another important aspect that must be addressed early in design is the waste issue. Indeed, it is necessary to reduce the amount of nuclear waste produced by operation of the reactor during its lifetime. Preliminary assessment of the nuclear waste output for an ANTARES type 280 MWe HTGR over 60 year-lifetime gives an estimated 6000 m 3 of activated graphite waste. Thus, reducing the graphite waste production is an important issue for any HTGR system. First, this paper presents a preliminary inventory of graphite waste fluxes coming from a HTGR, in mass and volume, with magnitudes of radiological activities based on activation calculations of graphite during its stay in the core of the reactor. Normalized data corresponding to an output of 1 GWe.year electricity allows comparison of the waste production with other nuclear reactor systems. Second, possible routes to manage irradiated graphite waste are addressed in both the context of French nuclear waste management rules and by comparison to other national regulations. Routes for graphite waste disposal studied in different countries (concerning existing irradiated graphite waste) will be discussed with regard to new issues of large graphite waste from HTGR. Alternative or complementary solutions aiming at lowering volume of graphite waste to be managed will be presented. For example

  15. A structured elicitation method to identify key direct risk factors for the management of natural resources

    Michael Smith

    2015-11-01

    Full Text Available The high level of uncertainty inherent in natural resource management requires planners to apply comprehensive risk analyses, often in situations where there are few resources. In this paper, we demonstrate a broadly applicable, novel and structured elicitation approach to identify important direct risk factors. This new approach combines expert calibration and fuzzy based mathematics to capture and aggregate subjective expert estimates of the likelihood that a set of direct risk factors will cause management failure. A specific case study is used to demonstrate the approach; however, the described methods are widely applicable in risk analysis. For the case study, the management target was to retain all species that characterise a set of natural biological elements. The analysis was bounded by the spatial distribution of the biological elements under consideration and a 20-year time frame. Fourteen biological elements were expected to be at risk. Eleven important direct risk factors were identified that related to surrounding land use practices, climate change, problem species (e.g., feral predators, fire and hydrological change. In terms of their overall influence, the two most important risk factors were salinisation and a lack of water which together pose a considerable threat to the survival of nine biological elements. The described approach successfully overcame two concerns arising from previous risk analysis work: (1 the lack of an intuitive, yet comprehensive scoring method enabling the detection and clarification of expert agreement and associated levels of uncertainty; and (2 the ease with which results can be interpreted and communicated while preserving a rich level of detail essential for informed decision making.

  16. Key differences and similarities in ways of managing and supporting radical pharmaceutical front end innovation

    Aagaard, Annabeth

    2015-01-01

    of the Danish and US based pharmaceutical company, H. Lundbeck A/S, and a comparative study including five European and American pharmaceutical companies. The findings from the study reveal a number of similarities and differences in innovation management and FEI support of radical projects and among...... pharmaceutical companies, which represent a growing market. The value added and the contribution of this paper to the existing FEI literature is therefore in the specificity of the empirical setting in which the issue is investigated. Read More: http://www.worldscientific.com/doi/abs/10.1142/S1363919615500115...

  17. Governance and New Technologies: Key Reflections of Informatization on Administrative Management of Judiciary

    Roberto Correia Da Silva Gomes Caldas

    2016-12-01

    Full Text Available The article deals with the consequences of new technologies in the administrativeorganization of the Judiciary and has good management practices that combine economic and social outcomes allies sustainability. The objective is to analyze how new technologies help in the governance of the Judiciary, especially regarding the transposition of the traditional support process paper to electronic court case. We opted for the bibliographical and documentary research using the deductive method. Justified the search because of democracy and globalization connect judicial governance computerization where it seeks to reconcile an administration results with sustainable practices.

  18. Understanding Lolium rigidum Seeds: The Key to Managing a Problem Weed?

    Kathryn J. Steadman

    2012-09-01

    Full Text Available The 40 million hectare southern Australian winter cropping region suffers from widespread infestation by Lolium rigidum (commonly known as annual or rigid ryegrass, a Mediterranean species initially introduced as a pasture plant. Along with its high competitiveness within crops, rapid adaptability and widespread resistance to herbicides, the dormancy of its seeds means that L. rigidum is the primary weed in southern Australian agriculture. With the individuals within a L. rigidum population exhibiting varying levels of seed dormancy, germination can be staggered across the crop-growing season, making complete weed removal virtually impossible, and ensuring that the weed seed bank is constantly replenished. By understanding the processes involved in induction and release of dormancy in L. rigidum seeds, it may be possible to develop strategies to more effectively manage this pest without further stretching herbicide resources. This review examines L. rigidum seed dormancy and germination from a weed-management perspective and explains how the seed bank can be depleted by control strategies encompassing all stages in the lifecycle of a seed, from development to germination.

  19. Health and productivity management: establishing key performance measures, benchmarks, and best practices.

    Goetzel, R Z; Guindon, A M; Turshen, I J; Ozminkowski, R J

    2001-01-01

    Major areas considered under the rubric of health and productivity management (HPM) in American business include absenteeism, employee turnover, and the use of medical, disability, and workers' compensation programs. Until recently, few normative data existed for most HPM areas. To meet the need for normative information in HPM, a series of Consortium Benchmarking Studies were conducted. In the most recent application of the study, 1998 HPM costs, incidence, duration, and other program data were collected from 43 employers on almost one million workers. The median HPM costs for these organizations were $9992 per employee, which were distributed among group health (47%), turnover (37%), unscheduled absence (8%), nonoccupational disability (5%), and workers' compensation programs (3%). Achieving "best-practice" levels of performance (operationally defined as the 25th percentile for program expenditures in each HPM area) would realize savings of $2562 per employee (a 26% reduction). The results indicate substantial opportunities for improvement through effective coordination and management of HPM programs. Examples of best-practice activities collated from on-site visits to "benchmark" organizations are also reviewed.

  20. IT service management - key to the quality of IT service delivering

    Recky, M.

    2004-01-01

    Objective of the contribution is to introduce IT service management (ITSM) as an approach to services quality improvement provided by IT departments of enterprises. As a result of massive application of information technologies in the past, the enterprises have become increasingly dependent on processes within IT of which many are critical for the business operations. Therefore it appears to be inevitable for IT organizations to become customer-oriented. ITSM's objective is to implement standardized and measurable IT services in every enterprise, to enable accurate service cost allocation and increase accuracy of planning of IT budget and investments. This method is based on processes definition, necessary technologies implementation and restructuralisation of human resources in IT organisations. It requires a change of attitude towards IT users who become IT department customers as well as cost-balanced utilization of in-sourcing and out-sourcing etc. Hewlett-Packard is a global leader offering its consulting and integration services in the area of IT service management together with an extensive portfolio of related technologies based on HP OpenView software platform. (author)